SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Source Code Escrow Overview




Overview Presentation Deck
                 Presenter

            February 2009
Presentation Overview
 What Is It?
 Basic Elements Of The Agreement
 When Is It Used?
 How It Works – The Agreement
 How It Works – The Service




       Holding Trust Inc. – Source Code Escrow Overview   Slide 1
Presentation Overview, Cont’d
 Why Is It Used?
 Secondary Benefits
 Variations
 What To Look Out For / Best Practices
 How To Contact Us




       Holding Trust Inc. – Source Code Escrow Overview   Slide 2
What Is It?
 Has been around in many industries in
 order to mitigate risk
 It is used to facilitate the transfer of
 property from one individual to another
 Essentially it consists of an agreement
 between three parties:
   You
   Supplier (Third Party)
   Escrow Agent

         Holding Trust Inc. – Source Code Escrow Overview   Slide 3
Basic Elements Of The Agreement
 An item is deposited with a third person, an
 escrow agent
 It is held in trust or security
 It is delivered to the grantee or promisee on
 the fulfillment of certain future conditions




        Holding Trust Inc. – Source Code Escrow Overview   Slide 4
When Is It Used?
 Liquidation
 Cease of Trade / Business Interruption
 Failure to maintain or meet service level
 agreements (SLAs)
 IP rights assignment (if the new owner
 provides no escrow protection)
 Assist in transfer of ownership of IP rights
 Security investigation of outsourced
 developed applications
        Holding Trust Inc. – Source Code Escrow Overview   Slide 5
How It Works – The Agreement
 You enter agreement with
 agent and third party
                                                           You
 Third party supplies right
 and source code to agent
 Third party provides your
 organization with the
 application                                                      Third
                                    Escrow
                                                                  Party
                                     Agent
                                                                 Supplier

        Holding Trust Inc. – Source Code Escrow Overview          Slide 6
How It Works – The Service
                                            Business interruption
                                            occurs by the third
             You                            party supplier
                                            You contact the
                                            escrow agent notifying
                                            of event
                    Third                   Escrow agent
Escrow              Party
                                            validates the concern
 Agent             Supplier
                                            and releases the
                                            source code to you
         Holding Trust Inc. – Source Code Escrow Overview   Slide 7
Why Is It Used?
 Peace of mind
 Scary marketplace where suppliers may
 go out of business
 Hedging your bets during application
 development
 Important aspect of risk management,
 business continuity and disaster
 recovery planning
 To be up and running in minimal time

       Holding Trust Inc. – Source Code Escrow Overview   Slide 8
Secondary Benefits
 Encourages your supplier to apply
 safeguards internally to protect itself
 and its customers, as they want to
 protect the source code
 In the event of a business interruption,
 the quicker your operations are up and
 running the more able you are to retain
 positive branding


        Holding Trust Inc. – Source Code Escrow Overview   Slide 9
Variations
 SaaS application / data
 Storage / transfer of decryption keys
 Transfer of Website ownership
 Third party critical applications
 Outsourced development of applications
 Other…




       Holding Trust Inc. – Source Code Escrow Overview   Slide 10
What To Look Out For / Best Practices
  Hire an unbiased escrow agent
  Check certifications
  Include documentation in escrow
  Involve change management
  Create a hash for validation purposes
  Validate the software
  Ensure that data is protected (e.g. SaaS)


         Holding Trust Inc. – Source Code Escrow Overview   Slide 11
How To Contact Us
 Web
  www.holdingtrust.com
  www.holdintrust.com
 Phone
  +1 416.910.5183
 Email
  info@holdingtrust.com




         Holding Trust Inc. – Source Code Escrow Overview   Slide 12

Weitere ähnliche Inhalte

Ähnlich wie Source Code Escrow: Protect Your Business with Trusted Escrow Services

Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010simongreaves
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsMani Soft International
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationlucydavidson
 
Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryKyle Conklin
 
Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Guy Huntington
 
Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012aj22dms
 
What the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to KnowWhat the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to KnowChris Mullins
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactionsbrucelb
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
2020 vrm expert reference guide
2020   vrm expert reference guide2020   vrm expert reference guide
2020 vrm expert reference guideAnkitKumar250429
 
