Feeds

US judge decrees open source licenses valid

Free software lovers' train pulls into station

Secure remote control for conventional and virtual desktops

Openistas are celebrating a major court victory over a legal spat involving model railroad hobbyists that will have big implications for the Creative Commons license.

The US Court of Appeals for the Federal Circuit in Washington ruled that just because a software programmer freely gave his work away, it didn’t follow that it could not be protected.

According to details outlined in the ruling (pdf), Robert Jacobsen had written and then released code under an Artistic License (an open source or public license) that requires other people who use it to attribute the author, flag up the original source of the files and explain how the code has been modified.

Jacobsen, who manages open source software group Java Model Railroad Interface, accused commercial software developers for the model train industry – Matthew Katzer and Kamind Associates Inc – of a breach of copyright.

He claimed they ignored the terms of the Artistic License by copying certain materials from his website and incorporating the code into a software package that programs the chips that control model trains, without giving appropriate credit.

The appeals court agreed that Katzer and Kamind had violated those terms and, in turn, infringed the software’s copyright.

Jacobsen had originally sought an injuction to prevent Katzer and Kamind using the software, but the US District Court for the Northern District of California threw out his allegations. Yesterday, that decision was overturned by federal judge, Jeffery S. White in a move that free software advocates view has a landmark ruling.

Andy Updegrove, an attorney with Gesmer Updegrove LLP in Boston and regular commentator on software licensing issues, described it as a “big day in court for the FOSS Community”.

Larry Lessig, who is Professor of Law at Stanford university said it was a “very important victory”.

“In non-technical terms," he said. "The Court has held that free licenses such as the CC licenses set conditions (rather than covenants) on the use of copyrighted work. When you violate the condition, the license disappears, meaning you're simply a copyright infringer. This is the theory of the GPL [General Public License] and all CC licenses.

“Put precisely, whether or not they are also contracts, they are copyright licenses which expire if you fail to abide by the terms of the license.” ®

Next gen security for virtualised datacentres

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Sin COS to tan Windows? Chinese operating system to debut in autumn – report
Development alliance working on desktop, mobe software
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
(Not so) Instagram now: Time-shifting Hyperlapse iPhone tool unleashed
Photos app now able to shoot fast-moving videos
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.