SlideShare una empresa de Scribd logo
1 de 32
[object Object],www.intelligere.in RITAMBHARA AGRAWAL INTELLIGERE OSI Days 2010 19-21 September, 2010 Chennai
[object Object],www.intelligere.in Open source   usually refers to a software that is released with source code under a license that ensures that derivative works will also be available as source code, protects certain rights of the original authors, and prohibits restrictions on how the software can be used or who can use it. Open source software code is publicly available and enables users to modify and disseminate new code including their modifications. The fundamental purpose of open source licensing is to deny anybody the right to exclusively exploit a work.
[object Object],www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition of  “Free” in FOSS www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free Software Definition www.intelligere.in The fundamental purpose of open source licensing is to deny anyone to exclusively exploit a work, the software. Main purpose remains that the work should reach a maximum of audience. At the same time, creators of the work are required to surrender all, or substantially all, of the rights granted by copyright to those entities that are capable of distributing and thereby exploiting that work.
Copyright www.intelligere.in Copyright is a set of exclusive rights granted to the author or creator of an original work. Copyright includes the right to copy, reproduce, distribute and adapt the work.  Registering a copyright is not a mandate. The moment a work is fixed in a tangible medium copyright comes into existence. But it is always beneficial to get the work registered, as its easier to prove in case of violation and infringement and damages can be quantified in a better way.  Copyright owners have the exclusive right to exercise control over copying and other exploitation of the works for a specific period of time. Anyone requiring to exploit and use any copyrighted work requires permission to use that work. Copyright owners can grant permission and grant license for exploitation of the work.
Copyright www.intelligere.in Copyright is granted to various categories of work, like, literary, artistic, dramatic and musical work. Ordinarily the author is the first owner of the work. Different rights are granted to different categories of work. Computer programmes are protected under copyright and are treated as literary works.  There are certain uses which fall under the domain of  “ fair use ” . Copyrighted work can be used and exploited without permission and license under fair use premise. Some of the fair usage are, news reporting, criticism, research, commentary, teaching or scholarship.
Copyright in Software www.intelligere.in All software is subject to copyright. The moment one saves code to a file, copyright law comes into existence. A software copyright is the exclusive right to control the rules for copying, exploiting, modifying, a work of software. Software copyright is usually used by proprietary company to prevent unauthorized copying of their software. Copyright holders can permit other persons to copy or modify their software. A copyright holder can sue for damages for any unauthorized usage of the copyrighted software product.  In addition to all the rights applicable to a literary work, owner of the copyright in a computer programme enjoys the rights to sell or give on hire or offer for sale or hire, regardless of whether such a copy has been sold or given on hire on earlier occasion.  Copyright in the software can either be assigned or licensed.
Rights granted by Copyright www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright infringement www.intelligere.in Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright owner ’s exclusive rights, such as right to reproduce or perform the copyrighted work, or to make derivative works. Copyright infringement occurs when someone uses a copyrighted product without permission and authorization from the author/owner of the copyright. Infringement also happens when the scope of rights granted under the license are exceeded or violated.  In case of any infringement of the copyrighted work, the author/owner of the copyright can initiate proceedings against the infringer. Copyright infringement is both civil and criminal offence. The copyright owner is entitled to remedies by way of injunctions, damages and accounts. The minimum punishment for infringement of copyright is imprisonment for six months with the minimum fine of Rs. 50,000/-
Copyright infringement in Software www.intelligere.in Copyright infringement of software is the practice of unauthorized copying of the computer software. The author/owner of the copyright of the software has the exclusive right to grant and control the usage of its software product. Any act of someone using/exploiting the software without permission and license from the author/owner of the software is regarded as copyright infringement. Infringement in copyright software also occurs when the software is used outside the purview of the terms and conditions of the license.
Copyleft www.intelligere.in Copyleft is a term used in respect of FOSS licensing which is used for copyright. Copyleft is a practice of using copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work.  The main idea behind copylefting the open source software was to not let the product fall into the domain of proprietary software. If open source software is put into public domain with no copyright, people can make the said software proprietary and it would defeat the whole purpose of open source freedom. Copyleft guarantees that every user has the freedom.
Copyleft www.intelligere.in Whereas, copyright law has been used to withhold permission to copy, modify or distribute software, on the contrary Copyleft ensures that the project remains free, and all modified and extended versions of the program remains free as well.  Copyleft licenses are conditional licenses. Copyleft should not be equated with abandoning the copyright.  Proprietary software developers use copyright to take away the users' freedom; whereas, copyleft guarantees their freedom. That's why the name has been reversed from  “copyright” to “copyleft”.  FOSS licenses are categorized as strong, weak or with no copyleft provisions.  Non-copyleft licenses, also known as permissive licenses, allows those using the software to re-license it under any terms as they want. The most popular copyleft license is GPL.  The most popular non-copyleft license is BSD style. These licenses place no restriction on licensing for modified works.
Few Questions www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Open Source Software is subject to Copyright ,[object Object],[object Object],www.intelligere.in
When does copyright infringement occurs in FOSS   Fundamental violations in case of FOSS licenses include; www.intelligere.in
Copyleft in FOSS www.intelligere.in h The strength of the copyleft governing a work is an expression of the extent that the copyleft provisions can be efficiently imposed on all kinds of derived works
FOSS Licenses www.intelligere.in h
Can licensed software (modified or unmodified) be distributed that has been   combined or linked  with code covered by  another licensing model? www.intelligere.in h
www.intelligere.in In case of violation of license, one can look for different measures for enforcement of the same. Before starting any enforcement proceedings one has to be sure to organize and gather all the information
www.intelligere.in Few Things to keep in mind before taking any action against the  violator
www.intelligere.in
www.intelligere.in Case Study
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in
Fortinet v. GPL ,[object Object],[object Object],www.intelligere.in
www.intelligere.in License Compliance  Best Practices
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in For more information, please feel free to drop a line at  [email_address]  or visit  http://www.intelligere.in

