License Compliance Software as a Tool for Open Source Risk Management
|
|
|
- Justina Jacobs
- 10 years ago
- Views:
Transcription
1 License Compliance Software as a Tool for Open Source Risk Management Ville Oksanen, Helsinki University of Technology and Mikko Välimäki, Hanken Swedish School of Economics, Finland Introduction Several studies have confirmed that real and perceived legal risks are one of the major obstacles for large-scale adoption of open source products in the corporate environment. Especially intellectual property (mainly copyrights and patents) risk management has become important as the corporate use of open source is increasing and open source start-ups have become targets for mergers and acquisitions. One of the main sources for intellectual property risks are compliance problems with open source licenses: large open source software packages may include components whose license terms are incompatible with the rest of the package. This article describes how license management can tackle the incompliance problem. First, we discuss the increasing relevance of license violation risks in open source development. Second, we explain briefly how different companies and communities are in practise trying to keep control of these risks. Then, we document an experiment with developing an automated license checking and analysing software. Our research project has developed a tool, which retrieves license information inside source code software packages and lists all identified licenses. We describe the design of the software and the outcomes that can be achieved by using it. We also explain the limitations of the current version and compare it to commercial alternatives. Finally, we discuss how the software could be improved to be more useful as part of intellectual property risk management strategy of software companies. In the end, we argue that technical solutions can indeed help minimizing the risks related to unintentional open source license conflicts. In the long term, however, intellectual property risks based on incompatible licenses could be minimized more effectively by reducing the number of open source licenses and by changing the existing licenses to be more compatible with each other. It must be acknowledged, though, that internal license compatibility between open source licenses is only part of the problem: there remains always the risk that a large package may include components under proprietary licenses, or that some part of the package may infringe other intellectual property rights such as the patent law.
2 License Management and the Incompliance Problems Rising Risk Factor Ever since the widely reported legal actions by SCO against major Linux supporters there has been a growing need for intellectual property risk management among open source users and developers. Typical infringement worries include the following: (1) third party source code has been illegally copied into an open source project, (2) license terms of third party components are not followed and (3) third party patent rights are being infringed. Further, the knowledge of the law is not enough and also concrete acts are called for to protect communities and also increasingly companies against the possible consequences of intellectual property violations. The current legislative regime has become rather strict towards any kind of intellectual property violation. This is mainly because major music and movie production companies and their lobby organizations have succeeded in setting the agenda for the international legal development. From their perspective the main goal has been to fight piracy to go against anonymous offshore CD-printers and individual file-sharers on the Internet which obviously requires quite a different toolset than dispute resolution in traditional business-to-business relationships. 1 As a consequence of this regulatory development any intellectual property violation in commercial scale is a cause for criminal prosecution both in Europe and the United States. For example, in Finland a commercial copyright violation is carrying a maximum punishment of two years in prison and in the United States it is up to ten years. In addition to the possible imprisonment, the sanctions also include large fines, other monetary compensation and the destruction of infringing products as well as manufacturing devices including computers. It should be noted that even non-commercial copyright violations are increasingly carrying severe criminal sanctions. For example, the criminal law was changed in Finland in the beginning of this year to make any copyright violation, which takes place in a network and has a potential to cause significant damage to the right holder, to carry the maximum penalty of two years in prison. In the United States the 'No Electronic Theft' Act was passed already in 1997 and it carries penalties of up to five years in prison and up to $250,000 in fines. (Bartow, 2004). Even the non-criminal sanctions against intellectual property violations can be devastating for both communities and companies alike. If a court orders a permanent injunction against a central component of a project based on a copyright or patent violation, minor participants may not have the required resources to correct the situation. Even the cost of hiring a lawyer is often too much for community lead projects and small enterprises. Thus, avoiding risks and violations in the first place should be the soundest strategy. However, this is easier said than done. As illustrated in the Figure 1, the internal logic of intellectual property laws mean that 1 In the software industry, organizations such as Business Software Alliance have been active in this debate.
