Professional Documents
Culture Documents
Journal of Information Systems Management
Journal of Information Systems Management
To cite this article: Paul S. Hoffman (1985) What You Need to Know About Software Contracts, Journal of Information Systems
Management, 2:1, 3-6, DOI: 10.1080/07399018508967733
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained
in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no
representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the
Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and
are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and
should be independently verified with primary sources of information. Taylor and Francis shall not be liable for
any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever
or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of
the Content.
This article may be used for research, teaching, and private study purposes. Any substantial or systematic
reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any
form to anyone is expressly forbidden. Terms & Conditions of access and use can be found at http://
www.tandfonline.com/page/terms-and-conditions
What You Need to
Know About Software
Contracts
Downloaded by [University of Bristol] at 20:03 27 January 2015
Paul S. Hoffman
Long-range planning is an important part of cause they frequently cause contract disputes.
software purchases and a primary difference
Although most standard vendor agreementsA
between hardware and software contracts. With
contain restrictive terms, this language can be
hardware contracts, the equipment is pur-
revised to satisfy specific user requirements. For
chased, installed, and, shortly afterwards, pro- example, the buyer may wish to continue using
vided standard maintenance service (when the external programming support, but the stan-
warranty expires). Software contracts, how-
dard vendor contract stipulates that, to protect
ever, present special concerns, because a long-
the vendor's proprietary rights, the software
term legal relationship is established between cannot be disclosed to any third party. If the
the user and the vendor. buyer can assure the vendor of reasonable pro-
The basic problem encountered in these tection, this provision can be rewritten to permit
contracts is defining the software (the operating disclosure of the software to the programming
code and such support elements as training and service. This article addresses the following
documentation) in terms that are understand- questions concerning proprietary rights:
able to the vendor and the buyer. Software ac- What future rights will the buyer request?
ceptance and warranties are also concerns, be- Who owns modifications?
May the buyer or a third party develop simi-
lar software?
Paul S. Hoffman is a lawyer specializing in computer
May a third party h a v e access t o the
business and software contracts. Croton-on-HudsonNY and software?
is the author of The Software Legal Book. Should source code be furnished?
Winter 1985 3
Definition of Software effective benchmarking standards, the accep-
tance test may never be developed. In the
Defining software can be as simple as nam- worst case, failure to agree on an acceptance
ing an industry-standard product or as complex test may mean that the vendor alone decides
as developing a detailed original definition. The when the software is accepted.
user should review the vendor's functional defi-
nition of the software to ensure that all major Acceptance by Default. An alternative
elements are included. The definition can be approach to acceptance testing (or a supple-
added to the contract as an exhibit or can be ment to the acceptance test agreement) is ad
incorporated by reference to a descriptive docu- hoc acceptance by the user. The typical ad hoc
ment. If software is poorly defined, the user can provision requires the vendor to inform the user
request that the definition be prepared as a sep- when the software is installed and operable.
arate contract or as a milestone in a single The software is considered accepted 30 days
contract. after the date of installation, unless the user has
The contract should usually address ele- notified the vendor in writing of unsatisfied
ments other than the operating code as de- specifications. The provision should also stipu-
Downloaded by [University of Bristol] at 20:03 27 January 2015
liverable~.For example, a provision could re- late the procedures for unacceptable software.
quire that qualified vendor trainers provide two For example, the vendor can be granted an ad-
days of on-site training for user operating per- ditional 30 days after rejection to correct and
sonnel and that training be scheduled in ad- reinstall the software. The process then begins
vance by agreement. Training materials, the again.
number of manuals, and installation and con- The buyer can test the software as much or
version support should also be treated as de- as little as necessary during the 30 days. To re-
liverable~.A price list for additional copies and duce disruption at the user site, a n acceptance
services should be attached. test can be run at the vendor location in the
presence of the user before installation.
Acceptance and Warranty
Considerations Acceptance by Use. Another supple-
mentary provision is acceptance by use. Al-
Once a user accepts the software, final pay- though the user can test the software or per-
ment must be made and the warranty period form parallel runs, live use constitutes
begins. For these reasons, software acceptance acceptance.
requires careful and thorough testing. A recent
trend for some software is to extend the war- Warranties
ranty, thus ameliorating the adverse conse-
quences of hasty acceptance. Most standard vendor contracts exclude all
implied warranties (e.g . , those ensuring the
Acceptance Testing software can be used for a specific application).
Although the vendor may guarantee that the
For standard software, delivery can be con- software matches a functional or technical spec-
sidered as the buyer's acceptance. If software is ification, the warranty is usually limited by a
custom developed by the vendor, the buyer remedy (e.g., tailoring the software to the spec-
must ensure that the software functions proper- ification). Legally, the warranty is the promise
ly before making the final payment. The vendor and the remedy is the user's recourse for an un-
can install the software by running an existing fulfilled warranty. Although the terminology
acceptance test or, if there is n o such test, by varies from contract to contract, a vendor gen-
developing one with the user. erally only warrants that the software is free
from errors that significantly affect its use.
