In a previous article, we discussed a legal strategy for protecting software that involved segmenting software into three tiers and…