Feeds

US court ruling nixes software EULA sales restrictions

Go forth and resell your bundles

  • alert
  • submit to reddit

High performance access to file storage

In an intriguing ruling picked up by LinuxJournal's Don Marti, a US district court has given encouragement to software users who want to extricate themselves from restrictive software licenses.

The judge, in the case Adobe vs Softman heard in the Central District of California, has ruled that consumers can resell bundled software, no matter what the EULA, or End User License Agreement, stipulates. Specifically, the ruling decrees that software purchases be treated as sales transactions, rather than explicit license agreements. In other words, consumers should have the same rights they'd enjoy under existing copyright legislation when buying a CD or a book. They can't make copies, but they can resell what they own.

"The balance of rights in intellectual property law is already tilted heavily in favor of the intellectual property owner," ruled Judge Dean Pregerson, in a burst of enlightenment.

In the case SoftMan was reselling Adobe software it received in bundles or "collections". Adobe claimed this was a breach of its trademark. Judge Pregerson wasn't convinced, and decided that existing copyright law should apply:

"... the purchaser commonly obtains a single copy of the software, with documentation, for a single price, which the purchaser pays at the time of the transaction, and which constitutes the entire payment for the 'license.' The license runs for an indefinite term without provisions for renewal. In light of these indicia, many courts and commentators conclude that a "shrinkwrap license" transaction is a sale of goods rather than a license."

The decision has its limitations, being merely a vacation of an earlier judgement. It doesn't even settle the Softman case. Given the powerful interests of the shrinkwrap software industry, it's likely to be appealed all the way to the Supreme Court.

But it does weaken the case for blanket, catch-all EULAs, and give users the opportunity to resell bundled shrinkwrap software. ®

Bootnote:Readers have pointed out that the excellent Linux Weekly News first ran this story. Credit where it's due - you can read LWN's coverage here.

External Link

The Ruling

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.