Obviously, in the Website production This includes design, program software, and best practices in software intellectual property protection. It is to seek legal advice from patent or intellectual property law firms. Only intellectual property lawyers can understand the advantages and disadvantages of copyright, patent, trademark, service trademark, trade secret, confidentiality agreement and non competitive agreement, and can provide appropriate guidance. The author is certainly not a lawyer, and what is mentioned in this section or this book cannot be regarded as legal advice. According to the above legal suggestions, technical disciplines should give more consideration, such as the encryption of sensitive information, computer firewall and intrusion prevention, physical security of offices, confidential military software, and even the isolation and use of computer protection screens to prevent waves. Microwave can be used to collect and analyze the tasks being performed by computers and extract confidential data.
Many applications contain proprietary information and algorithms. Some defense and military software may contain confidential information. There are more and more patent infringement lawsuits and intellectual property theft lawsuits, and they continue to grow. Compared with the past, the cases of stealing software data through hackers or bribing staff are also increasing. Commercial software suppliers are also concerned about piracy and illegal copying of software. The solution to this problem includes registering, activating and, in some cases, actually monitoring the operation of the software on the client's computer. However, these solutions are only partially feasible. In many developing countries and even industrialized countries, it is also common to copy illegal commercial software. A common solution is to encrypt key specifications and code segments. However, this method will bring many follow-up problems to the development team, because people need to understand the meaning of unencrypted information.
In the future, a reasonable solution will be combined with cloud computing, that is, the application can be stored on the network server instead of on the personal computer. Although this method can protect the software itself, it is not without problems. It may be subject to the interception of hackers from the wireless network, or even the refusal of access by the stock server. The protection of intellectual property requires legal advice from experts, as well as advice on physical security and network security. Here are only some general suggestions.
Pay attention to ensuring the safety of office, laptop, home computer and, of course, e-mail. When traveling or visiting abroad. Computers and laptops were stolen. Even the loss of a laptop can happen. Many companies prohibit employees from carrying computers overseas. In addition to computer security, it is sometimes necessary to restrict the use of USB flash drives, DVDs, CD ROMs and other removable media. Some companies and government agencies prohibit employees from entering and leaving the office with removable disks.