SlideShare una empresa de Scribd logo
1 de 32
[object Object],www.intelligere.in RITAMBHARA AGRAWAL INTELLIGERE OSI Days 2010 19-21 September, 2010 Chennai
[object Object],www.intelligere.in Open source   usually refers to a software that is released with source code under a license that ensures that derivative works will also be available as source code, protects certain rights of the original authors, and prohibits restrictions on how the software can be used or who can use it. Open source software code is publicly available and enables users to modify and disseminate new code including their modifications. The fundamental purpose of open source licensing is to deny anybody the right to exclusively exploit a work.
[object Object],www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition of  “Free” in FOSS www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free Software Definition www.intelligere.in The fundamental purpose of open source licensing is to deny anyone to exclusively exploit a work, the software. Main purpose remains that the work should reach a maximum of audience. At the same time, creators of the work are required to surrender all, or substantially all, of the rights granted by copyright to those entities that are capable of distributing and thereby exploiting that work.
Copyright www.intelligere.in Copyright is a set of exclusive rights granted to the author or creator of an original work. Copyright includes the right to copy, reproduce, distribute and adapt the work.  Registering a copyright is not a mandate. The moment a work is fixed in a tangible medium copyright comes into existence. But it is always beneficial to get the work registered, as its easier to prove in case of violation and infringement and damages can be quantified in a better way.  Copyright owners have the exclusive right to exercise control over copying and other exploitation of the works for a specific period of time. Anyone requiring to exploit and use any copyrighted work requires permission to use that work. Copyright owners can grant permission and grant license for exploitation of the work.
Copyright www.intelligere.in Copyright is granted to various categories of work, like, literary, artistic, dramatic and musical work. Ordinarily the author is the first owner of the work. Different rights are granted to different categories of work. Computer programmes are protected under copyright and are treated as literary works.  There are certain uses which fall under the domain of  “ fair use ” . Copyrighted work can be used and exploited without permission and license under fair use premise. Some of the fair usage are, news reporting, criticism, research, commentary, teaching or scholarship.
Copyright in Software www.intelligere.in All software is subject to copyright. The moment one saves code to a file, copyright law comes into existence. A software copyright is the exclusive right to control the rules for copying, exploiting, modifying, a work of software. Software copyright is usually used by proprietary company to prevent unauthorized copying of their software. Copyright holders can permit other persons to copy or modify their software. A copyright holder can sue for damages for any unauthorized usage of the copyrighted software product.  In addition to all the rights applicable to a literary work, owner of the copyright in a computer programme enjoys the rights to sell or give on hire or offer for sale or hire, regardless of whether such a copy has been sold or given on hire on earlier occasion.  Copyright in the software can either be assigned or licensed.
Rights granted by Copyright www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright infringement www.intelligere.in Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright owner ’s exclusive rights, such as right to reproduce or perform the copyrighted work, or to make derivative works. Copyright infringement occurs when someone uses a copyrighted product without permission and authorization from the author/owner of the copyright. Infringement also happens when the scope of rights granted under the license are exceeded or violated.  In case of any infringement of the copyrighted work, the author/owner of the copyright can initiate proceedings against the infringer. Copyright infringement is both civil and criminal offence. The copyright owner is entitled to remedies by way of injunctions, damages and accounts. The minimum punishment for infringement of copyright is imprisonment for six months with the minimum fine of Rs. 50,000/-
Copyright infringement in Software www.intelligere.in Copyright infringement of software is the practice of unauthorized copying of the computer software. The author/owner of the copyright of the software has the exclusive right to grant and control the usage of its software product. Any act of someone using/exploiting the software without permission and license from the author/owner of the software is regarded as copyright infringement. Infringement in copyright software also occurs when the software is used outside the purview of the terms and conditions of the license.
Copyleft www.intelligere.in Copyleft is a term used in respect of FOSS licensing which is used for copyright. Copyleft is a practice of using copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work.  The main idea behind copylefting the open source software was to not let the product fall into the domain of proprietary software. If open source software is put into public domain with no copyright, people can make the said software proprietary and it would defeat the whole purpose of open source freedom. Copyleft guarantees that every user has the freedom.
Copyleft www.intelligere.in Whereas, copyright law has been used to withhold permission to copy, modify or distribute software, on the contrary Copyleft ensures that the project remains free, and all modified and extended versions of the program remains free as well.  Copyleft licenses are conditional licenses. Copyleft should not be equated with abandoning the copyright.  Proprietary software developers use copyright to take away the users' freedom; whereas, copyleft guarantees their freedom. That's why the name has been reversed from  “copyright” to “copyleft”.  FOSS licenses are categorized as strong, weak or with no copyleft provisions.  Non-copyleft licenses, also known as permissive licenses, allows those using the software to re-license it under any terms as they want. The most popular copyleft license is GPL.  The most popular non-copyleft license is BSD style. These licenses place no restriction on licensing for modified works.
Few Questions www.intelligere.in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Open Source Software is subject to Copyright ,[object Object],[object Object],www.intelligere.in
When does copyright infringement occurs in FOSS   Fundamental violations in case of FOSS licenses include; www.intelligere.in
Copyleft in FOSS www.intelligere.in h The strength of the copyleft governing a work is an expression of the extent that the copyleft provisions can be efficiently imposed on all kinds of derived works
FOSS Licenses www.intelligere.in h
Can licensed software (modified or unmodified) be distributed that has been   combined or linked  with code covered by  another licensing model? www.intelligere.in h
www.intelligere.in In case of violation of license, one can look for different measures for enforcement of the same. Before starting any enforcement proceedings one has to be sure to organize and gather all the information
www.intelligere.in Few Things to keep in mind before taking any action against the  violator
www.intelligere.in
www.intelligere.in Case Study
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in
Fortinet v. GPL ,[object Object],[object Object],www.intelligere.in
www.intelligere.in License Compliance  Best Practices
[object Object],www.intelligere.in
[object Object],www.intelligere.in
[object Object],www.intelligere.in For more information, please feel free to drop a line at  [email_address]  or visit  http://www.intelligere.in