3 developers and users can be liable for even those violations, which have taken place during the upstream development. 2 IPR holder Infringement claims Original author Developer 1 Developer 2 Developer n End user Infringing contribution Figure 1. Developer-chain and intellectual property infringement (Välimäki & Oksanen 2005) Risk Management in Open Source Environment To counter the rising risk level, open source projects (and companies) have increased the use of different risk management strategies. Some of the better-managed projects and companies established such strategies already in the 1990s. For many developers, SCO s highly public cases against IBM and other Linux supporters launched in 2003 was the final wake-up call that open source software is not in any legal safe-haven. Indeed, the nature of open source means that intellectual property risk management can be more complex than before. Distributed development causes additional uncertainties compared to the traditional model, in which it is possible to keep the developers under stricter control. (c.f. Välimäki & Oksanen 2005 for more detailed analysis of the topic) There are several possible approaches to risk management. In the end, financial constrains are likely to dictate the choices. For example, launching a major lobbying campaign to limit patent liability is typically out of the reach of smaller companies and communities but may well be a good investment for companies like Intel and Cisco, which indeed are hoping to change the patent litigation regulations in the USA. (Lombardi 2006) Similarly, intellectual property insurances and the establishment of a defensive patent portfolio are options, which are too expensive and too complex to manage for most small-scale developers. The most popular and also generally speaking the cheapest risk management tools are related to risk avoidance. For example, staying out of areas of software development, which are heavily patented (e.g. colour management) or otherwise legally in the grey area (e.g. peer-topeer applications) lowers significantly the risk being sued by someone. Similarly, a policy to not accept code from unknown developers reduces the risk of infringing code. A cynical 2 To be precise, the consequences of accidental infringement are in practise much more limited and can in some cases be totally avoided. However, in principle it does not matter whether the infringer for example knew about an infringing patent.
4 observer would also note that staying poor belongs to this category since lawsuits are rarely raised without a profit-motive. (Graham 2006). In addition, most of the open source licenses use standard liability disclaimers in their licenses. While disclaimers may be somewhat effective in limiting liabilities pertaining to damages caused by a malfunctioning software, they offer little to none protection against third party intellectual property violation claims. Correspondingly, disclaimers may not protect companies in all jurisdictions if their customers are consumers. The summary of the risk management options can be found from table 1. Table 1. Different intellectual property defence options for open source developers (Välimäki & Oksanen 2005) Scope Effectivity Speed Price Disclaimers Licensees Low Fast Low Insurance Market Medium Fast Medium to High Patenting Market High Slow High Avoidance Market Medium Fast Varies Lobbying Regulatory Medium to High Slow Medium to High License Incompatibility Problem The open source economy has also its own peculiar problems, which are to a large extent caused by the current high number of incompatible open source licenses. Open Source Initiative (OSI), which grants OSI Certified marks for open source licenses, lists currently almost sixty separate licenses. The problem is that most of the reciprocal licenses are incompatible with each other: open source code licensed under one approved reciprocal license may not be used in a project licensed under another approved reciprocal open source license (e.g. Rosen 2004). There are no good reasons for this many incompatible licenses as many of them are just slightly differently worded copies of each other. Therefore it is very unfortunate that OSI s project to curb the license proliferation has been so far a failure. Only five licenses have been de-recommended by this date (i.e. Sun Industry Standards Source License, Intel Open Source License, the Jabber Open Source License and old versions of Academic Free License and Open Software License; see Majerus 2005) The license proliferation makes it very difficult to keep track on which licenses are compatible with each other. Even lawyers specialised in open source may not be able to answer right away to more exotic queries like is it legal to combine two files, which are licensed with Nethack General Public License and Motosoto License, respectively. Still, most of the projects tend to use a limited set of licenses, which helps keeping the cost of license management at reasonable level.
5 Another set of license related problems is caused by the licenses administered by the Free Software Foundation (FSF). The fuzzy reciprocal nature of General Public License (GPL) has made it difficult to know exactly to what extent and under what circumstances it is possible to combine GPL ed code with other code, which is not licensed with a Free Software License as defined by FSF. (This topic has been already extensively studied, see e.g. Välimäki 2005, ; Rosen 2004, ). The problem with GPL has been highlighted e.g. in the recent cases dealing with the proprietary drivers for the Linux Kernel (Zonk 2006, Smart 2006, Novell 2006). Compatibility issues related to Lesser General Public License (LGPL, FSF s second most popular license) are typically not as well knows as the problems related to GPL. Many developers tend to think that LGPL allows always linking and only direct changes to LGPL d file require sharing the outcome with the public. However, this is not necessary the case due to the complex requirements set in Article 6 of LGPL: 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications... Also, you must do one of these things: * a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) * b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. * c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. * d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. * e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. That is difficult to interpret by developers, or as Rosen (2004, ) puts it: These sections of the LGPL are an impenetrable maze of technological babble. They should not be in a general purpose software license
