SlideShare une entreprise Scribd logo
1  sur  32
[object Object],www.intelligere.in RITAMBHARA AGRAWAL INTELLIGERE OSI Days 2010 19-21 September, 2010 Chennai
[object Object],www.intelligere.in Open source   usually refers to a software that is released with source code under a license that ensures that derivative works will also be available as source code, protects certain rights of the original authors, and prohibits restrictions on how the software can be used or who can use it. Open source software code is publicly available and enables users to modify and disseminate new code including their modifications. The fundamental purpose of open source licensing is to deny anybody the right to exclusively exploit a work.
[object Object],www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition of  “Free” in FOSS www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free Software Definition www.intelligere.in The fundamental purpose of open source licensing is to deny anyone to exclusively exploit a work, the software. Main purpose remains that the work should reach a maximum of audience. At the same time, creators of the work are required to surrender all, or substantially all, of the rights granted by copyright to those entities that are capable of distributing and thereby exploiting that work.
Copyright www.intelligere.in Copyright is a set of exclusive rights granted to the author or creator of an original work. Copyright includes the right to copy, reproduce, distribute and adapt the work.  Registering a copyright is not a mandate. The moment a work is fixed in a tangible medium copyright comes into existence. But it is always beneficial to get the work registered, as its easier to prove in case of violation and infringement and damages can be quantified in a better way.  Copyright owners have the exclusive right to exercise control over copying and other exploitation of the works for a specific period of time. Anyone requiring to exploit and use any copyrighted work requires permission to use that work. Copyright owners can grant permission and grant license for exploitation of the work.
Copyright www.intelligere.in Copyright is granted to various categories of work, like, literary, artistic, dramatic and musical work. Ordinarily the author is the first owner of the work. Different rights are granted to different categories of work. Computer programmes are protected under copyright and are treated as literary works.  There are certain uses which fall under the domain of  “ fair use ” . Copyrighted work can be used and exploited without permission and license under fair use premise. Some of the fair usage are, news reporting, criticism, research, commentary, teaching or scholarship.
Copyright in Software www.intelligere.in All software is subject to copyright. The moment one saves code to a file, copyright law comes into existence. A software copyright is the exclusive right to control the rules for copying, exploiting, modifying, a work of software. Software copyright is usually used by proprietary company to prevent unauthorized copying of their software. Copyright holders can permit other persons to copy or modify their software. A copyright holder can sue for damages for any unauthorized usage of the copyrighted software product.  In addition to all the rights applicable to a literary work, owner of the copyright in a computer programme enjoys the rights to sell or give on hire or offer for sale or hire, regardless of whether such a copy has been sold or given on hire on earlier occasion.  Copyright in the software can either be assigned or licensed.
Rights granted by Copyright www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright infringement www.intelligere.in Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright owner ’s exclusive rights, such as right to reproduce or perform the copyrighted work, or to make derivative works. Copyright infringement occurs when someone uses a copyrighted product without permission and authorization from the author/owner of the copyright. Infringement also happens when the scope of rights granted under the license are exceeded or violated.  In case of any infringement of the copyrighted work, the author/owner of the copyright can initiate proceedings against the infringer. Copyright infringement is both civil and criminal offence. The copyright owner is entitled to remedies by way of injunctions, damages and accounts. The minimum punishment for infringement of copyright is imprisonment for six months with the minimum fine of Rs. 50,000/-
Copyright infringement in Software www.intelligere.in Copyright infringement of software is the practice of unauthorized copying of the computer software. The author/owner of the copyright of the software has the exclusive right to grant and control the usage of its software product. Any act of someone using/exploiting the software without permission and license from the author/owner of the software is regarded as copyright infringement. Infringement in copyright software also occurs when the software is used outside the purview of the terms and conditions of the license.
Copyleft www.intelligere.in Copyleft is a term used in respect of FOSS licensing which is used for copyright. Copyleft is a practice of using copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work.  The main idea behind copylefting the open source software was to not let the product fall into the domain of proprietary software. If open source software is put into public domain with no copyright, people can make the said software proprietary and it would defeat the whole purpose of open source freedom. Copyleft guarantees that every user has the freedom.
Copyleft www.intelligere.in Whereas, copyright law has been used to withhold permission to copy, modify or distribute software, on the contrary Copyleft ensures that the project remains free, and all modified and extended versions of the program remains free as well.  Copyleft licenses are conditional licenses. Copyleft should not be equated with abandoning the copyright.  Proprietary software developers use copyright to take away the users' freedom; whereas, copyleft guarantees their freedom. That's why the name has been reversed from  “copyright” to “copyleft”.  FOSS licenses are categorized as strong, weak or with no copyleft provisions.  Non-copyleft licenses, also known as permissive licenses, allows those using the software to re-license it under any terms as they want. The most popular copyleft license is GPL.  The most popular non-copyleft license is BSD style. These licenses place no restriction on licensing for modified works.
Few Questions www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Open Source Software is subject to Copyright ,[object Object],[object Object],www.intelligere.in
When does copyright infringement occurs in FOSS   Fundamental violations in case of FOSS licenses include; www.intelligere.in
Copyleft in FOSS www.intelligere.in h The strength of the copyleft governing a work is an expression of the extent that the copyleft provisions can be efficiently imposed on all kinds of derived works
FOSS Licenses www.intelligere.in h
Can licensed software (modified or unmodified) be distributed that has been   combined or linked  with code covered by  another licensing model? www.intelligere.in h
www.intelligere.in In case of violation of license, one can look for different measures for enforcement of the same. Before starting any enforcement proceedings one has to be sure to organize and gather all the information
www.intelligere.in Few Things to keep in mind before taking any action against the  violator
www.intelligere.in
www.intelligere.in Case Study
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in
Fortinet v. GPL ,[object Object],[object Object],www.intelligere.in
www.intelligere.in License Compliance  Best Practices
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in For more information, please feel free to drop a line at  [email_address]  or visit  http://www.intelligere.in

