SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
1
1
Don't Let Open Source be the Deal
Breaker in Your M&A Deal
2
A. Background: Casting the Net
B. Why Should You Care About This?
C. Impact on Due Diligence and Schedules
D. Impact on Deal Terms and Definitive Agreement
E. What Should You Be Doing Now?
F. Final Thoughts
Overview
3
A.  Background: Casting the Net
•  Software+
•  Transactions
•  Business Models
•  Inadvertent Software Companies
4
•  More than just open source software
•  Typically any third party in-licensed software
•  Commercial, freeware and open source
•  In any form: Object code, binary code, source code, firmware,
microcode, drivers, libraries, routines and subroutines
•  Extends to: APIs, SDKs, protocols, specifications and interface
definitions
•  Not just embedded, but also for development and internal use
•  Covers inbound SaaS offerings
•  Sometimes applies to:
•  Hardware
•  Data
•  Inbound content
Background - Casting the Net:
Software+
Really any in-licensed software/service (or more) for
developing, maintaining, supporting and offering your
products and services
5
•  Applies to all sorts of transactions
•  Mergers & Acquisitions
•  Divestitures
•  Financings, including VC/PE investments
•  Loans
•  IPOs
•  Customer agreements
Background - Casting the Net:
Transactions
6
•  Applies to all sorts of business models
•  Traditional distributed
•  Hosting
•  SaaS
•  PaaS
•  IaaS
•  Internal use
•  In support of professional services
Background - Casting the Net:
Business Models
7
EVERYONE
Automotive
Retail
Healthcare
Software
Infrastructure
Banking &
Financial
Services
Internet of
Things
Mobile
Background - Casting the Net:
Software is Everywhere…
8
Background - Casting the Net:
Even Where You Don’t Expect It…Inadvertent Software Companies
Agriculture
Banks and
Financial
Services
Automotive
Design/Custom
Products
- 3D printing
- DNA sequences
Hardware
- Medical Devices
- Lab and Diagnostics
Equipment
- POS terminal/bar code
reader
Content
Provider
- Media Companies
- Publishing
Companies
- Universities
Consumer
Products
- TVs
- Internet of Things
- Wearables
- Toys
- Greeting Cards
- Locks
Mobile Apps; SaaS Platforms; Code on the devices
Distributing and/or Hosting Code
9
B. Why Should You Care About This?
•  The Underlying Risks
•  Licensing and Compliance Risk
•  Security Risk
•  Business and Operational Risk
•  Remediation Risk
•  Overall Impacts on the Deal
•  It’s Not Theoretical Anymore: Recent Litigation
10
Why Should You Care About This?:
The Underlying Risks - Licensing and Compliance Risk
•  Use beyond scope of license
•  Breach of licenses; automatic termination since no materiality
•  Copyright infringement
•  ‘Viral’ infection of proprietary code
•  Automatic grant of licenses to certain of your patents
•  Defensive patent termination rights
•  Transfer/assignment/change-of-control issues
•  Under licensing; not enough seats/licenses
•  Combinations of components under incompatible licenses
•  Notice and attribution non-compliance
•  Failure to comply with licenses for “fourth party” components
11
Why Should You Care About This?:
The Underlying Risks - Security Risk
•  Avoid unknowingly using third party software with known security
vulnerabilities
•  Any vulnerabilities associated with the components?
•  Which components?
•  What are the vulnerabilities?
•  Any patches available?
•  May have more vulnerabilities since the source code is available or
fewer vulnerabilities since more people are looking
12
Why Should You Care About This?:
The Underlying Risks - Business and Operational Risk
•  Dependence on code from competitor/hostile party
•  Think ahead to integration and running the business or things can
become very difficult
•  Changing the offering model
•  Standardizing on certain components
•  May be expensive or impossible to collect the key information later
13
Why Should You Care About This?:
The Underlying Risks - Remediation Risk
Code
Remediation
•  Removing, rewriting or
replacing code
•  Costs: Engineering, time
Legal
Remediation
•  Amending/terminating
agreements, seeking
clarifications, seeking
waivers of past liability,
re-licensing components
and obtaining new
licenses
•  Often hard to remedy
past non-compliance
•  Costs: Legal, time, fees
to licensors
Risk Mitigation/
Allocation
