Software Development user source code protection requirements

Source: Internet
Author: User

Requirements for software development and research enterprises:

With the development of Enterprise Informatization, the competition between software manufacturers is becoming more and more intense, plus the lack of attention to intellectual property in China and the rampant imitation of products. To protect the source code and ensure the core competitiveness of enterprises has become the first priority of many software research and development enterprises. So how should the enterprise ensure the security of the source code? How should enterprises choose a suitable encryption software?

Overview of requirements

Typically, the following conditions exist in the enterprise:

1. internal personnel can pass the secret file through U disk and other mobile storage devices from the computer to copy away;

2. internal personnel can bring their own laptop computer into the company network, and then the secret documents to take away;

3. internal personnel through the Internet will be related to the secret file via mail, QQ, MSN and other sent out;

4. internal personnel can be the secret documents printed, copied out of the company;

5. internal personnel can take the secret files through the CD burning or screen out of the company;

6. The internal personnel can bring the computer or computer hard disk containing the secret files out of the company;

7 , Company's computer lost or repair, including the computer because of the confidential files lost, maintenance and other reasons fell to the hands of external personnel, resulting in the hidden danger of leaks;

8. external visitors to the computer to access the company's network, access to the company's confidential resources to steal secret-related documents leaked;

9. project developers at home to back up a copy of their own development, and even the whole system of source code and development of design documents, whether intentionally or unintentionally will cause the risk of code leakage;

10. The project manager has the complete product source code and development design documentation in hand. These personnel understand the development, understand the project, understand the requirements, become the source code and design documents leaks the major hidden danger;

11. hardware debugging personnel, you can directly send the confidential files to the hardware equipment to transit out, resulting in file leaks;


Software Development user source code protection requirements

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.