SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Litigation and Compliance in the
Open Source Ecosystem
Speakers
MARK RADCLIFFE
Partner, DLA Piper
BERND SIEBERS
Counsel, DLA Piper
PHIL ODENCE
VP & General Manager,
Black Duck Software
OSS Often Enters a Code Base
Unchecked, Resulting In Risks
Code Base
Commercial
3rd Party
Code
Purchasing
• Licensing?
• Security?
• Quality?
• Support?
Open Source
OPERATIONAL RISK
Which versions of code
are being used, and how
old are they
LEGAL RISK
Which licenses are used
and do they match
anticipated use of the code
SECURITY RISK
Which components have
vulnerabilities and what
are they
Management
visibility…not!
Black Duck’s Experience Analyzing Code
• Audits on average find 33% open
source
• 99% of code audits find open source
• 95% of audits find unknown open
source
• 75% of audits contain unknown licenses
• 67% of code contains vulnerable
components
• 50% of code audits contain GPL
FOSS Compliance: New Players
• Traditional FOSS Enforcement:
Focus on Compliance
• Software Freedom Law Center
• Software Freedom Conservancy
(“SFC”)
• gplviolations
• Shift to Commercial Licensors
• Continuent v. Tekelec (GPL)
• Versata Series of Cases
• New Enforcers
• McHardy, copyright troll
• Fligor: looking for clients
• Major Difference in Goals
• Shift from compliance to revenue
• Focus on injunctive relief
• Expansion of Traditional FOSS
Enforcement
• SFC assists in VMware litigation
Existing Compliance Issues
• VMware litigation (SFC)
• McHardy litigation
• First copyright troll
• Versata: focus on hybrid product licensing
• Will terminated licensees regularly raise the defense of “integration” with GPLv2 licensed
code?
• Will warranty claims against licensors arise from poorly drafted licenses become common?
Netfilter Project Suspends McHardy
The netfilter project regrets to have to suspend its core team member Patrick McHardy from the core team. This
is a grave step, definitely the first in the projects history, and it is not one we take lightly. Over many months,
severe allegations have been brought forward against the style of his license enforcement activities on parts of
the netfilter software he wrote. With respect to privacy, we will not publicly disclose the content of those
allegations.
Despite many attempts by us to reach him, Patrick has been unable or unwilling to comment on those
allegations or defend against the allegations. The netfilter project does not have first-hand evidence. But given
the consistent allegations from various trusted sources, and in the absence of any response from Patrick, we
feel it is necessary to suspend him until further notice.
We'd like to stress that we do not take any sides, and did not "convict" Patrick of anything. He continues to be
welcome in the project as soon as he is be able to address the allegations and/or co-sign the "principles" [1] in
terms of any future enforcement activities.
SFC Criticizes GPL Monetizers
These “GPL monetizers”, who trace their roots to nefarious business models that seek to catch users in minor violations in order to sell an
alternative proprietary license, stand in stark contrast to the work that Conservancy, FSF and gpl-violations.org have done for years.
Most notably, a Linux developer named Patrick McHardy continues ongoing GPL enforcement actions but has not endorsed the community
Principles. When Patrick began his efforts, Conservancy immediately reached out to him. After a promising initial discussion (even contemplating
partnership and Patrick joining our coalition) in mid-2014, Patrick ceased answering our emails and text messages, and never cooperated with
us. Conservancy has had no contact with Patrick nor his attorney since, other than a somewhat cryptic and off-topic response we received over a
year ago. In the last two years, we've heard repeated rumors about Patrick's enforcement activity, as well as some reliable claims by GPL
violators that Patrick failed to follow the Principles.
In one of the many attempts we made to contact Patrick, we urged him to join us in co-drafting the Principles, and then invited him to endorse
them after their publication. Neither communication received a response. We informed him that we felt the need to make this public statement,
and gave him almost three months to respond. He still has not responded.
Patrick's enforcement occurs primarily in Germany. We know well the difficulties of working transparently in that particular legal system, but both
gpl-violations.org and Conservancy have done transparent enforcement in that jurisdiction and others. Yet, Patrick's actions are not transparent.
In private and semi-private communications, many have criticized Patrick for his enforcement actions. Patrick McHardy has also been suspended
from work on the Netfilter core team. While the Netfilter team itself publicly endorsed Conservancy's principles of enforcement, Patrick has not.
Conservancy agrees that Patrick's apparent refusal to endorse the Principles leaves suspicion and concern, since the Principles have been
endorsed by so many other Linux copyright holders, including Conservancy.
New Compliance Issues
• Harald Welte announcement of an OSS Compliance Company, aggregating
developers
• Welte: ran gpl violations
• Geographic focus not limited to Germany, but could include France and Spain
• David Fligor/Progressive LLP: Troll lawyer searching for a project, so far no
cases filed
• Sound View Innovations: new ASF software patent troll based on Alcatel-Lucent
patents
• Sound View has sued Facebook
• Sound View has sued LinkedIn
• Sound View has sued Twitter
German FOSS Enforcement
• Community Enforcers
• Harald Welte/gpl-violations.org (Linux kernel, iptables)
• Returning to compliance based on Barcelona FSFE Conference
• Thomas Gleixner (Linux kernel code used in U-Boot)
• XviD project
• Christoph Hellwig (Linux kernel, this is the VMware case)
• Other
