"Jeff" <je************ @asken.com.au> wrote in
news:43******** *************** @per-qv1-newsreader-01.iinet.net.au :
Hi
I have a library mde that is used with some customer databases and
I found out that another developer discovered it while doing some
maintenance work on an old database for the same customer and has
copied it to use with her databases. Naturally, I was not
impressed and that story continues. It was not the customers
fault.
I assume she took a copy of the original code from the customers
database and is working out how to use the library mde from that.
For this customer the database is supplied with all source code
and not compiled into an mde.
There are also a few other situations where I suspect the mde may
be getting reused without my permission.
Basically, the mde contains a whole bunch of functions I have
developed over the years and am using it more and more in systems
developed for clients and had not really worried about it being
knocked off, so to speak, until now.
After this little incident I have given this some thought.
I want to allow some customers to reuse the library with databases
they put together, but stop this rip off happening again.
I have considered a few options, but am not really that happy with
any at this stage.
Any suggestions on a reasonably simple method of stopping, or at
least limiting, this from happening again would be appreciated.
Your contract with the client has to control it. After my signature,
I've appended the language I've used where I have exactly the
architecture you've described.
Assuming you have some kind of contract with your client that has
equivalent limitations in it, I believe it's the client's
responsibility to discipline its contractors to not violate the
agreements they've entered into.
If you lack such language in your contract, then it's up to you to
enforce it. Assuming you have already failed at having a reasonable
discussion with the developer who is using it without your
permission, I'd see a lawyer. Perhaps the mere threat of legal
action would get them to stop.
--
David W. Fenton
http://www.dfenton.com/
usenet at dfenton dot com
http://www.dfenton.com/DFA/
=============== =============== =============== =============== =====
APPLICATION COMPONENTS
The completed application will consist of four component parts:
1. An Access2000 MDB file for storing the shared application data
(installed on file server)
2. An Access2000 MDE file for running the application and
viewing/manipulating data in the shared application data MDB
(installed on each client workstation)
3. An Access2000 MDB file including full source code for producing
the MDE file (for reference use and as the basis for future
development)
4. An Access2000 MDE function library (installed on each client
workstation)
Items 1-2 will be fully owned by [CLIENT], while item 4 will be
licensed from David W. Fenton for use by [CLIENT] employees and
affiliates. [CLIENT] will have rights to use and further develop
item 3 as outlined in the following section. During the development
process, the architecture may be simplified to make component
testing more efficient.
SOURCE CODE RIGHTS
· [CLIENT] acquires the rights to use and distribute the finished
application as a whole to its employees and affiliates, without
limitation.
· Further, [CLIENT] obtains ownership and rights to the source code
in the application MDB (see #3 under APPLICATION COMPONENTS, above)
to alter or enhance as [CLIENT] sees fit.
· Also, [CLIENT] obtains a license from David W. Fenton to use the
supporting function library (APPLICATION COMPONENT #4) as part of
the application only, but acquires no rights to distribute, sell or
alter this library, or to utilize it in any other applications.
· Neither [CLIENT] nor David W. Fenton may distribute or sell the
application as a whole, or anything derived from the source code MDB
(component #3), unless both parties agree to that distribution or
sale.