“Infectious” Open Source Software: Spreading Incentives Or Promoting Resistance?

Total Page:16

File Type:pdf, Size:1020Kb

“Infectious” Open Source Software: Spreading Incentives Or Promoting Resistance? “INFECTIOUS” OPEN SOURCE SOFTWARE: SPREADING INCENTIVES OR PROMOTING RESISTANCE? Greg R. Vetter* ABSTRACT Some free or open source software infects other software with its licensing terms. Popularly, this is called a viral license, but the software is not a computer virus. Free or open source software is a copyright-based licensing system. It typically allows modification and distribution on conditions such as source code availability, royalty free use and other requirements. Some licenses require distribution of modifications under the same terms. A license is infectious when it has a strong scope for the modifications provision. The scope arises from a broad conception of software derivative works. A strong infectious ambit would apply itself to modified software, and to software intermixed or coupled with non-open-source software. Popular open source software, including the * Assistant Professor of Law, University of Houston Law Center (UHLC); Co-Director, Institute for Intellectual Property and Information Law (IPIL) at UHLC; biography and additional background available at: www.law.uh.edu/faculty/gvetter. Relevant to this Article is that my background includes a Master’s degree in Computer Science and full-time work experience in the business-to-business software industry from 1987 to 1996. Research for this Article was supported by summer research grants from the University of Houston Law Foundation and a grant from the University of Houston’s New Faculty Research Program. I also thank UHLC’s IPIL Institute and its sponsors for support of my endeavors at UHLC. My thanks to UHLC students Jason Williams, Cuong Lam Nguyen, Stacey R. Vause and Nivine Zakhari for research assistance. My special thanks to UHLC student Kristin Brown for comments, suggestions and research assistance on this Article. I also benefited from input and discussions with Joe Dryer, a UHLC alumnus whose Houston-based company is involved in open source software applications. In addition, I am thankful for exceptionally capable support provided by the staff of the University of Houston Law Center’s John M. O’Quinn Law Library, including Peter Egler and Nicole Evans, and by UHLC’s Legal Information Technology Department. My special thanks to Craig Joyce, Ray Nimmer, Heather Meeker, and Ron Chichester for helpful discussion and comments. Finally, I thank Peter Yu, Director of the Intellectual Property and Communications Law Program at Michigan State University College of Law. I presented elements of this Article at that program’s Conference on Intellectual Property, Sustainable Development, and Endangered Species: Understanding the Dynamics of the Information Ecosystems. My thanks to audience members and co-panelists for comments and feedback. 53 54 RUTGERS LAW JOURNAL [Vol. 36:53] GNU/Linux operating system, uses a license with this feature. This Article assesses the efficacy of broad infectious license terms to determine their incentive effects for open source and proprietary software. The analysis doubts beneficial effects. Rather, on balance, such terms may produce incentives detrimental to interoperability and coexistence between open and proprietary code. As a result, open source licensing should precisely define infectious terms in order to support open source development without countervailing effects and misaligned incentives. TABLE OF CONTENTS I. INTRODUCTION.................................................................................... 56 II. OPEN SOURCE SOFTWARE AND INFECTIOUS LICENSE TERMS............... 70 A. Open Source Licensing and Software Development....................... 71 1. Conditioned Permissions for Copyright Protected Software ................................................................................. 74 2. Open Source Development Norms and Practices ..................... 79 B. The General Public License (GPL) ................................................ 82 C. The GPL’s Infectious License Terms............................................. 88 III. THE TECHNOLOGICAL FRAMEWORK FOR INFECTIOUS AMBIT............... 94 A. Noninfectious Scenarios for Aggregated Software......................... 95 B. Modifications and/or Extensions to Source Code........................... 97 C. Intermixing Code in the Development and Runtime Environments.............................................................................. 103 D. Coupling and Integrating Software in the Runtime Environment.. 107 IV. THE INFECTIOUS GPL TERMS IN THIS FRAMEWORK ........................... 110 A. User Programs and the Linux Kernel ........................................... 113 B. The Lesser GPL – Intermixing Libraries and Other Software...................................................................................... 119 V. THE INCENTIVES EFFICACY OF INFECTIOUS LICENSE TERMS.............. 