SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Source Code Escrow Overview




Overview Presentation Deck
                 Presenter

            February 2009
Presentation Overview
 What Is It?
 Basic Elements Of The Agreement
 When Is It Used?
 How It Works – The Agreement
 How It Works – The Service




       Holding Trust Inc. – Source Code Escrow Overview   Slide 1
Presentation Overview, Cont’d
 Why Is It Used?
 Secondary Benefits
 Variations
 What To Look Out For / Best Practices
 How To Contact Us




       Holding Trust Inc. – Source Code Escrow Overview   Slide 2
What Is It?
 Has been around in many industries in
 order to mitigate risk
 It is used to facilitate the transfer of
 property from one individual to another
 Essentially it consists of an agreement
 between three parties:
   You
   Supplier (Third Party)
   Escrow Agent

         Holding Trust Inc. – Source Code Escrow Overview   Slide 3
Basic Elements Of The Agreement
 An item is deposited with a third person, an
 escrow agent
 It is held in trust or security
 It is delivered to the grantee or promisee on
 the fulfillment of certain future conditions




        Holding Trust Inc. – Source Code Escrow Overview   Slide 4
When Is It Used?
 Liquidation
 Cease of Trade / Business Interruption
 Failure to maintain or meet service level
 agreements (SLAs)
 IP rights assignment (if the new owner
 provides no escrow protection)
 Assist in transfer of ownership of IP rights
 Security investigation of outsourced
 developed applications
        Holding Trust Inc. – Source Code Escrow Overview   Slide 5
How It Works – The Agreement
 You enter agreement with
 agent and third party
                                                           You
 Third party supplies right
 and source code to agent
 Third party provides your
 organization with the
 application                                                      Third
                                    Escrow
                                                                  Party
                                     Agent
                                                                 Supplier

        Holding Trust Inc. – Source Code Escrow Overview          Slide 6
How It Works – The Service
                                            Business interruption
                                            occurs by the third
             You                            party supplier
                                            You contact the
                                            escrow agent notifying
                                            of event
                    Third                   Escrow agent
Escrow              Party
                                            validates the concern
 Agent             Supplier
                                            and releases the
                                            source code to you
         Holding Trust Inc. – Source Code Escrow Overview   Slide 7
Why Is It Used?
 Peace of mind
 Scary marketplace where suppliers may
 go out of business
 Hedging your bets during application
 development
 Important aspect of risk management,
 business continuity and disaster
 recovery planning
 To be up and running in minimal time

       Holding Trust Inc. – Source Code Escrow Overview   Slide 8
Secondary Benefits
 Encourages your supplier to apply
 safeguards internally to protect itself
 and its customers, as they want to
 protect the source code
 In the event of a business interruption,
 the quicker your operations are up and
 running the more able you are to retain
 positive branding


        Holding Trust Inc. – Source Code Escrow Overview   Slide 9
Variations
 SaaS application / data
 Storage / transfer of decryption keys
 Transfer of Website ownership
 Third party critical applications
 Outsourced development of applications
 Other…




       Holding Trust Inc. – Source Code Escrow Overview   Slide 10
What To Look Out For / Best Practices
  Hire an unbiased escrow agent
  Check certifications
  Include documentation in escrow
  Involve change management
  Create a hash for validation purposes
  Validate the software
  Ensure that data is protected (e.g. SaaS)


         Holding Trust Inc. – Source Code Escrow Overview   Slide 11
How To Contact Us
 Web
  www.holdingtrust.com
  www.holdintrust.com
 Phone
  +1 416.910.5183
 Email
  info@holdingtrust.com




         Holding Trust Inc. – Source Code Escrow Overview   Slide 12

Más contenido relacionado

Similar a Source Code Escrow: Protect Your Business with Trusted Escrow Services

Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010simongreaves
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsMani Soft International
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationlucydavidson
 
Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryKyle Conklin
 
Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Guy Huntington
 
Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012aj22dms
 
What the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to KnowWhat the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to KnowChris Mullins
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactionsbrucelb
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
2020 vrm expert reference guide
2020   vrm expert reference guide2020   vrm expert reference guide
2020 vrm expert reference guideAnkitKumar250429
 