Más contenido relacionado

La actualidad más candente

Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its Components
Mahmuda Rahman
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
Techsailor
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Professional ethics (chapter_one)_rev1[1]
Professional ethics (chapter_one)_rev1[1]Professional ethics (chapter_one)_rev1[1]
Professional ethics (chapter_one)_rev1[1]
johnbobfox
 

La actualidad más candente (20)

The internet
The internetThe internet
The internet
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its Components
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Categories of computer
Categories of computerCategories of computer
Categories of computer
 
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in LearningAdvantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating system
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Copyright, fair use & public domain
Copyright, fair use & public domainCopyright, fair use & public domain
Copyright, fair use & public domain
 
Analog computers digital computers & Hybrid computers
Analog computers digital computers & Hybrid computersAnalog computers digital computers & Hybrid computers
Analog computers digital computers & Hybrid computers
 
Basics of Internet and WWW
Basics of Internet and WWWBasics of Internet and WWW
Basics of Internet and WWW
 
Professional ethics (chapter_one)_rev1[1]
Professional ethics (chapter_one)_rev1[1]Professional ethics (chapter_one)_rev1[1]
Professional ethics (chapter_one)_rev1[1]
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
 
Types of software
Types of softwareTypes of software
Types of software
 

Destacado

Productive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for KidsProductive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for Kids
lanelee77
 
Making the Most of Google
Making the Most of GoogleMaking the Most of Google
Making the Most of Google
lanelee77
 
Budget Simulation for Technology Resources
Budget Simulation for Technology ResourcesBudget Simulation for Technology Resources
Budget Simulation for Technology Resources
lanelee77
 
Leapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grantLeapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grant
lanelee77
 
Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530
lanelee77
 
Research Skills - Sharp Searching
Research Skills - Sharp SearchingResearch Skills - Sharp Searching
Research Skills - Sharp Searching
lanelee77
 
Ga doe media center standards 2010 hms
Ga doe media center standards 2010   hmsGa doe media center standards 2010   hms
Ga doe media center standards 2010 hms
lanelee77
 
Institutional Strategic Plan
Institutional Strategic PlanInstitutional Strategic Plan
Institutional Strategic Plan
lanelee77
 
Storyboard for Video
Storyboard for VideoStoryboard for Video
Storyboard for Video
lanelee77
 
High School Business UbD Course Design
High School Business UbD Course DesignHigh School Business UbD Course Design
High School Business UbD Course Design
lanelee77
 

Destacado (15)

Productive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for KidsProductive & Safe Google Seaches for Kids
Productive & Safe Google Seaches for Kids
 
Making the Most of Google
Making the Most of GoogleMaking the Most of Google
Making the Most of Google
 
Budget Simulation for Technology Resources
Budget Simulation for Technology ResourcesBudget Simulation for Technology Resources
Budget Simulation for Technology Resources
 
Leapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grantLeapfrog tag, i pod touch, $100 funding grant
Leapfrog tag, i pod touch, $100 funding grant
 
Abans de llençar, reutilitzar!
Abans de llençar, reutilitzar! Abans de llençar, reutilitzar!
Abans de llençar, reutilitzar!
 
Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530Ub d & technology integration plan frit 8530
Ub d & technology integration plan frit 8530
 
Research Skills - Sharp Searching
Research Skills - Sharp SearchingResearch Skills - Sharp Searching
Research Skills - Sharp Searching
 
Jubileo 2011
Jubileo 2011Jubileo 2011
Jubileo 2011
 
Ga doe media center standards 2010 hms
Ga doe media center standards 2010   hmsGa doe media center standards 2010   hms
Ga doe media center standards 2010 hms
 
Institutional Strategic Plan
Institutional Strategic PlanInstitutional Strategic Plan
Institutional Strategic Plan
 
Presentació cicle superior - La queixa (Assemblea 1r trimestre)
Presentació cicle superior - La queixa (Assemblea 1r trimestre)Presentació cicle superior - La queixa (Assemblea 1r trimestre)
Presentació cicle superior - La queixa (Assemblea 1r trimestre)
 
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestre
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestreSer respectuosos amb el material comú i el propi - Assemblea 1r trimestre
Ser respectuosos amb el material comú i el propi - Assemblea 1r trimestre
 
Storyboard for Video
Storyboard for VideoStoryboard for Video
Storyboard for Video
 
High School Business UbD Course Design
High School Business UbD Course DesignHigh School Business UbD Course Design
High School Business UbD Course Design
 
Legal issues for start up
Legal issues for start upLegal issues for start up
Legal issues for start up
 

Similar a Copyright and open source licensing

Copyright and open source licensing
Copyright and open source licensingCopyright and open source licensing
Copyright and open source licensing
Ritambhara Agrawal
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
shujia
 
Conclusion
ConclusionConclusion
Conclusion
HitmanD
 
Overview
OverviewOverview
Overview
HitmanD
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
Rowan Wilson
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
sheryl90
 
open source and copyright
open source and copyrightopen source and copyright
open source and copyright
guest29e2eb
 
Creative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad FinalCreative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad Final
guest584d23
 

Similar a Copyright and open source licensing (20)

Copyright and open source licensing
Copyright and open source licensingCopyright and open source licensing
Copyright and open source licensing
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Overview of basic open-source licenses
Overview of basic open-source licensesOverview of basic open-source licenses
Overview of basic open-source licenses
 
License eula
License eulaLicense eula
License eula
 
Licence Gpl 3.0
Licence Gpl 3.0Licence Gpl 3.0
Licence Gpl 3.0
 
Discuss open sourcelicensing
Discuss open sourcelicensingDiscuss open sourcelicensing
Discuss open sourcelicensing
 
Wiki Educator
Wiki EducatorWiki Educator
Wiki Educator
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 
Conclusion
ConclusionConclusion
Conclusion
 
Overview
OverviewOverview
Overview
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
open source and copyright
open source and copyrightopen source and copyright
open source and copyright
 
Creative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad FinalCreative Commons Presnetation Ziad Final
Creative Commons Presnetation Ziad Final
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Open source licenses
Open source licensesOpen source licenses
Open source licenses
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
Free/Open Source Software
Free/Open Source SoftwareFree/Open Source Software
Free/Open Source Software
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Copyright and open source licensing

