SlideShare a Scribd company logo
Litigation and Compliance in the
Open Source Ecosystem
Speakers
MARK RADCLIFFE
Partner, DLA Piper
BERND SIEBERS
Counsel, DLA Piper
PHIL ODENCE
VP & General Manager,
Black Duck Software
OSS Often Enters a Code Base
Unchecked, Resulting In Risks
Code Base
Commercial
3rd Party
Code
Purchasing
• Licensing?
• Security?
• Quality?
• Support?
Open Source
OPERATIONAL RISK
Which versions of code
are being used, and how
old are they
LEGAL RISK
Which licenses are used
and do they match
anticipated use of the code
SECURITY RISK
Which components have
vulnerabilities and what
are they
Management
visibility…not!
Black Duck’s Experience Analyzing Code
• Audits on average find 33% open
source
• 99% of code audits find open source
• 95% of audits find unknown open
source
• 75% of audits contain unknown licenses
• 67% of code contains vulnerable
components
• 50% of code audits contain GPL
FOSS Compliance: New Players
• Traditional FOSS Enforcement:
Focus on Compliance
• Software Freedom Law Center
• Software Freedom Conservancy
(“SFC”)
• gplviolations
• Shift to Commercial Licensors
• Continuent v. Tekelec (GPL)
• Versata Series of Cases
• New Enforcers
• McHardy, copyright troll
• Fligor: looking for clients
• Major Difference in Goals
• Shift from compliance to revenue
• Focus on injunctive relief
• Expansion of Traditional FOSS
Enforcement
• SFC assists in VMware litigation
Existing Compliance Issues
• VMware litigation (SFC)
• McHardy litigation
• First copyright troll
• Versata: focus on hybrid product licensing
• Will terminated licensees regularly raise the defense of “integration” with GPLv2 licensed
code?
• Will warranty claims against licensors arise from poorly drafted licenses become common?
Netfilter Project Suspends McHardy
The netfilter project regrets to have to suspend its core team member Patrick McHardy from the core team. This
is a grave step, definitely the first in the projects history, and it is not one we take lightly. Over many months,
severe allegations have been brought forward against the style of his license enforcement activities on parts of
the netfilter software he wrote. With respect to privacy, we will not publicly disclose the content of those
allegations.
Despite many attempts by us to reach him, Patrick has been unable or unwilling to comment on those
allegations or defend against the allegations. The netfilter project does not have first-hand evidence. But given
the consistent allegations from various trusted sources, and in the absence of any response from Patrick, we
feel it is necessary to suspend him until further notice.
We'd like to stress that we do not take any sides, and did not "convict" Patrick of anything. He continues to be
welcome in the project as soon as he is be able to address the allegations and/or co-sign the "principles" [1] in
terms of any future enforcement activities.
SFC Criticizes GPL Monetizers
These “GPL monetizers”, who trace their roots to nefarious business models that seek to catch users in minor violations in order to sell an
alternative proprietary license, stand in stark contrast to the work that Conservancy, FSF and gpl-violations.org have done for years.
Most notably, a Linux developer named Patrick McHardy continues ongoing GPL enforcement actions but has not endorsed the community
Principles. When Patrick began his efforts, Conservancy immediately reached out to him. After a promising initial discussion (even contemplating
partnership and Patrick joining our coalition) in mid-2014, Patrick ceased answering our emails and text messages, and never cooperated with
us. Conservancy has had no contact with Patrick nor his attorney since, other than a somewhat cryptic and off-topic response we received over a
year ago. In the last two years, we've heard repeated rumors about Patrick's enforcement activity, as well as some reliable claims by GPL
violators that Patrick failed to follow the Principles.
In one of the many attempts we made to contact Patrick, we urged him to join us in co-drafting the Principles, and then invited him to endorse
them after their publication. Neither communication received a response. We informed him that we felt the need to make this public statement,
and gave him almost three months to respond. He still has not responded.
Patrick's enforcement occurs primarily in Germany. We know well the difficulties of working transparently in that particular legal system, but both
gpl-violations.org and Conservancy have done transparent enforcement in that jurisdiction and others. Yet, Patrick's actions are not transparent.
In private and semi-private communications, many have criticized Patrick for his enforcement actions. Patrick McHardy has also been suspended
from work on the Netfilter core team. While the Netfilter team itself publicly endorsed Conservancy's principles of enforcement, Patrick has not.
Conservancy agrees that Patrick's apparent refusal to endorse the Principles leaves suspicion and concern, since the Principles have been
endorsed by so many other Linux copyright holders, including Conservancy.
New Compliance Issues
• Harald Welte announcement of an OSS Compliance Company, aggregating
developers
• Welte: ran gpl violations
• Geographic focus not limited to Germany, but could include France and Spain
• David Fligor/Progressive LLP: Troll lawyer searching for a project, so far no
cases filed
• Sound View Innovations: new ASF software patent troll based on Alcatel-Lucent
patents
• Sound View has sued Facebook
• Sound View has sued LinkedIn
• Sound View has sued Twitter
German FOSS Enforcement
• Community Enforcers
• Harald Welte/gpl-violations.org (Linux kernel, iptables)
• Returning to compliance based on Barcelona FSFE Conference
• Thomas Gleixner (Linux kernel code used in U-Boot)
• XviD project
• Christoph Hellwig (Linux kernel, this is the VMware case)
• Other
• Patrick McHardy (Linux kernel, iptables, iproute2)
Community Enforcement
• Most cases are settled before they go to court. The agreement for a “declaration to cease
and desist" in Germany has to contain a clause about a contractual penalty for a future
infringement: if the defendant is caught violating GPLv2 again, then the defendant has to
pay the penalty.
• Harald Welte (gpl-violations.org) has used these penalties for donations to charities like
Chaos Computer Club, Wau Holland Stiftung, Free Software Foundation Europe, etc.
because his focus was on process change, compliance and community norms.
• gpl-violations.org worked very closely together with Free Software Foundation Europe to
get companies to talk about their problems and let them participate in the global
discussion about open source compliance and other legal issues.
German Court Procedure - Outline
I. Preliminary Injunction Proceedings
1. General
2. Requirements
3. Standard of Proof
4. Possible Remedies
5. Procedural Aspects
6. Enforcement
II. Proceedings on the Merits
1. Overview
2. Remedies
III. Pre-Litigation Strategies
1. Offense Position
2. Defense Position
German Court Procedure –
Preliminary Injunction Proceedings
1. General
• Objective: Stop infringement as soon as possible
• Often most dangerous threat to infringer, since immediately enforceable (appeal
has no suspensory effect!)
• "General" time line:
• Granted within hours (e.g. re trade fairs), 1-2 days (if ex parte),
2-6 weeks (with oral hearing);
• Appeal hearing 2-4 months after decision in first instance
German Court Procedure –
Preliminary Injunction Proceedings
2. Requirements
• Generally courts issue in cases where
• Infringement is very likely
• No undue delay in filing an application for PI ("Urgency Requirement")
• Plaintiff has to file the application for PI without undue delay
• Up to 4 weeks usually not problematic
• Up to 8 weeks usually problematic; IP owner has to show exceptional circumstances in determining
the infringement / preparation of PI application
• Over 8 weeks usually no PI granted!
• ACT FAST!
McHardy German Litigation I
• Patrick McHardy uses the same enforcement mechanism but is seeking personal
monetary gain
• Estimate is that McHardy has approached at least 50 companies that have been
hit (some companies multiple times).
• Wide variety of companies, including retailers, telcos, producers, importers
• Best estimate is that he has received significant damages
• Wide range of products
• physical products (offline distribution)
• firmware updates downloadable from a website
• Over The Air (OTA) updates
McHardy German Litigation II
• Tactics against companies
1. Address a (minor) violation and have a company sign a cease and desist with contractual
penalty.
2. Address another (minor) violation and collect the contractual penalty. Sign a new
agreement with a higher penalty.
3. Wait some time, then go back to 2
• Devices usually have multiple violations of GPLv2 and he only will address one