6 License Compliance Software Background Our research project at the Helsinki University of Technology set a goal to create a tool, which would automate some parts of intellectual property risk management. At the first stage, we chose to concentrate on license compliance issues. Automated license analysis makes it considerable faster and easier to find out what licenses and possible problems exists in open source software packages. A typical open source software package has hundreds or thousands of files, whose copyright holders may have freely chosen the license(s). This means that it is not enough to know what the main license of a project is. It is a common misperception that if software is released e.g. as GPL, all the files will fall automatically under GPL and there is no need to check the files on individual level. In reality, most of the packages carry files with several licenses. Sometimes these licenses are incompatible with each other. A manual license check for thousands of files is tedious and mind-numbing task. Still, for example in a merger or acquisition situation there may be explicit regulation that requires one to find out such legal liabilities. Somewhat surprisingly, we were not able to identify any relevant open source tool, which would help in this process. Some commercial closed-source tools are available, which offer more extensive solutions e.g. advanced file recognition and source code comparison feature to detect also code copying. 3 However, in addition to being pricey, their working logic is not disclosed to the extent one could be fully sure how the check is made and whether there are any gaps in their analysis. Thus, a group of students who participated into our institute s software project course wrote the first version of our Open Source License Checker. 4 The group was supposed to use 150 hours per student on the project, which was estimated to be enough to create a fully working demo version. Unfortunately, the group did not have enough persons specializing in coding and the outcome did not fulfil all the goals we set in the beginning of the course. That said, we believe that the outcome is still something that really helps in the risk assessment and license compliance analysis. Technical Description of the License Compliance Software Functionality First, the program detects licenses in individual source code files and then compares them to its license database. Most of the source files include rather standardized copyright and license information in the beginning of the file. However, license detecting is not enough for detailed analysis. The software should be able to understand also the links between the files because 3 See the products of e.g. Black Duck Software and Palamida The usefulness of code comparison is limited to the extent that it can be only done to code already available in practise other open source code. 4 Available at
7 two files under incompatible open source licenses should not have links between them. The linking information is also readily available since it has to exist for the compiler. The harder task is to describe the incompatibilities and also take into consideration the special rules about linking regarding each license. 5 The current version of the tool does not yet recognize the links, but it has already partial incompatibility information about the licenses stored as part of the database. The tool also detects files, which totally lack license information and files that only refer to e.g. License.txt. It also detects files, which have non-standard licenses or slightly modified versions of the OSI-certified open source licenses. As a consequence, the tool also verifies the licenses for any changes and additions (negative check, not currently activated). After the licenses are recognized and analysed, the tool shows the collected information in easily comprehensible format. The tool allows exportation of the information in such a format that the tool can be added to automatic processes, which monitor e.g. the source code management of the project. Internal Structure Information about the license types is stored in a license database, which is implemented as an XML file and separate text files for the actual license texts. When used, the XML file is read into memory, from where it can be efficiently accessed. The license information is stored in objects. A functionality for automatic database updates is currently not available but it could be added to the software at a later stage. 6 The XML-file is easily extended and the rules about compatibility may be also updated by hand. The software recursively parses through the specified directory structure, and tries to match each source code file with some license from the license database. This is done by trying to find the keywords associated with a particular license from within the source file. If the source file does not match to the license, the process is repeated until every license type in the database has been tried. A possibility for more advanced recognition heuristics exists in the future versions. The possible license match for each file is then stored to generate a clear looking tree structure of the results in the GUI. The license database XML-file uses the acronym of the license as a database key. The XMLfile is used for license information storage, but the actual license texts are stored as separate text files. The XML-file contains the file names of the text files. This allows the system to show the actual license text to the user when needed. The XML file has the following element structure: * licensedb o license 5 For example, GPL allows linking to proprietary libraries, which are a standard part of the operation system. 6 For example, a company could have internal rules about allowed mixing of the licenses, which could be changed on the fly.
8 + name + shortname + licensefile + shortlicensefile + compatibility # class1 # class2 # class3 + keywords # group * keyword + haropallo The main XML element in the license file is the 'licensedb'-element. It has 'license' child elements which in turn have the child elements described by the above list. The exact contents of the elements are described in the Appendix 4. User Interface The aim has been to develop an easy-to-use tool so that even non-technical persons such as many legal professionals can effectively use it. Thus, the tool has a wizard-like user interface, which has four separate windows. In the first window the user is able to choose the target for the inspection. (Appendix 1.) This can be either directory or a compressed file. At this stage, the software does not support any Linux package formats, but this can be easily implemented. After the file is selected, the second window shows a graphical indicator for the license scanning process. (Appendix 2.) The results are presented in the third window. (Appendix 3.). From there, the