• Patrick McHardy (Linux kernel, iptables, iproute2)
Community Enforcement
• Most cases are settled before they go to court. The agreement for a “declaration to cease
and desist" in Germany has to contain a clause about a contractual penalty for a future
infringement: if the defendant is caught violating GPLv2 again, then the defendant has to
pay the penalty.
• Harald Welte (gpl-violations.org) has used these penalties for donations to charities like
Chaos Computer Club, Wau Holland Stiftung, Free Software Foundation Europe, etc.
because his focus was on process change, compliance and community norms.
• gpl-violations.org worked very closely together with Free Software Foundation Europe to
get companies to talk about their problems and let them participate in the global
discussion about open source compliance and other legal issues.
German Court Procedure - Outline
I. Preliminary Injunction Proceedings
1. General
2. Requirements
3. Standard of Proof
4. Possible Remedies
5. Procedural Aspects
6. Enforcement
II. Proceedings on the Merits
1. Overview
2. Remedies
III. Pre-Litigation Strategies
1. Offense Position
2. Defense Position
German Court Procedure –
Preliminary Injunction Proceedings
1. General
• Objective: Stop infringement as soon as possible
• Often most dangerous threat to infringer, since immediately enforceable (appeal
has no suspensory effect!)
• "General" time line:
• Granted within hours (e.g. re trade fairs), 1-2 days (if ex parte),
2-6 weeks (with oral hearing);
• Appeal hearing 2-4 months after decision in first instance
German Court Procedure –
Preliminary Injunction Proceedings
2. Requirements
• Generally courts issue in cases where
• Infringement is very likely
• No undue delay in filing an application for PI ("Urgency Requirement")
• Plaintiff has to file the application for PI without undue delay
• Up to 4 weeks usually not problematic
• Up to 8 weeks usually problematic; IP owner has to show exceptional circumstances in determining
the infringement / preparation of PI application
• Over 8 weeks usually no PI granted!
• ACT FAST!
McHardy German Litigation I
• Patrick McHardy uses the same enforcement mechanism but is seeking personal
monetary gain
• Estimate is that McHardy has approached at least 50 companies that have been
hit (some companies multiple times).
• Wide variety of companies, including retailers, telcos, producers, importers
• Best estimate is that he has received significant damages
• Wide range of products
• physical products (offline distribution)
• firmware updates downloadable from a website
• Over The Air (OTA) updates
McHardy German Litigation II
• Tactics against companies
1. Address a (minor) violation and have a company sign a cease and desist with contractual
penalty.
2. Address another (minor) violation and collect the contractual penalty. Sign a new
agreement with a higher penalty.
3. Wait some time, then go back to 2
• Devices usually have multiple violations of GPLv2 and he only will address one
issue at a time to collect the contractual penalty.
McHardy German Litigation III
McHardy's claims largely focus on:
• Lack of written offer
• Lack of license text in product
• Inadequate terms of written offer
• Lack of complete corresponding source code in repositories
• EULA conflicting with GPL obligations
• Written offer must come from last company selling product
• More exotic
• Written offer should be in German
• GPL warranty disclaimers are inadequate under German law
In the past, McHardy did not do a thorough technical analysis, like a rebuild of the
source code, but he has started doing so.
McHardy German Litigation IV
Two recent hearings, McHardy lost on procedural issues
• Case one: court decided that application was not sufficiently “urgent” for
preliminary injunction procedure
• Case two: judge found that McHardy’s affidavits were inconsistent and McHardy’s
lawyer was not prepared to defend it: McHardy withdrew case
Statement by presiding judge (not required and without precedential value but
shows thinking):
• If only a tiny bit of the programming works was contained in the litigious product and if that
tiny bit was capable of being copyright protected, the arguments of the defendant would not
be sufficient to rebut the claim. This might indeed result in Linux not being tradable in
Germany. The industry might have to look for other platforms where the chain of rights can
be controlled more easily
Solving the McHardy Problem and Copycats
• Focus on compliance of your products going into Germany
• Understand the McHardy business model
• Collaborate on claims and share information
• DLA Piper: Developing “Defense in a box”
• Working with past litigants to provide information
• Facts about McHardy
• Summary of McHardy claims
• Summary of McHardy arguments
• References
• Possibility of including actual complaints and other filings but more challenging
Hellwig v. VMware I
• VMware is alleged to be using arts of the Linux kernel in their proprietary ESXi
product, including the entire SCSI mid-layer, USB support, radix tree and many,
many device drivers.
• Linux is licensed under GNU GPLv2 with a modification by Linus Torvalds
• VMware has modified all the code they took from the Linux kernel and integrated
them into something they call vmklinux.
• VMware has modified their proprietary virtualization OS kernel vmkernel with
specific API/symbol to interact with vmklinux
• vmklinux and vmkernel interaction is uncertain
Hellwig v. VMware II
The court did not decide
• If vmklinux and vmkernel can be regarded as a uniform work and, if so,
• If the use of Hellwig's code in the vmklinux + vmkernel entity qualifies as a modification
(requiring a license) or as free use.
Hellwig v. VMware III
Court required that Hellwig prove the following:
• which parts of the Linux program he claims to have modified, and in what manner;
• to what extent these modifications meet the criteria for adapter's copyright pursuant to