issue at a time to collect the contractual penalty.
McHardy German Litigation III
McHardy's claims largely focus on:
• Lack of written offer
• Lack of license text in product
• Inadequate terms of written offer
• Lack of complete corresponding source code in repositories
• EULA conflicting with GPL obligations
• Written offer must come from last company selling product
• More exotic
• Written offer should be in German
• GPL warranty disclaimers are inadequate under German law
In the past, McHardy did not do a thorough technical analysis, like a rebuild of the
source code, but he has started doing so.
McHardy German Litigation IV
Two recent hearings, McHardy lost on procedural issues
• Case one: court decided that application was not sufficiently “urgent” for
preliminary injunction procedure
• Case two: judge found that McHardy’s affidavits were inconsistent and McHardy’s
lawyer was not prepared to defend it: McHardy withdrew case
Statement by presiding judge (not required and without precedential value but
shows thinking):
• If only a tiny bit of the programming works was contained in the litigious product and if that
tiny bit was capable of being copyright protected, the arguments of the defendant would not
be sufficient to rebut the claim. This might indeed result in Linux not being tradable in
Germany. The industry might have to look for other platforms where the chain of rights can
be controlled more easily
Solving the McHardy Problem and Copycats
• Focus on compliance of your products going into Germany
• Understand the McHardy business model
• Collaborate on claims and share information
• DLA Piper: Developing “Defense in a box”
• Working with past litigants to provide information
• Facts about McHardy
• Summary of McHardy claims
• Summary of McHardy arguments
• References
• Possibility of including actual complaints and other filings but more challenging
Hellwig v. VMware I
• VMware is alleged to be using arts of the Linux kernel in their proprietary ESXi
product, including the entire SCSI mid-layer, USB support, radix tree and many,
many device drivers.
• Linux is licensed under GNU GPLv2 with a modification by Linus Torvalds
• VMware has modified all the code they took from the Linux kernel and integrated
them into something they call vmklinux.
• VMware has modified their proprietary virtualization OS kernel vmkernel with
specific API/symbol to interact with vmklinux
• vmklinux and vmkernel interaction is uncertain
Hellwig v. VMware II
The court did not decide
• If vmklinux and vmkernel can be regarded as a uniform work and, if so,
• If the use of Hellwig's code in the vmklinux + vmkernel entity qualifies as a modification
(requiring a license) or as free use.
Hellwig v. VMware III
Court required that Hellwig prove the following:
• which parts of the Linux program he claims to have modified, and in what manner;
• to what extent these modifications meet the criteria for adapter's copyright pursuant to
Copyright Act § 69c No. 2 clause 2 in conjunction with § 3; and
• to what extent the Plaintiff pleads and where necessary proves that the Defendant has in
turn adopted (and possibly further modified) those adapted parts of the program that
substantiate his claim to protection.
Hellwig failed to meet this standard. He has appealed.
Hellwig v. VMware IV
Not sufficient as evidence according to the court:
• Copyright notices in header files
• Reference to git repository
• Provision of source code and git blame files
Increased requirements for demonstrating an infringement:
• Exact identification of own contributions
• Conditions for copyright protection of those contributions fulfilled
• Source code comparison of own contributions and the allegedly infringing code
It is not the job of the court to analyze the source code for elements that might
originate from the plaintiff, and to judge to what extent those elements might be
protectable.
Linux at 25: Disputes on Compliance
Greg Kroah-Hartman
• "I do [want companies to comply], but I don't ever think that suing them is the right way to do it, given
that we have been _very_ successful so far without having to do that”
• “You value the GPL over Linux, and I value Linux over the GPL. You are willing to risk Linux in order to
try to validate the GPL in some manner. I am not willing to risk Linux for anything as foolish as that.”
Linus Torvalds
• “Lawsuits destroy community. They destroy trust. They would destroy all the goodwill we've built up
over the years by being nice.”
Bradley Kuhn (SFC)
• “You said that you "care more about Linux than the GPL". I would probably agree with that. But, I do
care about software freedom generally much more than I care about Linux *or* the GPL. I care about
Linux because it's the only kernel in the world that brings software freedom to lots of users.”
Linux Foundation
• Who owns the contributions in the Linux kernel
• Linux kernel analysis to determine the identity of contributors to Linux kernel, software has
been completed and analysis will be done this year
• Next step: identifying copyright owners
• Encouraging statements by kernel.org on community norms for enforcement
• Training programs
• Core Infrastructure Initiative “Badge Program” (focused on security but includes
governance issues)
Summary for Software Distributors
• More compliance actions seem likely, particularly in Germany
• Develop a FOSS use (and management) policy to ensure that you understand
your obligations and can comply with them (for an overview of FOSS and FOSS
governance see
https://www.blackducksoftware.com/resources/webinar/introduction-open-source-
software-and-licensing)
• Ensure that your policy covers updates and security issues
• Review your distribution agreements to ensure that they take into account any
terms imposed by FOSS in your product and modify those terms as appropriate
• Largest law firm in the world with
4,200 lawyers in 31 countries and 77
offices throughout the Americas, Asia
Pacific, Europe and the Middle East
• More than 145 DLA Piper lawyers in IP
transactions
• Global Open Source Practice
• More than 550 DLA Piper lawyers
ranked as leaders in their fields
Global platform
OSS Practice
• Worldwide OSS practice group
• US Practice led by two partners: Mark Radcliffe & Victoria Lee
• Experience
• Open sourcing Solaris operating system
• FOSS foundations:
• OpenStack Foundation
• PrPL Foundation
• OpenSocial
• Open Source Initiative
• GPLv3 Drafting Committee Chair (Committee D)
• Drafting Project Harmony agreements
Contact Information
Mark F. Radcliffe
Partner
2000 University Avenue, East Palo
Alto, California, 94303-2214, United
States
T +1 650 833 2266
F +1 650 687 1222
E mark.radcliffe@dlapiper.com
Mark Radcliffe concentrates in strategic intellectual property advice, private financing, corporate
partnering, software licensing, Internet licensing, cloud computing and copyright and trademark.
He is the Chair of the Open Source Industry Group at the firm and has been advising on open
source matters for over 15 years. For example, he assisted Sun Microsystems in open sourcing
the Solaris operating system and drafting the CDDL. And he represents or has represented
other large companies in their software licensing (and, in particular, open source matters)
including eBay, Accenture, Adobe, Palm and Sony. He represents many software companies
(including open source startups) including SugarCRM, DeviceVM, Revolution Analytics,
Funambol and Reductive Labs for intellectual property matters. On a pro bono basis, he serves
as outside General Counsel for the Open Source Initiative and on the Legal Committee of the
Apache Software Foundation. He was the Chair of Committee C for the Free Software
Foundation in reviewing GPLv3 and was the lead drafter for Project Harmony. And in 2012, he
became outside general counsel of the Open Stack Foundation and drafted their certificate of
incorporation and bylaws as well as advising them on open source matters.
Contact Information
Bernd Siebers
Rechtsanwalt | Counsel
DLA Piper UK LLP
Maximilianstraße 2
D-80539 München
T +49 89 232372 133
M +49 173 529 75 67
E bernd.siebers@dlapiper.com
Bernd Siebers has longstanding experience in advising national and international businesses in
technology related matters, both contentious and non-contentious. His practice focuses on
technology related disputes with a focus on software and failed IT projects.
Bernd has particular experience in advising on Open Source Software compliance and in
dealing with Open Source Software related disputes, both in court and out of court.
Bernd has distinct specialist skills in copyright protection of software and in drafting and
negotiating technology sourcing agreements including software development and maintenance
agreements, and software licensing agreements.
Litigation and Compliance in the Open Source Ecosystem

