Feeds

Nearly half of top UK firms do not use software escrow

Source code could evaporate if vendors go up in smoke

Securing Web Applications Made Simple and Scalable

Almost half of the 350 most valuable listed companies in the UK do not have software escrow agreements in place to give them access to technology if a supplier goes bust, according to an escrow services company.

NCC Group has said that just 189 of the FTSE-350 group of listed firms have escrow agreements in place, meaning that 46 per cent of the FTSE-350 do not.

It said that the 100 most valuable companies listed in the UK, the FTSE-100, performed better. It said that 82 of those companies had an escrow agreement on at least one piece of software.

Software escrow agreements place the source code of software with a secure third party. A list is drawn up of events that will trigger the release of that code. That list usually includes the software firm's bankruptcy, failures to adequately support the software customer, and a change in ownership over the software.

Source code is the underlying material which constitutes a software program. It is not usually available to customers and is essential for any changes to or support of the software. Making the source code available through escrow allows a customer to continue using a product and update it if one of the "trigger events" means that the original supplier is not performing that function.

NCC said that even the 54 per cent of FTSE-350 companies that do have escrow agreements are not fully protected.

"NCC Group’s research found that while 189 of the FTSE-350 have Escrow agreements in place, the majority only protect a small percentage of their business critical software," said the company. "As a result, they could be vulnerable to the risks of applications becoming unavailable when mergers, acquisitions or legal disputes arise."

NCC said that requests for escrow source code jumped by 150 per cent between 2008 and 2009, an increase that it said was due to the recession and to increased software industry merger and acquisition activity.

NCC's director of escrow solutions, Jon Leigh, told OUT-LAW Radio in 2008 that it released about 50 pieces of source code a year.

"The lack of protection among the wider FTSE-350 is extremely concerning, particularly in light of the challenging economic environment and the ever present cyber-security threats that could potentially have a huge impact on software suppliers and software delivered over the internet," said Mark Ormerod, managing director of escrow at NCC. "The issue also appears to be too low on the auditing agenda. Software supplier and availability risks should be established steps in the overall due diligence process, not merely tick boxes that get lost in an auditor’s report."

Escrow is most useful when the source code that is transferred is easily used by the customer company or by another technology firm employed by it to take over responsibility for it. This is not always the case, though, and software programming is not necessarily clear, consistent and reliable.

"It depends on people and the people might be programmers. It might be written a language which is reasonably accessible and it has been written in a pure form, so people who were not involved in its original creation can get to the code and do what they need to do with the code," software law expert Charles Park of Pinsent Masons, the law firm behind OUT-LAW.COM, told OUT-LAW Radio in 2008. "I think bad programming would make a mockery of quite a few escrow arrangements."

Copyright © 2010, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.