Contenu connexe

Tendances

Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethicsWaqar Ahmad
 
Socket programming in Java (PPTX)
Socket programming in Java (PPTX)Socket programming in Java (PPTX)
Socket programming in Java (PPTX)UC San Diego
 
Copyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsCopyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsFe Angela Verzosa
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensingRowan Wilson
 
FTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceFTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceTransweb Global Inc
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking ToolAmit Kumar
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsAnil Neupane
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.Šhæÿæñ Æhmęd
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
First Come First Serve & Shortest Job First-(FCFS & SJF)
First Come First Serve & Shortest Job First-(FCFS & SJF)First Come First Serve & Shortest Job First-(FCFS & SJF)
First Come First Serve & Shortest Job First-(FCFS & SJF)Adeel Rasheed
 

Tendances (20)

Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethics
 
FTP
FTPFTP
FTP
 
Trace route
Trace routeTrace route
Trace route
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Socket programming in Java (PPTX)
Socket programming in Java (PPTX)Socket programming in Java (PPTX)
Socket programming in Java (PPTX)
 
Determination of trade secret status
Determination of trade secret statusDetermination of trade secret status
Determination of trade secret status
 
What Is Fair Use?
What Is Fair Use?What Is Fair Use?
What Is Fair Use?
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Copyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsCopyright Protection for Philippine Publications
Copyright Protection for Philippine Publications
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
FTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceFTP Client and Server | Computer Science
FTP Client and Server | Computer Science
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Udp vs-tcp
Udp vs-tcpUdp vs-tcp
Udp vs-tcp
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
First Come First Serve & Shortest Job First-(FCFS & SJF)
First Come First Serve & Shortest Job First-(FCFS & SJF)First Come First Serve & Shortest Job First-(FCFS & SJF)
First Come First Serve & Shortest Job First-(FCFS & SJF)
 

En vedette

Productive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for KidsProductive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for Kidslanelee77
 
Making the Most of Google
Making the Most of GoogleMaking the Most of Google
Making the Most of Googlelanelee77
 
Budget Simulation for Technology Resources
Budget Simulation for Technology ResourcesBudget Simulation for Technology Resources
Budget Simulation for Technology Resourceslanelee77
 
Leapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grantLeapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grantlanelee77
 
Abans de llençar, reutilitzar!
Abans de llençar, reutilitzar! Abans de llençar, reutilitzar!
Abans de llençar, reutilitzar! terraprims
 
Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530lanelee77
 
Research Skills - Sharp Searching
Research Skills - Sharp SearchingResearch Skills - Sharp Searching
Research Skills - Sharp Searchinglanelee77
 
Ga doe media center standards 2010 hms
Ga doe media center standards 2010   hmsGa doe media center standards 2010   hms
Ga doe media center standards 2010 hmslanelee77
 
Institutional Strategic Plan
Institutional Strategic PlanInstitutional Strategic Plan
Institutional Strategic Planlanelee77
 
Presentació cicle superior - La queixa (Assemblea 1r trimestre)
Presentació cicle superior - La queixa (Assemblea 1r trimestre)Presentació cicle superior - La queixa (Assemblea 1r trimestre)
Presentació cicle superior - La queixa (Assemblea 1r trimestre)terraprims
 
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestre
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestreSer respectuosos amb el material comú i el propi - Assemblea 1r trimestre
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestreterraprims
 
