473,387 Members | 1,890 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Database Copyright

I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same
database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?.....Thanking you
for your assistance.

Regards

Zellan
Nov 13 '05 #1
13 6033
In message <40***********************@news.optusnet.com.au> , Zellan
<Ze****@hotmail.com> writes
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same
database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?.....Thanking you
for your assistance.


I don't know how much useful advice you can get from a newsgroup like
this. Like many newsgroups the majority of posters here are likely to be
in the US, so advice to a user in Australia will be of limited value.

But the laws are similar in every country that is a signatory to the
Berne Convention. You may own the copyright to the database design or it
may be owned by the client. Your contract with the client should be
explicit about this. If it isn't explicit then it is safe to assume that
you can't prevent the client doing what they want, because they can
afford more lawyers than you can whatever the law says.

You should be talking to a lawyer about this, not to a newsgroup. If you
want a legal opinion hire a lawyer. If you want a definitive legal
opinion, buy a judge.

--
Bernard Peek
London, UK. DBA, Manager, Trainer & Author. Will work for money.

Nov 13 '05 #2
"Zellan" <Ze****@hotmail.com> wrote in
news:40***********************@news.optusnet.com.a u:
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the
same database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.


Deal with honest people.

--
Lyle
(for e-mail refer to http://ffdba.com/)
Nov 13 '05 #3

"Lyle Fairfield" <Mi************@Invalid.Com> wrote in message
news:Xn*******************@130.133.1.4...

Deal with honest people.


So much for posting in CDMA!
Nov 13 '05 #4
If you are 'starting' a business doing databases and have a 'potential'
client then I would say worry less about copyright infringement and more
about getting the job and doing it successfully.

You can probably make any agreement you like over who 'owns' the copyright
to the software. Mr Fairfield's advice to only deal with honest people is
fine and dandy. A lot of people aren't honest and will try to get software
for free if they can.

But who are you dealing with? A small company with different users? Then it
doesn't make sense to limit use of your system to a few people within the
company. You actually _want_ everybody to use it. Then they'll come back to
you for the next job, because you'll get a good reputation with lots of
users.

Otherwise do manual installs, with an MDE, encrypted, and do some routine on
critical forms that checks the serial number of some hardware, like the disk
drive, so that the software won't work on a different machine. As protection
it works, but it's pretty drastic, and unless you make the customer aware,
they're going to be pretty unhappy when they try to move it and it fails.
Still, if you've got a 'this software can only be installed on these
machines' type agreement, then they can't complain.

Emily

"Zellan" <Ze****@hotmail.com> wrote in message
news:40***********************@news.optusnet.com.a u...
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?.....Thanking you for your assistance.

Regards

Zellan

Nov 13 '05 #5
Bob
On Sun, 13 Jun 2004 18:38:11 +0100, "Emily Jones"
<em************@hotmail.com> wrote:
If you are 'starting' a business doing databases and have a 'potential'
client then I would say worry less about copyright infringement and more
about getting the job and doing it successfully.

You can probably make any agreement you like over who 'owns' the copyright
to the software. Mr Fairfield's advice to only deal with honest people is
fine and dandy. A lot of people aren't honest and will try to get software
for free if they can.

But who are you dealing with? A small company with different users? Then it
doesn't make sense to limit use of your system to a few people within the
company. You actually _want_ everybody to use it. Then they'll come back to
you for the next job, because you'll get a good reputation with lots of
users.

Otherwise do manual installs, with an MDE, encrypted, and do some routine on
critical forms that checks the serial number of some hardware, like the disk
drive, so that the software won't work on a different machine. As protection
it works, but it's pretty drastic, and unless you make the customer aware,
Wow Emily! How is that possible. I always thought you had to have a
widget that you plug in between the screen monitor and computer box.
Any details available.

Regards Smil;ey Bob
they're going to be pretty unhappy when they try to move it and it fails.
Still, if you've got a 'this software can only be installed on these
machines' type agreement, then they can't complain.

Emily


Nov 13 '05 #6
Sell your service rather than the software.

I am a great believer in the open source concept. That is to say, a program
is a scientific discovery, invention that should not be kept a secret.
However, if you happened to be the scientist who discovered it then sure
they will hire you (at good rates), to train them, customise it, etc....

I would be flattered if they passed on the software to others..... Just make
sure that your name is listed at the top with your contact details so that
they will contact you when they need help. It will also be a very powerful
marketing tool for your business. Most access programmers are hired on
recommendation, so as long as you make a good application then you will get
more business out of it.

This is a much more positive approach then the one of trying to hold things
for yourself and it is also a much more desirable approach on a community
level.

Good luck
- Nicolaas
Nov 13 '05 #7
Dealing with honest and trustworthy people is a good beginning but remember,
locks are made to secure things against honest people, thieves see locks as
just another obstacle to get through.