More Related Content

What's hot

ヤフーのプライベートクラウドとクラウドエンジニアの業務について
ヤフーのプライベートクラウドとクラウドエンジニアの業務についてヤフーのプライベートクラウドとクラウドエンジニアの業務について
ヤフーのプライベートクラウドとクラウドエンジニアの業務について
Yahoo!デベロッパーネットワーク
 
GitOpsでKubernetesのManifest管理
GitOpsでKubernetesのManifest管理GitOpsでKubernetesのManifest管理
GitOpsでKubernetesのManifest管理
Shinya Sasaki
 
【CEDEC2013】20対20リアルタイム通信対戦オンラインゲームのサーバ開発&運営技法
【CEDEC2013】20対20リアルタイム通信対戦オンラインゲームのサーバ開発&運営技法【CEDEC2013】20対20リアルタイム通信対戦オンラインゲームのサーバ開発&運営技法
【CEDEC2013】20対20リアルタイム通信対戦オンラインゲームのサーバ開発&運営技法モノビット エンジン
 
30分でわかるマイクロサービスアーキテクチャ 第2版
30分でわかるマイクロサービスアーキテクチャ 第2版30分でわかるマイクロサービスアーキテクチャ 第2版
30分でわかるマイクロサービスアーキテクチャ 第2版
Naoki (Neo) SATO
 