Escrow Presentation Final
Escrow Presentation FinalEscrow Presentation Final
Escrow Presentation FinalTony_Clarke
 
Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12Richard Austin
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)tnguyenaci
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security InvestmentJojo Colina
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingJanine Anthony Bowen, Esq.
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationejervis
 

Ähnlich wie Source Code Escrow: Protect Your Business with Trusted Escrow Services (20)

Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game Industry
 
Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities
 
Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012
 
What the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to KnowWhat the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to Know
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactions
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
2020 vrm expert reference guide
2020   vrm expert reference guide2020   vrm expert reference guide
2020 vrm expert reference guide
 
Escrow Presentation Final
Escrow Presentation FinalEscrow Presentation Final
Escrow Presentation Final
 
Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Source Code Escrow: Protect Your Business with Trusted Escrow Services

  • 1. Source Code Escrow Overview Overview Presentation Deck Presenter February 2009
  • 2. Presentation Overview What Is It? Basic Elements Of The Agreement When Is It Used? How It Works – The Agreement How It Works – The Service Holding Trust Inc. – Source Code Escrow Overview Slide 1
  • 3. Presentation Overview, Cont’d Why Is It Used? Secondary Benefits Variations What To Look Out For / Best Practices How To Contact Us Holding Trust Inc. – Source Code Escrow Overview Slide 2
  • 4. What Is It? Has been around in many industries in order to mitigate risk It is used to facilitate the transfer of property from one individual to another Essentially it consists of an agreement between three parties: You Supplier (Third Party) Escrow Agent Holding Trust Inc. – Source Code Escrow Overview Slide 3
  • 5. Basic Elements Of The Agreement An item is deposited with a third person, an escrow agent It is held in trust or security It is delivered to the grantee or promisee on the fulfillment of certain future conditions Holding Trust Inc. – Source Code Escrow Overview Slide 4
  • 6. When Is It Used? Liquidation Cease of Trade / Business Interruption Failure to maintain or meet service level agreements (SLAs) IP rights assignment (if the new owner provides no escrow protection) Assist in transfer of ownership of IP rights Security investigation of outsourced developed applications Holding Trust Inc. – Source Code Escrow Overview Slide 5
  • 7. How It Works – The Agreement You enter agreement with agent and third party You Third party supplies right and source code to agent Third party provides your organization with the application Third Escrow Party Agent Supplier Holding Trust Inc. – Source Code Escrow Overview Slide 6
  • 8. How It Works – The Service Business interruption occurs by the third You party supplier You contact the escrow agent notifying of event Third Escrow agent Escrow Party validates the concern Agent Supplier and releases the source code to you Holding Trust Inc. – Source Code Escrow Overview Slide 7
  • 9. Why Is It Used? Peace of mind Scary marketplace where suppliers may go out of business Hedging your bets during application development Important aspect of risk management, business continuity and disaster recovery planning To be up and running in minimal time Holding Trust Inc. – Source Code Escrow Overview Slide 8
  • 10. Secondary Benefits Encourages your supplier to apply safeguards internally to protect itself and its customers, as they want to protect the source code In the event of a business interruption, the quicker your operations are up and running the more able you are to retain positive branding Holding Trust Inc. – Source Code Escrow Overview Slide 9
  • 11. Variations SaaS application / data Storage / transfer of decryption keys Transfer of Website ownership Third party critical applications Outsourced development of applications Other… Holding Trust Inc. – Source Code Escrow Overview Slide 10
  • 12. What To Look Out For / Best Practices Hire an unbiased escrow agent Check certifications Include documentation in escrow Involve change management Create a hash for validation purposes Validate the software Ensure that data is protected (e.g. SaaS) Holding Trust Inc. – Source Code Escrow Overview Slide 11
  • 13. How To Contact Us Web www.holdingtrust.com www.holdintrust.com Phone +1 416.910.5183 Email info@holdingtrust.com Holding Trust Inc. – Source Code Escrow Overview Slide 12