source code of the same. The defendants has altered/modified/inserted various external source codes into the plaintiff's original software and are involved ... source code would amount to the copyright violation. The adaptation and modification of the source code as well as KEN_HFS software, ORACLE AFSU software
stated that the petitioners have violated by tampering with the software, schema, source code of the fifth respondent resulting in tremendous loss to the fifth ... committed and reverse engineered the software provided by the fifth respondent company and hacked the software schema source code committing violations of the provisions
from the conspicuous similarity between source code items, column names, object occurring in the applicant's proprietary source code amounting to several thousand instances ... copyright infringement. There was also no modification of source code or software. The allegation that the first respondent had tampered with the schema
plaintiff, however,
did not hand over the source code. He also stated that such source code was
intended to be handed over only after completion ... without the source code. In other words, the
defendant was in a position to put the application to use without the source
code, which would
employee
of the plaintiff Company was entrusted with the source code of the
software U CAMPUS XL 1.0 and also the security key to enable ... defendant who has the security key
and the source code of the plaintiff's software U CAMPUS XL 1.0 has
clandestinely taken away
labels, brochures, books, printed materials including hoardings
and other material and software, source code, mobile applications data
including IDs and passwords bearing the impugned trademark
entire case is mainly on the theft of source-code of the software
said to have been developed by the de facto complainant/2nd respondent ... permanent
injunction restraining the accused from using the source-code of the
software developed by the de facto complainant. Meanwhile, a criminal
case in Crime
appropriate
professor from IIT-Madras for the purpose of comparing
source code, software, algorithms, GUI, artistic work and
literary work of the first respondent ... cooperate with the
Advocate Commissioner by submitting their respective
source codes for their respective softwares in sealed
cover to the Advocate Commissioner, who alone will
force. Hence the witnesses who speaks about the source code and
other software issue as alleged by the defacto complainant cannot be
taken ... maintained the source code as per the Information
Technology Act . Hence the list witnesses, which speaks about the
source code and other software issue
software products of the Applicant and other licensed third party software products and the Applicant for this purpose had disclosed the source code ... information of the Applicant, including but not limited to the source codes, computer software programs of the Applicant, that were disclosed on a need