You work for HDA Inc. as an auditor of their information system. During an audit, you will evaluate the safeguards that a business has put into place to protect its proprietary code during a collaborative development activity that involves a third party. Which of the following safeguards an organization's proprietary code the most effectively, given this scenario?