125 A. Isolating the Infectious Terms ..................................................... 127 1. Upfront Fees for Intermixed Software and Open Source Software ............................................................................... 131 2. Ongoing Service Fees for Intermixed Software and Open Source Software.................................................................... 135 B. Efficacy Model ........................................................................... 137 C. Infectious Effects ........................................................................ 144 1. Purported Benefits of Infectious Terms ................................. 146 2004] “INFECTIOUS” OPEN SOURCE SOFTWARE 55 2. Problems with Infectious Terms ............................................ 152 3. Striking a Balance: Limited Quarantine for Infectious Terms? ................................................................................. 156 VI. CONCLUSION ..................................................................................... 162 LIST OF FIGURES AND TABLES Figure 1 – Modifying and Extending Software......................................... 101 Figure 2 – Intermixing Software .............................................................. 106 Figure 3 – Coupling and Integrating Software.......................................... 108 Table 1 – Summary: The Technological Framework for Infectious Ambit ...................................................................... 109 Table 2 – Certainty Enhancing Measures within the Infectious Framework............................................................................... 124 Figure 4 – Modify the Original Open Source to Intermix with Other Software .................................................................................. 128 Figure 5 – Open Source Software Ready to Intermix with Other Software .................................................................................. 130 Figure 6 – Efficacy Model Illustration – scenarios for the infectious “whole” ................................................................... 141 56 RUTGERS LAW JOURNAL [Vol. 36:53] I. INTRODUCTION Copyright offers both incentives and deterrents to derivative uses, protecting derivative works as well as prohibiting their unauthorized production. Paul Goldstein, Derivative Rights and Derivative Works in Copyright 1 The GPL requires that works “derived from” a work licensed under the GPL also be licensed under the GPL. Unfortunately what counts as a derived work can be a bit vague. As soon as you try to draw the line at derived works, the problem immediately becomes one of where do you draw the line? Linus Torvalds, The Linux Edge 2 Too often, the open source software debate has an all-or-nothing flavor.3 One might hear: open source software is better because the production process taps debugging efficiencies and harvests volunteer effort on an impressive scale.4 Or hear: proprietary software is better because it 1. Paul Goldstein, Derivative Rights and Derivative Works in Copyright, 30 J. COPYRIGHT SOC’Y U.S. 209, 239 (1983). 2. Linus Torvalds, The Linux Edge, in OPEN SOURCES: VOICES FROM THE OPEN SOURCE REVOLUTION 108-09 (Chris DiBona et al. eds., 1999) [hereinafter Torvalds, The Linux Edge]. 3. See Peter Wayner, Whose Intellectual Property Is It, Anyway? The Open Source War, N.Y. TIMES, Aug. 24, 2000, at G8 (describing that “the war of Open Source . is being fought in conference rooms, law offices, hacker redoubts and university dormitory rooms and in the hearts of millions of people surfing the Web”); Eben Moglen, Freeing the Mind: Free Software and the Death of Proprietary Culture, Address Before the University of Maine Law School’s Fourth Annual Technology and Law Conference (June 29, 2003) (describing the “fundamental choice” between free software and a “dead [proprietary] system of inefficient distribution”), at http://emoglen.law.columbia.edu/publications/maine-speech.pdf; see also David McGowan, SCO What? Rhetoric, Law and the Future of F/OSS Production 10-16 (Univ. of Minn. Law School, Research Paper No. 04-9, June 12, 2004) [hereinafter McGowan, SCO What?] (describing the rhetorical strategies used by both sides of the debate and their accompanying exaggerated claims), available at http://www.law.umn.edu/uploads/images/830/McGowanD-SCOssrn.pdf. 4. See, e.g., Yochai Benkler, Coase’s Penguin, or, Linux and The Nature of the Firm, 112 YALE L.J. 369, 376-77, 415-23 (2002) (noting that one advantage of open source software and peer production in general is that “it allows larger groups of individuals to scour larger groups of resources in search of materials, projects, collaborations, and combinations than is possible
Recommended publications
  • Licensing 101 December 3, 2020 Meet the Speakers