Claim copyright protection in several places throughout your application.
Create your own splash screen and make sure the copyright notice is plainly
visible on it. My name is also semi-automatically inserted into every
routine I write.. Put a copyright notice on your project notes and other
project documentation, especially any User Manual or Help file.

Make sure you are clear with your customers that they have the right to run
only that number of copies of your application that they purchase from you
and that other copying constitutes copyright infringement and possibly
theft. They don't own the software, you do. They own a license to use
their copy or copies of the software.

Beyond that, get a lawyer. Note that all of the copyright notices in the
world won't stop a thief from copying your software. It provides a basis
for suit it that it shows you are diligently trying to protect your rights.
You might search the net for "copyright" and see what you get. You can also
do a google search for the word.

All that being said, if you have a reasonable product it will almost
certainly be illegally copied. I wouldn't worry about that overmuch.
People who steal your software can't very call in for software support.
Make it clear that you are continually updating your product and that
registered owners will receive notification ...

In time, people who have used purloined copies of your product may find it
necessary to purchase their own copies. Make sure your contact info is a
part of the product.

Look at theft as involuntary demo ware. For that matter, make a demo
version of each product you deliver that is not unique to a single customer.
Make free or low-cost.

One of the contributors to these newsgroups provides demo software with
footers that state that it is demo software, further, he inhibits the number
of critical cycles he allows that software to complete. When someone
actually purchases his software he then makes sure that their business name
appears in all of the footers. That seems like a pretty good system.

Good Luck.
--
-Larry-
--

"Lyle Fairfield" <Mi************@Invalid.Com> wrote in message
news:Xn*******************@130.133.1.4...
"Zellan" <Ze****@hotmail.com> wrote in
news:40***********************@news.optusnet.com.a u:
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the
same database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.


Deal with honest people.

--
Lyle
(for e-mail refer to http://ffdba.com/)

Nov 13 '05 #8
Private Declare Function apiGetVolumeInformation Lib "kernel32" Alias
"GetVolumeInformationA" _
(ByVal lpRootPathName As String, ByVal lpVolumeNameBuffer As String,
ByVal nVolumeNameSize As Long, _
lpVolumeSerialNumber As Long, lpMaximumComponentLength As Long,
lpFileSystemFlags As Long, _
ByVal lpFileSystemNameBuffer As String, ByVal nFileSystemNameSize As
Long) As Long
Private Const MAX_PATH = 260

Public Function fSerialNumber(strDriveLetter As String) As String
' Function to return the serial number for a hard drive
' Accepts:
' strDriveLetter - a valid drive letter for the PC, in the format
"C:\"
' Returns:
' The serial number for the drive, formatted as "xxxx-xxxx"
Dim lngReturn As Long, lngDummy1 As Long, lngDummy2 As Long, lngSerial
As Long
Dim strDummy1 As String, strDummy2 As String, strSerial As String
strDummy1 = Space(MAX_PATH)
strDummy2 = Space(MAX_PATH)
lngReturn = apiGetVolumeInformation(strDriveLetter, strDummy1,
Len(strDummy1), lngSerial, lngDummy1, lngDummy2, strDummy2, Len(strDummy2))
strSerial = Trim(Hex(lngSerial))
strSerial = String(8 - Len(strSerial), "0") & strSerial
strSerial = Left(strSerial, 4) & "-" & Right(strSerial, 4)
fSerialNumber = strSerial
End Function

Sub ej_ValDskProc()
Dim lngReturn As Long, lngDummy1 As Long, lngDummy2 As Long, lngSerial As
Long
Dim strDummy1 As String, strDummy2 As String, strSerial As String
strDummy1 = Space(MAX_PATH)
strDummy2 = Space(MAX_PATH)
lngReturn = apiGetVolumeInformation("C:\", strDummy1, Len(strDummy1),
lngSerial, lngDummy1, lngDummy2, strDummy2, Len(strDummy2))
strSerial = Trim(Hex(lngSerial))
strSerial = String(8 - Len(strSerial), "0") & strSerial
strSerial = Left(strSerial, 4) & "-" & Right(strSerial, 4)
If strSerial <> "345E-13BA" And strSerial <> "23DA-457A" Then
MsgBox "Application Error Code " & strSerial & vbCrLf & vbCrLf & _
"Contact Emily Jones" & vbCrLf & vbCrLf & _
"This application will now terminate", vbCritical
DoCmd.Quit
End If
End Sub

The two If tests test that the hard disk the app is running on is either my
development machine, or the clients machine.

So in the OnOpen of some of the critical forms, maybe also the switchboard,
call ej_ValDskProc().

Of course for this to work you need to get the hard disk volume number, but
if you're doing manual installs that's no problem.

Now if you compile the app into an MDE, nobody can look at the modules to
work out what you've done, and if you encrypt it they can't even guess by
opening it in a text editor.

