
Intellectual Property: Reverse Engineering
NDA
Intellectual Property: Reverse Engineering
The following exemplars prohibit any reverse engineering or similar types of activity designed to glean knowledge from disclosed information:
Exemplar N14D-1
The Recipient agrees not to, and not to authorize or knowingly permit any of its current or future directors, officers, employees, subcontractors, agents, consultants, customers or any third person or party to analyze, decompile, disassemble or reverse engineer the Confidential Information or any portion thereof, or attempt to engage in any of the foregoing activities. Recipient shall immediately notify Disclosing Party in writing if, to Recipient’s knowledge, any of Recipient’s former, current or future directors, officers, employees, subcontractors, agents, consultants or customers, or any third person or party analyzes, decompiles, disassembles or reverse engineers the Confidential Information or any portion thereof, or attempts to engage in any of the foregoing activities.
Exemplar N14D-2
The Receiving Party shall keep Confidential Material and all relating information received hereunder confidential and not to display, disassemble, reverse engineer, analyze or otherwise make efforts to try to gain knowledge of its exact contents.
Exemplar N14D-3
The recipient shall use the Information solely for the purposes of the Discussions stated above and SHALL NOT decompile, disassemble, use the Information for the purpose of creating a competitive product or service or copying its features or user interface, reverse engineer or otherwise attempt to discover or disclose the Information, except as may otherwise be mutually agreed upon in writing.
The following exemplar applies to confidential information in the form of software or code:
Exemplar N14D-4
The Receiving Party shall not attempt to (1) reverse engineer, decompile, disassemble or reverse translate any Confidential Information provided by the Disclosing Party, (2) attempt to discover the source code or composition of or trade secrets in any such Confidential Information, (3) analyze the Confidential Information for composition or structure or (4) circumvent any technological measure that controls access to such Information.