Feeds

Nearly half of top UK firms do not use software escrow

Source code could evaporate if vendors go up in smoke

Beginner's guide to SSL certificates

Almost half of the 350 most valuable listed companies in the UK do not have software escrow agreements in place to give them access to technology if a supplier goes bust, according to an escrow services company.

NCC Group has said that just 189 of the FTSE-350 group of listed firms have escrow agreements in place, meaning that 46 per cent of the FTSE-350 do not.

It said that the 100 most valuable companies listed in the UK, the FTSE-100, performed better. It said that 82 of those companies had an escrow agreement on at least one piece of software.

Software escrow agreements place the source code of software with a secure third party. A list is drawn up of events that will trigger the release of that code. That list usually includes the software firm's bankruptcy, failures to adequately support the software customer, and a change in ownership over the software.

Source code is the underlying material which constitutes a software program. It is not usually available to customers and is essential for any changes to or support of the software. Making the source code available through escrow allows a customer to continue using a product and update it if one of the "trigger events" means that the original supplier is not performing that function.

NCC said that even the 54 per cent of FTSE-350 companies that do have escrow agreements are not fully protected.

"NCC Group’s research found that while 189 of the FTSE-350 have Escrow agreements in place, the majority only protect a small percentage of their business critical software," said the company. "As a result, they could be vulnerable to the risks of applications becoming unavailable when mergers, acquisitions or legal disputes arise."

NCC said that requests for escrow source code jumped by 150 per cent between 2008 and 2009, an increase that it said was due to the recession and to increased software industry merger and acquisition activity.

NCC's director of escrow solutions, Jon Leigh, told OUT-LAW Radio in 2008 that it released about 50 pieces of source code a year.

"The lack of protection among the wider FTSE-350 is extremely concerning, particularly in light of the challenging economic environment and the ever present cyber-security threats that could potentially have a huge impact on software suppliers and software delivered over the internet," said Mark Ormerod, managing director of escrow at NCC. "The issue also appears to be too low on the auditing agenda. Software supplier and availability risks should be established steps in the overall due diligence process, not merely tick boxes that get lost in an auditor’s report."

Escrow is most useful when the source code that is transferred is easily used by the customer company or by another technology firm employed by it to take over responsibility for it. This is not always the case, though, and software programming is not necessarily clear, consistent and reliable.

"It depends on people and the people might be programmers. It might be written a language which is reasonably accessible and it has been written in a pure form, so people who were not involved in its original creation can get to the code and do what they need to do with the code," software law expert Charles Park of Pinsent Masons, the law firm behind OUT-LAW.COM, told OUT-LAW Radio in 2008. "I think bad programming would make a mockery of quite a few escrow arrangements."

Copyright © 2010, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Beginner's guide to SSL certificates

More from The Register

next story
That dreaded syncing feeling: Will Microsoft EVER fix OneDrive?
Microsoft's long history of broken Windows sync
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
SLURP! Flick your TONGUE around our LOLLIPOP – Google
Android 5 is coming – IF you're lucky enough to have the right gadget
Nokia's N1 fondleslab's HIDDEN BRILLIANCE: The 'Z Launcher'
Sugarcoating Android's Lollipop makes tab easier to swallow
Bug fixes! Get your APPLE BUG FIXES! iOS and OS X updates right here!
Yosemite fixes Wi-Fi hiccup, older iOS devices get performance boost
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
Meet Windows 10's new UI for OneDrive – also known as File Explorer
New preview build continues Redmond's retreat to the desktop
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.