Copyright Act § 69c No. 2 clause 2 in conjunction with § 3; and
• to what extent the Plaintiff pleads and where necessary proves that the Defendant has in
turn adopted (and possibly further modified) those adapted parts of the program that
substantiate his claim to protection.
Hellwig failed to meet this standard. He has appealed.
Hellwig v. VMware IV
Not sufficient as evidence according to the court:
• Copyright notices in header files
• Reference to git repository
• Provision of source code and git blame files
Increased requirements for demonstrating an infringement:
• Exact identification of own contributions
• Conditions for copyright protection of those contributions fulfilled
• Source code comparison of own contributions and the allegedly infringing code
It is not the job of the court to analyze the source code for elements that might
originate from the plaintiff, and to judge to what extent those elements might be
protectable.
Linux at 25: Disputes on Compliance
Greg Kroah-Hartman
• "I do [want companies to comply], but I don't ever think that suing them is the right way to do it, given
that we have been _very_ successful so far without having to do that”
• “You value the GPL over Linux, and I value Linux over the GPL. You are willing to risk Linux in order to
try to validate the GPL in some manner. I am not willing to risk Linux for anything as foolish as that.”
Linus Torvalds
• “Lawsuits destroy community. They destroy trust. They would destroy all the goodwill we've built up
over the years by being nice.”
Bradley Kuhn (SFC)
• “You said that you "care more about Linux than the GPL". I would probably agree with that. But, I do
care about software freedom generally much more than I care about Linux *or* the GPL. I care about
Linux because it's the only kernel in the world that brings software freedom to lots of users.”
Linux Foundation
• Who owns the contributions in the Linux kernel
• Linux kernel analysis to determine the identity of contributors to Linux kernel, software has
been completed and analysis will be done this year
• Next step: identifying copyright owners
• Encouraging statements by kernel.org on community norms for enforcement
• Training programs
• Core Infrastructure Initiative “Badge Program” (focused on security but includes
governance issues)
Summary for Software Distributors
• More compliance actions seem likely, particularly in Germany
• Develop a FOSS use (and management) policy to ensure that you understand
your obligations and can comply with them (for an overview of FOSS and FOSS
governance see
https://www.blackducksoftware.com/resources/webinar/introduction-open-source-
software-and-licensing)
• Ensure that your policy covers updates and security issues
• Review your distribution agreements to ensure that they take into account any
terms imposed by FOSS in your product and modify those terms as appropriate
• Largest law firm in the world with
4,200 lawyers in 31 countries and 77
offices throughout the Americas, Asia
Pacific, Europe and the Middle East
• More than 145 DLA Piper lawyers in IP
transactions
• Global Open Source Practice
• More than 550 DLA Piper lawyers
ranked as leaders in their fields
Global platform
OSS Practice
• Worldwide OSS practice group
• US Practice led by two partners: Mark Radcliffe & Victoria Lee
• Experience
• Open sourcing Solaris operating system
• FOSS foundations:
• OpenStack Foundation
• PrPL Foundation
• OpenSocial
• Open Source Initiative
• GPLv3 Drafting Committee Chair (Committee D)
• Drafting Project Harmony agreements
Contact Information
Mark F. Radcliffe
Partner
2000 University Avenue, East Palo
Alto, California, 94303-2214, United
States
T +1 650 833 2266
F +1 650 687 1222
E mark.radcliffe@dlapiper.com
Mark Radcliffe concentrates in strategic intellectual property advice, private financing, corporate
partnering, software licensing, Internet licensing, cloud computing and copyright and trademark.
He is the Chair of the Open Source Industry Group at the firm and has been advising on open
source matters for over 15 years. For example, he assisted Sun Microsystems in open sourcing
the Solaris operating system and drafting the CDDL. And he represents or has represented
other large companies in their software licensing (and, in particular, open source matters)
including eBay, Accenture, Adobe, Palm and Sony. He represents many software companies
(including open source startups) including SugarCRM, DeviceVM, Revolution Analytics,
Funambol and Reductive Labs for intellectual property matters. On a pro bono basis, he serves
as outside General Counsel for the Open Source Initiative and on the Legal Committee of the
Apache Software Foundation. He was the Chair of Committee C for the Free Software
Foundation in reviewing GPLv3 and was the lead drafter for Project Harmony. And in 2012, he
became outside general counsel of the Open Stack Foundation and drafted their certificate of
incorporation and bylaws as well as advising them on open source matters.
Contact Information
Bernd Siebers
Rechtsanwalt | Counsel
DLA Piper UK LLP
Maximilianstraße 2
D-80539 München
T +49 89 232372 133
M +49 173 529 75 67
E bernd.siebers@dlapiper.com
Bernd Siebers has longstanding experience in advising national and international businesses in
technology related matters, both contentious and non-contentious. His practice focuses on
technology related disputes with a focus on software and failed IT projects.
Bernd has particular experience in advising on Open Source Software compliance and in
dealing with Open Source Software related disputes, both in court and out of court.
Bernd has distinct specialist skills in copyright protection of software and in drafting and
negotiating technology sourcing agreements including software development and maintenance
agreements, and software licensing agreements.
Litigation and Compliance in the Open Source Ecosystem