Multi-Tenancy Kafka cluster for LINE services with 250 billion daily messages
Multi-Tenancy Kafka cluster for LINE services with 250 billion daily messagesMulti-Tenancy Kafka cluster for LINE services with 250 billion daily messages
Multi-Tenancy Kafka cluster for LINE services with 250 billion daily messages
LINE Corporation
 
[Cloud OnAir] Anthosで実現するハイブリッドクラウド 〜 GKE On-Prem編 〜 2019年8月29日 放送
[Cloud OnAir] Anthosで実現するハイブリッドクラウド 〜 GKE On-Prem編 〜 2019年8月29日 放送[Cloud OnAir] Anthosで実現するハイブリッドクラウド 〜 GKE On-Prem編 〜 2019年8月29日 放送
[Cloud OnAir] Anthosで実現するハイブリッドクラウド 〜 GKE On-Prem編 〜 2019年8月29日 放送
Google Cloud Platform - Japan
 
実運用して分かったRabbit MQの良いところ・気をつけること #jjug
実運用して分かったRabbit MQの良いところ・気をつけること #jjug実運用して分かったRabbit MQの良いところ・気をつけること #jjug
実運用して分かったRabbit MQの良いところ・気をつけること #jjug
Yahoo!デベロッパーネットワーク
 
Event Sourcing & CQRS, Kafka, Rabbit MQ
Event Sourcing & CQRS, Kafka, Rabbit MQEvent Sourcing & CQRS, Kafka, Rabbit MQ
Event Sourcing & CQRS, Kafka, Rabbit MQ
Araf Karsh Hamid
 
Establishing an Open Source Program Office
Establishing an Open Source Program OfficeEstablishing an Open Source Program Office
Establishing an Open Source Program Office
Lee Calcote
 
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
NTT DATA Technology & Innovation
 
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
Toru Makabe
 
DNS移転失敗体験談
DNS移転失敗体験談DNS移転失敗体験談
DNS移転失敗体験談
oheso tori
 
root権限無しでKubernetesを動かす
root権限無しでKubernetesを動かす root権限無しでKubernetesを動かす
root権限無しでKubernetesを動かす
Akihiro Suda
 
PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)
PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)
PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)
NTT DATA Technology & Innovation
 
CI/CD Tools Universe: The Ultimate List
CI/CD Tools Universe: The Ultimate ListCI/CD Tools Universe: The Ultimate List
CI/CD Tools Universe: The Ultimate List
Plutora
 
BuildKitの概要と最近の機能
BuildKitの概要と最近の機能BuildKitの概要と最近の機能
BuildKitの概要と最近の機能
Kohei Tokunaga
 
最近のOpenStackを振り返ってみよう
最近のOpenStackを振り返ってみよう最近のOpenStackを振り返ってみよう
最近のOpenStackを振り返ってみよう
Takashi Kajinami
 
Terraform
TerraformTerraform
Terraform
Otto Jongerius
 
Opensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptOpensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptViet NguyenHoang
 
KubeEdgeを触ってみた
KubeEdgeを触ってみたKubeEdgeを触ってみた
KubeEdgeを触ってみた
Tomoyuki Tanigaki
 

What's hot (20)

ヤフーのプライベートクラウドとクラウドエンジニアの業務について
ヤフーのプライベートクラウドとクラウドエンジニアの業務についてヤフーのプライベートクラウドとクラウドエンジニアの業務について
ヤフーのプライベートクラウドとクラウドエンジニアの業務について
 
GitOpsでKubernetesのManifest管理
GitOpsでKubernetesのManifest管理GitOpsでKubernetesのManifest管理
GitOpsでKubernetesのManifest管理
 
【CEDEC2013】20対20リアルタイム通信対戦オンラインゲームのサーバ開発&運営技法
【CEDEC2013】20対20リアルタイム通信対戦オンラインゲームのサーバ開発&運営技法【CEDEC2013】20対20リアルタイム通信対戦オンラインゲームのサーバ開発&運営技法
【CEDEC2013】20対20リアルタイム通信対戦オンラインゲームのサーバ開発&運営技法
 
30分でわかるマイクロサービスアーキテクチャ 第2版
30分でわかるマイクロサービスアーキテクチャ 第2版30分でわかるマイクロサービスアーキテクチャ 第2版
30分でわかるマイクロサービスアーキテクチャ 第2版
 
Multi-Tenancy Kafka cluster for LINE services with 250 billion daily messages
Multi-Tenancy Kafka cluster for LINE services with 250 billion daily messagesMulti-Tenancy Kafka cluster for LINE services with 250 billion daily messages
Multi-Tenancy Kafka cluster for LINE services with 250 billion daily messages
 
[Cloud OnAir] Anthosで実現するハイブリッドクラウド 〜 GKE On-Prem編 〜 2019年8月29日 放送
[Cloud OnAir] Anthosで実現するハイブリッドクラウド 〜 GKE On-Prem編 〜 2019年8月29日 放送[Cloud OnAir] Anthosで実現するハイブリッドクラウド 〜 GKE On-Prem編 〜 2019年8月29日 放送
[Cloud OnAir] Anthosで実現するハイブリッドクラウド 〜 GKE On-Prem編 〜 2019年8月29日 放送
 
実運用して分かったRabbit MQの良いところ・気をつけること #jjug
実運用して分かったRabbit MQの良いところ・気をつけること #jjug実運用して分かったRabbit MQの良いところ・気をつけること #jjug
実運用して分かったRabbit MQの良いところ・気をつけること #jjug
 