Más contenido relacionado

La actualidad más candente

Algorithm and pseudo codes
Algorithm and pseudo codesAlgorithm and pseudo codes
Algorithm and pseudo codes
hermiraguilar
 

La actualidad más candente (20)

Python file handling
Python file handlingPython file handling
Python file handling
 
Compiler vs Interpreter-Compiler design ppt.
Compiler vs Interpreter-Compiler design ppt.Compiler vs Interpreter-Compiler design ppt.
Compiler vs Interpreter-Compiler design ppt.
 
File Handling Python
File Handling PythonFile Handling Python
File Handling Python
 
Python Modules
Python ModulesPython Modules
Python Modules
 
Chapter 08 data file handling
Chapter 08 data file handlingChapter 08 data file handling
Chapter 08 data file handling
 
Python-01| Fundamentals
Python-01| FundamentalsPython-01| Fundamentals
Python-01| Fundamentals
 
Python exception handling
Python   exception handlingPython   exception handling
Python exception handling
 
Algorithm and pseudo codes
Algorithm and pseudo codesAlgorithm and pseudo codes
Algorithm and pseudo codes
 
Packages In Python Tutorial
Packages In Python TutorialPackages In Python Tutorial
Packages In Python Tutorial
 
Php and MySQL
Php and MySQLPhp and MySQL
Php and MySQL
 
Chapter 09 design and analysis of algorithms
Chapter 09  design and analysis of algorithmsChapter 09  design and analysis of algorithms
Chapter 09 design and analysis of algorithms
 
Steps for c program execution
Steps for c program executionSteps for c program execution
Steps for c program execution
 
Network programming
Network programmingNetwork programming
Network programming
 
The pseudocode
The pseudocodeThe pseudocode
The pseudocode
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systems
 
Linker and Loader Explained
Linker and Loader  ExplainedLinker and Loader  Explained
Linker and Loader Explained
 
Diff between c and c++
Diff between c and c++Diff between c and c++
Diff between c and c++
 
File handling in Python
File handling in PythonFile handling in Python
File handling in Python
 
Ch11 file system implementation
Ch11 file system implementationCh11 file system implementation
Ch11 file system implementation
 
Exception handling in python
Exception handling in pythonException handling in python
Exception handling in python
 

Destacado

Productive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for KidsProductive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for Kids
lanelee77
 
Making the Most of Google
Making the Most of GoogleMaking the Most of Google
Making the Most of Google
lanelee77
 
Budget Simulation for Technology Resources
Budget Simulation for Technology ResourcesBudget Simulation for Technology Resources
Budget Simulation for Technology Resources
lanelee77
 
Leapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grantLeapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grant
lanelee77
 
Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530
lanelee77
 
Research Skills - Sharp Searching
Research Skills - Sharp SearchingResearch Skills - Sharp Searching
Research Skills - Sharp Searching
lanelee77
 
