Government level secrecy practices. Being an independent contractor usually performing leading-edge research and design tasks,
our working relationships with our partners and their engineering teams has benefited greatly from this policy, and (except by one
client's request) is not violated. It takes very few clues from loose lips to tip off competitors to the research and development
activities taking place. Therefore, complete secrecy is the generally the best functional policy.
In general, if the client is paying for the discovery and/or development of intellectual property, they own it. All information
provided by a client to us for the purposes of performing our tasks is treated as "CONFIDENTIAL INFORMATION," and is covered by the
non-disclosure agreement. This information is either returned to the client or destroyed at the end of the job. All sensitive
data (schematics, layouts, specifications, plans, VHDL or Assembly codes, spreadsheets, design review documents, User's documentation,
sales and marketing materials, production and customer training materials, etc.) created by GUSTECH is password protected (and usually
also ZIPPED) prior to being electronically moved to the client's engineering team staff members, and typically this is a bilateral
practice. We only maintain project documentation archival if the client requests it (for future reference only), and prefer
to destroy all information at the end of a job.
Contract Electronic Engineering Design Services
Copyright 2008 GUSTECH