user gets general information about licenses in the scanned object (e.g. what licenses there are and are there files, which do not have any licenses). For example, in Appendix 3. the package has 13 recognized source files, which are all licensed with the Apache-license. The software shows the files in interactive tree-structured format with individual license information. The user can see the contents of individual files by clicking the file in order to manually check its contents. The user can also print or save the result and check the full license text (the fourth window). The design makes it easy to find the problematic files from the package. However, it could be still improved by adding a possibility for filtering the files based on the license. The software works also from the command line. It has only one parameter i.e. the name of the inspected target. This makes it possible to use the software for automated scripts. Practical Experiences Even though the entire design goal was not met, the tool works already well enough for realworld experimenting. The outcomes differ considerably between well-managed packages and packages, which are done by less meticulous communities. For example, it is quite easy to
9 find license violations in popular open source peer-to-peer software packages. To compare, none of the checked packages distributed by the Apache-foundation had any questionable licensing combinations. The single major problem detected seems to be the lack of licenses. There are lot of packages, which only carry on one license in the readme.txt or license.txt. If a file is taken from this kind package to another package, that may easily cause involuntary change of the license. Thus, in the case of open source, all files should always carry a license notification. Conclusions Intellectual property infringement risks have to be taken seriously in the development and use of open source software. While the general legal knowledge about the problems is increasing, there is still lot of room for improvements to manage the risks in practice. The license compliance software we have developed can be used as a tool to manage licenserelated risks. It helps both community projects and company users to analyse licenses used in open source packages and improve general understanding of open source licensing. Still, the tool is far from a one-size-fits-all solution to manage intellectual property infringement risks: for example, the software can not be used to detect code copying or patent infringements. Further, the functionality of the compliance tool could be improved. The next logical step would be to implement internal linking analysis for incompatible open source licenses. In our opinion, licensing-related legal risks could be also minimized in the long-term through stopping the proliferation of incompatible licenses. Perhaps OSI or some other recognized legal standardization could also create a guide for the marking of the license information in the source files. This could include e.g. a list for hashed versions of the licenses for efficiency (both space and recognition). Unnecessary license incompatibility situations could be also avoided if reciprocal licenses would recognize each other (currently for example Eclipse public license does this 7 ). Finally, we feel that our tool could be used in future empirical research about license compliance in open source development. For example, it would be interesting to analyse which kind of projects tend to have compliance problems and how these problems are resolved when detected. References Brown, S.L., Tilton, A. & Woodside, D.M. The case for online communities. The McKinsey Quarterly, < 7 According to the license text: When the Program is made available in source code form: a) it must be made available under this Agreement or any other OSI-certified copyleft license; and b) a copy of the Agreement must be included with each copy of the Program.
10 Bartow, A The Hegemony of the Copyright Treatise, 73 U. Cin. L. Rev. Graham, P Are Software Patents Evil. HP FAQ for the Partner Linux Driver Process. < Lombardi, C Tech firms to lobby for patent litigation reform. CNET News.com. Published: May 11, 2006, < Majerus, L Voluntary De-Recommendation of Sun's SISSL. to License Proliferation Committee List. < Rosen L. E Open Source Licensing: Software Freedom and Intellectual Property Law. Prentice Hall. Smart, C Kororaa Accused of Violating GPL. Post to website. Saturday, May 13 < Välimäki, M The Rise of Open Source Licensing. Turre Publishing. < Välimäki, M. Oksanen, V Minimizing IPR Infringement Risks in Open Source Projects. Software Development - Proceedings of the International Conference on Software Development, May 27 - June 1, 2005, University of Iceland. University of Iceland Press. Zonk Linux: Kororaa Accused of Violating GPL. News-article. <
11 Appendix 1. Screenshot 1. Start-up screen Appendix 2. Screenshot 2. Inspection Screen
12 Appendix 3. Screenshot 3. Detailed Results
13 Appendix 4. Table 1. The Content of the Elements Element Content Name Contains the full name of the license, e.g. GNU General Public License. Shortname Contains the acronym of the license, e.g. GPL. This field is also used as the database key, i.e. every license must have an unique shortname. Licensefile shortlicensefile compatibility class1 class2 class3 keywords haropallo Contains the name of the file containing the full license text. Contains the name of the file containing the shortened license text, i.e. the one you usually add to the beginning of each source file. Contains three child elements, which contain the compatibility information of this license. Contains the shortnames of licenses that are fully compatible with this license. Contains the shortnames of licenses that are only compatible with this license if the licensed piece of software is dynamically linked as part of another software, i.e. static linking is not allowed. Contains the shortnames of licenses that are completely incompatible with this license. Contains one or more 'group'-elements, which in turn contain one or more 'keyword'-elements. The 'keyword'-elements contain the (hopefully unique) keywords that are used to determine if the examined text matches with this license. Each keyword within a group must exist in order to generate a positive match, but a match from any one group is enough to generate a positive match This is an optional element and used as an indicator for internal entries in the license database. These entries have compatibility information, but no actual license data. For example, some reserved words that aren't supposed to appear in open source licenses are stored in the license database. Licenses with the 'haropallo'-element do not appear in the license browsing window.
