Requirements for software development and research enterprises:
With the development of Enterprise Informatization, the competition between software manufacturers is becoming more and more intense, plus the lack of attention to intellectual property in China and the rampant imitation of products. To protect the source code and ensure the core competitiveness of enterprises has become the first priority of many software research and development enterprises. So how should the enterprise ensure the security of the source code? How should enterprises choose a suitable encryption software?
Overview of requirements
Typically, the following conditions exist in the enterprise:
1. internal personnel can pass the secret file through U disk and other mobile storage devices from the computer to copy away;
2. internal personnel can bring their own laptop computer into the company network, and then the secret documents to take away;
3. internal personnel through the Internet will be related to the secret file via mail, QQ, MSN and other sent out;
4. internal personnel can be the secret documents printed, copied out of the company;
5. internal personnel can take the secret files through the CD burning or screen out of the company;
6. The internal personnel can bring the computer or computer hard disk containing the secret files out of the company;
7 , Company's computer lost or repair, including the computer because of the confidential files lost, maintenance and other reasons fell to the hands of external personnel, resulting in the hidden danger of leaks;
8. external visitors to the computer to access the company's network, access to the company's confidential resources to steal secret-related documents leaked;
9. project developers at home to back up a copy of their own development, and even the whole system of source code and development of design documents, whether intentionally or unintentionally will cause the risk of code leakage;
10. The project manager has the complete product source code and development design documentation in hand. These personnel understand the development, understand the project, understand the requirements, become the source code and design documents leaks the major hidden danger;
11. hardware debugging personnel, you can directly send the confidential files to the hardware equipment to transit out, resulting in file leaks;
Software Development user source code protection requirements