Yours, Emily

"Bob" <sm*******@hotmail.com> wrote in message
news:ii********************************@4ax.com...
On Sun, 13 Jun 2004 18:38:11 +0100, "Emily Jones"
<em************@hotmail.com> wrote:
If you are 'starting' a business doing databases and have a 'potential'
client then I would say worry less about copyright infringement and more
about getting the job and doing it successfully.

You can probably make any agreement you like over who 'owns' the copyrightto the software. Mr Fairfield's advice to only deal with honest people is
fine and dandy. A lot of people aren't honest and will try to get softwarefor free if they can.

But who are you dealing with? A small company with different users? Then itdoesn't make sense to limit use of your system to a few people within the
company. You actually _want_ everybody to use it. Then they'll come back toyou for the next job, because you'll get a good reputation with lots of
users.

Otherwise do manual installs, with an MDE, encrypted, and do some routine oncritical forms that checks the serial number of some hardware, like the diskdrive, so that the software won't work on a different machine. As protectionit works, but it's pretty drastic, and unless you make the customer
aware,
Wow Emily! How is that possible. I always thought you had to have a
widget that you plug in between the screen monitor and computer box.
Any details available.

Regards Smil;ey Bob
they're going to be pretty unhappy when they try to move it and it fails.
Still, if you've got a 'this software can only be installed on these
machines' type agreement, then they can't complain.

Emily


Nov 13 '05 #9
In article <Uh**************@shrdlu.com>, ba*@shrdlu.com says...
In message <40***********************@news.optusnet.com.au> , Zellan
<Ze****@hotmail.com> writes
I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same
database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?.....Thanking you
for your assistance.


I don't know how much useful advice you can get from a newsgroup like
this. Like many newsgroups the majority of posters here are likely to be
in the US, so advice to a user in Australia will be of limited value.

But the laws are similar in every country that is a signatory to the
Berne Convention. You may own the copyright to the database design or it
may be owned by the client. Your contract with the client should be
explicit about this. If it isn't explicit then it is safe to assume that
you can't prevent the client doing what they want, because they can
afford more lawyers than you can whatever the law says.

You should be talking to a lawyer about this, not to a newsgroup. If you
want a legal opinion hire a lawyer. If you want a definitive legal
opinion, buy a judge.


Technically a copyright AUTOMATICALLY attaches to ALL original works.
You do not have to do anything, register anything, file anything, or do
anything other than create the work and it is copyright(ed). However,
enforcing a copyright is MUCH easier if one does go through a
registration process. A VERY legal and a 'poor mans' registration is
taking a hard copy of your original work, and mailing it to yourself.
When you get the mail, the postmark is legally a registration date. Of
course you leave the envelope sealed and only open it if legal issues
arise.
Nov 13 '05 #10
"Ima Lostsoul" wrote
Technically a copyright AUTOMATICALLY
attaches to ALL original works. . . . However,
enforcing a copyright is MUCH easier if one
does go through a registration process.

It is true that by default _in the US_ that you have copyright when your
original work is "reduced to tangible form", but there are so many specifics
and exceptions that it really is needful to have advice from a competent
attorney who specializes in patent, copyright, and intellectual property
rights. I am informed that if you expect to get monetary damages in court
for copyright infringement, you had best have registered the copyright (not
"easier", "possible"). Besides, the original poster is not from the US.

Then again, perhaps you, too, are an Aussie and are quoting Australian laws
and practices?
A VERY legal and a 'poor mans' registration is
taking a hard copy of your original work, and
mailing it to yourself. When you get the mail, the
postmark is legally a registration date. Of
course you leave the envelope sealed and only
open it if legal issues arise.


Unfortunately, the "mail to yourself" approach does NOT hold up, according
to many authorities. It _sounds_ good, but just doesn't do what you want it
to.
Larry Linson
Nov 13 '05 #11
On Sun, 13 Jun 2004 22:03:49 +1000, "Zellan" <Ze****@hotmail.com>
wrote:

If you're really serious about it, you may want to investigate the use
of a "dongle", a small hardware device that sits in the parallel or
USB port. Your app checks for it, and if not found raises all kinds of
hell. Alladin is a brand I've used successfully in the past. This was
to secure a US$8,000 per seat application, so the investment was worth
it.

Otherwise it's interesting how often relative beginners are more
concerned about protecting their modest intellectual property than
hardcore professionals are. Focus on selling more, than on catching
the occasional bad guy.

Fact: 85% or more of all software in China is pirated. MSFT is still
developing Chinese-language software.

-Tom.

I am starting a small business designing Access databases and have a
potential client where several different users would be able to use the same
database I have designed.

I want to know what I should do to protect myself from unlawful
dissemination to other clients within this one group.
Is it possible to put a copyright on an individual database or would the
customer sign an agreement to say they would be the sole user.