    Licensing 101 December 3, 2020 Meet The Speakers Sushil Iyer Adam Kessel Principal Principal fr.com | 2 Roadmap • High level, introductory discussion on IP licensing • Topics – Types of IP – Monetization strategies – Key parts of a license agreement – Certain considerations • Licensing software, especially open source software • Licensing pharmaceutical patents • Trademarks • Trade secrets • Know-how fr.com | 3 Types of IP Patents Trademarks Copyrights Know-how (including trade secrets) fr.com | 4 Monetization Strategies • IP licensing – focus of this presentation – IP owner (licensor) retains ownership and grants certain rights to licensee – IP licensee obtains the legal rights to practice the IP – Bundle of rights can range from all the rights that the IP owner possesses to a subset of the same • Sale – IP owner (assignor) transfers ownership to the purchaser (assignee) • Litigation – Enforcement, by IP owner, of IP rights against an infringer who impermissibly practices the IP owner’s rights – Damages determined by a Court fr.com | 5 What is an IP License? • Contract between IP owner (Licensor) and Licensee – Licensor’s offer – grant of Licensor’s rights in IP • Patents – right to sell products that embody claimed inventions of Licensor’s US patents • Trademarks – right to use Licensor’s US marks on products or when selling products • Copyright – right to use and/or make derivative works of Licensor’s copyrighted work • Trade Secret – right to use and obligation to maintain Licensor’s trade secret – Licensee’s consideration – compensation
    [Show full text]
  • IBM Websphere Studio Application Developer for Windows, Version 4.0 Helps Java Developers to Build, Test, and Deploy J2EE-Based E-Business Applications
    Software Announcement November 6, 2001 IBM WebSphere Studio Application Developer for Windows, Version 4.0 Helps Java Developers To Build, Test, and Deploy J2EE-based e-business Applications Overview flexible source control management, pluggable At a Glance Introducing IBM′s premier Java repositories, as well as adapters development environment for for Concurrent Versioning System WebSphere Studio Application professional developers, the first (CVS) and for Rational ClearCase Developer for Windows, V4.0 product in the WebSphere Studio LT (CCLT) (Application Developer) provides product suite, WebSphere Studio • A comprehensive visual XML an advanced development Application Developer for development environment, environment for J2EE application Windows , V4.0 (Application including components for building development. Developer). DTDs, XML Schemas, XML files, and XSL style sheets Application Developer offers the Application Developer is built on the • Built-in WebSphere test following key functions: WebSphere Studio Workbench, an environment • integrated platform designed to A powerful Java development provide a common set of services Application Developer is next environment, that includes and frameworks unparalleled generation technology for support for JDK 1.3, a development tool integration and VisualAge for Java Enterprise configurable runtime, tool construction. Edition. It combines many popular incremental compilation, features of VisualAge for Java scrapbook, dynamic debugging, Application Developer includes the Enterprise Edition and WebSphere and a Java text editor • following functions: Studio Advanced Edition integrated Advanced Web, Java, and XML development environments • on top of WebSphere Studio An advanced development Workbench. designed to J2SE and J2EE environment for J2EE application specifications development that meets J2SE and Application Developer is focused on • A Relational Schema Center J2EE specifications and EJB optimizing J2EE application (RSC) focused on relational development and deployment and development.
    [Show full text]
  • Android (Operating System) 1 Android (Operating System)
    Android (operating system) 1 Android (operating system) Android Home screen displayed by Samsung Nexus S with Google running Android 2.3 "Gingerbread" Company / developer Google Inc., Open Handset Alliance [1] Programmed in C (core), C++ (some third-party libraries), Java (UI) Working state Current [2] Source model Free and open source software (3.0 is currently in closed development) Initial release 21 October 2008 Latest stable release Tablets: [3] 3.0.1 (Honeycomb) Phones: [3] 2.3.3 (Gingerbread) / 24 February 2011 [4] Supported platforms ARM, MIPS, Power, x86 Kernel type Monolithic, modified Linux kernel Default user interface Graphical [5] License Apache 2.0, Linux kernel patches are under GPL v2 Official website [www.android.com www.android.com] Android is a software stack for mobile devices that includes an operating system, middleware and key applications.[6] [7] Google Inc. purchased the initial developer of the software, Android Inc., in 2005.[8] Android's mobile operating system is based on a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release.[9] [10] The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.[11] The Android operating system is the world's best-selling Smartphone platform.[12] [13] Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 150,000 apps available for Android.[14] [15] Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites.
