Skip to navigation Skip to main content Skip to footer

Escrow protection for attorneys

Contact Us

Help Clients Minimize Risk and Maximize the Value of Their Licensing Relationships

Help Ensure Proper Protection for Your Clients

As an attorney representing clients who use or develop software or other technology, you can help ensure proper intellectual property protection by recommending that they leverage Iron Mountain’s comprehensive technology escrow services. Widely acknowledged in the legal community as the industry leader for technology escrow services, an Iron Mountain escrow account will significantly reduce your clients’ technology licensing risks.

At Iron Mountain, we take intellectual property management seriously and deliver our escrow services with the integrity you and your clients would expect — and, in fact, demand — from a trusted and neutral third party.

Comprehensive Escrow Services Meet Your Clients' Unique Needs

Whether your clients’ needs today are for one specific customer, a mission-critical application, or an entire risk management strategy, Iron Mountain provides flexible escrow solutions. Our services are governed the type of agreement that gives your client the optimal level of protection in each unique situation.

Iron Mountain’s escrow services include the key features required by all parties desiring escrow protection, but at the same time are flexible enough to accommodate additional requirements or individual needs.

Security for Software and Technology Users

Software and technology licensees are dependent on their vendors for support and maintenance of their licensed software or technology. They are exposed to risks if the vendor goes out of business or stops supporting the software or technology due to other unforeseen circumstances.

An escrow account with Iron Mountain protects licensees by allowing them to gain access to their vendor’s source code under specific conditions outlined in the escrow agreement. With an escrow in place, licensees have the opportunity to maintain that software without vendor support, while planning how to replace it.

While requesting escrow protection is a prudent business practice when licensing any software or technology of significance, you should seriously consider recommending escrow protection to your clients if:

  • The software or technology is mission-critical
  • Many employees will be using the software or technology
  • The technology impacts your clients’ customers
  • The technology would be difficult or costly to replace
  • Third-party software is embedded into the technology
  • The client is developing or has implemented a corporate risk management strategy

Protection for Technology Developers

Software and technology developers can appreciate the benefits of technology escrow protection too.

As a neutral third party, Iron Mountain dates and timestamps all materials deposited into escrow. This creates an audit trail of the development of software and technology and provides independent validation of the ownership of the related intellectual property.

Iron Mountain has no vested interest in defending one party over another, and has the trust of the courts to vouch for the existence and ownership of all types of intellectual property your clients might want to protect.

Verification: A Fundamental Element of Software Escrow

Although putting software in an escrow account ensures that code will be released if and when a release condition occurs, your licensee clients have no assurance that the software will be complete, usable, or even readable. Don’t forget to stress the importance of Escrow Verification Services to your licensee clients to validate the completeness, accuracy, and functionality of the deposit, and to help ensure that they would be able to read, recreate, and maintain the software upon release.

The Right Agreement for Each Situation

As an attorney, your billable time is extremely valuable, as is your need for flexibility in the services you recommend to your clients. Iron Mountain’s escrow professionals will work with you to define the right level of protection for your clients’ specific requirements, keeping your time investment under control. We have a variety of standard two- and three-party agreements to meet the needs of both developers (escrow depositors) and licensees (escrow beneficiaries).

Assured Privacy and Security

You can rest easy knowing that your clients’ data is completely protected within Iron Mountain’s secure environment for data transfer, data storage, and account management of escrow deposits. Our security framework includes the following attributes:

  • Deposit security. Tracks chain of custody from the time of receipt to the release of the deposit. Vault administrators code and track a physical media deposit upon delivery to a vault. Electronic media deposits are encrypted and transferred to an Iron Mountain vault using secure transfer protocols.
  • Storage security. Prevents unauthorized access to physical and electronic vaults. Iron Mountain stores all escrow media and documents in vaults at secure, offsite facilities, which include uninterruptible power supplies, non-combustible construction, gaseous fire protection, and sophisticated access control security systems.
  • Facility security. Adheres to stringent physical security practices which restrict access to the materials.
  • Deposit retrieval security. When a depositor does not meet the terms stated in their escrow deposit account agreement, a beneficiary can request a release of the deposit materials. Vault administrators do not move the materials from their storage location until they complete a comprehensive internal review and material inventory.


NCC Group Software Resilience has acquired Iron Mountain’s Intellectual Property Management (IPM) business. For more information on the acquisition, please visit our dedicated information hub, or contact Iron Mountain IPM.

Get in touch

Skip to navigation Skip to main content Skip to footer