SlideShare a Scribd company logo
Software licensing techniques
LICENCING
License
License
A permit from an authority to own or use
something, do a particular thing, or carry on a trade .
Freedom to behave as one wishes, especially
in a way which results in excessive or unacceptable
behavior.
Software License
The hallmark of proprietary software licenses is that the
software publisher grants the use of one or more copies of
software under the end-user license agreement (EULA), but
ownership of those copies remains with the software publisher.
A software license is a legal instrument (usually by way
of contract law, with or without printed material)
governing the use or redistribution of software. Under
United States copyright law
all software is copyright protected, except material in the
public domain. A typical software license grants an end-
user permission to use one or more copies of software in
ways where such a use would otherwise potentially
constitute copyright infringement of the software owner's
exclusive rights under copyright law.
All software must be legally licensed before it may be installed. Proof of purchase
(purchase orders, receipts, invoices or similar documentation are acceptable) must be
maintained by individuals or departments for all non-ITS provided software that is installed on a
university-owned computer. Vendors may require proof of purchase during an audit, and
technical support staff may ask for proof of purchase before software can be reinstalled on a
computer that has been reimaged or rebuilt.
Types of licenses
Proprietary license
Most software licenses are "proprietary" licenses, meaning the software publisher grants a
license to use one or more copies of software, but that ownership of those copies remains
with the software publisher. The user must accept the license before they are permitted to
use the software.
GNU General Public License
These are agreements under which much "open source" software is licensed. End users may
do things like change the source code, but any refinements of the software must also be
made available under a GNU GPL license. Often referred to as "free, copy left" licenses, the
software may or may not be distributed for a fee - "free" refers to the ability of users to change
and distribute modifications of the software, not to cost
End User License Agreement
(EULA)
Also called "clickwraps" or "shrinkwraps," EULAS indicate the terms under which the end-user
may use the software. Agreements with organizations or companies often take the form of
contracts between the organization and the software publisher or vendor, and specify the
terms of use for all users from the organization, superseding any EULAs which may come
with the software.
Workstation licenses
These are licenses that permit the installation of an application on a single computer. You may
not install the software on more than one machine unless you purchase a license for each
additional machine. Most workstation license agreements allow you to make a single backup
copy of the software as long as that backup copy is used only to restore the software onto the
same machine, or a separate machine if the software is removed from the original computer
Concurrent use license
These are licenses that permit you to install the software onto multiple machines as long
as the number of computers using the software at the same time does not exceed the
number of licenses which you have purchased. Concurrent use licenses are usually used
in conjunction with "license manager" software that prevents the number of licenses
from being exceeded. At UNCG, ITS uses KeyServer software that monitors and controls
the use of concurrent use licensed software.
Site licenses
A site license permits the use of software on any computer at a specified site. Unlimited site
licenses allow the installation of software on any number of computers as long as those
computers are located at the specified site. Some site licenses permit the installation on
computers owned by a particular entity (such as a university) regardless of the physical
location. Some vendors refer to their licenses as site licenses but restrict the number of
computers on which the software may be installed. The only way to know for sure is to read the
license specifics.
Perpetual licenses
These are licenses without expiration dates, which permit use of the software
indefinitely, without requiring a recurring fee for continued use. Most software
that individuals buy for use on their home computers are perpetual licenses.
Non-perpetual licenses
These are licenses that "lease" the software for use for a specified period of time,
usually annually or sometimes bi-annually. Users are required to remove the
software from their computer if they cease paying the license fee
License with Maintenance
Some license agreements allow the user to purchase "maintenance" or "software
assurance" along with the original license fee, which entitles the user to receive new
versions of the software for one to two years until the maintenance agreement expires.
Software Licensing Models
Beta or field test
This type of license is used to get feedback so usually expire at the end of the
Beta test and are not renewed. The product is likely not be „production grade‟
and the licensee may be required to exercise the software under certain
conditions and to submit reports, as well as limit use to defined environments and
users that fit a specific profile.
Cross license
These are used when the licensor and licensee(s) agree to exchange
rights. The rights are not necessarily symmetrical, nor no-fee. It can be a
way for people to leverage their intellectual property by exchanging
value on a no-cash basis.
Demo or evaluation
Such licenses are granted for a short time such as 30 days or a number of uses.
Usually, production-level work is not allowed and some features may be limited
or disabled, or it may have a time bomb that disables the product at a certain
time. The types of users, platforms, content or tools may also be prescribed.
Development
These licenses can require granting rights to modify the software, or in some
cases, to create derivative works. Alternatively, the grantor may want rights
to modify the output of the development effort; or the licensee may need to
retain residual rights in order to support the output. Development licenses are
used to gain special knowledge and to supplement engineering effort.
Duplicate grouping (license
sharing) by user, host or
display
Grouping defines rules for counting usage when a single user concurrently runs the same
application on several computers. This instance may count as a single use or a multiple
use, depending on the license terms.
End User License Agreements
(EULA), Shrink Wrap or “click
through”
These are most common license models for online and single user software. They
usually grant the perpetual right to use, only for one end-user on one computer at a
time, and do not include any upgrades.
Group License
This type of license can be used to develop a consortium. It grants rights only to
members of a specific group such as named entities, or those that adhere to a
particular
standard, or have received a particular certification. Group licenses may
require licensees to grant special rights to all members of the group such as
mandatory no-fee cross-licensing.
Examples of License software
shrink wrap contract: an example of a license for which the originators maintain strict
control over the software component is the Microsoft Windows Operating System
software. This has helped Microsoft successfully gain a dominant position in the software
market: Microsoft Licensing.
Example of free software
license:
The GNU GPL is aimed at providing licenses with significant permissions and rights.
There are restrictions in the license -- the licensee must pass on the received
permissions and rights to anyone to whom they provide the software. Once a piece
of software is distributed under the GPL that released copy will always be available
with the permissions and rights received.