Weitere ähnliche Inhalte

Was ist angesagt?

EMBA - Firmware analysis - Black Hat Arsenal USA 2022
EMBA - Firmware analysis - Black Hat Arsenal USA 2022EMBA - Firmware analysis - Black Hat Arsenal USA 2022
EMBA - Firmware analysis - Black Hat Arsenal USA 2022MichaelM85042
 
Git pour les (pas si) nuls
Git pour les (pas si) nulsGit pour les (pas si) nuls
Git pour les (pas si) nulsMalk Zameth
 
Control de versiones utilizando Git
Control de versiones utilizando GitControl de versiones utilizando Git
Control de versiones utilizando GitHugo Gilmar Erazo
 
B4XPages - Cross platform development
B4XPages - Cross platform developmentB4XPages - Cross platform development
B4XPages - Cross platform developmentB4X
 
Introduction to GitHub Actions
Introduction to GitHub ActionsIntroduction to GitHub Actions
Introduction to GitHub ActionsBo-Yi Wu
 
Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...
Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...
Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...linuxlab_conf
 
Intro to Github Actions @likecoin
Intro to Github Actions @likecoinIntro to Github Actions @likecoin
Intro to Github Actions @likecoinWilliam Chong
 
DevOps on AWS - Building Systems to Deliver Faster
DevOps on AWS - Building Systems to Deliver FasterDevOps on AWS - Building Systems to Deliver Faster
DevOps on AWS - Building Systems to Deliver FasterAmazon Web Services
 
DevOps overview 2019-04-13 Nelkinda April Meetup
DevOps overview  2019-04-13 Nelkinda April MeetupDevOps overview  2019-04-13 Nelkinda April Meetup
DevOps overview 2019-04-13 Nelkinda April MeetupShweta Sadawarte
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixDenim Group
 
Kali linux
Kali linux Kali linux
Kali linux Fa6ma_
 
かごしま未来の学びを作る会2022(Microsoft).pdf
かごしま未来の学びを作る会2022(Microsoft).pdfかごしま未来の学びを作る会2022(Microsoft).pdf
かごしま未来の学びを作る会2022(Microsoft).pdfHisaho Nakata
 
Weaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelineWeaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelinePuma Security, LLC
 

Was ist angesagt? (20)

Apresentação Software Livre
Apresentação Software LivreApresentação Software Livre
Apresentação Software Livre
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
 
CI/CD with GitHub Actions
CI/CD with GitHub ActionsCI/CD with GitHub Actions
CI/CD with GitHub Actions
 
EMBA - Firmware analysis - Black Hat Arsenal USA 2022
EMBA - Firmware analysis - Black Hat Arsenal USA 2022EMBA - Firmware analysis - Black Hat Arsenal USA 2022
EMBA - Firmware analysis - Black Hat Arsenal USA 2022
 
Git pour les (pas si) nuls
Git pour les (pas si) nulsGit pour les (pas si) nuls
Git pour les (pas si) nuls
 
Control de versiones utilizando Git
Control de versiones utilizando GitControl de versiones utilizando Git
Control de versiones utilizando Git
 
Github in Action
Github in ActionGithub in Action
Github in Action
 
Github
GithubGithub
Github
 
B4XPages - Cross platform development
B4XPages - Cross platform developmentB4XPages - Cross platform development
B4XPages - Cross platform development
 
Introduction to GitHub Actions
Introduction to GitHub ActionsIntroduction to GitHub Actions
Introduction to GitHub Actions
 
Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...
Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...
Marco Cavallini - Yocto Project, an automatic generator of embedded Linux dis...
 
Intro to Github Actions @likecoin
Intro to Github Actions @likecoinIntro to Github Actions @likecoin
Intro to Github Actions @likecoin
 
DevOps on AWS - Building Systems to Deliver Faster
DevOps on AWS - Building Systems to Deliver FasterDevOps on AWS - Building Systems to Deliver Faster
DevOps on AWS - Building Systems to Deliver Faster
 
DevOps overview 2019-04-13 Nelkinda April Meetup
DevOps overview  2019-04-13 Nelkinda April MeetupDevOps overview  2019-04-13 Nelkinda April Meetup
DevOps overview 2019-04-13 Nelkinda April Meetup
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
 
Kali linux
Kali linux Kali linux
Kali linux
 
Les bases de git
Les bases de gitLes bases de git
Les bases de git
 
Docker 101
Docker 101Docker 101
Docker 101
 
かごしま未来の学びを作る会2022(Microsoft).pdf
かごしま未来の学びを作る会2022(Microsoft).pdfかごしま未来の学びを作る会2022(Microsoft).pdf
かごしま未来の学びを作る会2022(Microsoft).pdf
 
Weaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelineWeaponizing Your DevOps Pipeline
Weaponizing Your DevOps Pipeline
 

Andere mochten auch

Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016 Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016 Mark Radcliffe
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryBlack Duck by Synopsys
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceBlack Duck by Synopsys
 