Event Sourcing & CQRS, Kafka, Rabbit MQ
Event Sourcing & CQRS, Kafka, Rabbit MQEvent Sourcing & CQRS, Kafka, Rabbit MQ
Event Sourcing & CQRS, Kafka, Rabbit MQ
 
Establishing an Open Source Program Office
Establishing an Open Source Program OfficeEstablishing an Open Source Program Office
Establishing an Open Source Program Office
 
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
 
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
 
DNS移転失敗体験談
DNS移転失敗体験談DNS移転失敗体験談
DNS移転失敗体験談
 
root権限無しでKubernetesを動かす
root権限無しでKubernetesを動かす root権限無しでKubernetesを動かす
root権限無しでKubernetesを動かす
 
PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)
PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)
PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)
 
CI/CD Tools Universe: The Ultimate List
CI/CD Tools Universe: The Ultimate ListCI/CD Tools Universe: The Ultimate List
CI/CD Tools Universe: The Ultimate List
 
BuildKitの概要と最近の機能
BuildKitの概要と最近の機能BuildKitの概要と最近の機能
BuildKitの概要と最近の機能
 
最近のOpenStackを振り返ってみよう
最近のOpenStackを振り返ってみよう最近のOpenStackを振り返ってみよう
最近のOpenStackを振り返ってみよう
 
Terraform
TerraformTerraform
Terraform
 
Opensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptOpensource Powerpoint Review.Ppt
Opensource Powerpoint Review.Ppt
 
KubeEdgeを触ってみた
KubeEdgeを触ってみたKubeEdgeを触ってみた
KubeEdgeを触ってみた
 

Viewers also liked

Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016 Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016
Mark Radcliffe
 
What's it like to work at Black Duck
What's it like to work at Black DuckWhat's it like to work at Black Duck
What's it like to work at Black Duck
Black Duck by Synopsys
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
Black Duck by Synopsys
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
Black Duck by Synopsys
 
Containers for Lawyers Richard Fontana
Containers for Lawyers  Richard FontanaContainers for Lawyers  Richard Fontana
Containers for Lawyers Richard Fontana
Black Duck by Synopsys
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIs
Black Duck by Synopsys
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
Black Duck by Synopsys
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
Black Duck by Synopsys
 
Securing Docker Containers
Securing Docker ContainersSecuring Docker Containers
Securing Docker Containers
Black Duck by Synopsys
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
Black Duck by Synopsys
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
Black Duck by Synopsys
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open Source
Black Duck by Synopsys
 
Making the Transition from Suite to the Hub
Making the Transition from Suite to the HubMaking the Transition from Suite to the Hub
Making the Transition from Suite to the Hub
Black Duck by Synopsys
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
Black Duck by Synopsys
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A
Black Duck by Synopsys
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk Management
Black Duck by Synopsys
 
US-Jpan Innovation and Entrepreneurship Council Report
US-Jpan Innovation and Entrepreneurship Council ReportUS-Jpan Innovation and Entrepreneurship Council Report
US-Jpan Innovation and Entrepreneurship Council Report
Mark Radcliffe
 
Unintended Consequences of Joint Patent Ownership
Unintended Consequences of Joint Patent OwnershipUnintended Consequences of Joint Patent Ownership
Unintended Consequences of Joint Patent Ownership
Rodney Sparks
 

Viewers also liked (20)

Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016 Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016
 
What's it like to work at Black Duck
What's it like to work at Black DuckWhat's it like to work at Black Duck
What's it like to work at Black Duck
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
 
Containers for Lawyers Richard Fontana
Containers for Lawyers  Richard FontanaContainers for Lawyers  Richard Fontana
Containers for Lawyers Richard Fontana
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIs
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Securing Docker Containers
Securing Docker ContainersSecuring Docker Containers
Securing Docker Containers
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open Source
 
Making the Transition from Suite to the Hub
Making the Transition from Suite to the HubMaking the Transition from Suite to the Hub
Making the Transition from Suite to the Hub
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk Management
 
US-Jpan Innovation and Entrepreneurship Council Report
US-Jpan Innovation and Entrepreneurship Council ReportUS-Jpan Innovation and Entrepreneurship Council Report
US-Jpan Innovation and Entrepreneurship Council Report
 
Unintended Consequences of Joint Patent Ownership
Unintended Consequences of Joint Patent OwnershipUnintended Consequences of Joint Patent Ownership
Unintended Consequences of Joint Patent Ownership
 

Similar to Litigation and Compliance in the Open Source Ecosystem

FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
Black Duck by Synopsys
 
Top Five Global Patent Concerns For 2015
Top Five Global Patent Concerns For 2015Top Five Global Patent Concerns For 2015
Top Five Global Patent Concerns For 2015Maya Fowell
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Black Duck by Synopsys
 
2009 Think Tank Final Update
2009 Think Tank Final Update2009 Think Tank Final Update
2009 Think Tank Final Update
Mark Radcliffe
 
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Black Duck by Synopsys
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
Jason Haislmaier
 
Ppt oops i just lost a billion euros part 1 3 q18
Ppt oops i just lost a billion euros part 1 3 q18Ppt oops i just lost a billion euros part 1 3 q18
Ppt oops i just lost a billion euros part 1 3 q18
James C. Roberts III
 
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
Financial Poise
 
Top 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLTop 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDL
Sarah Toomey
 
Managing IP -- New Tlds
Managing IP -- New TldsManaging IP -- New Tlds
Managing IP -- New Tlds
mxrodenbaugh
 
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Arlen Meyers, MD, MBA
 
IPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP StrategyIPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP Strategy
Origiin IP Solutions LLP
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
Eversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamIT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
Eversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
Eversheds Sutherland
 