More Related Content

What's hot

Keyloggers
KeyloggersKeyloggers
Keyloggers
kdore
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
Ashita Agrawal
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
 
Open source software
Open source softwareOpen source software
Open source software
Santosh Kumar Kori
 
System security
System securitySystem security
System security
sommerville-videos
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
Software copyright
Software copyrightSoftware copyright
Software copyright
Roshan Chaudhary
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging
Sam Bowne
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Cryptography ppt
Cryptography pptCryptography ppt
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
shubhravrat Deshpande
 
Authentication methods
Authentication methodsAuthentication methods
Authentication methods
sana mateen
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
Rajapriya82
 
Software security
Software securitySoftware security
Software security
Roman Oliynykov
 
Web technology
Web technologyWeb technology
Web technology
Selvin Josy Bai Somu
 

What's hot (20)

Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Open source software
Open source softwareOpen source software
Open source software
 
System security
System securitySystem security
System security
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Authentication methods
Authentication methodsAuthentication methods
Authentication methods
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Software security
Software securitySoftware security
Software security
 
Web technology
Web technologyWeb technology
Web technology
 

Viewers also liked

Software license schemes
Software license schemesSoftware license schemes
Software license schemes
Chit Ko Ko Win
 
ShareWare: An Android Application for Video Sharing
ShareWare: An Android Application for Video SharingShareWare: An Android Application for Video Sharing
ShareWare: An Android Application for Video Sharing
Shahid Khan
 
Shareware license
Shareware  licenseShareware  license
Shareware license
slksagar
 
Itgs os presentation
Itgs os presentationItgs os presentation
Itgs os presentation
smatejka2082
 
FREEWARE
FREEWAREFREEWARE
FREEWARE
Revathy Nair
 
Software license
Software licenseSoftware license
Software license
sstothoff
 
Software License
Software LicenseSoftware License
Observer License Tracer
Observer License TracerObserver License Tracer
Observer License Tracer
ABC Interactive
 

Viewers also liked (8)

Software license schemes
Software license schemesSoftware license schemes
Software license schemes
 
ShareWare: An Android Application for Video Sharing
ShareWare: An Android Application for Video SharingShareWare: An Android Application for Video Sharing
ShareWare: An Android Application for Video Sharing
 
Shareware license
Shareware  licenseShareware  license
Shareware license
 
Itgs os presentation
Itgs os presentationItgs os presentation
Itgs os presentation
 