Containers for Lawyers Richard Fontana
Containers for Lawyers  Richard FontanaContainers for Lawyers  Richard Fontana
Containers for Lawyers Richard FontanaBlack Duck by Synopsys
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsBlack Duck by Synopsys
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentBlack Duck by Synopsys
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleBlack Duck by Synopsys
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on GivingBlack Duck by Synopsys
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Black Duck by Synopsys
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourceBlack Duck by Synopsys
 
Making the Transition from Suite to the Hub
Making the Transition from Suite to the HubMaking the Transition from Suite to the Hub
Making the Transition from Suite to the HubBlack Duck by Synopsys
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceBlack Duck by Synopsys
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingBlack Duck by Synopsys
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Black Duck by Synopsys
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementBlack Duck by Synopsys
 
US-Jpan Innovation and Entrepreneurship Council Report
US-Jpan Innovation and Entrepreneurship Council ReportUS-Jpan Innovation and Entrepreneurship Council Report
US-Jpan Innovation and Entrepreneurship Council ReportMark Radcliffe
 
Unintended Consequences of Joint Patent Ownership
Unintended Consequences of Joint Patent OwnershipUnintended Consequences of Joint Patent Ownership
Unintended Consequences of Joint Patent OwnershipRodney Sparks
 

Andere mochten auch (20)

Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016 Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016
 
What's it like to work at Black Duck
What's it like to work at Black DuckWhat's it like to work at Black Duck
What's it like to work at Black Duck
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
 
Containers for Lawyers Richard Fontana
Containers for Lawyers  Richard FontanaContainers for Lawyers  Richard Fontana
Containers for Lawyers Richard Fontana
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIs
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Securing Docker Containers
Securing Docker ContainersSecuring Docker Containers
Securing Docker Containers
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open Source
 
Making the Transition from Suite to the Hub
Making the Transition from Suite to the HubMaking the Transition from Suite to the Hub
Making the Transition from Suite to the Hub
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk Management
 
US-Jpan Innovation and Entrepreneurship Council Report
US-Jpan Innovation and Entrepreneurship Council ReportUS-Jpan Innovation and Entrepreneurship Council Report
US-Jpan Innovation and Entrepreneurship Council Report
 
Unintended Consequences of Joint Patent Ownership
Unintended Consequences of Joint Patent OwnershipUnintended Consequences of Joint Patent Ownership
Unintended Consequences of Joint Patent Ownership
 

Ähnlich wie Litigation and Compliance in the Open Source Ecosystem

FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
Top Five Global Patent Concerns For 2015
Top Five Global Patent Concerns For 2015Top Five Global Patent Concerns For 2015
Top Five Global Patent Concerns For 2015Maya Fowell
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
2009 Think Tank Final Update
2009 Think Tank Final Update2009 Think Tank Final Update
2009 Think Tank Final UpdateMark Radcliffe
 
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Black Duck by Synopsys
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For EntrepreneurersJason Haislmaier
 
Ppt oops i just lost a billion euros part 1 3 q18
Ppt oops i just lost a billion euros part 1 3 q18Ppt oops i just lost a billion euros part 1 3 q18
Ppt oops i just lost a billion euros part 1 3 q18James C. Roberts III
 
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)Financial Poise
 
Top 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLTop 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLSarah Toomey
 
Managing IP -- New Tlds
Managing IP -- New TldsManaging IP -- New Tlds
Managing IP -- New Tldsmxrodenbaugh
 
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)Arlen Meyers, MD, MBA
 
IPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP StrategyIPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP StrategyOrigiin IP Solutions LLP
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamEversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamIT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamEversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffEversheds Sutherland
 
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdfMartin Schweiger
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonEversheds Sutherland
 
Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Buying & Selling IP (Series: Intellectual Property 201 - 2020)  Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Buying & Selling IP (Series: Intellectual Property 201 - 2020) Financial Poise
 

Ähnlich wie Litigation and Compliance in the Open Source Ecosystem (20)

FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
Top Five Global Patent Concerns For 2015
Top Five Global Patent Concerns For 2015Top Five Global Patent Concerns For 2015
Top Five Global Patent Concerns For 2015
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
2009 Think Tank Final Update
2009 Think Tank Final Update2009 Think Tank Final Update
2009 Think Tank Final Update
 
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
 
Ppt oops i just lost a billion euros part 1 3 q18
Ppt oops i just lost a billion euros part 1 3 q18Ppt oops i just lost a billion euros part 1 3 q18
Ppt oops i just lost a billion euros part 1 3 q18
 
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
PGRT Basics (Series: IP 301 Post-Grant Review Trials 2020)
 
Top 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLTop 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDL
 
Managing IP -- New Tlds
Managing IP -- New TldsManaging IP -- New Tlds
Managing IP -- New Tlds
 
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
 
IPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP StrategyIPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP Strategy
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamIT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
 
(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice
 
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
16 Good Reasons For Pursuing A Quick Patent Grant 100422.pdf
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - London
 
Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Buying & Selling IP (Series: Intellectual Property 201 - 2020)  Buying & Selling IP (Series: Intellectual Property 201 - 2020)
Buying & Selling IP (Series: Intellectual Property 201 - 2020)
 

Mehr von Black Duck by Synopsys

FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...Black Duck by Synopsys
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming Black Duck by Synopsys
 

