SlideShare a Scribd company logo
1 of 45
#ESCminn#ESCminn
Legal and Practical Concerns with Software Development
Rod Cope, Rogue Wave Software
Rick Leach, Brooks Kushman, P.C.
#ESCminn
Disclaimer
• This presentation shall not be taken as legal advice and is only for
educational purpose.
#ESCminn
Software touches all IP categories
• Copyright – The main theme of this presentation
• Patent – currently under scrutiny by the USPTO in regards to Patent
Eligibility under §101.
• Trade Secret – Consider the new Defend Trade Secret Act of 2016 (DTSA).
• Trademark – Consider a GUI (Color scheme, Boot Sounds, Imagery, Icons,
Arrangements, etc.)
#ESCminn
DTSA – Brief Overview
• Ex Parte Seizures – The DTSA provides for the seizure of property necessary to prevent the propagation or dissemination
of the trade secret.
• Immunity Notice Requirements – For an employer to preserve its rights to exemplary damages and attorney fees, the
employer “shall” provide notice to an employee, contractor, or consultant of his or her immunity rights.
• Inevitable Disclosure – Under DTSA, a court cannot prevent a person from entering into an employment relationship,
and any conditions placed on such employment shall be based on evidence of threatened misappropriation and not
merely on the information the person knows.
• State Law Preemption – The DTSA provides for a Federal forum for relieve but the DTSA does not preempt state law.
• In summary, given the extreme value of trade secrets, and the growing threat of trade secret theft, businesses should
audit their trade secret protection practices in light of DTSA, and existing state laws, and to take appropriate steps to
protect those trade secrets. This includes
• (1) instituting practices to detect trade secret misappropriation – especially through electronic means – as soon as possible,
• (2) revising all contracts or agreements relating to trade secrets or other confidential information with any employee, contractor, or
consultant to provide the notices required by DTSA,
• (3) instituting employee exit strategies to warn both the exiting employee and their next employer of the employee’s trade secret
obligations, and
• (4) reviewing the measures taken to protect trade secrets to ensure that such measures meet the requirements of both DTSA and state law
#ESCminn#ESCminn
Why use Open Source Software?
• ~$60B/year savings*
• > 4 Billion Files
• >7,500 repositories
• > 2,000 Licenses
• ~ 97% say they use OSS
• ~ 64% companies participate in OSS projects
• ~ 88% companies expect to increase
contributions to OSS
https://www.blackducksoftware.com/
* http://www.freesoftwaremagazine.com/articles/creating_wealth_free_software
#ESCminn
OSS Compliance: Should I care?
• Diversion of Time, Talent,
Resources
• Impact to Customers &
Reputation
• Potential waiver of IP
rights
• Potential Damages
#ESCminn#ESCminn
Benefits and Risks
OSS Projects are on the rise … and so is Policing of the projects
#ESCminn
Copyright: What is it?
• Protection of Artistic Expressions, not
ideas or functionality
• Music
• Movies
• Artwork
• Literature
• Software
#ESCminn
Rights of a Copyright Owner
• Exclusive rights
• Distribute – Sell
• Reproduce – Copy
• Adapt – Create derivative work
• Perform
• Display
• Transmit
• Neither Registration nor notice required to create protection
#ESCminn
Copyright Introduction
License
$$$
Copyright
Owner User
• Owner chooses to enter into a contract with User
• Owner grants rights to Sell, Copy, Adapt, . . .
• User provides some consideration ($$$)
• User agrees to abide by the license terms
• Other people not allowed to Sell, Copy, Adapt, . . .
#ESCminn
Introduction to ‘Copyleft’
Copyleft
License
$0.0
• Owner chooses to enter into a contract with User
• Owner grants rights to Sell, Copy, Adapt, . . .
• User provides some consideration ($$$)
• User agrees to abide by the license terms
• Everyone is allowed to Sell, Copy, Adapt, . . .
(As long as they comply with license terms)
#ESCminn
Strong Copyleft – The Cost of Freedom
• Strong Copyleft is a copyright licensing scheme for making a
program (or other work) free, and requiring all modified and
extended versions of the program to be free as well
http://www.gnu.org/copyleft/copyleft.en.html
#ESCminn#ESCminn
Permissive Licenses
• “… [A] permissive license that is short and to the point. It lets people do anything
they want with your code as long as they provide attribution back to you and
don’t hold you liable.“ - http://choosealicense.com/
• Common permissive licenses include BSD, MIT, Apache
13https://en.wikipedia.org/wiki/Permissive_software_licence
#ESCminn
Top 20 Common Open Source Licenses
https://www.blackducksoftware.com/top-open-source-licenses#top20
What’s the
difference?
> 75% of software
uses 5 Licenses
#ESCminn
MIT License
The MIT License (MIT)
Copyright (c) [year] [fullname]
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files
(the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge,
publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do
so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
DEALINGS IN THE SOFTWARE.
http://opensource.org/licenses/MIT
#ESCminn#ESCminn
GPLv2 License select sections
Preamble. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors
of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made
it clear that any patent must be licensed for everyone's free use or not licensed at all.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy
and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any
part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such
interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a
notice that there is no warranty
http://www.gnu.org/licenses/gpl.txt