FREEWARE
FREEWAREFREEWARE
FREEWARE
 
Software license
Software licenseSoftware license
Software license
 
Software License
Software LicenseSoftware License
Software License
 
Observer License Tracer
Observer License TracerObserver License Tracer
Observer License Tracer
 

Similar to Software licencing techniqes

Software Licensing - Comprehensive Guide to Types and Models
Software Licensing - Comprehensive Guide to Types and ModelsSoftware Licensing - Comprehensive Guide to Types and Models
Software Licensing - Comprehensive Guide to Types and Models
Labs64 NetLicensing
 
Software License Agreements
Software License AgreementsSoftware License Agreements
Software License Agreements
termsfeed
 
License
LicenseLicense
License
nafia
 
Software Licensing.pptx
Software Licensing.pptxSoftware Licensing.pptx
Software Licensing.pptx
AaliyanShaikh
 
opensource_powerpoint_review
opensource_powerpoint_reviewopensource_powerpoint_review
opensource_powerpoint_review
webuploader
 
Opensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptOpensource Powerpoint Review.Ppt
Opensource Powerpoint Review.Ppt
Viet NguyenHoang
 
GDSC - Software Licensing.pdf
GDSC - Software Licensing.pdfGDSC - Software Licensing.pdf
GDSC - Software Licensing.pdf
AaliyanShaikh
 
Opensource powerpoint-reviewppt742
Opensource powerpoint-reviewppt742Opensource powerpoint-reviewppt742
Opensource powerpoint-reviewppt742
Vibha Khanna
 
License
LicenseLicense
License
nafia
 
Open Source and You
Open Source and YouOpen Source and You
Open Source and You
Jeff Stoner
 
Open Source Licensing Fundamentals for Financial Services
Open Source Licensing Fundamentals for Financial ServicesOpen Source Licensing Fundamentals for Financial Services
Open Source Licensing Fundamentals for Financial Services
FINOS
 
How to select software license for software program code * What type of Softw...
How to select software license for software program code * What type of Softw...How to select software license for software program code * What type of Softw...
How to select software license for software program code * What type of Softw...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
 
Use terms retail_windows_8.1_single_language_update_english
Use terms retail_windows_8.1_single_language_update_englishUse terms retail_windows_8.1_single_language_update_english
Use terms retail_windows_8.1_single_language_update_english
Khairizal Zaman
 
License
LicenseLicense
Software licences
Software licencesSoftware licences
Software licences
OriginalGSM
 
Software Licences
Software LicencesSoftware Licences
Software Licences
Ajay Jassi
 
License
LicenseLicense
License
LicenseLicense
License
yopui
 
50120140503011
5012014050301150120140503011
50120140503011
IAEME Publication
 
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanSOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
Haseeb Shalmani
 

Similar to Software licencing techniqes (20)

Software Licensing - Comprehensive Guide to Types and Models
Software Licensing - Comprehensive Guide to Types and ModelsSoftware Licensing - Comprehensive Guide to Types and Models
Software Licensing - Comprehensive Guide to Types and Models
 
Software License Agreements
Software License AgreementsSoftware License Agreements
Software License Agreements
 
License
LicenseLicense
License
 
Software Licensing.pptx
Software Licensing.pptxSoftware Licensing.pptx
Software Licensing.pptx
 
opensource_powerpoint_review
opensource_powerpoint_reviewopensource_powerpoint_review
opensource_powerpoint_review
 
Opensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptOpensource Powerpoint Review.Ppt
Opensource Powerpoint Review.Ppt
 
GDSC - Software Licensing.pdf
GDSC - Software Licensing.pdfGDSC - Software Licensing.pdf
GDSC - Software Licensing.pdf
 
Opensource powerpoint-reviewppt742
Opensource powerpoint-reviewppt742Opensource powerpoint-reviewppt742
Opensource powerpoint-reviewppt742
 
License
LicenseLicense
License
 
Open Source and You
Open Source and YouOpen Source and You
Open Source and You
 
Open Source Licensing Fundamentals for Financial Services
Open Source Licensing Fundamentals for Financial ServicesOpen Source Licensing Fundamentals for Financial Services
Open Source Licensing Fundamentals for Financial Services
 
How to select software license for software program code * What type of Softw...
How to select software license for software program code * What type of Softw...How to select software license for software program code * What type of Softw...
How to select software license for software program code * What type of Softw...
 