(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice
MyCase Legal Case and Practice Management Software
 
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
Martin Schweiger
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - London
Eversheds Sutherland
 
Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Buying & Selling IP (Series: Intellectual Property 201 - 2020)  Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Financial Poise
 

Similar to Litigation and Compliance in the Open Source Ecosystem (20)

FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
Top Five Global Patent Concerns For 2015
Top Five Global Patent Concerns For 2015Top Five Global Patent Concerns For 2015
Top Five Global Patent Concerns For 2015
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
2009 Think Tank Final Update
2009 Think Tank Final Update2009 Think Tank Final Update
2009 Think Tank Final Update
 
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
 
Ppt oops i just lost a billion euros part 1 3 q18
Ppt oops i just lost a billion euros part 1 3 q18Ppt oops i just lost a billion euros part 1 3 q18
Ppt oops i just lost a billion euros part 1 3 q18
 
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
 
Top 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLTop 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDL
 
Managing IP -- New Tlds
Managing IP -- New TldsManaging IP -- New Tlds
Managing IP -- New Tlds
 
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
 
IPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP StrategyIPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP Strategy
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamIT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
 
(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice
 
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - London
 
Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Buying & Selling IP (Series: Intellectual Property 201 - 2020)  Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Buying & Selling IP (Series: Intellectual Property 201 - 2020)
 

More from Black Duck by Synopsys

FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
Black Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Black Duck by Synopsys
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
Black Duck by Synopsys
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Black Duck by Synopsys
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Black Duck by Synopsys
 

More from Black Duck by Synopsys (20)

FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 

Recently uploaded

Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 

Recently uploaded (20)

Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 

Litigation and Compliance in the Open Source Ecosystem

  • 1. Litigation and Compliance in the Open Source Ecosystem
  • 2. Speakers MARK RADCLIFFE Partner, DLA Piper BERND SIEBERS Counsel, DLA Piper PHIL ODENCE VP & General Manager, Black Duck Software
  • 3. OSS Often Enters a Code Base Unchecked, Resulting In Risks Code Base Commercial 3rd Party Code Purchasing • Licensing? • Security? • Quality? • Support? Open Source OPERATIONAL RISK Which versions of code are being used, and how old are they LEGAL RISK Which licenses are used and do they match anticipated use of the code SECURITY RISK Which components have vulnerabilities and what are they Management visibility…not!
  • 4. Black Duck’s Experience Analyzing Code • Audits on average find 33% open source • 99% of code audits find open source • 95% of audits find unknown open source • 75% of audits contain unknown licenses • 67% of code contains vulnerable components • 50% of code audits contain GPL
  • 5. FOSS Compliance: New Players • Traditional FOSS Enforcement: Focus on Compliance • Software Freedom Law Center • Software Freedom Conservancy (“SFC”) • gplviolations • Shift to Commercial Licensors • Continuent v. Tekelec (GPL) • Versata Series of Cases • New Enforcers • McHardy, copyright troll • Fligor: looking for clients • Major Difference in Goals • Shift from compliance to revenue • Focus on injunctive relief • Expansion of Traditional FOSS Enforcement • SFC assists in VMware litigation
  • 6. Existing Compliance Issues • VMware litigation (SFC) • McHardy litigation • First copyright troll • Versata: focus on hybrid product licensing • Will terminated licensees regularly raise the defense of “integration” with GPLv2 licensed code? • Will warranty claims against licensors arise from poorly drafted licenses become common?
  • 7. Netfilter Project Suspends McHardy The netfilter project regrets to have to suspend its core team member Patrick McHardy from the core team. This is a grave step, definitely the first in the projects history, and it is not one we take lightly. Over many months, severe allegations have been brought forward against the style of his license enforcement activities on parts of the netfilter software he wrote. With respect to privacy, we will not publicly disclose the content of those allegations. Despite many attempts by us to reach him, Patrick has been unable or unwilling to comment on those allegations or defend against the allegations. The netfilter project does not have first-hand evidence. But given the consistent allegations from various trusted sources, and in the absence of any response from Patrick, we feel it is necessary to suspend him until further notice. We'd like to stress that we do not take any sides, and did not "convict" Patrick of anything. He continues to be welcome in the project as soon as he is be able to address the allegations and/or co-sign the "principles" [1] in terms of any future enforcement activities.
  • 8. SFC Criticizes GPL Monetizers These “GPL monetizers”, who trace their roots to nefarious business models that seek to catch users in minor violations in order to sell an alternative proprietary license, stand in stark contrast to the work that Conservancy, FSF and gpl-violations.org have done for years. Most notably, a Linux developer named Patrick McHardy continues ongoing GPL enforcement actions but has not endorsed the community Principles. When Patrick began his efforts, Conservancy immediately reached out to him. After a promising initial discussion (even contemplating partnership and Patrick joining our coalition) in mid-2014, Patrick ceased answering our emails and text messages, and never cooperated with us. Conservancy has had no contact with Patrick nor his attorney since, other than a somewhat cryptic and off-topic response we received over a year ago. In the last two years, we've heard repeated rumors about Patrick's enforcement activity, as well as some reliable claims by GPL violators that Patrick failed to follow the Principles. In one of the many attempts we made to contact Patrick, we urged him to join us in co-drafting the Principles, and then invited him to endorse them after their publication. Neither communication received a response. We informed him that we felt the need to make this public statement, and gave him almost three months to respond. He still has not responded. Patrick's enforcement occurs primarily in Germany. We know well the difficulties of working transparently in that particular legal system, but both gpl-violations.org and Conservancy have done transparent enforcement in that jurisdiction and others. Yet, Patrick's actions are not transparent. In private and semi-private communications, many have criticized Patrick for his enforcement actions. Patrick McHardy has also been suspended from work on the Netfilter core team. While the Netfilter team itself publicly endorsed Conservancy's principles of enforcement, Patrick has not. Conservancy agrees that Patrick's apparent refusal to endorse the Principles leaves suspicion and concern, since the Principles have been endorsed by so many other Linux copyright holders, including Conservancy.
  • 9. New Compliance Issues • Harald Welte announcement of an OSS Compliance Company, aggregating developers • Welte: ran gpl violations • Geographic focus not limited to Germany, but could include France and Spain • David Fligor/Progressive LLP: Troll lawyer searching for a project, so far no cases filed • Sound View Innovations: new ASF software patent troll based on Alcatel-Lucent patents • Sound View has sued Facebook • Sound View has sued LinkedIn • Sound View has sued Twitter
  • 10. German FOSS Enforcement • Community Enforcers • Harald Welte/gpl-violations.org (Linux kernel, iptables) • Returning to compliance based on Barcelona FSFE Conference • Thomas Gleixner (Linux kernel code used in U-Boot) • XviD project • Christoph Hellwig (Linux kernel, this is the VMware case) • Other • Patrick McHardy (Linux kernel, iptables, iproute2)
  • 11. Community Enforcement • Most cases are settled before they go to court. The agreement for a “declaration to cease and desist" in Germany has to contain a clause about a contractual penalty for a future infringement: if the defendant is caught violating GPLv2 again, then the defendant has to pay the penalty. • Harald Welte (gpl-violations.org) has used these penalties for donations to charities like Chaos Computer Club, Wau Holland Stiftung, Free Software Foundation Europe, etc. because his focus was on process change, compliance and community norms. • gpl-violations.org worked very closely together with Free Software Foundation Europe to get companies to talk about their problems and let them participate in the global discussion about open source compliance and other legal issues.
  • 12. German Court Procedure - Outline I. Preliminary Injunction Proceedings 1. General 2. Requirements 3. Standard of Proof 4. Possible Remedies 5. Procedural Aspects 6. Enforcement II. Proceedings on the Merits 1. Overview 2. Remedies III. Pre-Litigation Strategies 1. Offense Position 2. Defense Position
  • 13. German Court Procedure – Preliminary Injunction Proceedings 1. General • Objective: Stop infringement as soon as possible • Often most dangerous threat to infringer, since immediately enforceable (appeal has no suspensory effect!) • "General" time line: • Granted within hours (e.g. re trade fairs), 1-2 days (if ex parte), 2-6 weeks (with oral hearing); • Appeal hearing 2-4 months after decision in first instance
  • 14. German Court Procedure – Preliminary Injunction Proceedings 2. Requirements • Generally courts issue in cases where • Infringement is very likely • No undue delay in filing an application for PI ("Urgency Requirement") • Plaintiff has to file the application for PI without undue delay • Up to 4 weeks usually not problematic • Up to 8 weeks usually problematic; IP owner has to show exceptional circumstances in determining the infringement / preparation of PI application • Over 8 weeks usually no PI granted! • ACT FAST!
  • 15. McHardy German Litigation I • Patrick McHardy uses the same enforcement mechanism but is seeking personal monetary gain • Estimate is that McHardy has approached at least 50 companies that have been hit (some companies multiple times). • Wide variety of companies, including retailers, telcos, producers, importers • Best estimate is that he has received significant damages • Wide range of products • physical products (offline distribution) • firmware updates downloadable from a website • Over The Air (OTA) updates
  • 16. McHardy German Litigation II • Tactics against companies 1. Address a (minor) violation and have a company sign a cease and desist with contractual penalty. 2. Address another (minor) violation and collect the contractual penalty. Sign a new agreement with a higher penalty. 3. Wait some time, then go back to 2 • Devices usually have multiple violations of GPLv2 and he only will address one issue at a time to collect the contractual penalty.