Mehr von Black Duck by Synopsys (20)

FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 

Kürzlich hochgeladen

ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理ss
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量acyefsa
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 

Kürzlich hochgeladen (20)

ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 

Litigation and Compliance in the Open Source Ecosystem

  • 1. Litigation and Compliance in the Open Source Ecosystem
  • 2. Speakers MARK RADCLIFFE Partner, DLA Piper BERND SIEBERS Counsel, DLA Piper PHIL ODENCE VP & General Manager, Black Duck Software
  • 3. OSS Often Enters a Code Base Unchecked, Resulting In Risks Code Base Commercial 3rd Party Code Purchasing • Licensing? • Security? • Quality? • Support? Open Source OPERATIONAL RISK Which versions of code are being used, and how old are they LEGAL RISK Which licenses are used and do they match anticipated use of the code SECURITY RISK Which components have vulnerabilities and what are they Management visibility…not!
  • 4. Black Duck’s Experience Analyzing Code • Audits on average find 33% open source • 99% of code audits find open source • 95% of audits find unknown open source • 75% of audits contain unknown licenses • 67% of code contains vulnerable components • 50% of code audits contain GPL
  • 5. FOSS Compliance: New Players • Traditional FOSS Enforcement: Focus on Compliance • Software Freedom Law Center • Software Freedom Conservancy (“SFC”) • gplviolations • Shift to Commercial Licensors • Continuent v. Tekelec (GPL) • Versata Series of Cases • New Enforcers • McHardy, copyright troll • Fligor: looking for clients • Major Difference in Goals • Shift from compliance to revenue • Focus on injunctive relief • Expansion of Traditional FOSS Enforcement • SFC assists in VMware litigation
  • 6. Existing Compliance Issues • VMware litigation (SFC) • McHardy litigation • First copyright troll • Versata: focus on hybrid product licensing • Will terminated licensees regularly raise the defense of “integration” with GPLv2 licensed code? • Will warranty claims against licensors arise from poorly drafted licenses become common?
  • 7. Netfilter Project Suspends McHardy The netfilter project regrets to have to suspend its core team member Patrick McHardy from the core team. This is a grave step, definitely the first in the projects history, and it is not one we take lightly. Over many months, severe allegations have been brought forward against the style of his license enforcement activities on parts of the netfilter software he wrote. With respect to privacy, we will not publicly disclose the content of those allegations. Despite many attempts by us to reach him, Patrick has been unable or unwilling to comment on those allegations or defend against the allegations. The netfilter project does not have first-hand evidence. But given the consistent allegations from various trusted sources, and in the absence of any response from Patrick, we feel it is necessary to suspend him until further notice. We'd like to stress that we do not take any sides, and did not "convict" Patrick of anything. He continues to be welcome in the project as soon as he is be able to address the allegations and/or co-sign the "principles" [1] in terms of any future enforcement activities.
  • 8. SFC Criticizes GPL Monetizers These “GPL monetizers”, who trace their roots to nefarious business models that seek to catch users in minor violations in order to sell an alternative proprietary license, stand in stark contrast to the work that Conservancy, FSF and gpl-violations.org have done for years. Most notably, a Linux developer named Patrick McHardy continues ongoing GPL enforcement actions but has not endorsed the community Principles. When Patrick began his efforts, Conservancy immediately reached out to him. After a promising initial discussion (even contemplating partnership and Patrick joining our coalition) in mid-2014, Patrick ceased answering our emails and text messages, and never cooperated with us. Conservancy has had no contact with Patrick nor his attorney since, other than a somewhat cryptic and off-topic response we received over a year ago. In the last two years, we've heard repeated rumors about Patrick's enforcement activity, as well as some reliable claims by GPL violators that Patrick failed to follow the Principles. In one of the many attempts we made to contact Patrick, we urged him to join us in co-drafting the Principles, and then invited him to endorse them after their publication. Neither communication received a response. We informed him that we felt the need to make this public statement, and gave him almost three months to respond. He still has not responded. Patrick's enforcement occurs primarily in Germany. We know well the difficulties of working transparently in that particular legal system, but both gpl-violations.org and Conservancy have done transparent enforcement in that jurisdiction and others. Yet, Patrick's actions are not transparent. In private and semi-private communications, many have criticized Patrick for his enforcement actions. Patrick McHardy has also been suspended from work on the Netfilter core team. While the Netfilter team itself publicly endorsed Conservancy's principles of enforcement, Patrick has not. Conservancy agrees that Patrick's apparent refusal to endorse the Principles leaves suspicion and concern, since the Principles have been endorsed by so many other Linux copyright holders, including Conservancy.
  • 9. New Compliance Issues • Harald Welte announcement of an OSS Compliance Company, aggregating developers • Welte: ran gpl violations • Geographic focus not limited to Germany, but could include France and Spain • David Fligor/Progressive LLP: Troll lawyer searching for a project, so far no cases filed • Sound View Innovations: new ASF software patent troll based on Alcatel-Lucent patents • Sound View has sued Facebook • Sound View has sued LinkedIn • Sound View has sued Twitter
