473,748 Members | 2,658 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Database Copyright

I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same
database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?..... Thanking you
for your assistance.

Regards

Zellan
Nov 13 '05 #1
13 6079
In message <40************ ***********@new s.optusnet.com. au>, Zellan
<Ze****@hotmail .com> writes
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same
database I have designed.

I want to know what I should do to protect myself from unlawful
disseminatio n to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?..... Thanking you
for your assistance.


I don't know how much useful advice you can get from a newsgroup like
this. Like many newsgroups the majority of posters here are likely to be
in the US, so advice to a user in Australia will be of limited value.

But the laws are similar in every country that is a signatory to the
Berne Convention. You may own the copyright to the database design or it
may be owned by the client. Your contract with the client should be
explicit about this. If it isn't explicit then it is safe to assume that
you can't prevent the client doing what they want, because they can
afford more lawyers than you can whatever the law says.

You should be talking to a lawyer about this, not to a newsgroup. If you
want a legal opinion hire a lawyer. If you want a definitive legal
opinion, buy a judge.

--
Bernard Peek
London, UK. DBA, Manager, Trainer & Author. Will work for money.

Nov 13 '05 #2
"Zellan" <Ze****@hotmail .com> wrote in
news:40******** *************** @news.optusnet. com.au:
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the
same database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.


Deal with honest people.

--
Lyle
(for e-mail refer to http://ffdba.com/)
Nov 13 '05 #3

"Lyle Fairfield" <Mi************ @Invalid.Com> wrote in message
news:Xn******** ***********@130 .133.1.4...

Deal with honest people.


So much for posting in CDMA!
Nov 13 '05 #4
If you are 'starting' a business doing databases and have a 'potential'
client then I would say worry less about copyright infringement and more
about getting the job and doing it successfully.

You can probably make any agreement you like over who 'owns' the copyright
to the software. Mr Fairfield's advice to only deal with honest people is
fine and dandy. A lot of people aren't honest and will try to get software
for free if they can.

But who are you dealing with? A small company with different users? Then it
doesn't make sense to limit use of your system to a few people within the
company. You actually _want_ everybody to use it. Then they'll come back to
you for the next job, because you'll get a good reputation with lots of
users.

Otherwise do manual installs, with an MDE, encrypted, and do some routine on
critical forms that checks the serial number of some hardware, like the disk
drive, so that the software won't work on a different machine. As protection
it works, but it's pretty drastic, and unless you make the customer aware,
they're going to be pretty unhappy when they try to move it and it fails.
Still, if you've got a 'this software can only be installed on these
machines' type agreement, then they can't complain.

Emily

"Zellan" <Ze****@hotmail .com> wrote in message
news:40******** *************** @news.optusnet. com.au...
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?..... Thanking you for your assistance.

Regards

Zellan

Nov 13 '05 #5
Bob
On Sun, 13 Jun 2004 18:38:11 +0100, "Emily Jones"
<em************ @hotmail.com> wrote:
If you are 'starting' a business doing databases and have a 'potential'
client then I would say worry less about copyright infringement and more
about getting the job and doing it successfully.

You can probably make any agreement you like over who 'owns' the copyright
to the software. Mr Fairfield's advice to only deal with honest people is
fine and dandy. A lot of people aren't honest and will try to get software
for free if they can.

But who are you dealing with? A small company with different users? Then it
doesn't make sense to limit use of your system to a few people within the
company. You actually _want_ everybody to use it. Then they'll come back to
you for the next job, because you'll get a good reputation with lots of
users.

Otherwise do manual installs, with an MDE, encrypted, and do some routine on
critical forms that checks the serial number of some hardware, like the disk
drive, so that the software won't work on a different machine. As protection
it works, but it's pretty drastic, and unless you make the customer aware,
Wow Emily! How is that possible. I always thought you had to have a
widget that you plug in between the screen monitor and computer box.
Any details available.