#ESCminn
GPLv3 License select sections
1. "The ‘Corresponding Source’ for a work in object code form means all the source code
needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to
control those activities. . . . ”
6. Conveying Non-Source Forms: You may convey a covered work in object code form under the terms of sections 4 and 5,
provided that you also convey the machine-readable Corresponding Source
under the terms of this License
10. Automatic Licensing of Downstream Recipients: "...and you may not initiate litigation (including a cross-
claim or counterclaim in a lawsuit) alleging that any patent claim is infringedby making, using,
selling, offering for sale, or importing the Program or any portion of it."
11. Patents: . . . Each contributor grants you a non-exclusive, worldwide, royalty-
free patent license. . .
http://www.gnu.org/licenses/gpl.txt
#ESCminn#ESCminn
18
LGPLv2.1 Section 5
#ESCminn
A History of License Options
19911988 2001 2004 2007 2012
BSD & MIT
Licenses
GPLv2 Apache 2.0 GPLv3 MPL 2.0CPL
· Implied License
&/or Estoppel
· Implied License
&/or Estoppel
· Patent Disincentive
Clause
· Express Patent
License
· Broad Patent
Retaliation Clause
· Express Patent
License
· Patent Retaliation
Clause
· Broad Express Patent
License
· Anti-Tivoization clause
· Patent Non-Assert
· Patent Disincentive
Clause
· Express Patent
License
· Patent Retaliation
Clause
#ESCminn
Thoughts on Derivative Works?
Proprietary
Software
MIT
License
Static OR Dynamic Linking
• Provide Copyright Notice
• Provide License
Proprietary
Software
LGPL
v2.1
Dynamic Linking
LibraryExecutable
Proprietary
Software
LGPL
v2.1
Static Linking
Executable
Proprietary
Software
GPL v3
Static OR Dynamic Linking
• Provide Copyright Notice
• Provide License
• Provide Open Source code
• Provide modifications &
change log
• Provide Disclaimer of
warranty in the OSS
• Provide Library Source
Code
• Provide Copyright Notice
• Provide License
• Provide Open Source code
• Provide modifications &
change log
• Provide Disclaimer of
warranty in the OSS
• Provide proprietary Object
Code and/or Source Code
so that a modified Library
can generate an executable
• Provide Copyright Notice
• Provide License
• Provide Open Source code
• Provide modifications &
change log
• Provide Disclaimer of
warranty for all GPL code
• Provide proprietary Object
Code and/or Source Code
• Provide License to all IP in
the proprietary code that
uses or is linked to GPL
Related to
linking or
something
else?
#ESCminn
GPL/GPL License Compatibility
http://www.gnu.org/licenses/gpl-faq.html#v2v3Compatibility
#ESCminn
Infringement – Consequences
• § 504 – Damages (Actual or Statutory)
• Actual damages to Owner and profits of the Infringer
• Statutory (Timely Registration required) $750 - $30,000 per
infringement, If willful up to $150,000!
• § 505 – Costs and Attorney Fees
• Usually linked with Willfullness (Pre-Registration required)
• § 502 – Injunction, § 503 – Impounding, and § 506 – Criminal
Prosecution
#ESCminn
Step 1: Have a license policy
• You must decide which licenses are acceptable for your
company (and potentially your customers).
• The policy depends on how you plan to use the software.
• GENIVI has the following policy
• Red – GPLv3; LGPLv2/3; BSD 4; MPL1.1; Flora
• Yellow – GPLv2; LGPL2.1; AFL 3; OSL 3; OpenSSL; Public domain
• Green – MPL 2.0; BSD 2/3; MIT/X11; Apache 1.1/2; Artistic 2/1
http://docs.projects.genivi.org/License/Public_Policy_for_GENIVI_Licensing_and_Copyright_v_1.0.pdf
NO
OK
???
#ESCminn
Step 2: Educate your Developers
• Which software/licenses are acceptable and not
• Which software licenses need to be discussed
• How and who to contact with questions – Point Person
• Disclosure of software use to Point Person
#ESCminn#ESCminn
Step 3: Compliance
Apple -
iPhone
Mercedes-Benz
#ESCminn
Example Supply ChainComponent
Manufacturer
Development Board –Drivers Sub-Assembly – Libraries
Product
Manufacturer
OSS contribution Retailer
#ESCminn
Who can help ?
#ESCminn28
Dependency Issues Impact Licensing
•OSS often depends on or bundles other OSS
•Need to look at all the dependencies and bundled
projects and their licenses
• Important: The licenses may not be the same!
•Example:
• Geronimo (Apache license) uses MySQL (GPL) through the
MySQL driver (formerly LGPL but now GPL)
#ESCminn29
Multiple Packages, Multiple Licenses• When a developer downloads and installs those projects they also get additional open source components
that are installed automatically (over 90 additional!!)
AspectJ (19)
- Ant (1.6.3)
- Apache Avalon (4.1.2)
- ASM (2.0)
- ASM (2.2.1)
- Batik (unknown)
- BCEL (5.1)
- Commons BeanUtils (unknown)
- Commons Digester (unknown)
- Commons Logging (unknown)
- DocBook XML (4.1.2)
- DocBook XSL Stylesheets (1.44)
- FOP (0.20.5)
- JDiff (unknown)
- JUnit (3.8.1)
- Jython (2.1)
- Regexp (1.2)
- Saxon (unknown)
- Xalan (2.4.1)
- JDK (1.4.2_12)
Spring Framework (61)
- ActiveMQ (1.1)
- Ant (1.6.5)
- ANTLR (2.7.5H3)
- AOP Alliance (1.0)
- Apache (OJB) (1.0.4)
- Apache xml-apis (1.2.01)
- c3p0 (0.9.0.4)
- cglib (2.1.3)
- com.oreilly.servlet (1.0)
- Commons Attributes (2.1)
- Commons BeanUtils (1.6)
- Commons Codec (1.3)
- Commons Collections (3.1)
- Commons DBCP (1.2.1)
- Commons Digester (1.6)
- Commons Discovery (0.2)
- Commons Fileupload (1.0)
- Commons HttpClient (3.0)
- Commons Lang (2.1)
- Commons Logging (1.0.4)
- Commons Pool (1.2)
Ant (7 bundled)
- Apache xml-apis (1.5)
- Xerces (2.6.2)
- BCEL (5.1)
- BeanShell (1.3.0)
- BSF (2.3.0)
- JUnit (3.8.1)
- JDK (1.4.2_12)
MySQL Connector
(9)
- Ant-Contrib (1.0-b2)
- AspectJ (1.2)
- c3p0 (0.9.1-pre6)
- Commons Logging (1.0.4)
- JBoss Application Server (3.2.7)
- JDBC (2_0)
- JTA (1.0.1)