Ga doe media center standards 2010 hms
Ga doe media center standards 2010   hmsGa doe media center standards 2010   hms
Ga doe media center standards 2010 hms
lanelee77
 
Institutional Strategic Plan
Institutional Strategic PlanInstitutional Strategic Plan
Institutional Strategic Plan
lanelee77
 
Storyboard for Video
Storyboard for VideoStoryboard for Video
Storyboard for Video
lanelee77
 
High School Business UbD Course Design
High School Business UbD Course DesignHigh School Business UbD Course Design
High School Business UbD Course Design
lanelee77
 

Destacado (15)

Productive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for KidsProductive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for Kids
 
Making the Most of Google
Making the Most of GoogleMaking the Most of Google
Making the Most of Google
 
Budget Simulation for Technology Resources
Budget Simulation for Technology ResourcesBudget Simulation for Technology Resources
Budget Simulation for Technology Resources
 
Leapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grantLeapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grant
 
Abans de llençar, reutilitzar!
Abans de llençar, reutilitzar! Abans de llençar, reutilitzar!
Abans de llençar, reutilitzar!
 
Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530
 
Research Skills - Sharp Searching
Research Skills - Sharp SearchingResearch Skills - Sharp Searching
Research Skills - Sharp Searching
 
Jubileo 2011
Jubileo 2011Jubileo 2011
Jubileo 2011
 
Ga doe media center standards 2010 hms
Ga doe media center standards 2010   hmsGa doe media center standards 2010   hms
Ga doe media center standards 2010 hms
 
Institutional Strategic Plan
Institutional Strategic PlanInstitutional Strategic Plan
Institutional Strategic Plan
 
Presentació cicle superior - La queixa (Assemblea 1r trimestre)
Presentació cicle superior - La queixa (Assemblea 1r trimestre)Presentació cicle superior - La queixa (Assemblea 1r trimestre)
Presentació cicle superior - La queixa (Assemblea 1r trimestre)
 
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestre
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestreSer respectuosos amb el material comú i el propi - Assemblea 1r trimestre
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestre
 
Storyboard for Video
Storyboard for VideoStoryboard for Video
Storyboard for Video
 
High School Business UbD Course Design
High School Business UbD Course DesignHigh School Business UbD Course Design
High School Business UbD Course Design
 
Legal issues for start up
Legal issues for start upLegal issues for start up
Legal issues for start up
 

Similar a Copyright and open source licensing

Copyright and open source licensing
Copyright and open source licensingCopyright and open source licensing
Copyright and open source licensing
Ritambhara Agrawal
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
shujia
 
Conclusion
ConclusionConclusion
Conclusion
HitmanD
 
Overview
OverviewOverview
Overview
HitmanD
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
Rowan Wilson
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
sheryl90
 
open source and copyright
open source and copyrightopen source and copyright
open source and copyright
guest29e2eb
 
Creative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad FinalCreative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad Final
guest584d23
 

Similar a Copyright and open source licensing (20)

Copyright and open source licensing
Copyright and open source licensingCopyright and open source licensing
Copyright and open source licensing
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Overview of basic open-source licenses
Overview of basic open-source licensesOverview of basic open-source licenses
Overview of basic open-source licenses
 
License eula
License eulaLicense eula
License eula
 
Licence Gpl 3.0
Licence Gpl 3.0Licence Gpl 3.0
Licence Gpl 3.0
 
Discuss open sourcelicensing
Discuss open sourcelicensingDiscuss open sourcelicensing
Discuss open sourcelicensing
 
Wiki Educator
Wiki EducatorWiki Educator
Wiki Educator
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 
Conclusion
ConclusionConclusion
Conclusion
 
Overview
OverviewOverview
Overview
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
open source and copyright
open source and copyrightopen source and copyright
open source and copyright
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Creative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad FinalCreative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad Final
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Open source licenses
Open source licensesOpen source licenses
Open source licenses
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 

Último

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Copyright and open source licensing