•  Additional
representations and
warranties
•  Remediation-focused
closing conditions and
best efforts covenants
•  Specific indemnities
•  Additional escrows
14
Why Should You Care About This?:
Overall Impacts on the Deal
Macro Impacts:
• Delay
• Signing
• Closing
• Reduce Price
•  By expected cost of
remediation
•  By estimate of past
non-compliance
•  Plus a premium for
the unknown
• Deal certainty
•  Due to conditions
•  Dependence on
third parties
• Kill the deal
•  Upset the build vs.
buy decision
Diligence/Scheduling
Impacts:
•  Inability to provide
basic materials
requested in
diligence and for
schedules
•  List of in-licensed
software with license
and usage for each
item
•  Open source policy
•  Surprises discovered
during diligence
•  Inability to cleanly
make reps
Lead to Additional:
•  Diligence, such as a
code scan
•  Reps and warranties
•  Remediation
covenants and closing
conditions
•  Specific indemnities
•  Escrows
15
•  Shifting landscape of open source license enforcement
•  No longer brought for ideological reasons; now commercial
software companies on both sides with hundreds of millions at risk
•  Recent cases with much in common:
Why Should You Care About This?:
It’s Not Theoretical Anymore: Recent Litigation
Continuent v. Tekelec XimpleWare v. Versata Software
Filed July 2013 November 2013
Likely Settled February 2014 February 2015
Licensing Model Dual Commercial & GPL Dual Commercial & GPL
Claims
GPL violations, copyright infringement,
etc.
GPL violations, copyright infringement,
etc.
Alleged Damages "All profits"
In excess of $150MM for the copyright
suit
Remediation Appeared trivial Patch released in 2 weeks
Transaction Oracle bought Tekelec prior to suit Trilogy bought Versata prior to suit
16
C. Impact on Due Diligence and Schedules
•  Diligence Requests
•  Requests for Policies and Procedures
•  Typical Scheduling Requirements
17
•  Conduct a review of third party in-licensed software
•  Initial step is to request list of in-licensed software, with license and
usage for each component
•  Time to provide the list is important
Impact on Due Diligence and Schedules:
Diligence Requests
18
•  Request third Party in-Licensed software policy
(or lack thereof)
•  Quickly learn a great deal about a company’s business, legal and
engineering practices
•  Date implemented
•  Written
•  Approval process
•  Documentation function
•  Mechanism for on-going compliance
Impact on Due Diligence and Schedules:
Requests for Policies and Procedures
19
Identify All In-Licensed Software Components
•  Incorporated, embedded or integrated
•  Used to offer any Company product/technology
•  Sold with any Company product/technology
•  Otherwise distributed by Company
•  Used or held for use by Company, including use for
development, maintenance, support and testing
Impact on Due Diligence and Schedules:
Typical Scheduling Requirements
20
Impact on Due Diligence and Schedules:
Typical Scheduling Requirements
Information for Each Component:
•  Applicable versions
•  Applicable license agreement
•  How incorporated, embedded or integrated
•  How used internally
•  How distributed or bundled; distinguish source and binary
•  Linking
•  How modified
•  How hosted; allow others to host
•  Relevant Company products/technologies
•  Payment obligations
•  Audit rights
21
List of Contracts Pursuant to Which:
•  Company has agreed to create or maintain
interoperability or compatibility with any third party
software/technology
•  Company has the right to access any software as a
service, platform as a service, infrastructure as a
service, cloud service or similar service
•  Company has the right to access, link to or otherwise
use data or content
Impact on Due Diligence and Schedules:
Typical Scheduling Requirements
22
Exceptions:
•  Generally available commercial off-the-shelf software
with value of less than $1000-$5000
•  Fourth party code; without knowledge
•  Internal use only, non-development related software (e.g.
CRM, HR and accounting software); may be covered
elsewhere
•  In-licensed software incorporated into office equipment or
other equipment/products purchased or leased
Impact on Due Diligence and Schedules:
Typical Scheduling Requirements
23
D. Impact on Deal Terms and
Definitive Agreement
•  Reps and Warranties