- JUnit (3.8.1)
- Log4j (1.2.9)
- Commons Validator (1.1.4)
- dom4j (1.6)
- EasyMock (1.1)
- Ehcache (1.1)
- Enterprise Java Beans (2.0)
- Free Marker (2.3.4)
- Hessian (3.0.1)
- Hibernate (2.1.7)
- Hibernate (3.0.5)
- HSQLDB (1.8.0)
- iBATIS (2.1.7)
- iText (1.3)
- J2EE Connector Arch (1.0)
- Jakarta JSTL (1.0.3)
- Jamon (1.0)
- Jasper Reports (1.0.3)
- Java Servlet API (2.4)
- JavaBeans (JAF) (1.0.1)
- JavaMail (1.3)
- JavaServer Faces (1.1)
- JAX-RPC (1.1)
- Jaxen (1.1-beta4)
- JDBC (2_0)
- JDO (2.0)
- JMX (1.0)
- JOTM (2.0.9)
- JTA (1.0.1B)
- JUnit (3.8.1)
- jxl (2.6)
- Log4j (1.2.13)
- ORO (2.0.8)
- POI (2.5.1)
- Quartz (1.5.2)
- Rowset (1.0.1)
- Struts (1.2.8)
- Tag Libs (1.0.6)
- TOPLink (1.0)
- Velocity (1.4)
- Velocity Tools (1.1)
- XDoclet (1.1)
#ESCminn
Bundling OSS into other code
Project Foo:
GPL v2
Project Time:
BSD
Project Commercial:
Restrictive EULA
Project Foo:
GPL v2
Project
Time:
BSD
What if I take a file that is under one license and I distribute it under a different
license–do I have to comply with the original license?
#ESCminn
Use of
OSS under GPL
Revisions made to FOSS
Linked to or bundled with
proprietary code Use by wholly
owned sub
Sub is sold to a
3rd party
Internal Use
Use by an
outsourcer or
contractor
Software shared
with “partner”
during further
development
Software
distributed to
end users
Using OSS Distributing OSS
Changes in how FOSS is used can impact license compliance
Example: How OSS is used may change...
#ESCminn
Jacobsen v. Katzer: Opens the door
• Model train software under Artistic License
• Distribution without notice (non-compliance)
• Question: contract or copyright
• Contract – State Court and no consideration (OSS is free)
• Copyright – Federal Court,
• OSS license obligations are conditions precedent to the license.
• Failure to comply with obligations extinguishes license.
• Case settled.
#ESCminn
Google v. Oracle: Make or Buy?
#ESCminn
Google v. Oracle: Make or Buy?
Which should I choose ?
#ESCminn
Google v. Oracle: 9 lines is enough
“the jury reasonably found
that Google’s copying of the
rangeCheck files was more
than de minimis;” - CAFC
#ESCminn
APIs/taxonomy are copyrightable
• “the declaring code and the structure,
sequence, and organization of the API
packages are entitled to copyright
protection” – CAFC (Google v. Oracle)
#ESCminn
Upon Remand – Google saved writing a $9.3 Billion
check by “fair use” doctrine
• June 2015 – Supreme Court denied Certiorari
• March 2016 – Oracle Filed for $9.3 Billion
• Actual Damages of 0.475B and Profits Apportioned to Infringed Java Copyrights $8.829B.
• May 2016 – On remand to the District Court for a trial on Google’s fair use
defense, a jury unanimously found that Google’s was protected by Fair Use
• Under Fair Use, reproduction for purposes such as criticism, comment, news
reporting, teaching, scholarship, or research, is not an infringement of
copyright
#ESCminn
Versata, Ameriprise, Ximpleware
• “the GPL is a ‘viral’ license in the sense the incorporation of a GPL-covered
software program into a new program ‘infects’ the new program and
requires it to become open source , too” – District Court W.D. Texas
• Take away: Compliance is important even for customers (Ameriprise)
#ESCminn
Welte v. Fantec – Germany
• GPLv2.0 software used in a media player
• Fantec : Fantec’s supplier assured them compliance with GPL terms.
• Result: Welte was awarded Attorney’s fees and damages.
• German Court stated:
• “Here, Defendant was not allowed to rely merely on its suppliers’ assurances that
the works supplied did not infringe any third-party rights.
• In any case, Defendant should have performed its own review of the software, or
have someone preform, by hiring knowledgable third parties, such a review of the software
offered and provided by Defendant – even if this would have resulted in additional costs.”
#ESCminn#ESCminn
Ximpleware v. Versata – Downstream use
• Versata provided Distribution Channel Management software to Ameriprise
• Versata sued Ameriprise for redistributing DCM software
• Ameriprise counterclaimed Versata violated GPLv2 under copyright that preempted the breach of contract
filed by Versata.
• XimpleWare developed and owns XML parsing software used by Versata
• XimpleWare sued both Versata and Ameriprise
• Ameriprise patent license under preamble, never modified code, did not distribute
• XimpleWare, downstream license terminates when Versata license terminates
• Court Held: “even if the original licensee—here, one of the Versata entities—breaches its license for
whatever reason, third-party customers of that original license retain the right to use XimpleWare’s software
so long as the customer does not itself breach the license”
40
#ESCminn#ESCminn
Ximpleware v. Versata – Take-away
• “the GPL is a ‘viral’ license in the sense the incorporation of a GPL-
covered software program into a new program ‘infects’ the new
program and requires it to become open source , too” – District Court
W.D. Texas
• Compliance is important even for customers (Ameriprise)
#ESCminn
Roadmap to Compliance
• 1st appreciate Open Source Software’s benefits
• 2nd develop an Open Source Software Strategy
• 3rd know your code: Education, Point Person
• 4th know the licenses associated with your code
• 5th comply or use different software
#ESCminn#ESCminn
Rod Cope
• CTO, Rogue Wave Software
• Previous:
• Founder and CTO, OpenLogic
• IBM, IBM Global Services, GE, Anthem BCBS
• roguewave.com
• rod.cope@roguewave.com
• @RodCope
#ESCminn#ESCminn
Rick Leach
• Intellectual Property Attorney at Brooks Kushman, P.C.
• brookskushman.com
• rleach@brookskushman.com
• LinkedIn Information
#ESCminn#ESCminn
Thank You!
Questions?
@ESC_Conf