An Introduction to the Legal Issues Surrounding Open Source Software
An Introduction to the Legal Issues Surrounding Open Source Software By Daliah Saper Saper Law Offices, LLC 505 N. LaSalle, Suite #350 Chicago, IL 60654 http://www.saperlaw.com Open Source Software Open
OSADL License Compliance Audit (OSADL LCA)
Open Source Automation Development Lab eg OSADL License Compliance Audit (OSADL LCA) 1. Goals Risk management for any company includes the maintenance of legal and contractual obligations. The observance
A free software license for the BUFR software
A free software license for the BUFR software H. Paulitsch / TU-Graz At the first OPERA-III meeting the need for a license for the BUFR software has been discussed in WG2 and TU-Graz has been asked to
Open Source Announcement
Open Source Announcement A software component of this product incorporates source code covered under the GNU Lesser General Public License (LGPL). Acknowledgement: The software included in this product
What You Should Know About Open Source Software
What You Should Know About Open Source Software J.D. Marple Silicon Valley Latham & Watkins operates as a limited liability partnership worldwide with an affiliate in the United Kingdom and Italy, where
If you are submitting changes to the project, please see CONTRIBUTIONS file for more instructions.
================================ Licenses of Third Party Software ================================ This product contains software provided by third parties, which may include the below listed components.
Instructions for specifying the licence terms in Open Source software François Fluckiger, Editor 10 January 2012 Version 1
OSL-2012-01 Open-source Licence - Task force Instructions for specifying the licence terms in Open Source software François Fluckiger, Editor 10 January 2012 Version 1 Contents 1 Rules for the copyright
GNU LIBRARY GENERAL PUBLIC LICENSE. Preamble
GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute
Presentation. Open Source is NOT Free. For ISACA. By Dave Yip / Gamatech Ltd. Agenda
Presentation Open Source is NOT Free For ISACA By Dave Yip / Gamatech Ltd Agenda Gamatech Introduction to Open Source Open Source and Enterprises Open Source Licensing Open Source Risks Open Source Management
Siemens Schweiz AG Building Technologies Division Intellectual Property Gubelstrasse 22 CH 6300 Zug Switzerland
Open Source Software used in the product The product contains, among other things, Open Source Software, licensed under an Open Source Software License and developed by third parties. These Open Source
Open Source Voting Systems
Presented to: 2015 State Certification Testing of Voting Systems National Conference Paul W. Craft Kathleen A. McGregor May, 19, 2015 Introduction One concern raised in the aftermath of Election 2000 was
How To Use Open Source Software
Open Source Software: What You Need to Know Presented By: Lisa Abe, Ian Kyer and Marek Nitoslawski September 15, 2005 Open source software ( OSS ): What you need to know Understanding the business and
The Common Public License (CPL)
08_Rosen_ch08 Page 161 Thursday, June 17, 2004 10:53 AM 8 The Common Public License (CPL) CPL as a Template IBM has long participated in the open source community. Its involvement along with other major
GPL, MIT, BSD, GEHC (and me)
GPL, MIT, BSD, GEHC (and me) Introduction to Open Source Therese Catanzariti author reproduce literary employer COPYRIGHT OWNER commission work for hire has the exclusive right to distribute prepare derivatives
Open Source Software: Strategies and Risk Management
Open Source Software: Strategies and Risk Management Elisabeth Esner i DLA Pper i Rudnick Gray Cary US LLP (858) 677-1484 elisabeth.e isner@dlap iper.com Mark Lehberg DLA Pper i Rudnick Gray Cary US LLP
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction
1. Third Party Software or Free Software License Information
Acer Legal Information 1. Third Party Software or Free Software License Information Software included by Acer on its products or offered by Acer on its websites for download may contain free or third party
CSPA. Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software
CSPA Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software Carlo Vaccari Istat ([email protected]) Index Costs categories
Software Copyright. 1. Introduction. Last update: July 2009
- 1. Introduction...1-1.1. The scope of this briefing paper...1-1.2. "Software" defined...1-2. What is software copyright?...2-3. The Community Directive on software copyright...3-3.1. What does software
Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20
Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed
R&S TSMW Radio Network Analyzer Open Source Acknowledgment
Radio Network Analyzer Open Source Acknowledgment (;Úà@2) 1176.8216.02 03 Test & Measurement Open Source Acknowledgment Contents Contents 1 Introduction... 3 1.1 Disclaimer... 3 1.2 How to obtain the source
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including
Intellectual Property Group Presentation. Using Open Source Software Issues to Consider. Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009
Intellectual Property Group Presentation Using Open Source Software Issues to Consider Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009 I. Agenda Select key terms in various open source licenses
Open Source in the Real World: Beyond the Rhetoric
Open Source in the Real World: Beyond the Rhetoric Maureen Dorney Partner, DLA Piper Kat McCabe Board of Advisors, Black Duck Software, Inc. Gemma Dreher Senior Counsel, BAE Systems Introduction Widespread
Open Source Software: Recent Developments and Public Policy Implications. World Information Technology and Services Alliance
December 2004 Open Source Software: Recent Developments and Public Policy Implications Open source software has become a topic of great interest in the press and among policymakers. Open source software
The Corporate Counsel s Guide to Open Source Software Policy Implementation
The Corporate Counsel s Guide to Open Source Software Policy Implementation How to Protect the Enterprise from Risk while Helping Your Company More Efficiently Develop and Maintain Applications Black Duck
GPL v3 or EUPL? Alternative for Public Sector and their providers
GPL v3 or EUPL? Alternative for Public Sector and their providers European Opensource Lawyers Event Paris, 24 September 2008 European Opensource Lawyers Event Page 1 ID cards Nationality: Parents : Pregnancy:
Code Estimation Tools Directions for a Services Engagement
Code Estimation Tools Directions for a Services Engagement Summary Black Duck software provides two tools to calculate size, number, and category of files in a code base. This information is necessary
Introduction. This answering guide has been prepared in order to make the task of responding to the questionnaire easier for citizens.