•  Covenants and Closing Conditions
•  Specific Indemnities
•  Additional Escrows
24
Except as scheduled, Company has not:
•  Incorporated third party software into, or combined
third party software with, any Company product/
technology
•  Distributed or modified any third party software in
conjunction with or for use with any Company product/
technology
Impact on Deal Terms and Definitive Agreement:
Reps and Warranties
25
Impact on Deal Terms and Definitive Agreement:
Reps and Warranties
Company has not accessed, used, distributed,
hosted or modified any third party software in such
a manner as to:
•  Require disclosure or distribution of any Company product/technology in
source code form
•  Require the licensing of any Company product/technology for the purpose of
making derivative works/modifications
•  Grant the right to decompile, reverse engineer or otherwise derive the source
of any Company product/technology
•  Require distribution of any Company product/technology at no charge or
with limited usage restrictions
•  Limit in any manner the ability to charge fees or seek compensation in
respect of any Company product/technology
•  Place any limitation on the right of the Company to use, host or distribute any
Company product/technology
26
The Company:
•  Has no plans to do any of the foregoing
•  Is in compliance [in all material respects] with
the licenses
•  Has not been subjected to an audit, nor
received any notice of intent to conduct any
such audit
•  Has no payment obligations, except as
scheduled
Impact on Deal Terms and Definitive Agreement:
Reps and Warranties
27
•  Commercially reasonable or best efforts covenant
•  Actual closing condition
•  Typically remediation focused:
•  Code remediation
•  Legal remediation
Impact on Deal Terms and Definitive Agreement:
Covenants and Closing Conditions
28
•  Specific indemnities
•  At a minimum for errors/omissions and breaches/non-
compliance with in-licensed software related reps
•  In respect of certain agreements, licensors and components
•  Often included in IP indemnity and pushes amount higher
•  Additional escrows
•  Set aside for specific issues and to back-stop specific
indemnities
•  Often included in general transaction escrow and pushes
amount higher
Impact on Deal Terms and Definitive Agreement:
Specific Indemnities and Escrows
29
E. What Should You Be Doing Now?
•  Best Practices
•  Sell-Side: Seller/Investee
•  Buy-Side: Buyer/Investor
30
What Should You Be Doing Now?:
Best Practices
•  Have a plan to identify, quantify and mitigate third party software-
related risks
•  Conduct periodic in-licensed software audits and code scans
•  Develop written polices and procedures for using and releasing
open source
•  Implement for both internal code and transactions
•  Include appropriate protections in contracts:
•  Reps and warranties
•  Indemnification
•  Schedules of in-licensed software
•  Rights to complete code scans
31
•  Conduct an in-licensed software audit/code scan
now
•  Identify
•  Analyze
•  Plan/Remediate
•  Put in place a written in-licensed/third party software
policy
•  Review compliance
•  Prepare for diligence
•  Consider industry practices
•  Know your likely buyer/investor
•  Address the red and yellow flags
What Should You Be Doing Now?:
Sell-Side: Seller/Investee
32
•  Develop a game plan
•  Timing is critical
•  Kick-off diligence process early
•  Prioritization is key
•  Update due diligence request lists
•  Update reps and warranties
•  Develop policies regarding acceptable third party
software usage
What Should You Be Doing Now?:
Buy-Side: Buyer/Investor
33
F. Final Thoughts
34
Your
Software
Application
Internally
Developed
Proprietary Code
OSS Community
3rd Party
Commercial Code
Outsourced Code
Development
Final Thoughts:
Protecting and Assessing the Code Base
35
Final Thoughts:
Use of open source software
is unavoidable and can have a
major impact on a transaction
Often
insufficient to
rely on reps
alone
The more you
look the more
you find
Almost
impossible to
undo the
impact of poor
practices
A little can go
a long way
36
Anthony Decicco
Member
GTC Law Group
617.314.7892
adecicco@gtclawgroup.com
www.gtclawgroup.com
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitch
i7
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
Black Duck by Synopsys
 