More Related Content

What's hot

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Increasing Quality with DevOps
Increasing Quality with DevOpsIncreasing Quality with DevOps
Increasing Quality with DevOpsCoveros, Inc.
 
Continuous Delivery in a Legacy Shop - One Step at a Time
Continuous Delivery in a Legacy Shop - One Step at a TimeContinuous Delivery in a Legacy Shop - One Step at a Time
Continuous Delivery in a Legacy Shop - One Step at a TimeGene Gotimer
 
Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Nagaraju Repala
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)Arjun Comar
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsSuman Sourav
 
Automated Testing Using Selenium
Automated Testing Using SeleniumAutomated Testing Using Selenium
Automated Testing Using SeleniumTechWell
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentBlack Duck by Synopsys
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
10 Things You Might Not Know: Continuous Integration
10 Things You Might Not Know: Continuous Integration10 Things You Might Not Know: Continuous Integration
10 Things You Might Not Know: Continuous IntegrationCoveros, Inc.
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous DeliveryTom Stiehm
 
Flight East 2018 Presentation–Continuous Integration––An Overview
Flight East 2018 Presentation–Continuous Integration––An OverviewFlight East 2018 Presentation–Continuous Integration––An Overview
Flight East 2018 Presentation–Continuous Integration––An OverviewSynopsys Software Integrity Group
 
Building a high quality+ products with SCA
Building a high quality+ products with SCABuilding a high quality+ products with SCA
Building a high quality+ products with SCASuman Sourav
 
How To Improve Quality With Static Code Analysis
How To Improve Quality With Static Code Analysis How To Improve Quality With Static Code Analysis
How To Improve Quality With Static Code Analysis Perforce
 
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...Synopsys Software Integrity Group
 
IoT Software Testing Challenges: The IoT World Is Really Different
IoT Software Testing Challenges: The IoT World Is Really DifferentIoT Software Testing Challenges: The IoT World Is Really Different
IoT Software Testing Challenges: The IoT World Is Really DifferentTechWell
 

What's hot (20)

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Increasing Quality with DevOps
Increasing Quality with DevOpsIncreasing Quality with DevOps
Increasing Quality with DevOps
 
Continuous Delivery in a Legacy Shop - One Step at a Time
Continuous Delivery in a Legacy Shop - One Step at a TimeContinuous Delivery in a Legacy Shop - One Step at a Time
Continuous Delivery in a Legacy Shop - One Step at a Time
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)
 
Securing Apache Web Servers
Securing Apache Web ServersSecuring Apache Web Servers
Securing Apache Web Servers
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
 
Automated Testing Using Selenium
Automated Testing Using SeleniumAutomated Testing Using Selenium
Automated Testing Using Selenium
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
10 Things You Might Not Know: Continuous Integration
10 Things You Might Not Know: Continuous Integration10 Things You Might Not Know: Continuous Integration
10 Things You Might Not Know: Continuous Integration
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
Flight East 2018 Presentation–Continuous Integration––An Overview
Flight East 2018 Presentation–Continuous Integration––An OverviewFlight East 2018 Presentation–Continuous Integration––An Overview
Flight East 2018 Presentation–Continuous Integration––An Overview
 
Flight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at DocusignFlight East 2018 Presentation–Black Duck at Docusign
Flight East 2018 Presentation–Black Duck at Docusign
 
Building a high quality+ products with SCA
Building a high quality+ products with SCABuilding a high quality+ products with SCA
Building a high quality+ products with SCA
 
How To Improve Quality With Static Code Analysis
How To Improve Quality With Static Code Analysis How To Improve Quality With Static Code Analysis
How To Improve Quality With Static Code Analysis
 
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security wit...
 