Introduction The European Commission launched a public consultation on the Intellectual Property Rights Enforcement Directive (IPRED) on 30 November 2012. IPRED is in force since 2004 and requires all
Metatron Technology Consulting s Strategic Guide to Open Source Software
Metatron Technology Consulting s Strategic Guide to Open Source Software Chris Travers April 30, 2004 Copyright c April 30, 2004 Metatron Technology Consulting. Permission is granted for verbatim redistribution
what your business needs to do about the new HIPAA rules
what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or
HOT TOPICS IN OPEN-SOURCE SOFTWARE LICENSING. By Robert J. Scott and Christopher Barnett
HOT TOPICS IN OPEN-SOURCE SOFTWARE LICENSING By Robert J. Scott and Christopher Barnett HOT TOPICS IN OPEN-SOURCE SOFTWARE LICENSING I. Introduction Businesses and software developers who incorporate new
University of Edinburgh. School of Informatics. Intellectual Property and the Digital Age. Chris Martin
University of Edinburgh School of Informatics Intellectual Property and the Digital Age Chris Martin Outline IP Basics what is IP? / IP ownership / protecting IP Copyright basics infringement / permitted
The FOSSology Project Overview and Discussion. » The Open Compliance Program. ... By Bob Gobeille, Hewlett-Packard
» The Open Compliance Program The FOSSology Project Overview and Discussion By Bob Gobeille, Hewlett-Packard A White Paper By The Linux Foundation FOSSology (http://fossologyorg) is an open source compliance
AXIS SOFTWARE LICENSE AGREEMENT
AXIS SOFTWARE LICENSE AGREEMENT This Software License Agreement (this Agreement ) is a legal agreement between you (either individual or an entity) and Axis Communications AB (hereinafter referred to as
Freedom and Open Source
Rosen_ch01 Page 1 Tuesday, June 22, 2004 7:35 PM 1 Freedom and Open Source The Language of Freedom Open source licenses promise to everyone what many in the community refer to as software freedom. The
EVERYTHING YOU NEED TO KNOW ABOUT PARALEGALS AND LEGAL ASSISTANTS
EVERYTHING YOU NEED TO KNOW ABOUT PARALEGALS AND LEGAL ASSISTANTS EVERYTHING YOU NEED TO KNOW ABOUT PARALEGAL AND LEGAL ASSISTANT CAREERS 2 NATURE OF WORK Paralegals, or legal assistants as some QUICK
Software Packages and Application Software From Rohde & Schwarz Open Source Acknowledgment
Software Packages and Application Software From Rohde & Schwarz Open Source Acknowledgment This document is valid for the following Rohde & Schwarz software packages and application software: R&S Pulse
Rack Station RS407, RS408, RS408-RP
Rack Station RS407, RS408, RS408-RP Quick Installation Guide SAFETY INSTRUCTIONS Please read these safety instructions carefully before use, and keep this manual in a safe place for your future reference.
ASEAN IPR SME Helpdesk Guide: Protecting your IP at Trade Fairs in Southeast Asia. Contents. 1. Protecting your IP at trade fairs. 2.