Regards Smil;ey Bob
they're going to be pretty unhappy when they try to move it and it fails.
Still, if you've got a 'this software can only be installed on these
machines' type agreement, then they can't complain.

Emily


Nov 13 '05 #6
Sell your service rather than the software.

I am a great believer in the open source concept. That is to say, a program
is a scientific discovery, invention that should not be kept a secret.
However, if you happened to be the scientist who discovered it then sure
they will hire you (at good rates), to train them, customise it, etc....

I would be flattered if they passed on the software to others..... Just make
sure that your name is listed at the top with your contact details so that
they will contact you when they need help. It will also be a very powerful
marketing tool for your business. Most access programmers are hired on
recommendation, so as long as you make a good application then you will get
more business out of it.

This is a much more positive approach then the one of trying to hold things
for yourself and it is also a much more desirable approach on a community
level.

Good luck
- Nicolaas
Nov 13 '05 #7
Dealing with honest and trustworthy people is a good beginning but remember,
locks are made to secure things against honest people, thieves see locks as
just another obstacle to get through.

Claim copyright protection in several places throughout your application.
Create your own splash screen and make sure the copyright notice is plainly
visible on it. My name is also semi-automatically inserted into every
routine I write.. Put a copyright notice on your project notes and other
project documentation, especially any User Manual or Help file.

Make sure you are clear with your customers that they have the right to run
only that number of copies of your application that they purchase from you
and that other copying constitutes copyright infringement and possibly
theft. They don't own the software, you do. They own a license to use
their copy or copies of the software.

Beyond that, get a lawyer. Note that all of the copyright notices in the
world won't stop a thief from copying your software. It provides a basis
for suit it that it shows you are diligently trying to protect your rights.
You might search the net for "copyright" and see what you get. You can also
do a google search for the word.

All that being said, if you have a reasonable product it will almost
certainly be illegally copied. I wouldn't worry about that overmuch.
People who steal your software can't very call in for software support.
Make it clear that you are continually updating your product and that
registered owners will receive notification ...

In time, people who have used purloined copies of your product may find it
necessary to purchase their own copies. Make sure your contact info is a
part of the product.

Look at theft as involuntary demo ware. For that matter, make a demo
version of each product you deliver that is not unique to a single customer.
Make free or low-cost.

One of the contributors to these newsgroups provides demo software with
footers that state that it is demo software, further, he inhibits the number
of critical cycles he allows that software to complete. When someone
actually purchases his software he then makes sure that their business name
appears in all of the footers. That seems like a pretty good system.

Good Luck.
--
-Larry-
--

"Lyle Fairfield" <Mi************ @Invalid.Com> wrote in message
news:Xn******** ***********@130 .133.1.4...
"Zellan" <Ze****@hotmail .com> wrote in
news:40******** *************** @news.optusnet. com.au:
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the
same database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.


Deal with honest people.

--
Lyle
(for e-mail refer to http://ffdba.com/)

Nov 13 '05 #8
Private Declare Function apiGetVolumeInf ormation Lib "kernel32" Alias
"GetVolumeInfor mationA" _
(ByVal lpRootPathName As String, ByVal lpVolumeNameBuf fer As String,
ByVal nVolumeNameSize As Long, _
lpVolumeSerialN umber As Long, lpMaximumCompon entLength As Long,
lpFileSystemFla gs As Long, _
ByVal lpFileSystemNam eBuffer As String, ByVal nFileSystemName Size As
Long) As Long
Private Const MAX_PATH = 260

