Feeds

Fortinet settles GPL violation lawsuit

Latest in a long line of settlements

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

The UK subsidiary of security software firm Fortinet has settled an action brought against it because it was allegedly not complying with the terms of the General Public Licence (GPL), which underpins the distribution of most open source software.

Harald Welte, founder of the gpl-violations.org project, announced earlier this month that a German District Court had granted a preliminary injunction against Fortinet UK Ltd after the project sued, alleging that the security software firm had used GPL software in certain products and then used encryption technologies to hide the software.

The GPL is a licence commonly used for many free software projects, including the Linux operating system kernel. The GPL licenses software free of cost but requires any re-distributor to provide the full source code and a copy of the full licence text.

"This violation by Fortinet is especially egregious since the vendor not only violated the GPL, but actively tried to hide that violation," said Welte.

"We are not in any way opposed to the commercial use of Free and Open Source Software and there is no legal risk of using GPL licensed software in commercial products. But vendors have to comply with the licence terms, just like they would have to with any other software licence agreement," he added.

In terms of the settlement agreement, Fortinet UK Ltd will modify its End User Licensing Agreement (EULA), include the GPL licensing terms with all shipments, and make available the full corresponding source code of all GPL licensed software upon request.

The settlement agreement also provides that no Fortinet partners will be subject to legal action.

The settlement is the latest in a series of more than 30 out-of-court settlements that the project has managed to negotiate in the past 15 months.

Copyright © 2005, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Related stories

Fortinet fortifies anti-virus firewalls
Vendors complete tougher ICSA 4.0 firewall tests
Aruba to bring WLAN-level security to LANs

Secure remote control for conventional and virtual desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.