ASEAN IPR SME Helpdesk Guide: Protecting your IP at Trade Fairs in Southeast Asia Contents 1. Protecting your IP at trade fairs 2. Advance planning 3. Attending the trade fair 4. Taking action against
An Introduction to Open Source Software and Licensing
An Introduction to Open Source Software and Licensing @black_duck_sw Karen Copenhaver Mark Radcliffe Peter Vescuso Black Duck 2013 Speakers Peter Vescuso EVP of Marketing, Black Duck Software Karen Copenhaver
The 7 Myths of IP Risk: The Real Exposure Issues with Free and Open Source Software. Black Duck Software White Paper
The 7 Myths of IP Risk: The Real Exposure Issues with Free and Open Source Software Black Duck Software White Paper FOSS is widely recognized as providing significant technology, innovation and financial
4. Limitation of Liability. 5. General Provisions
End User License Agreement Please read these contract terms and conditions carefully before you make use of the software. eq-3 shall provide you with a license for the software only if you accept the terms
Aniko GYENGE: The Hungarian model of licensing orphan works
Aniko GYENGE: The Hungarian model of licensing orphan works (Presentation at the ES Presidency conference on Digitisation of cultural material. Digital libraries and copyright 14 March 2010, Madrid) We
Symantec Workflow 7.5 SP1 Third-Party Legal Notices
Symantec Workflow 7.5 SP1 Third-Party Legal Notices This document includes the following topics: Third-Party Legal Attributions Apache Log4net v1.2.0 Beta 8 Apache Lucene.NET v2.1 edtftpnet v2.2.3 ASPOSE.NET
Summary. Natalie Marshall. Graduation Date: 2014. MArCH Honor Society Career Profile for: Lawyer. Type: Professional Area: Legal Subarea: Lawyer
Natalie Marshall Graduation Date: 2014 MArCH Honor Society Career Profile for: Lawyer Type: Professional Area: Legal Subarea: Lawyer From the U.S. Bureau of Labor Statistics Occupational Outlook Handbook
RTI Monitor. Release Notes
RTI Monitor Release Notes Version 5.1.0 2013 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. December 2013. Trademarks Real-Time Innovations, RTI, and Connext are trademarks
Open Source. Knowledge Base. By: Karan Malik INTRODUCTION
Open Source By: Karan Malik INTRODUCTION Open source is a development method, offering accessibility to the source of a product. Some consider open source as possible design approaches, while some of them
This program incorporates work covered by the following copyright and permission notices:
WordPress - Web publishing software Copyright 2014 by the contributors This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published
AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape
AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and
Open Source Used In H.264 Decoder for WebEx NBR Player WBS27
Open Source Used In H.264 Decoder for WebEx NBR Player WBS27 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco
Categories of Free and Nonfree Software
This list was originally published on http://gnu.org, in 1996. This document is part of, the GNU Project s exhaustive collection of articles and essays about free software and related matters. Copyright
Citrix ShareFile Sync for Mac
Citrix ShareFile Sync for Mac Third Party Notices Citrix ShareFile Sync for Mac may include third party software components licensed under the following terms. This list was generated using third party
UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online?
UCO Copyright Compliance As members of the UCO community, all faculty and staff members are expected to comply with federal copyright law. Unauthorized use of copyrighted material is illegal and may result
SIEMENS. Document ID 009771_MP30_a_en_-- SAP Order-No.: A5Q00021001 Siemens Switzerland Ltd. Edition 07.2012 1/10
SIEMENS Embedded in this product are free software files that you may copy on a data carrier, distribute and/or modify under the terms of their respective license: 1. busybox - GPL v2 2. dejavu - Bitstream
Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions
Table of Content Introduction Overview System Requirements Software Install and Uninstall Install Uninstall Software Features and GUI Software Menu Options Software Navigation Quick Getting Started Guide
INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User)
INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User) By clicking the Accept button, I signify that I have read and accept the terms below. IMPORTANT - READ BEFORE COPYING, INSTALLING
Open Source Used In Cisco Active Directory Agent 1.0
Open Source Used In Cisco Active Directory Agent 1.0 Part Number: OL-25135-01 This document contains the licenses and notices for open source software used in this product. With respect to the free/open
GPL AND SOFTWARE LICENSING ISSUES LESSONS FROM THE VERSATA LAWSUIT. 2015 Black Duck Software, Inc. All Rights Reserved.
GPL AND SOFTWARE LICENSING ISSUES LESSONS FROM THE VERSATA LAWSUIT 2015 Black Duck Software, Inc. All Rights Reserved. SPEAKERS Phil Odence Vice President & General Manager Karen Copenhaver Partner at
BMC Remedy Action Request System 7.0 Open Source License Agreements
March 2006 BMC Remedy Action Request System 7.0 Open Source License Agreements Copyright 1991 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names, BMC
Distribution of Software
OpenSource_CH03 Page 41 Monday, June 14, 2004 3:54 PM 3 Distribution of Software Contributors and Distributors Open source software is written by computer programmers who generously distribute it to their
Extension Module (XMOD): SiteMap Generator
Extension Module (XMOD): SiteMap Generator 1999-Present Kryptronic, Inc. All rights reserved worldwide. Kryptronic, the Kryptronic logo and all Kryptronic software names and logos are trademarks of Kryptronic,
A white paper discussing the advantages of Digital Mailrooms
Implementing a Digital Mailroom A white paper discussing the advantages of Digital Mailrooms Contents Environment... 2 The Paperless Office Myth... 2 Reasons for Implementing a Digital Mail Room... 3 Impact
CPI Antitrust Chronicle March 2013 (Special Issue)
CPI Antitrust Chronicle March 2013 (Special Issue) Standard Setting Organizations Can Help Solve the Standard Essential Patents Licensing Problem Kai-Uwe Kühn, Fiona Scott Morton, & Howard Shelanski www.competitionpolicyinternational.com
CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?
