Feeds

CA wins copyright wrangle against ISI

Don't nick the source code kids

5 things you didn’t know about cloud backup

CA Technologies has won a protracted legal battle against Sydney based software company Independent Systems Integrators ( ISI).

In late 2010, CA claimed that ISI had infringed the source code in two of its computer programs and had also breached confidence in documents relating to the computer programs.

The Federal Court of Australia’s Justice Bennett found in favour of CA in relation to both copyright infringement and breach of confidence.

In making her decision, Bennett dealt with issues about copyright protection for computer programs such as whether copyright can subsist in a macro. Details of the decision are pending release.

CA instigated the law suit over a program that it claimed could allow companies to migrate away from CA database platforms onto IBM DB2. The tool was created by developer ISI and Macquarie Bank staff to help Macquarie Bank in database migration during 1996 and 1998.

In its legal case CA alleged that the developer ISI Software infringed copyright when creating the 2BDB2 tool to assist Macquarie Bank's transition off CA's Datacom database.

CA claimed the ISI's software has replicated parts of confidential source and object codes without permission and lost CA revenue via license fees. ®

5 things you didn’t know about cloud backup

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?