software developers

Software developers

HomeIndustry expertiseSoftware developers

The Dundas Lawyers® software development team advises software developers and buyers of software, on various issues associated to software development law ancillary compliance.  We act as advisors to organisations ranging from emerging and dynamic growth companies to ASX Listed entities.  Not only do our lawyers know the law relating to software development, but they also understand software development itself by having run development teams maintaining large complex systems and small server side applications.  Our legal services in this area include, for example, drafting, negotiating, settling, and litigating.

Why choose Dundas Lawyers®?

Having exerted Blood Sweat and Years® since April 2010 we are the team you want on your side for the long term to act as the ‘bodyguard’ for your software development business.  Some of the reasons clients choose Dundas Lawyers® include:

  • our Uncommon business acumen;
  • our Uncommon expertise in transactional, compliance and litigious matters;
  • our Uncommon expertise forensic case preparation;
  • our Uncommon customer focus;
  • the fact that we don’t just know law, we know business!
  • how we leverage our Uncommon Nous® to provide client centric solutions.

Considering getting a lawyer to advise your business?

For a confidential, no obligation initial telephone call to find out how we can help your business gain an uncommon advantage in software development, please phone our team on either 1300 386 529 or 07 3221 0013.

Recent insights for software developers

  • Risks when implementing retrieval-augmented generation systems

    Risks when implementing retrieval-augmented generation systems

    Retrieval-augmented generation (RAG) is an artificial intelligence (AI) system architecture that combines large language models (LLMs), such as GPT-4, with external data retrieval processes.

  • What is the US Take It Down Act?

    What is the US Take It Down Act?

    The Tools to Address Known Exploitation by Immobilizing Technological Deepfakes on Websites and Networks Act (Take It Down Act ) is a United States (US) federal law enacted on 19 May 2025. The Take It Down Act amends 47 U.S. Code § 223 (Code) of the Communications Act 1934 (US) (Communications Act) by establishing new…

  • QITC IT contracts framework an introduction

    QITC IT contracts framework an introduction

    In August 2017, the Queensland Government introduced the Queensland Information Technology Contracting (QITC).  The QITC framework replaces the Government Information Technology Contracting (GITC) framework.  It was designed for the purpose of guiding all Queensland Government Information and Communications Technology (ICT) contracts.

  • Domain name disputes – a summary of the process

    Domain name disputes – a summary of the process

    A domain name is a string of text that maps to an alphanumeric IP address, enabling users to access websites through client-side software.[1]  Domains can be valuable business assets, and they frequently become the subject of disputes regarding the legitimacy of their registration among organisations with competing rights.

  • Misuse of confidential information within source code

    Misuse of confidential information within source code

    In Australia, computer code can amount to confidential information as well as being subject to copyright protection.  In some cases the two things overlap as was the case in decision of the Court in Optus Networks Pty Ltd v Telstra Corporation Ltd (2010) 265 ALR 281; [2010] FCAFC 21.

  • Software developer obtains Court order – names behind IP addresses

    Software developer obtains Court order – names behind IP addresses

    Justice Burley of the Federal Court of Australia in the case of Siemens Industry Software Inc v Telstra Corporation Limited [2020] FCA 901 ordered that Telstra, within fourteen (14) days, provide to Siemens all documents in its control relating to the identity of certain Telstra Account holders.  Those account holders were suspected by Siemens of…

Recent Federal Court decisions regarding software developers

  • Mokhtari v Piacentini & Son PL [2025] FCA 26

    PRACTICE AND PROCEDURE – application for orders for preservation of documents – where orders made referring the issue of the extent and nature of discovery for consideration at a conference by a registrar – where applicant alleges that system updates to computing software used by the respondent may compromise the discovery process – whether likely…

  • Gattani v Digital Edge Technologies Pty Ltd (in administration) [2025] FCA 199 (17 March 2025)

    PRACTICE AND PROCEDURE – application by the plaintiff for freezing and ancillary orders concerning the assets of the second defendant and third parties – plaintiff contends that the second defendant: (1) wrongly failed to transfer to the plaintiff the issued shares in the first defendant; (2) diverted funds belonging to the first defendant to the…

  • Take-Two Interactive Software, Inc v Anderson (No 2) [2024]FCA 1459

      COPYRIGHT – circumvention devices – application by copyright owner under ss 116AN and 116AO of Copyright Act 1968 (Cth) (“the Act”) – interpretation of relevant definitions in s 10(1) of the Act – “technological protection measure” – “access control technological protection measure” – “controls access” – whether device, product technology or component requires application…

Send this to a friend