Was ist angesagt? (20)

Flight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at DocusignFlight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at Docusign
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIs
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
Securing Docker Containers
Securing Docker ContainersSecuring Docker Containers
Securing Docker Containers
 
Flight East 2018 Presentation–Continuous Integration––An Overview
Flight East 2018 Presentation–Continuous Integration––An OverviewFlight East 2018 Presentation–Continuous Integration––An Overview
Flight East 2018 Presentation–Continuous Integration––An Overview
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitch
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
IT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsIT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startups
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk Management
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
nexB: Software Audit for Acquisition Due Diligence
nexB: Software Audit for Acquisition Due DiligencenexB: Software Audit for Acquisition Due Diligence
nexB: Software Audit for Acquisition Due Diligence
 

Ähnlich wie Don't Let Open Source be the Deal Breaker In Your M&A

Pitfalls of Software Licenses (2)
Pitfalls of Software Licenses (2)Pitfalls of Software Licenses (2)
Pitfalls of Software Licenses (2)
ravimohan2
 
NCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsNCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing Vendors
WhitmeyerTuffin
 
EOLE / OWF 12 - Public procurement of foss-daniel melin (eole2012)
EOLE / OWF 12 - Public procurement of foss-daniel melin (eole2012)EOLE / OWF 12 - Public procurement of foss-daniel melin (eole2012)
EOLE / OWF 12 - Public procurement of foss-daniel melin (eole2012)
Paris Open Source Summit
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
Dale White
 

Ähnlich wie Don't Let Open Source be the Deal Breaker In Your M&A (20)

Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 
Pitfalls of Software Licenses (2)
Pitfalls of Software Licenses (2)Pitfalls of Software Licenses (2)
Pitfalls of Software Licenses (2)
 
NCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsNCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing Vendors
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2Coalition
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
 
EOLE / OWF 12 - Public procurement of foss-daniel melin (eole2012)
EOLE / OWF 12 - Public procurement of foss-daniel melin (eole2012)EOLE / OWF 12 - Public procurement of foss-daniel melin (eole2012)
EOLE / OWF 12 - Public procurement of foss-daniel melin (eole2012)
 
Financial Services Open Source Participation
Financial Services Open Source ParticipationFinancial Services Open Source Participation
Financial Services Open Source Participation
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterIT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - LeedsIT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamIT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
 
'Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions''Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions'
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - London
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cambridge
IT:AM Semina Series - Managing your secrets, protecting your assets - CambridgeIT:AM Semina Series - Managing your secrets, protecting your assets - Cambridge
IT:AM Semina Series - Managing your secrets, protecting your assets - Cambridge
 

Mehr von Black Duck by Synopsys

Mehr von Black Duck by Synopsys (20)

FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOps
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Don't Let Open Source be the Deal Breaker In Your M&A