  • 17. McHardy German Litigation III McHardy's claims largely focus on: • Lack of written offer • Lack of license text in product • Inadequate terms of written offer • Lack of complete corresponding source code in repositories • EULA conflicting with GPL obligations • Written offer must come from last company selling product • More exotic • Written offer should be in German • GPL warranty disclaimers are inadequate under German law In the past, McHardy did not do a thorough technical analysis, like a rebuild of the source code, but he has started doing so.
  • 18. McHardy German Litigation IV Two recent hearings, McHardy lost on procedural issues • Case one: court decided that application was not sufficiently “urgent” for preliminary injunction procedure • Case two: judge found that McHardy’s affidavits were inconsistent and McHardy’s lawyer was not prepared to defend it: McHardy withdrew case Statement by presiding judge (not required and without precedential value but shows thinking): • If only a tiny bit of the programming works was contained in the litigious product and if that tiny bit was capable of being copyright protected, the arguments of the defendant would not be sufficient to rebut the claim. This might indeed result in Linux not being tradable in Germany. The industry might have to look for other platforms where the chain of rights can be controlled more easily
  • 19. Solving the McHardy Problem and Copycats • Focus on compliance of your products going into Germany • Understand the McHardy business model • Collaborate on claims and share information • DLA Piper: Developing “Defense in a box” • Working with past litigants to provide information • Facts about McHardy • Summary of McHardy claims • Summary of McHardy arguments • References • Possibility of including actual complaints and other filings but more challenging
  • 20. Hellwig v. VMware I • VMware is alleged to be using arts of the Linux kernel in their proprietary ESXi product, including the entire SCSI mid-layer, USB support, radix tree and many, many device drivers. • Linux is licensed under GNU GPLv2 with a modification by Linus Torvalds • VMware has modified all the code they took from the Linux kernel and integrated them into something they call vmklinux. • VMware has modified their proprietary virtualization OS kernel vmkernel with specific API/symbol to interact with vmklinux • vmklinux and vmkernel interaction is uncertain
  • 21. Hellwig v. VMware II The court did not decide • If vmklinux and vmkernel can be regarded as a uniform work and, if so, • If the use of Hellwig's code in the vmklinux + vmkernel entity qualifies as a modification (requiring a license) or as free use.
  • 22. Hellwig v. VMware III Court required that Hellwig prove the following: • which parts of the Linux program he claims to have modified, and in what manner; • to what extent these modifications meet the criteria for adapter's copyright pursuant to Copyright Act § 69c No. 2 clause 2 in conjunction with § 3; and • to what extent the Plaintiff pleads and where necessary proves that the Defendant has in turn adopted (and possibly further modified) those adapted parts of the program that substantiate his claim to protection. Hellwig failed to meet this standard. He has appealed.
  • 23. Hellwig v. VMware IV Not sufficient as evidence according to the court: • Copyright notices in header files • Reference to git repository • Provision of source code and git blame files Increased requirements for demonstrating an infringement: • Exact identification of own contributions • Conditions for copyright protection of those contributions fulfilled • Source code comparison of own contributions and the allegedly infringing code It is not the job of the court to analyze the source code for elements that might originate from the plaintiff, and to judge to what extent those elements might be protectable.
  • 24. Linux at 25: Disputes on Compliance Greg Kroah-Hartman • "I do [want companies to comply], but I don't ever think that suing them is the right way to do it, given that we have been _very_ successful so far without having to do that” • “You value the GPL over Linux, and I value Linux over the GPL. You are willing to risk Linux in order to try to validate the GPL in some manner. I am not willing to risk Linux for anything as foolish as that.” Linus Torvalds • “Lawsuits destroy community. They destroy trust. They would destroy all the goodwill we've built up over the years by being nice.” Bradley Kuhn (SFC) • “You said that you "care more about Linux than the GPL". I would probably agree with that. But, I do care about software freedom generally much more than I care about Linux *or* the GPL. I care about Linux because it's the only kernel in the world that brings software freedom to lots of users.”
  • 25. Linux Foundation • Who owns the contributions in the Linux kernel • Linux kernel analysis to determine the identity of contributors to Linux kernel, software has been completed and analysis will be done this year • Next step: identifying copyright owners • Encouraging statements by kernel.org on community norms for enforcement • Training programs • Core Infrastructure Initiative “Badge Program” (focused on security but includes governance issues)
  • 26. Summary for Software Distributors • More compliance actions seem likely, particularly in Germany • Develop a FOSS use (and management) policy to ensure that you understand your obligations and can comply with them (for an overview of FOSS and FOSS governance see https://www.blackducksoftware.com/resources/webinar/introduction-open-source- software-and-licensing) • Ensure that your policy covers updates and security issues • Review your distribution agreements to ensure that they take into account any terms imposed by FOSS in your product and modify those terms as appropriate
  • 27. • Largest law firm in the world with 4,200 lawyers in 31 countries and 77 offices throughout the Americas, Asia Pacific, Europe and the Middle East • More than 145 DLA Piper lawyers in IP transactions • Global Open Source Practice • More than 550 DLA Piper lawyers ranked as leaders in their fields Global platform
  • 28. OSS Practice • Worldwide OSS practice group • US Practice led by two partners: Mark Radcliffe & Victoria Lee • Experience • Open sourcing Solaris operating system • FOSS foundations: • OpenStack Foundation • PrPL Foundation • OpenSocial • Open Source Initiative • GPLv3 Drafting Committee Chair (Committee D) • Drafting Project Harmony agreements
  • 29. Contact Information Mark F. Radcliffe Partner 2000 University Avenue, East Palo Alto, California, 94303-2214, United States T +1 650 833 2266 F +1 650 687 1222 E mark.radcliffe@dlapiper.com Mark Radcliffe concentrates in strategic intellectual property advice, private financing, corporate partnering, software licensing, Internet licensing, cloud computing and copyright and trademark. He is the Chair of the Open Source Industry Group at the firm and has been advising on open source matters for over 15 years. For example, he assisted Sun Microsystems in open sourcing the Solaris operating system and drafting the CDDL. And he represents or has represented other large companies in their software licensing (and, in particular, open source matters) including eBay, Accenture, Adobe, Palm and Sony. He represents many software companies (including open source startups) including SugarCRM, DeviceVM, Revolution Analytics, Funambol and Reductive Labs for intellectual property matters. On a pro bono basis, he serves as outside General Counsel for the Open Source Initiative and on the Legal Committee of the Apache Software Foundation. He was the Chair of Committee C for the Free Software Foundation in reviewing GPLv3 and was the lead drafter for Project Harmony. And in 2012, he became outside general counsel of the Open Stack Foundation and drafted their certificate of incorporation and bylaws as well as advising them on open source matters.
  • 30. Contact Information Bernd Siebers Rechtsanwalt | Counsel DLA Piper UK LLP Maximilianstraße 2 D-80539 München T +49 89 232372 133 M +49 173 529 75 67 E bernd.siebers@dlapiper.com Bernd Siebers has longstanding experience in advising national and international businesses in technology related matters, both contentious and non-contentious. His practice focuses on technology related disputes with a focus on software and failed IT projects. Bernd has particular experience in advising on Open Source Software compliance and in dealing with Open Source Software related disputes, both in court and out of court. Bernd has distinct specialist skills in copyright protection of software and in drafting and negotiating technology sourcing agreements including software development and maintenance agreements, and software licensing agreements.