THE LAW OFFICES OF SCOTT L. KRAMER CRIMINAL DEFENSE FAQ ANSWERS FROM AN DELAWARE COUNTY ATTORNEY: QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? No. You are never
THE BUSINESS COUNCIL OF WESTCHESTER Website & Internet Services Terms And Conditions of Use
THE BUSINESS COUNCIL OF WESTCHESTER Website & Internet Services Terms And Conditions of Use PLEASE READ THE FOLLOWING TERMS AND CONDITIONS RELATING TO YOUR USE OF OUR WEBSITE AND ANY OTHER INTERNET-BASED
Intellectual Property Rights in Vietnam
Intellectual Property Rights in Vietnam Intellectual Property Office is an operating name of the Patent Office Contents Intellectual property rights in Vietnam What are intellectual property rights? International
Google: Trust, Choice, and Privacy
Google: Trust, Choice, and Privacy Gus Meuli, Caitlin Finn Trust is hard to earn, easy to loose, and nearly impossible to win back. 1 This statement seems to ring true in the constantly changing world
IP Considerations in Outsourcing Agreements
IP Considerations in Outsourcing Agreements Speakers: Moderator: Diana Mansour, Associate, Gardner Roberts LLP Mathew Snell, GTS Canada Senior Counsel, IBM Canada Ildiko Mehes, VP and General Counsel,
AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK
White Paper AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK Abstract EMC Isilon SmartLock protects critical data against accidental, malicious or premature deletion or alteration. Whether you need to
Entering Support Requests Online with the Cubeware Online Ticket System
Entering Support Requests Online with the Cubeware Online Ticket System July 2013 Cubeware Support About this document We reserve the right to change any information contained in this document. Cubeware
GNU LESSER GENERAL PUBLIC LICENSE. The Qt Toolkit is Copyright (C) 2014 Digia Plc and/or its subsidiary(-ies). Contact: http://www.qt.
GENERAL ------- Qt is available under a commercial license with various pricing models and packages that meet a variety of needs. Commercial Qt license keeps your code proprietary where only you can control
INTERNET USAGE AND THE POTENTIAL EFFECT IN YOUR MANAGEMENT OF YOUR PATENT PROGRAM. Steven D. Hemminger. Lyon & Lyon, LLP
INTERNET USAGE AND THE POTENTIAL EFFECT IN YOUR MANAGEMENT OF YOUR PATENT PROGRAM Steven D. Hemminger Lyon & Lyon, LLP {1} Much has been written and said about the Internet and the benefits for a company
Web development, intellectual property, e-commerce & legal issues. Presented By: Lisa Abe
Web development, intellectual property, e-commerce & legal issues Presented By: Lisa Abe October 8, 2005 Web development, intellectual property, e-commerce & legal issues 1. what intellectual property
copyright reform Bill C - 11
intellectual property bulletin June 2012 copyright reform Bill C - 11 After several failed attempts, the federal government has finally passed copyright reform legislation, namely Bill C-11, the Copyright
HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT
HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT THE VERTEXFX TRADER API (THE SOFTWARE ) AND THE ACCOMPANYING DOCUMENTATION (THE RELATED MATERIALS ) (COLLECTIVELY, THE PRODUCT ) ARE PROTECTED BY
Using Open Source Software in Product Development: A Primer
focus The use of open source software in industrial products is growing rapidly because its many advantages are well known. 1 4 However, although we in industry understand liability and intellectual-propertyrights
Building SaaS Business on Top of Open Source - Economic and Legal Considerations
Building SaaS Business on Top of Open Source - Economic and Legal Considerations Ville Oksanen, Nina Helander, Marko Seppänen, Mikko Puhakka, Juha Laine Helsinki University of Technology - Tampere University
Legal Issues for FOSS-based Supply Chain Management. Herve Guyomard, Black Duck Software
Legal Issues for FOSS-based Supply Chain Management Herve Guyomard, Black Duck Software Agenda Legal Case in Supply Chain Open Source in Mobile Mobile devices Supply Chain Management Summary Copyright
Data, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller
Data, Privacy, Cookies and the FTC in 2013 Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller BIOS Kevin Stark: Product Manager at ExactTarget. Focused on data security,
Parasitic copying is unfair play
Parasitic copying is unfair play Toy Industries of Europe (TIE) has developed this document following the European Commission s call for comments on its retail market monitoring report, Towards more efficient
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