Storyboard for Video
Storyboard for VideoStoryboard for Video
Storyboard for Videolanelee77
 
High School Business UbD Course Design
High School Business UbD Course DesignHigh School Business UbD Course Design
High School Business UbD Course Designlanelee77
 
Legal issues for start up
Legal issues for start upLegal issues for start up
Legal issues for start upmovinghats
 

En vedette (15)

Productive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for KidsProductive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for Kids
 
Making the Most of Google
Making the Most of GoogleMaking the Most of Google
Making the Most of Google
 
Budget Simulation for Technology Resources
Budget Simulation for Technology ResourcesBudget Simulation for Technology Resources
Budget Simulation for Technology Resources
 
Leapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grantLeapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grant
 
Abans de llençar, reutilitzar!
Abans de llençar, reutilitzar! Abans de llençar, reutilitzar!
Abans de llençar, reutilitzar!
 
Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530
 
Research Skills - Sharp Searching
Research Skills - Sharp SearchingResearch Skills - Sharp Searching
Research Skills - Sharp Searching
 
Jubileo 2011
Jubileo 2011Jubileo 2011
Jubileo 2011
 
Ga doe media center standards 2010 hms
Ga doe media center standards 2010   hmsGa doe media center standards 2010   hms
Ga doe media center standards 2010 hms
 
Institutional Strategic Plan
Institutional Strategic PlanInstitutional Strategic Plan
Institutional Strategic Plan
 
Presentació cicle superior - La queixa (Assemblea 1r trimestre)
Presentació cicle superior - La queixa (Assemblea 1r trimestre)Presentació cicle superior - La queixa (Assemblea 1r trimestre)
Presentació cicle superior - La queixa (Assemblea 1r trimestre)
 
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestre
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestreSer respectuosos amb el material comú i el propi - Assemblea 1r trimestre
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestre
 
Storyboard for Video
Storyboard for VideoStoryboard for Video
Storyboard for Video
 
High School Business UbD Course Design
High School Business UbD Course DesignHigh School Business UbD Course Design
High School Business UbD Course Design
 
Legal issues for start up
Legal issues for start upLegal issues for start up
Legal issues for start up
 

Similaire à Copyright and Open Source Licensing Basics

Copyright and open source licensing
Copyright and open source licensingCopyright and open source licensing
Copyright and open source licensingRitambhara Agrawal
 
香港六合彩
香港六合彩香港六合彩
香港六合彩shujia
 
Overview of basic open-source licenses
Overview of basic open-source licensesOverview of basic open-source licenses
Overview of basic open-source licensesIrina Shubina
 
Wiki Educator
Wiki EducatorWiki Educator
Wiki Educatorsansdoute
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source LicensingMark Radcliffe
 
Conclusion
ConclusionConclusion
ConclusionHitmanD
 
Overview
OverviewOverview
OverviewHitmanD
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptsheryl90
 
open source and copyright
open source and copyrightopen source and copyright
open source and copyrightguest29e2eb
 
Creative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad FinalCreative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad Finalguest584d23
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresAntara Rastogi
 
Free/Open Source Software
Free/Open Source SoftwareFree/Open Source Software
Free/Open Source SoftwareAngelo Corsaro
 

Similaire à Copyright and Open Source Licensing Basics (20)

Copyright and open source licensing
Copyright and open source licensingCopyright and open source licensing
Copyright and open source licensing
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Overview of basic open-source licenses
Overview of basic open-source licensesOverview of basic open-source licenses
Overview of basic open-source licenses
 
License eula
License eulaLicense eula
License eula
 
Licence Gpl 3.0
Licence Gpl 3.0Licence Gpl 3.0
Licence Gpl 3.0
 
Discuss open sourcelicensing
Discuss open sourcelicensingDiscuss open sourcelicensing
Discuss open sourcelicensing
 
Wiki Educator
Wiki EducatorWiki Educator
Wiki Educator
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 
Conclusion
ConclusionConclusion
Conclusion
 
Overview
OverviewOverview
Overview
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
open source and copyright
open source and copyrightopen source and copyright
open source and copyright
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Creative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad FinalCreative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad Final
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Open source licenses
Open source licensesOpen source licenses
Open source licenses
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
Free/Open Source Software
Free/Open Source SoftwareFree/Open Source Software
Free/Open Source Software
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Copyright and Open Source Licensing Basics

