We take certain steps to protect our technology including: ??? We rely on a combination of copyrights, patents, trademarks, trade secret laws, restrictions on disclosure, and transferring title and other methods. ??? We enter into confidentiality or license agreements with our employees and consultants, and control access to and distribution of our documentation and other proprietary information.