IoT Software Testing Challenges: The IoT World Is Really Different
IoT Software Testing Challenges: The IoT World Is Really DifferentIoT Software Testing Challenges: The IoT World Is Really Different
IoT Software Testing Challenges: The IoT World Is Really Different
 

Viewers also liked

Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issuesblogzilla
 
Five ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecksFive ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecksRogue Wave Software
 
Top 10 lessons learned from deploying hadoop in a private cloud
Top 10 lessons learned from deploying hadoop in a private cloudTop 10 lessons learned from deploying hadoop in a private cloud
Top 10 lessons learned from deploying hadoop in a private cloudRogue Wave Software
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Rogue Wave Software
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareRogue Wave Software
 
How we created Customer Personas for our online travel brands
How we created Customer Personas for our online travel brandsHow we created Customer Personas for our online travel brands
How we created Customer Personas for our online travel brandsAndre Van Kets
 
Real-time searching of big data with Solr and Hadoop
Real-time searching of big data with Solr and HadoopReal-time searching of big data with Solr and Hadoop
Real-time searching of big data with Solr and HadoopRogue Wave Software
 
User profiles. Personas
User profiles. PersonasUser profiles. Personas
User profiles. PersonasDCU_MPIUA
 

Viewers also liked (8)

Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
Five ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecksFive ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecks
 
Top 10 lessons learned from deploying hadoop in a private cloud
Top 10 lessons learned from deploying hadoop in a private cloudTop 10 lessons learned from deploying hadoop in a private cloud
Top 10 lessons learned from deploying hadoop in a private cloud
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
How we created Customer Personas for our online travel brands
How we created Customer Personas for our online travel brandsHow we created Customer Personas for our online travel brands
How we created Customer Personas for our online travel brands
 
Real-time searching of big data with Solr and Hadoop
Real-time searching of big data with Solr and HadoopReal-time searching of big data with Solr and Hadoop
Real-time searching of big data with Solr and Hadoop
 
User profiles. Personas
User profiles. PersonasUser profiles. Personas
User profiles. Personas
 

Similar to Legal and Practical Concerns with Software Development

Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsRogue Wave Software
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Legal and practical concerns with open source software
Legal and practical concerns with open source softwareLegal and practical concerns with open source software
Legal and practical concerns with open source softwareRogue Wave Software
 
Open Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and ComplianceOpen Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and ComplianceAll Things Open
 
Exploring Open Source Licensing
Exploring Open Source LicensingExploring Open Source Licensing
Exploring Open Source LicensingStefano Fago
 
Open Source Software Legal Issues and Compliance
Open Source Software Legal Issues and ComplianceOpen Source Software Legal Issues and Compliance
Open Source Software Legal Issues and ComplianceTarun Khurana
 
Overview of basic open-source licenses
Overview of basic open-source licensesOverview of basic open-source licenses
Overview of basic open-source licensesIrina Shubina
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GISJoanne Cook
 
Open Source—Avoiding Common Pitfalls
Open Source—Avoiding Common PitfallsOpen Source—Avoiding Common Pitfalls
Open Source—Avoiding Common PitfallsKRLaw
 
Open Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsOpen Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsAnsel Halliburton
 
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...Black Duck by Synopsys
 
Introduction to Open Source License and Business Model
Introduction to Open Source License and Business ModelIntroduction to Open Source License and Business Model
Introduction to Open Source License and Business ModelMohd Izhar Firdaus Ismail
 
オープンソースソフトウェア入門
オープンソースソフトウェア入門オープンソースソフトウェア入門
オープンソースソフトウェア入門Yusuke Miyazaki
 
Open source software 101: Compliance and risk management
Open source software 101: Compliance and risk managementOpen source software 101: Compliance and risk management
Open source software 101: Compliance and risk managementOsler, Hoskin & Harcourt LLP
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open SourceJody Garnett
 

Similar to Legal and Practical Concerns with Software Development (20)

Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Legal and practical concerns with open source software
Legal and practical concerns with open source softwareLegal and practical concerns with open source software
Legal and practical concerns with open source software
 
Open Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and ComplianceOpen Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and Compliance
 
FreeBSD is not a Linux distribution
FreeBSD is not a Linux distribution FreeBSD is not a Linux distribution
FreeBSD is not a Linux distribution
 
Exploring Open Source Licensing
Exploring Open Source LicensingExploring Open Source Licensing
Exploring Open Source Licensing
 
Open Source Software Legal Issues and Compliance
Open Source Software Legal Issues and ComplianceOpen Source Software Legal Issues and Compliance
Open Source Software Legal Issues and Compliance
 
Overview of basic open-source licenses
Overview of basic open-source licensesOverview of basic open-source licenses
Overview of basic open-source licenses
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
 
Adobe products eula(2)
Adobe products eula(2)Adobe products eula(2)
Adobe products eula(2)
 
Adobe products eula(1)
Adobe products eula(1)Adobe products eula(1)
Adobe products eula(1)
 
Adobe products eula
Adobe products eulaAdobe products eula
Adobe products eula
 
Open Source—Avoiding Common Pitfalls
Open Source—Avoiding Common PitfallsOpen Source—Avoiding Common Pitfalls
Open Source—Avoiding Common Pitfalls
 
Open Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsOpen Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common Pitfalls
 
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
 
Introduction to Open Source License and Business Model
Introduction to Open Source License and Business ModelIntroduction to Open Source License and Business Model
Introduction to Open Source License and Business Model
 
Acknowledgements
AcknowledgementsAcknowledgements
Acknowledgements
 
オープンソースソフトウェア入門
オープンソースソフトウェア入門オープンソースソフトウェア入門
オープンソースソフトウェア入門
 
Open source software 101: Compliance and risk management
Open source software 101: Compliance and risk managementOpen source software 101: Compliance and risk management
Open source software 101: Compliance and risk management
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
 

More from Rogue Wave Software

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveRogue Wave Software
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureRogue Wave Software
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationRogue Wave Software
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-timeRogue Wave Software
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyRogue Wave Software
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsRogue Wave Software
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youRogue Wave Software
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?Rogue Wave Software
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Rogue Wave Software
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure successRogue Wave Software
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and complianceRogue Wave Software
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureRogue Wave Software
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)Rogue Wave Software
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Rogue Wave Software
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxRogue Wave Software
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsRogue Wave Software
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSRogue Wave Software
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migrationRogue Wave Software
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmRogue Wave Software
 