Public Function fSerialNumber(s trDriveLetter As String) As String
' Function to return the serial number for a hard drive
' Accepts:
' strDriveLetter - a valid drive letter for the PC, in the format
"C:\"
' Returns:
' The serial number for the drive, formatted as "xxxx-xxxx"
Dim lngReturn As Long, lngDummy1 As Long, lngDummy2 As Long, lngSerial
As Long
Dim strDummy1 As String, strDummy2 As String, strSerial As String
strDummy1 = Space(MAX_PATH)
strDummy2 = Space(MAX_PATH)
lngReturn = apiGetVolumeInf ormation(strDri veLetter, strDummy1,
Len(strDummy1), lngSerial, lngDummy1, lngDummy2, strDummy2, Len(strDummy2))
strSerial = Trim(Hex(lngSer ial))
strSerial = String(8 - Len(strSerial), "0") & strSerial
strSerial = Left(strSerial, 4) & "-" & Right(strSerial , 4)
fSerialNumber = strSerial
End Function

Sub ej_ValDskProc()
Dim lngReturn As Long, lngDummy1 As Long, lngDummy2 As Long, lngSerial As
Long
Dim strDummy1 As String, strDummy2 As String, strSerial As String
strDummy1 = Space(MAX_PATH)
strDummy2 = Space(MAX_PATH)
lngReturn = apiGetVolumeInf ormation("C:\", strDummy1, Len(strDummy1),
lngSerial, lngDummy1, lngDummy2, strDummy2, Len(strDummy2))
strSerial = Trim(Hex(lngSer ial))
strSerial = String(8 - Len(strSerial), "0") & strSerial
strSerial = Left(strSerial, 4) & "-" & Right(strSerial , 4)
If strSerial <> "345E-13BA" And strSerial <> "23DA-457A" Then
MsgBox "Applicatio n Error Code " & strSerial & vbCrLf & vbCrLf & _
"Contact Emily Jones" & vbCrLf & vbCrLf & _
"This application will now terminate", vbCritical
DoCmd.Quit
End If
End Sub

The two If tests test that the hard disk the app is running on is either my
development machine, or the clients machine.

So in the OnOpen of some of the critical forms, maybe also the switchboard,
call ej_ValDskProc() .

Of course for this to work you need to get the hard disk volume number, but
if you're doing manual installs that's no problem.

Now if you compile the app into an MDE, nobody can look at the modules to
work out what you've done, and if you encrypt it they can't even guess by
opening it in a text editor.

Yours, Emily

"Bob" <sm*******@hotm ail.com> wrote in message
news:ii******** *************** *********@4ax.c om...
On Sun, 13 Jun 2004 18:38:11 +0100, "Emily Jones"
<em************ @hotmail.com> wrote:
If you are 'starting' a business doing databases and have a 'potential'
client then I would say worry less about copyright infringement and more
about getting the job and doing it successfully.

You can probably make any agreement you like over who 'owns' the copyrightto the software. Mr Fairfield's advice to only deal with honest people is
fine and dandy. A lot of people aren't honest and will try to get softwarefor free if they can.

But who are you dealing with? A small company with different users? Then itdoesn't make sense to limit use of your system to a few people within the
company. You actually _want_ everybody to use it. Then they'll come back toyou for the next job, because you'll get a good reputation with lots of
users.

Otherwise do manual installs, with an MDE, encrypted, and do some routine oncritical forms that checks the serial number of some hardware, like the diskdrive, so that the software won't work on a different machine. As protectionit works, but it's pretty drastic, and unless you make the customer
aware,
Wow Emily! How is that possible. I always thought you had to have a
widget that you plug in between the screen monitor and computer box.
Any details available.

Regards Smil;ey Bob
they're going to be pretty unhappy when they try to move it and it fails.
Still, if you've got a 'this software can only be installed on these
machines' type agreement, then they can't complain.

Emily


Nov 13 '05 #9
In article <Uh************ **@shrdlu.com>, ba*@shrdlu.com says...
In message <40************ ***********@new s.optusnet.com. au>, Zellan
<Ze****@hotmail .com> writes
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same
database I have designed.

I want to know what I should do to protect myself from unlawful
disseminatio n to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?..... Thanking you
for your assistance.


I don't know how much useful advice you can get from a newsgroup like
this. Like many newsgroups the majority of posters here are likely to be
in the US, so advice to a user in Australia will be of limited value.