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Free Software Definition www.intelligere.in The fundamental purpose of open source licensing is to deny anyone to exclusively exploit a work, the software. Main purpose remains that the work should reach a maximum of audience. At the same time, creators of the work are required to surrender all, or substantially all, of the rights granted by copyright to those entities that are capable of distributing and thereby exploiting that work.
  • 6. Copyright www.intelligere.in Copyright is a set of exclusive rights granted to the author or creator of an original work. Copyright includes the right to copy, reproduce, distribute and adapt the work. Registering a copyright is not a mandate. The moment a work is fixed in a tangible medium copyright comes into existence. But it is always beneficial to get the work registered, as its easier to prove in case of violation and infringement and damages can be quantified in a better way. Copyright owners have the exclusive right to exercise control over copying and other exploitation of the works for a specific period of time. Anyone requiring to exploit and use any copyrighted work requires permission to use that work. Copyright owners can grant permission and grant license for exploitation of the work.
  • 7. Copyright www.intelligere.in Copyright is granted to various categories of work, like, literary, artistic, dramatic and musical work. Ordinarily the author is the first owner of the work. Different rights are granted to different categories of work. Computer programmes are protected under copyright and are treated as literary works. There are certain uses which fall under the domain of “ fair use ” . Copyrighted work can be used and exploited without permission and license under fair use premise. Some of the fair usage are, news reporting, criticism, research, commentary, teaching or scholarship.
  • 8. Copyright in Software www.intelligere.in All software is subject to copyright. The moment one saves code to a file, copyright law comes into existence. A software copyright is the exclusive right to control the rules for copying, exploiting, modifying, a work of software. Software copyright is usually used by proprietary company to prevent unauthorized copying of their software. Copyright holders can permit other persons to copy or modify their software. A copyright holder can sue for damages for any unauthorized usage of the copyrighted software product. In addition to all the rights applicable to a literary work, owner of the copyright in a computer programme enjoys the rights to sell or give on hire or offer for sale or hire, regardless of whether such a copy has been sold or given on hire on earlier occasion. Copyright in the software can either be assigned or licensed.
  • 9.
  • 10. Copyright infringement www.intelligere.in Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright owner ’s exclusive rights, such as right to reproduce or perform the copyrighted work, or to make derivative works. Copyright infringement occurs when someone uses a copyrighted product without permission and authorization from the author/owner of the copyright. Infringement also happens when the scope of rights granted under the license are exceeded or violated. In case of any infringement of the copyrighted work, the author/owner of the copyright can initiate proceedings against the infringer. Copyright infringement is both civil and criminal offence. The copyright owner is entitled to remedies by way of injunctions, damages and accounts. The minimum punishment for infringement of copyright is imprisonment for six months with the minimum fine of Rs. 50,000/-
  • 11. Copyright infringement in Software www.intelligere.in Copyright infringement of software is the practice of unauthorized copying of the computer software. The author/owner of the copyright of the software has the exclusive right to grant and control the usage of its software product. Any act of someone using/exploiting the software without permission and license from the author/owner of the software is regarded as copyright infringement. Infringement in copyright software also occurs when the software is used outside the purview of the terms and conditions of the license.
  • 12. Copyleft www.intelligere.in Copyleft is a term used in respect of FOSS licensing which is used for copyright. Copyleft is a practice of using copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work. The main idea behind copylefting the open source software was to not let the product fall into the domain of proprietary software. If open source software is put into public domain with no copyright, people can make the said software proprietary and it would defeat the whole purpose of open source freedom. Copyleft guarantees that every user has the freedom.
  • 13. Copyleft www.intelligere.in Whereas, copyright law has been used to withhold permission to copy, modify or distribute software, on the contrary Copyleft ensures that the project remains free, and all modified and extended versions of the program remains free as well. Copyleft licenses are conditional licenses. Copyleft should not be equated with abandoning the copyright. Proprietary software developers use copyright to take away the users' freedom; whereas, copyleft guarantees their freedom. That's why the name has been reversed from “copyright” to “copyleft”. FOSS licenses are categorized as strong, weak or with no copyleft provisions. Non-copyleft licenses, also known as permissive licenses, allows those using the software to re-license it under any terms as they want. The most popular copyleft license is GPL. The most popular non-copyleft license is BSD style. These licenses place no restriction on licensing for modified works.
  • 14.
  • 15.
  • 16. When does copyright infringement occurs in FOSS Fundamental violations in case of FOSS licenses include; www.intelligere.in
  • 17. Copyleft in FOSS www.intelligere.in h The strength of the copyleft governing a work is an expression of the extent that the copyleft provisions can be efficiently imposed on all kinds of derived works
  • 19. Can licensed software (modified or unmodified) be distributed that has been combined or linked with code covered by another licensing model? www.intelligere.in h
  • 20. www.intelligere.in In case of violation of license, one can look for different measures for enforcement of the same. Before starting any enforcement proceedings one has to be sure to organize and gather all the information
  • 21. www.intelligere.in Few Things to keep in mind before taking any action against the violator
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31.
  • 32.