More from Rogue Wave Software (20)

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data Perspective
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failure
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-time
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case study
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applications
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for you
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the future
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to Linux
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC apps
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOS
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calm
 

Recently uploaded

Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile EnvironmentVictorSzoltysek
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Recently uploaded (20)

Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Legal and Practical Concerns with Software Development

  • 1. #ESCminn#ESCminn Legal and Practical Concerns with Software Development Rod Cope, Rogue Wave Software Rick Leach, Brooks Kushman, P.C.
  • 2. #ESCminn Disclaimer • This presentation shall not be taken as legal advice and is only for educational purpose.
  • 3. #ESCminn Software touches all IP categories • Copyright – The main theme of this presentation • Patent – currently under scrutiny by the USPTO in regards to Patent Eligibility under §101. • Trade Secret – Consider the new Defend Trade Secret Act of 2016 (DTSA). • Trademark – Consider a GUI (Color scheme, Boot Sounds, Imagery, Icons, Arrangements, etc.)
  • 4. #ESCminn DTSA – Brief Overview • Ex Parte Seizures – The DTSA provides for the seizure of property necessary to prevent the propagation or dissemination of the trade secret. • Immunity Notice Requirements – For an employer to preserve its rights to exemplary damages and attorney fees, the employer “shall” provide notice to an employee, contractor, or consultant of his or her immunity rights. • Inevitable Disclosure – Under DTSA, a court cannot prevent a person from entering into an employment relationship, and any conditions placed on such employment shall be based on evidence of threatened misappropriation and not merely on the information the person knows. • State Law Preemption – The DTSA provides for a Federal forum for relieve but the DTSA does not preempt state law. • In summary, given the extreme value of trade secrets, and the growing threat of trade secret theft, businesses should audit their trade secret protection practices in light of DTSA, and existing state laws, and to take appropriate steps to protect those trade secrets. This includes • (1) instituting practices to detect trade secret misappropriation – especially through electronic means – as soon as possible, • (2) revising all contracts or agreements relating to trade secrets or other confidential information with any employee, contractor, or consultant to provide the notices required by DTSA, • (3) instituting employee exit strategies to warn both the exiting employee and their next employer of the employee’s trade secret obligations, and • (4) reviewing the measures taken to protect trade secrets to ensure that such measures meet the requirements of both DTSA and state law
  • 5. #ESCminn#ESCminn Why use Open Source Software? • ~$60B/year savings* • > 4 Billion Files • >7,500 repositories • > 2,000 Licenses • ~ 97% say they use OSS • ~ 64% companies participate in OSS projects • ~ 88% companies expect to increase contributions to OSS https://www.blackducksoftware.com/ * http://www.freesoftwaremagazine.com/articles/creating_wealth_free_software
  • 6. #ESCminn OSS Compliance: Should I care? • Diversion of Time, Talent, Resources • Impact to Customers & Reputation • Potential waiver of IP rights • Potential Damages
  • 7. #ESCminn#ESCminn Benefits and Risks OSS Projects are on the rise … and so is Policing of the projects
  • 8. #ESCminn Copyright: What is it? • Protection of Artistic Expressions, not ideas or functionality • Music • Movies • Artwork • Literature • Software
  • 9. #ESCminn Rights of a Copyright Owner • Exclusive rights • Distribute – Sell • Reproduce – Copy • Adapt – Create derivative work • Perform • Display • Transmit • Neither Registration nor notice required to create protection
  • 10. #ESCminn Copyright Introduction License $$$ Copyright Owner User • Owner chooses to enter into a contract with User • Owner grants rights to Sell, Copy, Adapt, . . . • User provides some consideration ($$$) • User agrees to abide by the license terms • Other people not allowed to Sell, Copy, Adapt, . . .
  • 11. #ESCminn Introduction to ‘Copyleft’ Copyleft License $0.0 • Owner chooses to enter into a contract with User • Owner grants rights to Sell, Copy, Adapt, . . . • User provides some consideration ($$$) • User agrees to abide by the license terms • Everyone is allowed to Sell, Copy, Adapt, . . . (As long as they comply with license terms)
  • 12. #ESCminn Strong Copyleft – The Cost of Freedom • Strong Copyleft is a copyright licensing scheme for making a program (or other work) free, and requiring all modified and extended versions of the program to be free as well http://www.gnu.org/copyleft/copyleft.en.html
  • 13. #ESCminn#ESCminn Permissive Licenses • “… [A] permissive license that is short and to the point. It lets people do anything they want with your code as long as they provide attribution back to you and don’t hold you liable.“ - http://choosealicense.com/ • Common permissive licenses include BSD, MIT, Apache 13https://en.wikipedia.org/wiki/Permissive_software_licence