    [Show full text]
  • An Introduction to Software Licensing
    An Introduction to Software Licensing James Willenbring Software Engineering and Research Department Center for Computing Research Sandia National Laboratories David Bernholdt Oak Ridge National Laboratory Please open the Q&A Google Doc so that I can ask you Michael Heroux some questions! Sandia National Laboratories http://bit.ly/IDEAS-licensing ATPESC 2019 Q Center, St. Charles, IL (USA) (And you’re welcome to ask See slide 2 for 8 August 2019 license details me questions too) exascaleproject.org Disclaimers, license, citation, and acknowledgements Disclaimers • This is not legal advice (TINLA). Consult with true experts before making any consequential decisions • Copyright laws differ by country. Some info may be US-centric License and Citation • This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). • Requested citation: James Willenbring, David Bernholdt and Michael Heroux, An Introduction to Software Licensing, tutorial, in Argonne Training Program on Extreme-Scale Computing (ATPESC) 2019. • An earlier presentation is archived at https://ideas-productivity.org/events/hpc-best-practices-webinars/#webinar024 Acknowledgements • This work was supported by the U.S. Department of Energy Office of Science, Office of Advanced Scientific Computing Research (ASCR), and by the Exascale Computing Project (17-SC-20-SC), a collaborative effort of the U.S. Department of Energy Office of Science and the National Nuclear Security Administration. • This work was performed in part at the Oak Ridge National Laboratory, which is managed by UT-Battelle, LLC for the U.S. Department of Energy under Contract No. DE-AC05-00OR22725. • This work was performed in part at Sandia National Laboratories.
    [Show full text]
  • Shared Source Licensing Program for the Windows Embedded Compact (Formerly Windows CE) Platform
    9/6/2020 Shared Source Initiative | Licensing Program for the Windows Embedded Compact Platform Search Microsoft.com PRODUCTS STORE DOWNLOADS SUPPORT United States Shared Source Initiative > Windows Embedded Compact Source Licensing Program Shared Source Licensing Program for the Windows® Embedded Compact (formerly Windows CE) Platform Shared Source Licensing Programs Overview Microsoft offers a Shared Source licensing program for the Windows Embedded Compact (formerly Windows CE) platform. This program is applicable to the Windows Embedded Compact and Windows Embedded CE products. The Windows Embedded Shared Source program helps OEMs and developers speed development, reduce troubleshooting and code debugging time, receive assistance in remote device support and gain a deeper technical understanding of Windows Embedded Compact software. Public/Sample Source code is built at no additional cost into the purchased copies of the Windows Embedded Compact Platform Builder toolkit and provides access to nearly 4 million lines of code. Depending on a partner’s needs and qualifications, deeper levels of Shared Source code access (Private and Premium) are available. How to Participate Public/Sample Shared Source Public/Sample Shared Source code is available at no additional cost with each purchased copy of the Windows Embedded Compact 7 Platform Builder toolkit. Private Shared Source Private Shared Source Code is an optional component of the Windows Embedded Compact 7 Platform Builder toolkit that can be installed during the setup process. The toolkit user must electronically accept the terms and conditions of the Shared Source licensing agreement (EULA) before the Private source code can be installed. Premium Derivatives Program Microsoft also offers Premium access to advanced Windows Embedded Compact 7 source code through the Premium Derivatives licensing program.
    [Show full text]
  • Real-Time Performance During CUDA™ a Demonstration and Analysis of Redhawk™ CUDA RT Optimizations
    A Concurrent Real-Time White Paper 2881 Gateway Drive Pompano Beach, FL 33069 (954) 974-1700 real-time.ccur.com Real-Time Performance During CUDA™ A Demonstration and Analysis of RedHawk™ CUDA RT Optimizations By: Concurrent Real-Time Linux® Development Team November 2010 Overview There are many challenges to creating a real-time Linux distribution that provides guaranteed low process-dispatch latencies and minimal process run-time jitter. Concurrent Computer Corporation’s RedHawk Linux distribution meets and exceeds these challenges, providing a hard real-time environment on many qualified hardware configurations, even in the presence of a heavy system load. However, there are additional challenges faced when guaranteeing real-time performance of processes while CUDA applications are simultaneously running on the system. The proprietary CUDA driver supplied by NVIDIA® frequently makes demands upon kernel resources that can dramatically impact real-time performance. This paper discusses a demonstration application developed by Concurrent to illustrate that RedHawk Linux kernel optimizations allow hard real-time performance guarantees to be preserved even while demanding CUDA applications are running. The test results will show how RedHawk performance compares to CentOS performance running the same application. The design and implementation details of the demonstration application are also discussed in this paper. Demonstration This demonstration features two selectable real-time test modes: 1. Jitter Mode: measure and graph the run-time jitter of a real-time process 2. PDL Mode: measure and graph the process-dispatch latency of a real-time process While the demonstration is running, it is possible to switch between these different modes at any time.