Escrow Presentation Final
Escrow Presentation FinalEscrow Presentation Final
Escrow Presentation FinalTony_Clarke
 
Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12Richard Austin
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)tnguyenaci
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security InvestmentJojo Colina
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingJanine Anthony Bowen, Esq.
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationejervis
 

Similar a Source Code Escrow: Protect Your Business with Trusted Escrow Services (20)

Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game Industry
 
Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities
 
Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012
 
What the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to KnowWhat the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to Know
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactions
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
2020 vrm expert reference guide
2020   vrm expert reference guide2020   vrm expert reference guide
2020 vrm expert reference guide
 
Escrow Presentation Final
Escrow Presentation FinalEscrow Presentation Final
Escrow Presentation Final
 
Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Source Code Escrow: Protect Your Business with Trusted Escrow Services

  • 1. Source Code Escrow Overview Overview Presentation Deck Presenter February 2009
  • 2. Presentation Overview What Is It? Basic Elements Of The Agreement When Is It Used? How It Works – The Agreement How It Works – The Service Holding Trust Inc. – Source Code Escrow Overview Slide 1
  • 3. Presentation Overview, Cont’d Why Is It Used? Secondary Benefits Variations What To Look Out For / Best Practices How To Contact Us Holding Trust Inc. – Source Code Escrow Overview Slide 2
  • 4. What Is It? Has been around in many industries in order to mitigate risk It is used to facilitate the transfer of property from one individual to another Essentially it consists of an agreement between three parties: You Supplier (Third Party) Escrow Agent Holding Trust Inc. – Source Code Escrow Overview Slide 3
  • 5. Basic Elements Of The Agreement An item is deposited with a third person, an escrow agent It is held in trust or security It is delivered to the grantee or promisee on the fulfillment of certain future conditions Holding Trust Inc. – Source Code Escrow Overview Slide 4
  • 6. When Is It Used? Liquidation Cease of Trade / Business Interruption Failure to maintain or meet service level agreements (SLAs) IP rights assignment (if the new owner provides no escrow protection) Assist in transfer of ownership of IP rights Security investigation of outsourced developed applications Holding Trust Inc. – Source Code Escrow Overview Slide 5
  • 7. How It Works – The Agreement You enter agreement with agent and third party You Third party supplies right and source code to agent Third party provides your organization with the application Third Escrow Party Agent Supplier Holding Trust Inc. – Source Code Escrow Overview Slide 6
  • 8. How It Works – The Service Business interruption occurs by the third You party supplier You contact the escrow agent notifying of event Third Escrow agent Escrow Party validates the concern Agent Supplier and releases the source code to you Holding Trust Inc. – Source Code Escrow Overview Slide 7
  • 9. Why Is It Used? Peace of mind Scary marketplace where suppliers may go out of business Hedging your bets during application development Important aspect of risk management, business continuity and disaster recovery planning To be up and running in minimal time Holding Trust Inc. – Source Code Escrow Overview Slide 8
  • 10. Secondary Benefits Encourages your supplier to apply safeguards internally to protect itself and its customers, as they want to protect the source code In the event of a business interruption, the quicker your operations are up and running the more able you are to retain positive branding Holding Trust Inc. – Source Code Escrow Overview Slide 9
  • 11. Variations SaaS application / data Storage / transfer of decryption keys Transfer of Website ownership Third party critical applications Outsourced development of applications Other… Holding Trust Inc. – Source Code Escrow Overview Slide 10
  • 12. What To Look Out For / Best Practices Hire an unbiased escrow agent Check certifications Include documentation in escrow Involve change management Create a hash for validation purposes Validate the software Ensure that data is protected (e.g. SaaS) Holding Trust Inc. – Source Code Escrow Overview Slide 11
  • 13. How To Contact Us Web www.holdingtrust.com www.holdintrust.com Phone +1 416.910.5183 Email info@holdingtrust.com Holding Trust Inc. – Source Code Escrow Overview Slide 12