  • 10. German FOSS Enforcement • Community Enforcers • Harald Welte/gpl-violations.org (Linux kernel, iptables) • Returning to compliance based on Barcelona FSFE Conference • Thomas Gleixner (Linux kernel code used in U-Boot) • XviD project • Christoph Hellwig (Linux kernel, this is the VMware case) • Other • Patrick McHardy (Linux kernel, iptables, iproute2)
  • 11. Community Enforcement • Most cases are settled before they go to court. The agreement for a “declaration to cease and desist" in Germany has to contain a clause about a contractual penalty for a future infringement: if the defendant is caught violating GPLv2 again, then the defendant has to pay the penalty. • Harald Welte (gpl-violations.org) has used these penalties for donations to charities like Chaos Computer Club, Wau Holland Stiftung, Free Software Foundation Europe, etc. because his focus was on process change, compliance and community norms. • gpl-violations.org worked very closely together with Free Software Foundation Europe to get companies to talk about their problems and let them participate in the global discussion about open source compliance and other legal issues.
  • 12. German Court Procedure - Outline I. Preliminary Injunction Proceedings 1. General 2. Requirements 3. Standard of Proof 4. Possible Remedies 5. Procedural Aspects 6. Enforcement II. Proceedings on the Merits 1. Overview 2. Remedies III. Pre-Litigation Strategies 1. Offense Position 2. Defense Position
  • 13. German Court Procedure – Preliminary Injunction Proceedings 1. General • Objective: Stop infringement as soon as possible • Often most dangerous threat to infringer, since immediately enforceable (appeal has no suspensory effect!) • "General" time line: • Granted within hours (e.g. re trade fairs), 1-2 days (if ex parte), 2-6 weeks (with oral hearing); • Appeal hearing 2-4 months after decision in first instance
  • 14. German Court Procedure – Preliminary Injunction Proceedings 2. Requirements • Generally courts issue in cases where • Infringement is very likely • No undue delay in filing an application for PI ("Urgency Requirement") • Plaintiff has to file the application for PI without undue delay • Up to 4 weeks usually not problematic • Up to 8 weeks usually problematic; IP owner has to show exceptional circumstances in determining the infringement / preparation of PI application • Over 8 weeks usually no PI granted! • ACT FAST!
  • 15. McHardy German Litigation I • Patrick McHardy uses the same enforcement mechanism but is seeking personal monetary gain • Estimate is that McHardy has approached at least 50 companies that have been hit (some companies multiple times). • Wide variety of companies, including retailers, telcos, producers, importers • Best estimate is that he has received significant damages • Wide range of products • physical products (offline distribution) • firmware updates downloadable from a website • Over The Air (OTA) updates
  • 16. McHardy German Litigation II • Tactics against companies 1. Address a (minor) violation and have a company sign a cease and desist with contractual penalty. 2. Address another (minor) violation and collect the contractual penalty. Sign a new agreement with a higher penalty. 3. Wait some time, then go back to 2 • Devices usually have multiple violations of GPLv2 and he only will address one issue at a time to collect the contractual penalty.
  • 17. McHardy German Litigation III McHardy's claims largely focus on: • Lack of written offer • Lack of license text in product • Inadequate terms of written offer • Lack of complete corresponding source code in repositories • EULA conflicting with GPL obligations • Written offer must come from last company selling product • More exotic • Written offer should be in German • GPL warranty disclaimers are inadequate under German law In the past, McHardy did not do a thorough technical analysis, like a rebuild of the source code, but he has started doing so.
  • 18. McHardy German Litigation IV Two recent hearings, McHardy lost on procedural issues • Case one: court decided that application was not sufficiently “urgent” for preliminary injunction procedure • Case two: judge found that McHardy’s affidavits were inconsistent and McHardy’s lawyer was not prepared to defend it: McHardy withdrew case Statement by presiding judge (not required and without precedential value but shows thinking): • If only a tiny bit of the programming works was contained in the litigious product and if that tiny bit was capable of being copyright protected, the arguments of the defendant would not be sufficient to rebut the claim. This might indeed result in Linux not being tradable in Germany. The industry might have to look for other platforms where the chain of rights can be controlled more easily
  • 19. Solving the McHardy Problem and Copycats • Focus on compliance of your products going into Germany • Understand the McHardy business model • Collaborate on claims and share information • DLA Piper: Developing “Defense in a box” • Working with past litigants to provide information • Facts about McHardy • Summary of McHardy claims • Summary of McHardy arguments • References • Possibility of including actual complaints and other filings but more challenging
  • 20. Hellwig v. VMware I • VMware is alleged to be using arts of the Linux kernel in their proprietary ESXi product, including the entire SCSI mid-layer, USB support, radix tree and many, many device drivers. • Linux is licensed under GNU GPLv2 with a modification by Linus Torvalds • VMware has modified all the code they took from the Linux kernel and integrated them into something they call vmklinux. • VMware has modified their proprietary virtualization OS kernel vmkernel with specific API/symbol to interact with vmklinux • vmklinux and vmkernel interaction is uncertain
  • 21. Hellwig v. VMware II The court did not decide • If vmklinux and vmkernel can be regarded as a uniform work and, if so, • If the use of Hellwig's code in the vmklinux + vmkernel entity qualifies as a modification (requiring a license) or as free use.