    [Show full text]
  • Creator's Guide to Commercializing Copyrighted Work
    STANFORD UNIVERSITY OFFICE OF Creator’s Guide to TECHNOLOGY Commercializing LICENSING Copyrighted Work OURSES WEB C PHY BOOKS S SI E GRA OFT TE D TO WA S O HO R C P E V M S U ID Y M S H E I E O C O P P C A S H F R G O N R I I C G E D O T O R G I O E R O C A R E N P R H O Y S M H P C C P O O A D B E E C L I I I C L B S O E O U U R M A S M N E P O S I T W P E C I E F B S R S O I T E A E D I S V B W O T O F K O S S he Stanford University Office of Technology Licensing (OTL) promotes the transfer of Stanford technology for Tsociety’s use and benefit. This technology grows out of the CONTENTS boundless creativity found in the faculty, staff, and students at the University. When that creative expression is protected by copyright, OTL and our Stanford creators face a distinct set THE BASICS .......................................................................................2 of commercialization and distribution issues that they do not STanford’s copyrighT POLICY .......................................................5 encounter for other forms of intellectual property. SOFTWARE .........................................................................................8 OTL created this booklet to help Stanford creators successfully identify and CONTENT AND COURSES..................................................................15 navigate those issues. The booklet is focused on out-licensing or distributing OPEN SOURCE SOFTWARE LICENSING ..............................................18 creative works owned by Stanford.
    [Show full text]
  • Mcafee Potentially Unwanted Programs (PUP) Policy March, 2018
    POLICY McAfee Potentially Unwanted Programs (PUP) Policy March, 2018 McAfee recognizes that legitimate technologies such as commercial, shareware, freeware, or open source products may provide a value or benefit to a user. However, if these technologies also pose a risk to the user or their system, then users should consent to the behaviors exhibited by the software, understand the risks, and have adequate control over the technology. McAfee refers to technologies with these characteristics as “potentially unwanted program(s),” or “PUP(s).” The McAfee® PUP detection policy is based on the process includes assessing the risks to privacy, security, premise that users should understand what is being performance, and stability associated with the following: installed on their systems and be notified when a ■ Distribution: how users obtain the software including technology poses a risk to their system or privacy. advertisements, interstitials, landing-pages, linking, PUP detection and removal is intended to provide and bundling notification to our users when a software program or technology lacks sufficient notification or control over ■ Installation: whether the user can make an informed the software or fails to adequately gain user consent to decision about the software installation or add- the risks posed by the technology. McAfee Labs is the ons and can adequately back out of any undesired McAfee team responsible for researching and analyzing installations technologies for PUP characteristics. ■ Run-Time Behaviors: the behaviors exhibited by the technology including advertisements, deception, and McAfee Labs evaluates technologies to assess any impacts to privacy and security risks exhibited by the technology against the degree of user notification and control over the technology.
    [Show full text]
  • Linux Low-Latency Tracing for Multicore Hard Real-Time Systems
    Hindawi Publishing Corporation Advances in Computer Engineering Volume 2015, Article ID 261094, 8 pages http://dx.doi.org/10.1155/2015/261094 Research Article Linux Low-Latency Tracing for Multicore Hard Real-Time Systems Raphaël Beamonte and Michel R. Dagenais Computer and Software Engineering Department, Polytechnique Montreal, C.P. 6079, Station Downtown, Montreal,´ QC,CanadaH3C3A7 Correspondence should be addressed to Raphael¨ Beamonte; [email protected] Received 29 March 2015; Revised 21 July 2015; Accepted 29 July 2015 Academic Editor: Ying-Tung Hsiao Copyright © 2015 R. Beamonte and M. R. Dagenais. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Real-time systems have always been difficult to monitor and debug because of the timing constraints which rule out anytool significantly impacting the system latency and performance. Tracing is often the most reliable tool available for studying real-time systems. The real-time behavior of Linux systems has improved recently and it is possible to have latencies in the low microsecond range. Therefore, tracers must ensure that their overhead is within that range and predictable and scales well to multiple cores. The LTTng 2.0 tools have been optimized for multicore performance, scalability, and flexibility. We used and extended the real-time verification tool rteval to study the impact of LTTng on the maximum latency on hard real-time applications. We introduced a new real-time analysis tool to establish the baseline of real-time system performance and then to measure the impact added by tracing the kernel and userspace (UST) with LTTng.