Can anyone answer or point me towards the right direction?.....Thanking you
for your assistance.

Regards

Zellan


Nov 13 '05 #12
In article <uD******************@nwrddc03.gnilink.net>,
bo*****@localhost.not says...
"Ima Lostsoul" wrote
> Technically a copyright AUTOMATICALLY
> attaches to ALL original works. . . . However,
> enforcing a copyright is MUCH easier if one
> does go through a registration process.

It is true that by default _in the US_ that you have copyright when your
original work is "reduced to tangible form", but there are so many specifics
and exceptions that it really is needful to have advice from a competent
attorney who specializes in patent, copyright, and intellectual property
rights. I am informed that if you expect to get monetary damages in court
for copyright infringement, you had best have registered the copyright (not
"easier", "possible"). Besides, the original poster is not from the US.

Then again, perhaps you, too, are an Aussie and are quoting Australian laws
and practices?
> A VERY legal and a 'poor mans' registration is
> taking a hard copy of your original work, and
> mailing it to yourself. When you get the mail, the
> postmark is legally a registration date. Of
> course you leave the envelope sealed and only
> open it if legal issues arise.


Unfortunately, the "mail to yourself" approach does NOT hold up, according
to many authorities. It _sounds_ good, but just doesn't do what you want it
to.
Larry Linson


Well said Larry... Not sure if I would say it is impossible to enforce
a copyright w/o registration or not as you (might be) imply(ing),
however your points do not fall on deaf ears. As far as the other goes,
of course I would not use the 'mail to yourself' for anything even
slightly major. For a rather minor issue it sint totally useless and
does actaully hold merit.
Nov 13 '05 #13
"Tom van Stiphout" <to*****@no.spam.cox.net> wrote in message
news:07********************************@4ax.com...
On Sun, 13 Jun 2004 22:03:49 +1000, "Zellan" <Ze****@hotmail.com>
wrote:
<snip> Otherwise it's interesting how often relative beginners are more
concerned about protecting their modest intellectual property than
hardcore professionals are. Focus on selling more, than on catching
the occasional bad guy.

Fact: 85% or more of all software in China is pirated. MSFT is still
developing Chinese-language software.

-Tom.


Tom,

IMHO, this points up my contention that the 'real' money in software is in
support and maintenance contracts or upgrade distribution, than in the
original sale.

I tend to sell my products low and (try to) do such good work that the
clients do not think twice about using my services for additional work or
relevant support. It works for me - ymmv.

Incidentally, I saw a snippet on TV last night which supported the claim
that in Australia, car dealerships make a considerable loss on the sale of
the vehicle, but make this up in aftermarket (service, spares etc.) revenue.
The point being contended was that third-party service-only franchises were
savaging car dealership profits, by siphoning off the cream of the
aftermarket services. Moral: Don't go broke making the original sale and
don't overcharge for post-sale services.

Just my $0.02
Doug

--
Remove the blots from my address to reply
Nov 13 '05 #14

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Steve Holden | last post by:
This is even stranger: it makes it if I import the module a second time: import dbimp as dbimp import sys if __name__ == "__main__": dbimp.install() #k = sys.modules.keys() #k.sort() #for...
5
by: Don Vaillancourt | last post by:
Hello all, Over the years as I design more database schemas the more I come up with patterns in database design. The more patterns I recognize the more I want to try to design some kind of...
2
by: Ausrack Webmaster | last post by:
Hi, I have a database, which just happens to be the main database on a RAQ4..(cobalt) that even when recreated it still dies, even before readding any tables.. Welcome to psql, the...
2
by: Ausrack Webmaster | last post by:
Nobody got any ideas on the below problem? :-( # psql -V psql (PostgreSQL) 7.0.2 contains readline, history, multibyte support Portions Copyright (c) 1996-2000, PostgreSQL, Inc Portions...
2
by: Rob | last post by:
I have a customer who wants to copyright a database application I wrote for him. Are there any useful guides out there on how to do this? It is a compiled front-end back-end database application...
6
by: ronwer | last post by:
Hello, The title doesn't completely cover the question I have, but it's a bit more complicated problem we have. We are using a database, based on Acces, but developed by a third party...
1
by: asad | last post by:
Hello, I'm working on a Articles Website.There are many Article categories.when user click on a particular category he/she will got lots of article records, i want to show only 2 to 3 lines of...
9
by: Paul H | last post by:
I have nearly finished work on a database for my client. At the start of the project we touched on the subject of reselling the database to other businesses in the same market as my client. How...
10
by: shsandeep | last post by:
The ETL application loaded around 3000 rows in 14 seconds in a Development database while it took 2 hours to load in a UAT database. UAT db is partitioned. Dev db is not partitioned. the...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.