  • 1. 1 1 Don't Let Open Source be the Deal Breaker in Your M&A Deal
  • 2. 2 A. Background: Casting the Net B. Why Should You Care About This? C. Impact on Due Diligence and Schedules D. Impact on Deal Terms and Definitive Agreement E. What Should You Be Doing Now? F. Final Thoughts Overview
  • 3. 3 A.  Background: Casting the Net •  Software+ •  Transactions •  Business Models •  Inadvertent Software Companies
  • 4. 4 •  More than just open source software •  Typically any third party in-licensed software •  Commercial, freeware and open source •  In any form: Object code, binary code, source code, firmware, microcode, drivers, libraries, routines and subroutines •  Extends to: APIs, SDKs, protocols, specifications and interface definitions •  Not just embedded, but also for development and internal use •  Covers inbound SaaS offerings •  Sometimes applies to: •  Hardware •  Data •  Inbound content Background - Casting the Net: Software+ Really any in-licensed software/service (or more) for developing, maintaining, supporting and offering your products and services
  • 5. 5 •  Applies to all sorts of transactions •  Mergers & Acquisitions •  Divestitures •  Financings, including VC/PE investments •  Loans •  IPOs •  Customer agreements Background - Casting the Net: Transactions
  • 6. 6 •  Applies to all sorts of business models •  Traditional distributed •  Hosting •  SaaS •  PaaS •  IaaS •  Internal use •  In support of professional services Background - Casting the Net: Business Models
  • 8. 8 Background - Casting the Net: Even Where You Don’t Expect It…Inadvertent Software Companies Agriculture Banks and Financial Services Automotive Design/Custom Products - 3D printing - DNA sequences Hardware - Medical Devices - Lab and Diagnostics Equipment - POS terminal/bar code reader Content Provider - Media Companies - Publishing Companies - Universities Consumer Products - TVs - Internet of Things - Wearables - Toys - Greeting Cards - Locks Mobile Apps; SaaS Platforms; Code on the devices Distributing and/or Hosting Code
  • 9. 9 B. Why Should You Care About This? •  The Underlying Risks •  Licensing and Compliance Risk •  Security Risk •  Business and Operational Risk •  Remediation Risk •  Overall Impacts on the Deal •  It’s Not Theoretical Anymore: Recent Litigation
  • 10. 10 Why Should You Care About This?: The Underlying Risks - Licensing and Compliance Risk •  Use beyond scope of license •  Breach of licenses; automatic termination since no materiality •  Copyright infringement •  ‘Viral’ infection of proprietary code •  Automatic grant of licenses to certain of your patents •  Defensive patent termination rights •  Transfer/assignment/change-of-control issues •  Under licensing; not enough seats/licenses •  Combinations of components under incompatible licenses •  Notice and attribution non-compliance •  Failure to comply with licenses for “fourth party” components
  • 11. 11 Why Should You Care About This?: The Underlying Risks - Security Risk •  Avoid unknowingly using third party software with known security vulnerabilities •  Any vulnerabilities associated with the components? •  Which components? •  What are the vulnerabilities? •  Any patches available? •  May have more vulnerabilities since the source code is available or fewer vulnerabilities since more people are looking
  • 12. 12 Why Should You Care About This?: The Underlying Risks - Business and Operational Risk •  Dependence on code from competitor/hostile party •  Think ahead to integration and running the business or things can become very difficult •  Changing the offering model •  Standardizing on certain components •  May be expensive or impossible to collect the key information later
  • 13. 13 Why Should You Care About This?: The Underlying Risks - Remediation Risk Code Remediation •  Removing, rewriting or replacing code •  Costs: Engineering, time Legal Remediation •  Amending/terminating agreements, seeking clarifications, seeking waivers of past liability, re-licensing components and obtaining new licenses •  Often hard to remedy past non-compliance •  Costs: Legal, time, fees to licensors Risk Mitigation/ Allocation •  Additional representations and warranties •  Remediation-focused closing conditions and best efforts covenants •  Specific indemnities •  Additional escrows
  • 14. 14 Why Should You Care About This?: Overall Impacts on the Deal Macro Impacts: • Delay • Signing • Closing • Reduce Price •  By expected cost of remediation •  By estimate of past non-compliance •  Plus a premium for the unknown • Deal certainty •  Due to conditions •  Dependence on third parties • Kill the deal •  Upset the build vs. buy decision Diligence/Scheduling Impacts: •  Inability to provide basic materials requested in diligence and for schedules •  List of in-licensed software with license and usage for each item •  Open source policy •  Surprises discovered during diligence •  Inability to cleanly make reps Lead to Additional: •  Diligence, such as a code scan •  Reps and warranties •  Remediation covenants and closing conditions •  Specific indemnities •  Escrows
  • 15. 15 •  Shifting landscape of open source license enforcement •  No longer brought for ideological reasons; now commercial software companies on both sides with hundreds of millions at risk •  Recent cases with much in common: Why Should You Care About This?: It’s Not Theoretical Anymore: Recent Litigation Continuent v. Tekelec XimpleWare v. Versata Software Filed July 2013 November 2013 Likely Settled February 2014 February 2015 Licensing Model Dual Commercial & GPL Dual Commercial & GPL Claims GPL violations, copyright infringement, etc. GPL violations, copyright infringement, etc. Alleged Damages "All profits" In excess of $150MM for the copyright suit Remediation Appeared trivial Patch released in 2 weeks Transaction Oracle bought Tekelec prior to suit Trilogy bought Versata prior to suit
  • 16. 16 C. Impact on Due Diligence and Schedules •  Diligence Requests •  Requests for Policies and Procedures •  Typical Scheduling Requirements
  • 17. 17 •  Conduct a review of third party in-licensed software •  Initial step is to request list of in-licensed software, with license and usage for each component •  Time to provide the list is important Impact on Due Diligence and Schedules: Diligence Requests