    [Show full text]
  • Third-Party License Acknowledgments
    Symantec Privileged Access Manager Third-Party License Acknowledgments Version 3.4.3 Symantec Privileged Access Manager Third-Party License Acknowledgments Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. Copyright © 2021 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. 2 Symantec Privileged Access Manager Third-Party License Acknowledgments Contents Activation 1.1.1 ..................................................................................................................................... 7 Adal4j 1.1.2 ............................................................................................................................................ 7 AdoptOpenJDK 1.8.0_282-b08 ............................................................................................................ 7 Aespipe 2.4e aespipe ........................................................................................................................
    [Show full text]
  • Web Application for Generating a Standard Coordinated Documentation for CS Students’ Graduation Project in Gaza Universities Ibrahim M
    International Journal of Engineering and Information Systems (IJEAIS) ISSN: 2000-000X Vol. 1 Issue 6, September – 2017, Pages: 155-167 Web Application for Generating a Standard Coordinated Documentation for CS Students’ Graduation Project in Gaza Universities Ibrahim M. Nasser, Samy S. Abu-Naser Faculty of Engineering and Information Technology, Al-Azhar University, Gaza, Palestine [email protected] Abstract: The computer science (CS) graduated students suffered from documenting their projects and specially from coordinating it. In addition, students’ supervisors faced difficulties with guiding their students to an efficient process of documenting. In this paper, we will offer a suggestion as a solution to the mentioned problems; that is an application to make the process of documenting computer science (CS) student graduation project easy and time-cost efficient. This solution will decrease the possibility of human mistakes and reduce the effort of documenting process. Keywords: web applications, cost efficient, time-cost efficient, documenting, software engineering, graduation projects. 1. INTRODUCTION Computer science (CS) is the study of the occurrences adjoining computers [1]. It's also defined as the study of computers and computational systems, computer scientists deal usually with software (unlike electrical and computer engineers), Primary parts of study inside Computer Science consist of computer systems, operating systems, networks, database systems, artificial intelligence, computer architecture, security, computer graphics, human computer interaction, systems analysis, software engineering, theory of computing and programming languages [11,17-28]. In computing, a web application is a client–server application that means, the client (like user interface) works in a web browser [2]. The general distinction between a web application and a dynamic web page is vague, web sites that we can name them as "web applications" are those have comparable functionality to a mobile application or to a desktop applications [3].
    [Show full text]
  • Titans and Trolls of the Open Source Arena
    Titans and Trolls Enter the Open-Source Arena * by DEBRA BRUBAKER BURNS I. Introduction .................................................................................... 34 II. Legal Theories for Open Source Software License Enforcement ................................................................................... 38 A. OSS Licensing .......................................................................... 38 B. Legal Theories and Remedies for OSS Claims .................... 40 1. Legal Protections for OSS under Copyright and Contract Law ..................................................................... 40 Stronger Protections for OSS License under Copyright Law ................................................................... 40 2. Copyright-Ownership Challenges in OSS ....................... 42 3. Potential Legal Minefields for OSS under Patent Law ...................................................................................... 45 4. Added Legal Protection for OSS under Trademark Law ...................................................................................... 46 5. ITC 337 Action as Uncommon Legal Protection for OSS ..................................................................................... 49 III. Enforcement Within the OSS Community .................................. 49 A. Software Freedom Law Center Enforces OSS Licenses .... 50 B. Federal Circuit Finds OSS License Enforceable Under Copyright Law ......................................................................... 53 C. Commercial OSS
    [Show full text]