  • 14. #ESCminn Top 20 Common Open Source Licenses https://www.blackducksoftware.com/top-open-source-licenses#top20 What’s the difference? > 75% of software uses 5 Licenses
  • 15. #ESCminn MIT License The MIT License (MIT) Copyright (c) [year] [fullname] Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. http://opensource.org/licenses/MIT
  • 16. #ESCminn#ESCminn GPLv2 License select sections Preamble. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty http://www.gnu.org/licenses/gpl.txt
  • 17. #ESCminn GPLv3 License select sections 1. "The ‘Corresponding Source’ for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. . . . ” 6. Conveying Non-Source Forms: You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License 10. Automatic Licensing of Downstream Recipients: "...and you may not initiate litigation (including a cross- claim or counterclaim in a lawsuit) alleging that any patent claim is infringedby making, using, selling, offering for sale, or importing the Program or any portion of it." 11. Patents: . . . Each contributor grants you a non-exclusive, worldwide, royalty- free patent license. . . http://www.gnu.org/licenses/gpl.txt
  • 19. #ESCminn A History of License Options 19911988 2001 2004 2007 2012 BSD & MIT Licenses GPLv2 Apache 2.0 GPLv3 MPL 2.0CPL · Implied License &/or Estoppel · Implied License &/or Estoppel · Patent Disincentive Clause · Express Patent License · Broad Patent Retaliation Clause · Express Patent License · Patent Retaliation Clause · Broad Express Patent License · Anti-Tivoization clause · Patent Non-Assert · Patent Disincentive Clause · Express Patent License · Patent Retaliation Clause
  • 20. #ESCminn Thoughts on Derivative Works? Proprietary Software MIT License Static OR Dynamic Linking • Provide Copyright Notice • Provide License Proprietary Software LGPL v2.1 Dynamic Linking LibraryExecutable Proprietary Software LGPL v2.1 Static Linking Executable Proprietary Software GPL v3 Static OR Dynamic Linking • Provide Copyright Notice • Provide License • Provide Open Source code • Provide modifications & change log • Provide Disclaimer of warranty in the OSS • Provide Library Source Code • Provide Copyright Notice • Provide License • Provide Open Source code • Provide modifications & change log • Provide Disclaimer of warranty in the OSS • Provide proprietary Object Code and/or Source Code so that a modified Library can generate an executable • Provide Copyright Notice • Provide License • Provide Open Source code • Provide modifications & change log • Provide Disclaimer of warranty for all GPL code • Provide proprietary Object Code and/or Source Code • Provide License to all IP in the proprietary code that uses or is linked to GPL Related to linking or something else?
  • 22. #ESCminn Infringement – Consequences • § 504 – Damages (Actual or Statutory) • Actual damages to Owner and profits of the Infringer • Statutory (Timely Registration required) $750 - $30,000 per infringement, If willful up to $150,000! • § 505 – Costs and Attorney Fees • Usually linked with Willfullness (Pre-Registration required) • § 502 – Injunction, § 503 – Impounding, and § 506 – Criminal Prosecution
  • 23. #ESCminn Step 1: Have a license policy • You must decide which licenses are acceptable for your company (and potentially your customers). • The policy depends on how you plan to use the software. • GENIVI has the following policy • Red – GPLv3; LGPLv2/3; BSD 4; MPL1.1; Flora • Yellow – GPLv2; LGPL2.1; AFL 3; OSL 3; OpenSSL; Public domain • Green – MPL 2.0; BSD 2/3; MIT/X11; Apache 1.1/2; Artistic 2/1 http://docs.projects.genivi.org/License/Public_Policy_for_GENIVI_Licensing_and_Copyright_v_1.0.pdf NO OK ???
  • 24. #ESCminn Step 2: Educate your Developers • Which software/licenses are acceptable and not • Which software licenses need to be discussed • How and who to contact with questions – Point Person • Disclosure of software use to Point Person
  • 26. #ESCminn Example Supply ChainComponent Manufacturer Development Board –Drivers Sub-Assembly – Libraries Product Manufacturer OSS contribution Retailer
  • 28. #ESCminn28 Dependency Issues Impact Licensing •OSS often depends on or bundles other OSS •Need to look at all the dependencies and bundled projects and their licenses • Important: The licenses may not be the same! •Example: • Geronimo (Apache license) uses MySQL (GPL) through the MySQL driver (formerly LGPL but now GPL)
  • 29. #ESCminn29 Multiple Packages, Multiple Licenses• When a developer downloads and installs those projects they also get additional open source components that are installed automatically (over 90 additional!!) AspectJ (19) - Ant (1.6.3) - Apache Avalon (4.1.2) - ASM (2.0) - ASM (2.2.1) - Batik (unknown) - BCEL (5.1) - Commons BeanUtils (unknown) - Commons Digester (unknown) - Commons Logging (unknown) - DocBook XML (4.1.2) - DocBook XSL Stylesheets (1.44) - FOP (0.20.5) - JDiff (unknown) - JUnit (3.8.1) - Jython (2.1) - Regexp (1.2) - Saxon (unknown) - Xalan (2.4.1) - JDK (1.4.2_12) Spring Framework (61) - ActiveMQ (1.1) - Ant (1.6.5) - ANTLR (2.7.5H3) - AOP Alliance (1.0) - Apache (OJB) (1.0.4) - Apache xml-apis (1.2.01) - c3p0 (0.9.0.4) - cglib (2.1.3) - com.oreilly.servlet (1.0) - Commons Attributes (2.1) - Commons BeanUtils (1.6) - Commons Codec (1.3) - Commons Collections (3.1) - Commons DBCP (1.2.1) - Commons Digester (1.6) - Commons Discovery (0.2) - Commons Fileupload (1.0) - Commons HttpClient (3.0) - Commons Lang (2.1) - Commons Logging (1.0.4) - Commons Pool (1.2) Ant (7 bundled) - Apache xml-apis (1.5) - Xerces (2.6.2) - BCEL (5.1) - BeanShell (1.3.0) - BSF (2.3.0) - JUnit (3.8.1) - JDK (1.4.2_12) MySQL Connector (9) - Ant-Contrib (1.0-b2) - AspectJ (1.2) - c3p0 (0.9.1-pre6) - Commons Logging (1.0.4) - JBoss Application Server (3.2.7) - JDBC (2_0) - JTA (1.0.1) - JUnit (3.8.1) - Log4j (1.2.9) - Commons Validator (1.1.4) - dom4j (1.6) - EasyMock (1.1) - Ehcache (1.1) - Enterprise Java Beans (2.0) - Free Marker (2.3.4) - Hessian (3.0.1) - Hibernate (2.1.7) - Hibernate (3.0.5) - HSQLDB (1.8.0) - iBATIS (2.1.7) - iText (1.3) - J2EE Connector Arch (1.0) - Jakarta JSTL (1.0.3) - Jamon (1.0) - Jasper Reports (1.0.3) - Java Servlet API (2.4) - JavaBeans (JAF) (1.0.1) - JavaMail (1.3) - JavaServer Faces (1.1) - JAX-RPC (1.1) - Jaxen (1.1-beta4) - JDBC (2_0) - JDO (2.0) - JMX (1.0) - JOTM (2.0.9) - JTA (1.0.1B) - JUnit (3.8.1) - jxl (2.6) - Log4j (1.2.13) - ORO (2.0.8) - POI (2.5.1) - Quartz (1.5.2) - Rowset (1.0.1) - Struts (1.2.8) - Tag Libs (1.0.6) - TOPLink (1.0) - Velocity (1.4) - Velocity Tools (1.1) - XDoclet (1.1)