But the laws are similar in every country that is a signatory to the
Berne Convention. You may own the copyright to the database design or it
may be owned by the client. Your contract with the client should be
explicit about this. If it isn't explicit then it is safe to assume that
you can't prevent the client doing what they want, because they can
afford more lawyers than you can whatever the law says.

You should be talking to a lawyer about this, not to a newsgroup. If you
want a legal opinion hire a lawyer. If you want a definitive legal
opinion, buy a judge.


Technically a copyright AUTOMATICALLY attaches to ALL original works.
You do not have to do anything, register anything, file anything, or do
anything other than create the work and it is copyright(ed). However,
enforcing a copyright is MUCH easier if one does go through a
registration process. A VERY legal and a 'poor mans' registration is
taking a hard copy of your original work, and mailing it to yourself.
When you get the mail, the postmark is legally a registration date. Of
course you leave the envelope sealed and only open it if legal issues
arise.
Nov 13 '05 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
2477
by: Steve Holden | last post by:
This is even stranger: it makes it if I import the module a second time: import dbimp as dbimp import sys if __name__ == "__main__": dbimp.install() #k = sys.modules.keys() #k.sort() #for kk in k:
5
674
by: Don Vaillancourt | last post by:
Hello all, Over the years as I design more database schemas the more I come up with patterns in database design. The more patterns I recognize the more I want to try to design some kind of generic design patterns that can be used and shared amongst many sub-schemas. For example, the grouping of entities. I may have the following tables: employee, product and client. These tables have no direct relationship with each other. But...
2
2779
by: Ausrack Webmaster | last post by:
Hi, I have a database, which just happens to be the main database on a RAQ4..(cobalt) that even when recreated it still dies, even before readding any tables.. Welcome to psql, the PostgreSQL interactive terminal. Type: \copyright for distribution terms
2
1942
by: Ausrack Webmaster | last post by:
Nobody got any ideas on the below problem? :-( # psql -V psql (PostgreSQL) 7.0.2 contains readline, history, multibyte support Portions Copyright (c) 1996-2000, PostgreSQL, Inc Portions Copyright (c) 1996 Regents of the University of California Read the file COPYRIGHT or use the command \copyright to see the usage and
2
1505
by: Rob | last post by:
I have a customer who wants to copyright a database application I wrote for him. Are there any useful guides out there on how to do this? It is a compiled front-end back-end database application secured with Workgroup (User-level) security. Thanks in advance, Rob
6
3440
by: ronwer | last post by:
Hello, The title doesn't completely cover the question I have, but it's a bit more complicated problem we have. We are using a database, based on Acces, but developed by a third party developer who sells it under his own name. So, functionally it's a very specific database for a specific purpose. Now we want to make certain changes in this database, but for reasons of
1
1013
by: asad | last post by:
Hello, I'm working on a Articles Website.There are many Article categories.when user click on a particular category he/she will got lots of article records, i want to show only 2 to 3 lines of articles and place a Read more link when user click on that he/she get full article, how can i do it, i'm using ASP.NET and MS-Access as a Database Record will show like that,
9
1610
by: Paul H | last post by:
I have nearly finished work on a database for my client. At the start of the project we touched on the subject of reselling the database to other businesses in the same market as my client. How dose one approach this? The client has the contacts (the who's who) and had the initial idea for the database. But I my ideas have added to the functionality of the database and the UI is largely my design and of course the code is 100 percent...
10
4300
by: shsandeep | last post by:
The ETL application loaded around 3000 rows in 14 seconds in a Development database while it took 2 hours to load in a UAT database. UAT db is partitioned. Dev db is not partitioned. the application looks for existing rows in the table...if they already exist then it updates otherwise inserts them. The table is pretty large, around 6.5 million rows.
0
8995
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8832
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
9561
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9381
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
9332
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9254
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8252
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
2
2791
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2217
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.