  • 22. Hellwig v. VMware III Court required that Hellwig prove the following: • which parts of the Linux program he claims to have modified, and in what manner; • to what extent these modifications meet the criteria for adapter's copyright pursuant to Copyright Act § 69c No. 2 clause 2 in conjunction with § 3; and • to what extent the Plaintiff pleads and where necessary proves that the Defendant has in turn adopted (and possibly further modified) those adapted parts of the program that substantiate his claim to protection. Hellwig failed to meet this standard. He has appealed.
  • 23. Hellwig v. VMware IV Not sufficient as evidence according to the court: • Copyright notices in header files • Reference to git repository • Provision of source code and git blame files Increased requirements for demonstrating an infringement: • Exact identification of own contributions • Conditions for copyright protection of those contributions fulfilled • Source code comparison of own contributions and the allegedly infringing code It is not the job of the court to analyze the source code for elements that might originate from the plaintiff, and to judge to what extent those elements might be protectable.
  • 24. Linux at 25: Disputes on Compliance Greg Kroah-Hartman • "I do [want companies to comply], but I don't ever think that suing them is the right way to do it, given that we have been _very_ successful so far without having to do that” • “You value the GPL over Linux, and I value Linux over the GPL. You are willing to risk Linux in order to try to validate the GPL in some manner. I am not willing to risk Linux for anything as foolish as that.” Linus Torvalds • “Lawsuits destroy community. They destroy trust. They would destroy all the goodwill we've built up over the years by being nice.” Bradley Kuhn (SFC) • “You said that you "care more about Linux than the GPL". I would probably agree with that. But, I do care about software freedom generally much more than I care about Linux *or* the GPL. I care about Linux because it's the only kernel in the world that brings software freedom to lots of users.”
  • 25. Linux Foundation • Who owns the contributions in the Linux kernel • Linux kernel analysis to determine the identity of contributors to Linux kernel, software has been completed and analysis will be done this year • Next step: identifying copyright owners • Encouraging statements by kernel.org on community norms for enforcement • Training programs • Core Infrastructure Initiative “Badge Program” (focused on security but includes governance issues)
  • 26. Summary for Software Distributors • More compliance actions seem likely, particularly in Germany • Develop a FOSS use (and management) policy to ensure that you understand your obligations and can comply with them (for an overview of FOSS and FOSS governance see https://www.blackducksoftware.com/resources/webinar/introduction-open-source- software-and-licensing) • Ensure that your policy covers updates and security issues • Review your distribution agreements to ensure that they take into account any terms imposed by FOSS in your product and modify those terms as appropriate
  • 27. • Largest law firm in the world with 4,200 lawyers in 31 countries and 77 offices throughout the Americas, Asia Pacific, Europe and the Middle East • More than 145 DLA Piper lawyers in IP transactions • Global Open Source Practice • More than 550 DLA Piper lawyers ranked as leaders in their fields Global platform
  • 28. OSS Practice • Worldwide OSS practice group • US Practice led by two partners: Mark Radcliffe & Victoria Lee • Experience • Open sourcing Solaris operating system • FOSS foundations: • OpenStack Foundation • PrPL Foundation • OpenSocial • Open Source Initiative • GPLv3 Drafting Committee Chair (Committee D) • Drafting Project Harmony agreements
  • 29. Contact Information Mark F. Radcliffe Partner 2000 University Avenue, East Palo Alto, California, 94303-2214, United States T +1 650 833 2266 F +1 650 687 1222 E mark.radcliffe@dlapiper.com Mark Radcliffe concentrates in strategic intellectual property advice, private financing, corporate partnering, software licensing, Internet licensing, cloud computing and copyright and trademark. He is the Chair of the Open Source Industry Group at the firm and has been advising on open source matters for over 15 years. For example, he assisted Sun Microsystems in open sourcing the Solaris operating system and drafting the CDDL. And he represents or has represented other large companies in their software licensing (and, in particular, open source matters) including eBay, Accenture, Adobe, Palm and Sony. He represents many software companies (including open source startups) including SugarCRM, DeviceVM, Revolution Analytics, Funambol and Reductive Labs for intellectual property matters. On a pro bono basis, he serves as outside General Counsel for the Open Source Initiative and on the Legal Committee of the Apache Software Foundation. He was the Chair of Committee C for the Free Software Foundation in reviewing GPLv3 and was the lead drafter for Project Harmony. And in 2012, he became outside general counsel of the Open Stack Foundation and drafted their certificate of incorporation and bylaws as well as advising them on open source matters.
  • 30. Contact Information Bernd Siebers Rechtsanwalt | Counsel DLA Piper UK LLP Maximilianstraße 2 D-80539 München T +49 89 232372 133 M +49 173 529 75 67 E bernd.siebers@dlapiper.com Bernd Siebers has longstanding experience in advising national and international businesses in technology related matters, both contentious and non-contentious. His practice focuses on technology related disputes with a focus on software and failed IT projects. Bernd has particular experience in advising on Open Source Software compliance and in dealing with Open Source Software related disputes, both in court and out of court. Bernd has distinct specialist skills in copyright protection of software and in drafting and negotiating technology sourcing agreements including software development and maintenance agreements, and software licensing agreements.