  • 30. #ESCminn Bundling OSS into other code Project Foo: GPL v2 Project Time: BSD Project Commercial: Restrictive EULA Project Foo: GPL v2 Project Time: BSD What if I take a file that is under one license and I distribute it under a different license–do I have to comply with the original license?
  • 31. #ESCminn Use of OSS under GPL Revisions made to FOSS Linked to or bundled with proprietary code Use by wholly owned sub Sub is sold to a 3rd party Internal Use Use by an outsourcer or contractor Software shared with “partner” during further development Software distributed to end users Using OSS Distributing OSS Changes in how FOSS is used can impact license compliance Example: How OSS is used may change...
  • 32. #ESCminn Jacobsen v. Katzer: Opens the door • Model train software under Artistic License • Distribution without notice (non-compliance) • Question: contract or copyright • Contract – State Court and no consideration (OSS is free) • Copyright – Federal Court, • OSS license obligations are conditions precedent to the license. • Failure to comply with obligations extinguishes license. • Case settled.
  • 34. #ESCminn Google v. Oracle: Make or Buy? Which should I choose ?
  • 35. #ESCminn Google v. Oracle: 9 lines is enough “the jury reasonably found that Google’s copying of the rangeCheck files was more than de minimis;” - CAFC
  • 36. #ESCminn APIs/taxonomy are copyrightable • “the declaring code and the structure, sequence, and organization of the API packages are entitled to copyright protection” – CAFC (Google v. Oracle)
  • 37. #ESCminn Upon Remand – Google saved writing a $9.3 Billion check by “fair use” doctrine • June 2015 – Supreme Court denied Certiorari • March 2016 – Oracle Filed for $9.3 Billion • Actual Damages of 0.475B and Profits Apportioned to Infringed Java Copyrights $8.829B. • May 2016 – On remand to the District Court for a trial on Google’s fair use defense, a jury unanimously found that Google’s was protected by Fair Use • Under Fair Use, reproduction for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright
  • 38. #ESCminn Versata, Ameriprise, Ximpleware • “the GPL is a ‘viral’ license in the sense the incorporation of a GPL-covered software program into a new program ‘infects’ the new program and requires it to become open source , too” – District Court W.D. Texas • Take away: Compliance is important even for customers (Ameriprise)
  • 39. #ESCminn Welte v. Fantec – Germany • GPLv2.0 software used in a media player • Fantec : Fantec’s supplier assured them compliance with GPL terms. • Result: Welte was awarded Attorney’s fees and damages. • German Court stated: • “Here, Defendant was not allowed to rely merely on its suppliers’ assurances that the works supplied did not infringe any third-party rights. • In any case, Defendant should have performed its own review of the software, or have someone preform, by hiring knowledgable third parties, such a review of the software offered and provided by Defendant – even if this would have resulted in additional costs.”
  • 40. #ESCminn#ESCminn Ximpleware v. Versata – Downstream use • Versata provided Distribution Channel Management software to Ameriprise • Versata sued Ameriprise for redistributing DCM software • Ameriprise counterclaimed Versata violated GPLv2 under copyright that preempted the breach of contract filed by Versata. • XimpleWare developed and owns XML parsing software used by Versata • XimpleWare sued both Versata and Ameriprise • Ameriprise patent license under preamble, never modified code, did not distribute • XimpleWare, downstream license terminates when Versata license terminates • Court Held: “even if the original licensee—here, one of the Versata entities—breaches its license for whatever reason, third-party customers of that original license retain the right to use XimpleWare’s software so long as the customer does not itself breach the license” 40
  • 41. #ESCminn#ESCminn Ximpleware v. Versata – Take-away • “the GPL is a ‘viral’ license in the sense the incorporation of a GPL- covered software program into a new program ‘infects’ the new program and requires it to become open source , too” – District Court W.D. Texas • Compliance is important even for customers (Ameriprise)
  • 42. #ESCminn Roadmap to Compliance • 1st appreciate Open Source Software’s benefits • 2nd develop an Open Source Software Strategy • 3rd know your code: Education, Point Person • 4th know the licenses associated with your code • 5th comply or use different software
  • 43. #ESCminn#ESCminn Rod Cope • CTO, Rogue Wave Software • Previous: • Founder and CTO, OpenLogic • IBM, IBM Global Services, GE, Anthem BCBS • roguewave.com • rod.cope@roguewave.com • @RodCope
  • 44. #ESCminn#ESCminn Rick Leach • Intellectual Property Attorney at Brooks Kushman, P.C. • brookskushman.com • rleach@brookskushman.com • LinkedIn Information