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Free Software Definition www.intelligere.in The fundamental purpose of open source licensing is to deny anyone to exclusively exploit a work, the software. Main purpose remains that the work should reach a maximum of audience. At the same time, creators of the work are required to surrender all, or substantially all, of the rights granted by copyright to those entities that are capable of distributing and thereby exploiting that work.
  • 6. Copyright www.intelligere.in Copyright is a set of exclusive rights granted to the author or creator of an original work. Copyright includes the right to copy, reproduce, distribute and adapt the work. Registering a copyright is not a mandate. The moment a work is fixed in a tangible medium copyright comes into existence. But it is always beneficial to get the work registered, as its easier to prove in case of violation and infringement and damages can be quantified in a better way. Copyright owners have the exclusive right to exercise control over copying and other exploitation of the works for a specific period of time. Anyone requiring to exploit and use any copyrighted work requires permission to use that work. Copyright owners can grant permission and grant license for exploitation of the work.
  • 7. Copyright www.intelligere.in Copyright is granted to various categories of work, like, literary, artistic, dramatic and musical work. Ordinarily the author is the first owner of the work. Different rights are granted to different categories of work. Computer programmes are protected under copyright and are treated as literary works. There are certain uses which fall under the domain of “ fair use ” . Copyrighted work can be used and exploited without permission and license under fair use premise. Some of the fair usage are, news reporting, criticism, research, commentary, teaching or scholarship.
  • 8. Copyright in Software www.intelligere.in All software is subject to copyright. The moment one saves code to a file, copyright law comes into existence. A software copyright is the exclusive right to control the rules for copying, exploiting, modifying, a work of software. Software copyright is usually used by proprietary company to prevent unauthorized copying of their software. Copyright holders can permit other persons to copy or modify their software. A copyright holder can sue for damages for any unauthorized usage of the copyrighted software product. In addition to all the rights applicable to a literary work, owner of the copyright in a computer programme enjoys the rights to sell or give on hire or offer for sale or hire, regardless of whether such a copy has been sold or given on hire on earlier occasion. Copyright in the software can either be assigned or licensed.
  • 9.
  • 10. Copyright infringement www.intelligere.in Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright owner ’s exclusive rights, such as right to reproduce or perform the copyrighted work, or to make derivative works. Copyright infringement occurs when someone uses a copyrighted product without permission and authorization from the author/owner of the copyright. Infringement also happens when the scope of rights granted under the license are exceeded or violated. In case of any infringement of the copyrighted work, the author/owner of the copyright can initiate proceedings against the infringer. Copyright infringement is both civil and criminal offence. The copyright owner is entitled to remedies by way of injunctions, damages and accounts. The minimum punishment for infringement of copyright is imprisonment for six months with the minimum fine of Rs. 50,000/-
  • 11. Copyright infringement in Software www.intelligere.in Copyright infringement of software is the practice of unauthorized copying of the computer software. The author/owner of the copyright of the software has the exclusive right to grant and control the usage of its software product. Any act of someone using/exploiting the software without permission and license from the author/owner of the software is regarded as copyright infringement. Infringement in copyright software also occurs when the software is used outside the purview of the terms and conditions of the license.
  • 12. Copyleft www.intelligere.in Copyleft is a term used in respect of FOSS licensing which is used for copyright. Copyleft is a practice of using copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work. The main idea behind copylefting the open source software was to not let the product fall into the domain of proprietary software. If open source software is put into public domain with no copyright, people can make the said software proprietary and it would defeat the whole purpose of open source freedom. Copyleft guarantees that every user has the freedom.
  • 13. Copyleft www.intelligere.in Whereas, copyright law has been used to withhold permission to copy, modify or distribute software, on the contrary Copyleft ensures that the project remains free, and all modified and extended versions of the program remains free as well. Copyleft licenses are conditional licenses. Copyleft should not be equated with abandoning the copyright. Proprietary software developers use copyright to take away the users' freedom; whereas, copyleft guarantees their freedom. That's why the name has been reversed from “copyright” to “copyleft”. FOSS licenses are categorized as strong, weak or with no copyleft provisions. Non-copyleft licenses, also known as permissive licenses, allows those using the software to re-license it under any terms as they want. The most popular copyleft license is GPL. The most popular non-copyleft license is BSD style. These licenses place no restriction on licensing for modified works.
  • 14.
  • 15.
  • 16. When does copyright infringement occurs in FOSS Fundamental violations in case of FOSS licenses include; www.intelligere.in
  • 17. Copyleft in FOSS www.intelligere.in h The strength of the copyleft governing a work is an expression of the extent that the copyleft provisions can be efficiently imposed on all kinds of derived works
  • 19. Can licensed software (modified or unmodified) be distributed that has been combined or linked with code covered by another licensing model? www.intelligere.in h
  • 20. www.intelligere.in In case of violation of license, one can look for different measures for enforcement of the same. Before starting any enforcement proceedings one has to be sure to organize and gather all the information
  • 21. www.intelligere.in Few Things to keep in mind before taking any action against the violator
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31.
  • 32.