  • 18. 18 •  Request third Party in-Licensed software policy (or lack thereof) •  Quickly learn a great deal about a company’s business, legal and engineering practices •  Date implemented •  Written •  Approval process •  Documentation function •  Mechanism for on-going compliance Impact on Due Diligence and Schedules: Requests for Policies and Procedures
  • 19. 19 Identify All In-Licensed Software Components •  Incorporated, embedded or integrated •  Used to offer any Company product/technology •  Sold with any Company product/technology •  Otherwise distributed by Company •  Used or held for use by Company, including use for development, maintenance, support and testing Impact on Due Diligence and Schedules: Typical Scheduling Requirements
  • 20. 20 Impact on Due Diligence and Schedules: Typical Scheduling Requirements Information for Each Component: •  Applicable versions •  Applicable license agreement •  How incorporated, embedded or integrated •  How used internally •  How distributed or bundled; distinguish source and binary •  Linking •  How modified •  How hosted; allow others to host •  Relevant Company products/technologies •  Payment obligations •  Audit rights
  • 21. 21 List of Contracts Pursuant to Which: •  Company has agreed to create or maintain interoperability or compatibility with any third party software/technology •  Company has the right to access any software as a service, platform as a service, infrastructure as a service, cloud service or similar service •  Company has the right to access, link to or otherwise use data or content Impact on Due Diligence and Schedules: Typical Scheduling Requirements
  • 22. 22 Exceptions: •  Generally available commercial off-the-shelf software with value of less than $1000-$5000 •  Fourth party code; without knowledge •  Internal use only, non-development related software (e.g. CRM, HR and accounting software); may be covered elsewhere •  In-licensed software incorporated into office equipment or other equipment/products purchased or leased Impact on Due Diligence and Schedules: Typical Scheduling Requirements
  • 23. 23 D. Impact on Deal Terms and Definitive Agreement •  Reps and Warranties •  Covenants and Closing Conditions •  Specific Indemnities •  Additional Escrows
  • 24. 24 Except as scheduled, Company has not: •  Incorporated third party software into, or combined third party software with, any Company product/ technology •  Distributed or modified any third party software in conjunction with or for use with any Company product/ technology Impact on Deal Terms and Definitive Agreement: Reps and Warranties
  • 25. 25 Impact on Deal Terms and Definitive Agreement: Reps and Warranties Company has not accessed, used, distributed, hosted or modified any third party software in such a manner as to: •  Require disclosure or distribution of any Company product/technology in source code form •  Require the licensing of any Company product/technology for the purpose of making derivative works/modifications •  Grant the right to decompile, reverse engineer or otherwise derive the source of any Company product/technology •  Require distribution of any Company product/technology at no charge or with limited usage restrictions •  Limit in any manner the ability to charge fees or seek compensation in respect of any Company product/technology •  Place any limitation on the right of the Company to use, host or distribute any Company product/technology
  • 26. 26 The Company: •  Has no plans to do any of the foregoing •  Is in compliance [in all material respects] with the licenses •  Has not been subjected to an audit, nor received any notice of intent to conduct any such audit •  Has no payment obligations, except as scheduled Impact on Deal Terms and Definitive Agreement: Reps and Warranties
  • 27. 27 •  Commercially reasonable or best efforts covenant •  Actual closing condition •  Typically remediation focused: •  Code remediation •  Legal remediation Impact on Deal Terms and Definitive Agreement: Covenants and Closing Conditions
  • 28. 28 •  Specific indemnities •  At a minimum for errors/omissions and breaches/non- compliance with in-licensed software related reps •  In respect of certain agreements, licensors and components •  Often included in IP indemnity and pushes amount higher •  Additional escrows •  Set aside for specific issues and to back-stop specific indemnities •  Often included in general transaction escrow and pushes amount higher Impact on Deal Terms and Definitive Agreement: Specific Indemnities and Escrows
  • 29. 29 E. What Should You Be Doing Now? •  Best Practices •  Sell-Side: Seller/Investee •  Buy-Side: Buyer/Investor
  • 30. 30 What Should You Be Doing Now?: Best Practices •  Have a plan to identify, quantify and mitigate third party software- related risks •  Conduct periodic in-licensed software audits and code scans •  Develop written polices and procedures for using and releasing open source •  Implement for both internal code and transactions •  Include appropriate protections in contracts: •  Reps and warranties •  Indemnification •  Schedules of in-licensed software •  Rights to complete code scans
  • 31. 31 •  Conduct an in-licensed software audit/code scan now •  Identify •  Analyze •  Plan/Remediate •  Put in place a written in-licensed/third party software policy •  Review compliance •  Prepare for diligence •  Consider industry practices •  Know your likely buyer/investor •  Address the red and yellow flags What Should You Be Doing Now?: Sell-Side: Seller/Investee
  • 32. 32 •  Develop a game plan •  Timing is critical •  Kick-off diligence process early •  Prioritization is key •  Update due diligence request lists •  Update reps and warranties •  Develop policies regarding acceptable third party software usage What Should You Be Doing Now?: Buy-Side: Buyer/Investor
  • 34. 34 Your Software Application Internally Developed Proprietary Code OSS Community 3rd Party Commercial Code Outsourced Code Development Final Thoughts: Protecting and Assessing the Code Base
  • 35. 35 Final Thoughts: Use of open source software is unavoidable and can have a major impact on a transaction Often insufficient to rely on reps alone The more you look the more you find Almost impossible to undo the impact of poor practices A little can go a long way
  • 36. 36 Anthony Decicco Member GTC Law Group 617.314.7892 adecicco@gtclawgroup.com www.gtclawgroup.com Thank You