Acceptance Test. A contract provision
requiring that the vendor and buyer develop an Use and Back-up Considerations
acceptance test implies that the parties may be
unable to determine mutually agreeable accep- A typical software vendor directly relates the
tance criteria. Because many users underesti- amount of software use to the cost. Proprietary-
mate the time and effort involved in designing rights restrictions on back-up use and copies are
Software Contracts
not related t o the amount of use. Because the the existing software, the ownership of software
scope of permitted use may not b e clearly developed after the contract is signed cannot be
stated, the contract should be reviewed t o iden- a s easily determined.
tify and match use restrictions to user require-
ments. Common contract restrictions limit soft-
ware use to o n e type of CPU, o n e site, internal
Custom-Developed Software
users only (i. e., services t o a third party are not If a contract involves custom software, the
permitted), and/or the specified customer sub- vendor usually retains ownership. Software,
sidiary. Software generally can be neither used however, should be owned by the party best
at a service bureau nor assigned. able to market it. ,Users want to own the soft-
ware because they paid for it or because it pro-
CPU Limitation. Although a standard vides the organization with a competitive mar-
vendor contract can stipulate that only o n e type ket e d g e . Simply p a y i n g for software
of CPU can use the software, the user may development does not necessarily imply that
have several suitably configured CPUs at the the user owns the software; user ownership
same site. If the software can run on more than must be specified in the contract.
Downloaded by [University of Bristol] at 20:03 27 January 2015
Winter 1985 5
strength of the parties, a possible solution is to Storing escrow source listings o n d i m (un-
include a provision that ensures the contract copyable) fiche. (Some vendors are more
cannot be interpreted to prevent the user from willing t o release a diff icult-to-transcribe list-
developing functionally similar software for itself ing t h a n a readily copyable magnetic
or a third party. Because questionable owner- medium .)
ship makes software unmarketable, this issue Regardless of the escrow arrangement, a user
must be settled in the original contract. should pay the escrow costs as well a s the cost
of producing and depositing copies and should
Disclosure to a Third Party control how often new copies are placed in es-
crow. The user can then monitor code modifi-
Many software contracts prohibit the user cations and source escrow updates.
from disclosing the software to a third party to
preserve the vendor's proprietary rights. As a Although software contracts a r e seldom
result, the software cannot be used by an exter- identical, this article addresses the most com-
nal auditor, software house, freelance program- mon considerations and terms. Although legal
mer, or consultant. Because the vendor is inter- advice should be obtained from a professional,
Downloaded by [University of Bristol] at 20:03 27 January 2015
ested only in protecting its proprietary rights the MIS manager is responsible for ascertaining
and does not want to interfere with the buyer's which aspects of the contract are most signifi-
normal software use and development, the cant t o the MIS function. For further insight into
vendor usually accepts a provision that allows software contract terms, acceptance testing and
the user to disclose the software to a third party warran ties, and proprietary rights, please con-
if an agreement of confidentiality is signed. sult the bibliography.
If source code is not furnished under the Bender, D. Computer Law: Evidence and Procedure. New
contract, maintenance must be vendor provid- York: Matthew Bender.
ed. Many vendors believe that by retaining the Bigelow, R.P. Computer Law and Tux Report. New York:
source code they are protecting the software Warren, Gorham & bmont Inc.
from modifications and theft. An organization, Bigelow, R.P., ed. Computen t The Law, 3rd ed., Science &
however, must ensure that future maintenance Technology Section, American Bar Association. Chicago:
is always available, even if the user must per- Commerce Clearing House Inc, 1981.
form the maintenance (in which case it must Bigelow, RP., and Nycom, S.H.Your Computer and The Law.
have access to the source code). Englewood Cli& NJ: Prentice-Hall Inc, 1975.
If reluctant to release the source code, the Brandon, D.H., and Segelstein, S. Data Processing Contracts.
New York: Van Nostrand Reinhold, 1976.
vendor may be willing to place it in escrow-a
third party holds the code and releases it t o the Cohen, N.J., ed. Computer Law Reporter. Washington DC:
user if, for example, the vendor declares bank- Computer Law Reporter Inc.
ruptcy. This arrangement is inadequate for Harris, C.E.,ed, CN Report. Winter Park FL: International
code that is modified frequently by the vendor, Computer Negotiations Inc.
because the source code released from escrow Hoffman, P.S. The SoJfware Legal Book. Madison NJ:
probably will not compile into the object code Camegie Press, 1982.
currently run by the user. In addition, the user Goldscheider, R., and Arnold, T., ed. The Law and Business
tends t o focus its attention on the escrpw agent of Licensing. New York: Clark Boardman Company Ltd.
rather than t h e vendor. This can b e self-
defeating when the user wants vendor person- Milgrim, R.M.Trade Secrets. New York: Matthew Bender.
nel who worked on the code to continue main- Nimmer, M.B. Nimmer on Copyright. New York: Matthew
t e n a n c e after t h e vendor has gone o u t of Bender.
business. Rutgers Computen and Technology Lnw Journal. Newark NJ:
Alternative measures for obtaining source Rutgers Law School.
code include: Scott, M.D.,
ed. Computcr/Low Journal Los Angeles: Center
Using vendors that supply source code. for Computer/Law.
Establishing an in-house escrow and escrow Wise, A.N. Trade Secrets and Know-How Throughout The
agent. World. New York: Clark Boardman Company Ltd.
b
6 Winter 1985