Feeds

Fee fie Firefox: Mozilla's lawyers probe Dell over browser install charge

Thou shalt NOT charge for freeware, thunders Moz

Beginner's guide to SSL certificates

Mozilla has put its legal department to work on a preliminary investigation into claims that Dell is charging £16 to install freeware browser Firefox on new PCs.

Sources told us about Mozilla's plans after we received reports that Dell was asking customers to stump up £16.25 to have the free software pre-installed.

Mozilla's legal department has now officially confirmed that it is probing Dell. It is not yet known whether this will lead to Mozilla filing any sort of legal suit.

Denelle Dixon-Thayer, Mozilla's vice president of business and legal affairs, said: "There is no agreement between Dell and Mozilla which allows Dell or anyone else to charge for installing Firefox using that brand name. Our trademark policy makes clear that this is not permitted and we are investigating this specific report."

Mozilla also sent us the relevant part of of its Ts&Cs covering the issue, which demand that "unaltered binaries" of software with the "Mozilla mark(s)" must be given away for free. The following paragraph can be found at the end of the section on software distribution:

The Mozilla product must be without cost and its distribution (whether by download or other media) may not be subject to a fee, or tied to subscribing to or purchasing a service, or the collection of personal information.

If you want to sell the product, you may do so, but you must call that product by another name — one unrelated to Mozilla or any of the Mozilla Marks.

A Dell spokeswoman said the fee covered the time taken to install Firefox, rather than the product itself.

"Dell Configuration Services, including the application loading service, ensure customers have a complete, ready to use product when it arrives," she said. "In this particular situation, the customer would not be charged for the Mozilla Firefox software download; rather the fee would cover the time and labour involved for factory personnel to load a different image than is provided on the system’s standard configuration." ®

Beginner's guide to SSL certificates

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.