Use terms retail_windows_8.1_single_language_update_english
Use terms retail_windows_8.1_single_language_update_englishUse terms retail_windows_8.1_single_language_update_english
Use terms retail_windows_8.1_single_language_update_english
 
License
LicenseLicense
License
 
Software licences
Software licencesSoftware licences
Software licences
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
50120140503011
5012014050301150120140503011
50120140503011
 
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanSOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
 

More from Rana Muhammad Asif

Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
Rana Muhammad Asif
 
Intellectual properties and laws
Intellectual properties and lawsIntellectual properties and laws
Intellectual properties and laws
Rana Muhammad Asif
 
Ieee institute-of-electrical-and-electronics-engineers (1)
Ieee institute-of-electrical-and-electronics-engineers (1)Ieee institute-of-electrical-and-electronics-engineers (1)
Ieee institute-of-electrical-and-electronics-engineers (1)
Rana Muhammad Asif
 
Health and safety at work
Health and safety at workHealth and safety at work
Health and safety at work
Rana Muhammad Asif
 
Design pattern-presentation
Design pattern-presentationDesign pattern-presentation
Design pattern-presentation
Rana Muhammad Asif
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Rana Muhammad Asif
 
Black box software testing
Black box software testingBlack box software testing
Black box software testing
Rana Muhammad Asif
 
Association for computing machinery (acm)
Association for computing machinery (acm)Association for computing machinery (acm)
Association for computing machinery (acm)
Rana Muhammad Asif
 

More from Rana Muhammad Asif (8)

Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
 
Intellectual properties and laws
Intellectual properties and lawsIntellectual properties and laws
Intellectual properties and laws
 
Ieee institute-of-electrical-and-electronics-engineers (1)
Ieee institute-of-electrical-and-electronics-engineers (1)Ieee institute-of-electrical-and-electronics-engineers (1)
Ieee institute-of-electrical-and-electronics-engineers (1)
 
Health and safety at work
Health and safety at workHealth and safety at work
Health and safety at work
 
Design pattern-presentation
Design pattern-presentationDesign pattern-presentation
Design pattern-presentation
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Black box software testing
Black box software testingBlack box software testing
Black box software testing
 
Association for computing machinery (acm)
Association for computing machinery (acm)Association for computing machinery (acm)
Association for computing machinery (acm)
 

Recently uploaded

在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Envertis Software Solutions
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 

Recently uploaded (20)