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Free Software Definition www.intelligere.in The fundamental purpose of open source licensing is to deny anyone to exclusively exploit a work, the software. Main purpose remains that the work should reach a maximum of audience. At the same time, creators of the work are required to surrender all, or substantially all, of the rights granted by copyright to those entities that are capable of distributing and thereby exploiting that work.
  • 6. Copyright www.intelligere.in Copyright is a set of exclusive rights granted to the author or creator of an original work. Copyright includes the right to copy, reproduce, distribute and adapt the work. Registering a copyright is not a mandate. The moment a work is fixed in a tangible medium copyright comes into existence. But it is always beneficial to get the work registered, as its easier to prove in case of violation and infringement and damages can be quantified in a better way. Copyright owners have the exclusive right to exercise control over copying and other exploitation of the works for a specific period of time. Anyone requiring to exploit and use any copyrighted work requires permission to use that work. Copyright owners can grant permission and grant license for exploitation of the work.
  • 7. Copyright www.intelligere.in Copyright is granted to various categories of work, like, literary, artistic, dramatic and musical work. Ordinarily the author is the first owner of the work. Different rights are granted to different categories of work. Computer programmes are protected under copyright and are treated as literary works. There are certain uses which fall under the domain of “ fair use ” . Copyrighted work can be used and exploited without permission and license under fair use premise. Some of the fair usage are, news reporting, criticism, research, commentary, teaching or scholarship.
  • 8. Copyright in Software www.intelligere.in All software is subject to copyright. The moment one saves code to a file, copyright law comes into existence. A software copyright is the exclusive right to control the rules for copying, exploiting, modifying, a work of software. Software copyright is usually used by proprietary company to prevent unauthorized copying of their software. Copyright holders can permit other persons to copy or modify their software. A copyright holder can sue for damages for any unauthorized usage of the copyrighted software product. In addition to all the rights applicable to a literary work, owner of the copyright in a computer programme enjoys the rights to sell or give on hire or offer for sale or hire, regardless of whether such a copy has been sold or given on hire on earlier occasion. Copyright in the software can either be assigned or licensed.
  • 9.
  • 10. Copyright infringement www.intelligere.in Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright owner ’s exclusive rights, such as right to reproduce or perform the copyrighted work, or to make derivative works. Copyright infringement occurs when someone uses a copyrighted product without permission and authorization from the author/owner of the copyright. Infringement also happens when the scope of rights granted under the license are exceeded or violated. In case of any infringement of the copyrighted work, the author/owner of the copyright can initiate proceedings against the infringer. Copyright infringement is both civil and criminal offence. The copyright owner is entitled to remedies by way of injunctions, damages and accounts. The minimum punishment for infringement of copyright is imprisonment for six months with the minimum fine of Rs. 50,000/-
  • 11. Copyright infringement in Software www.intelligere.in Copyright infringement of software is the practice of unauthorized copying of the computer software. The author/owner of the copyright of the software has the exclusive right to grant and control the usage of its software product. Any act of someone using/exploiting the software without permission and license from the author/owner of the software is regarded as copyright infringement. Infringement in copyright software also occurs when the software is used outside the purview of the terms and conditions of the license.
  • 12. Copyleft www.intelligere.in Copyleft is a term used in respect of FOSS licensing which is used for copyright. Copyleft is a practice of using copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work. The main idea behind copylefting the open source software was to not let the product fall into the domain of proprietary software. If open source software is put into public domain with no copyright, people can make the said software proprietary and it would defeat the whole purpose of open source freedom. Copyleft guarantees that every user has the freedom.
  • 13. Copyleft www.intelligere.in Whereas, copyright law has been used to withhold permission to copy, modify or distribute software, on the contrary Copyleft ensures that the project remains free, and all modified and extended versions of the program remains free as well. Copyleft licenses are conditional licenses. Copyleft should not be equated with abandoning the copyright. Proprietary software developers use copyright to take away the users' freedom; whereas, copyleft guarantees their freedom. That's why the name has been reversed from “copyright” to “copyleft”. FOSS licenses are categorized as strong, weak or with no copyleft provisions. Non-copyleft licenses, also known as permissive licenses, allows those using the software to re-license it under any terms as they want. The most popular copyleft license is GPL. The most popular non-copyleft license is BSD style. These licenses place no restriction on licensing for modified works.
  • 14.
  • 15.
  • 16. When does copyright infringement occurs in FOSS Fundamental violations in case of FOSS licenses include; www.intelligere.in
  • 17. Copyleft in FOSS www.intelligere.in h The strength of the copyleft governing a work is an expression of the extent that the copyleft provisions can be efficiently imposed on all kinds of derived works
  • 19. Can licensed software (modified or unmodified) be distributed that has been combined or linked with code covered by another licensing model? www.intelligere.in h
  • 20. www.intelligere.in In case of violation of license, one can look for different measures for enforcement of the same. Before starting any enforcement proceedings one has to be sure to organize and gather all the information
  • 21. www.intelligere.in Few Things to keep in mind before taking any action against the violator
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31.
  • 32.