• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Database Design Copyright abuse"

Collapse

  • Lucy
    replied
    Originally posted by Fishface View Post
    My client runs a system that my co owns.

    They want to get the data out of the database.

    We have told them we would build an interface for them to get the data.

    However they have some guy hacking around in the database trying to piece it together.

    Is there anything I can do to stop this happening?

    The source code is encrypted however the DB is an open book really SP's, design, keys.

    I think you have bigger things to worry about if you have a face like a fish.

    Leave a comment:


  • kramer
    replied
    why aren't your SPs encrypted... and why do they have the kind of rights to connect directly to the db..???

    Leave a comment:


  • TheFaQQer
    replied
    Originally posted by thunderlizard View Post
    Database copyright law is complex, even by software copyright standards. There's a good section on it in David Bainbridge, "Software Copyright Law".
    Dr. Bainbridge is the recognized guru on this kind of thing - part of my degree focused on new technology and the law, with him as the lecturer.

    Get hold of the book, and see what there is in there - you may be able to do something, but my gut feeling would be not.

    Leave a comment:


  • King Cnvt
    replied
    My client runs a system that my co owns.

    They want to get the data out of the database.
    Can't you dump all their data out to a set of CSV files (for example) and say "here's your data without the database." Should take all of about an hour to do that on most DB systems.

    Where's the problem in that?

    Leave a comment:


  • thunderlizard
    replied
    Database copyright law is complex, even by software copyright standards. There's a good section on it in David Bainbridge, "Software Copyright Law".

    Depending on contracts obviously, your company may indeed have IP rights on the design, and even on the data itself if it was compiled using your company's effort and ingenuity.

    I think the main principle is one of fair use. If you are effectively holding their data to ransom in a way that was never envisaged by either party, the client is probably justified in reverse-engineering it. But if your offer to build an interface was reasonable (e.g. you can do it in a reasonable time for a reasonable price) they'll find it hard to make that defence.

    But as I say it's complex, so getting a specialist lawyer to help warn them off would be a good first step.

    Leave a comment:


  • Sysman
    replied
    I agree with Milan here.

    It's the client's data, after all.

    Leave a comment:


  • Lucy
    replied
    Milan

    Do you pronounce your last name beanz or bennez ?

    I just wondered because I've always thought of you as milanbeanz or some other rude name and it would be good to sort it out.

    Leave a comment:


  • milanbenes
    replied
    Maybe you would sel more database software if you let customers customize and extend the container ala a popular erp system

    Milan.

    Leave a comment:


  • Cowboy Bob
    replied
    Originally posted by Fishface View Post
    My client runs a system that my co owns.

    They want to get the data out of the database.

    We have told them we would build an interface for them to get the data.

    However they have some guy hacking around in the database trying to piece it together.

    Is there anything I can do to stop this happening?

    The source code is encrypted however the DB is an open book really SP's, design, keys.
    No, I do that all the time to systems. There's a particular system I'm dealing with at the moment where there's a bug in the front-end. So I reverse-engineered their DB to manually correct it. When you need to get something done, you can't always wait for a vendor to fix their bugs first.

    Besides, the data belongs to the client. They should be able to see it in it's raw form should they so wish. Your co only owns the container.

    Leave a comment:


  • Sockpuppet
    replied
    Not really.

    Leave a comment:


  • Fishface
    started a topic Database Design Copyright abuse

    Database Design Copyright abuse

    My client runs a system that my co owns.

    They want to get the data out of the database.

    We have told them we would build an interface for them to get the data.

    However they have some guy hacking around in the database trying to piece it together.

    Is there anything I can do to stop this happening?

    The source code is encrypted however the DB is an open book really SP's, design, keys.

Working...
X