在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 

Software licencing techniqes

  • 1.
  • 3. License A permit from an authority to own or use something, do a particular thing, or carry on a trade . Freedom to behave as one wishes, especially in a way which results in excessive or unacceptable behavior.
  • 4. Software License The hallmark of proprietary software licenses is that the software publisher grants the use of one or more copies of software under the end-user license agreement (EULA), but ownership of those copies remains with the software publisher. A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software. Under United States copyright law all software is copyright protected, except material in the public domain. A typical software license grants an end- user permission to use one or more copies of software in ways where such a use would otherwise potentially constitute copyright infringement of the software owner's exclusive rights under copyright law.
  • 5. All software must be legally licensed before it may be installed. Proof of purchase (purchase orders, receipts, invoices or similar documentation are acceptable) must be maintained by individuals or departments for all non-ITS provided software that is installed on a university-owned computer. Vendors may require proof of purchase during an audit, and technical support staff may ask for proof of purchase before software can be reinstalled on a computer that has been reimaged or rebuilt.
  • 6. Types of licenses Proprietary license Most software licenses are "proprietary" licenses, meaning the software publisher grants a license to use one or more copies of software, but that ownership of those copies remains with the software publisher. The user must accept the license before they are permitted to use the software.
  • 7. GNU General Public License These are agreements under which much "open source" software is licensed. End users may do things like change the source code, but any refinements of the software must also be made available under a GNU GPL license. Often referred to as "free, copy left" licenses, the software may or may not be distributed for a fee - "free" refers to the ability of users to change and distribute modifications of the software, not to cost
  • 8. End User License Agreement (EULA) Also called "clickwraps" or "shrinkwraps," EULAS indicate the terms under which the end-user may use the software. Agreements with organizations or companies often take the form of contracts between the organization and the software publisher or vendor, and specify the terms of use for all users from the organization, superseding any EULAs which may come with the software.
  • 9. Workstation licenses These are licenses that permit the installation of an application on a single computer. You may not install the software on more than one machine unless you purchase a license for each additional machine. Most workstation license agreements allow you to make a single backup copy of the software as long as that backup copy is used only to restore the software onto the same machine, or a separate machine if the software is removed from the original computer
  • 10. Concurrent use license These are licenses that permit you to install the software onto multiple machines as long as the number of computers using the software at the same time does not exceed the number of licenses which you have purchased. Concurrent use licenses are usually used in conjunction with "license manager" software that prevents the number of licenses from being exceeded. At UNCG, ITS uses KeyServer software that monitors and controls the use of concurrent use licensed software.
  • 11. Site licenses A site license permits the use of software on any computer at a specified site. Unlimited site licenses allow the installation of software on any number of computers as long as those computers are located at the specified site. Some site licenses permit the installation on computers owned by a particular entity (such as a university) regardless of the physical location. Some vendors refer to their licenses as site licenses but restrict the number of computers on which the software may be installed. The only way to know for sure is to read the license specifics.
  • 12. Perpetual licenses These are licenses without expiration dates, which permit use of the software indefinitely, without requiring a recurring fee for continued use. Most software that individuals buy for use on their home computers are perpetual licenses.
  • 13. Non-perpetual licenses These are licenses that "lease" the software for use for a specified period of time, usually annually or sometimes bi-annually. Users are required to remove the software from their computer if they cease paying the license fee
  • 14. License with Maintenance Some license agreements allow the user to purchase "maintenance" or "software assurance" along with the original license fee, which entitles the user to receive new versions of the software for one to two years until the maintenance agreement expires.
  • 15. Software Licensing Models Beta or field test This type of license is used to get feedback so usually expire at the end of the Beta test and are not renewed. The product is likely not be „production grade‟ and the licensee may be required to exercise the software under certain conditions and to submit reports, as well as limit use to defined environments and users that fit a specific profile.
  • 16. Cross license These are used when the licensor and licensee(s) agree to exchange rights. The rights are not necessarily symmetrical, nor no-fee. It can be a way for people to leverage their intellectual property by exchanging value on a no-cash basis.
  • 17. Demo or evaluation Such licenses are granted for a short time such as 30 days or a number of uses. Usually, production-level work is not allowed and some features may be limited or disabled, or it may have a time bomb that disables the product at a certain time. The types of users, platforms, content or tools may also be prescribed.
  • 18. Development These licenses can require granting rights to modify the software, or in some cases, to create derivative works. Alternatively, the grantor may want rights to modify the output of the development effort; or the licensee may need to retain residual rights in order to support the output. Development licenses are used to gain special knowledge and to supplement engineering effort.
  • 19. Duplicate grouping (license sharing) by user, host or display Grouping defines rules for counting usage when a single user concurrently runs the same application on several computers. This instance may count as a single use or a multiple use, depending on the license terms.
  • 20. End User License Agreements (EULA), Shrink Wrap or “click through” These are most common license models for online and single user software. They usually grant the perpetual right to use, only for one end-user on one computer at a time, and do not include any upgrades.
  • 21. Group License This type of license can be used to develop a consortium. It grants rights only to members of a specific group such as named entities, or those that adhere to a particular standard, or have received a particular certification. Group licenses may require licensees to grant special rights to all members of the group such as mandatory no-fee cross-licensing.
  • 22. Examples of License software shrink wrap contract: an example of a license for which the originators maintain strict control over the software component is the Microsoft Windows Operating System software. This has helped Microsoft successfully gain a dominant position in the software market: Microsoft Licensing.
  • 23. Example of free software license: The GNU GPL is aimed at providing licenses with significant permissions and rights. There are restrictions in the license -- the licensee must pass on the received permissions and rights to anyone to whom they provide the software. Once a piece of software is distributed under the GPL that released copy will always be available with the permissions and rights received.