-
Services
Services
Services--
- Document Management Solutions
- Document Storage
- File management
- Media Storage
- Vault Storage
- File Room Solution
- Digital Solutions
- Document Scanning & E-Hosting
- Digital Invoice Processing
- Employee Management System (HRDMS)
- Contract Management
- Digital Mailroom
- Employee Onboarding
- Source Code Escrow
- Document Destruction
- Paper Destruction
- Product Destruction
- Electronic waste & IT asset disposal
- Certified Data Erasure
- Degaussing & Destruction Service
- Insight
- About Us About Us
- Locations
- Online Store
- Customer Centre
Cloud-Based Escrow: Modern and Convenient
Store software source codes, licenses, and documentation in a secure, encrypted cloud environment for:
- Ease of Access: Quickly deposit and release materials as needed, with TLS and OWASP-compliant access control, restricted privileges, and detailed access logs.
- Real-Time Updates: Effortless version control and updates, ensuring your materials are always current.
- Scalability: Accommodates businesses of all sizes, providing flexible storage solutions.
Global Security Standards: Ensures compliance with leading regulations, including AES256-bit encryption, role-based authentication, and multi-factor authentication (MFA) for enhanced security.
Physical Vault Escrow: Legacy and Redundant Protection
For those who prefer tangible storage, Crown offers state-of-the-art physical vaults where critical software assets are stored on encrypted media.
- Secure Facilities: Climate-controlled, highly secured vaults.
- Dual Strategy: Ideal for businesses seeking both cloud and physical backups.
Escrow Implementation Guide
Verification and Validation Service
Despite their best efforts, software vendors can sometimes make mistakes, resulting in files that are corrupted, incomplete, password-protected, difficult to use, or infected with viruses. To mitigate these risks, Crown Information Management provides a thorough verification service designed to ensure the integrity and usability of your escrowed materials.
Two-Step Code Verification Process
- Default Verification: Inspection of the folder and submission of a detailed report confirming file names, file types, file sizes, and encryption checks.
- Add-on Verification: Code and build verification to create an executable and confirm the compilation of the source code.
Custom Verification
Customised verification as per client requirements, ensuring the deposited source code and its output match the actual application.
By incorporating these verification steps, we ensure the integrity and reliability of the escrowed materials, providing you with the highest level of protection and peace of mind.
Software Escrow Frequently Asked Questions (FAQ)
A software escrow agreement is a legal arrangement where a third-party escrow agent (like Crown) securely stores software source code, documentation, and other materials. It ensures access to these assets if specific conditions (e.g., vendor bankruptcy) are met.
Software escrow protects businesses from the risks of relying on third-party vendors by ensuring access to critical software and preventing operational disruptions.
Source code, licenses, documentation, and any essential software-related materials, including updates and patches, can be stored.
The licensor deposits assets into a secure, encrypted cloud platform managed by Crown. Assets are continuously updated and can be accessed if the agreed release conditions are met.
Our physical vaults are climate-controlled, monitored 24/7, and equipped with advanced security systems to protect encrypted media.
Code verification is an optional service to validate the completeness and functionality of escrowed materials. While not mandatory, it ensures that released materials are ready for use.
Yes, you can regularly update the deposited materials, ensuring the latest versions are stored.
Assets are released when predefined conditions (e.g., vendor insolvency, contract breach) are met. This process is governed by the terms outlined in the escrow agreement.