Feeds

US court ruling nixes software EULA sales restrictions

Go forth and resell your bundles

  • alert
  • submit to reddit

SANS - Survey on application security programs

In an intriguing ruling picked up by LinuxJournal's Don Marti, a US district court has given encouragement to software users who want to extricate themselves from restrictive software licenses.

The judge, in the case Adobe vs Softman heard in the Central District of California, has ruled that consumers can resell bundled software, no matter what the EULA, or End User License Agreement, stipulates. Specifically, the ruling decrees that software purchases be treated as sales transactions, rather than explicit license agreements. In other words, consumers should have the same rights they'd enjoy under existing copyright legislation when buying a CD or a book. They can't make copies, but they can resell what they own.

"The balance of rights in intellectual property law is already tilted heavily in favor of the intellectual property owner," ruled Judge Dean Pregerson, in a burst of enlightenment.

In the case SoftMan was reselling Adobe software it received in bundles or "collections". Adobe claimed this was a breach of its trademark. Judge Pregerson wasn't convinced, and decided that existing copyright law should apply:

"... the purchaser commonly obtains a single copy of the software, with documentation, for a single price, which the purchaser pays at the time of the transaction, and which constitutes the entire payment for the 'license.' The license runs for an indefinite term without provisions for renewal. In light of these indicia, many courts and commentators conclude that a "shrinkwrap license" transaction is a sale of goods rather than a license."

The decision has its limitations, being merely a vacation of an earlier judgement. It doesn't even settle the Softman case. Given the powerful interests of the shrinkwrap software industry, it's likely to be appealed all the way to the Supreme Court.

But it does weaken the case for blanket, catch-all EULAs, and give users the opportunity to resell bundled shrinkwrap software. ®

Bootnote:Readers have pointed out that the excellent Linux Weekly News first ran this story. Credit where it's due - you can read LWN's coverage here.

External Link

The Ruling

3 Big data security analytics techniques

More from The Register

next story
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.