Opensourcesoftware
Opensourcesoftware
sets out practical tips for companies How and why companies typically use OSS in their businesses
(see What is OSS?).
to consider to effectively govern its Common limitations and risks that arise when using OSS (see
How and Why Companies Use OSS).
use of open-source software, both
Steps companies should consider in developing an OSS policy
internally and when developing (see Developing an OSS Compliance Policy).
Copyright © 2011 Practical Law Publishing Limited and Practical Law Company, Inc. All Rights Reserved.
FMLA Employer
Open-source Software:
CoverageUseand
andEmployee
Compliance
Eligibility Checklist
HOW AND WHY COMPANIES USE OSS The recipient of the modified software cannot have
any further restrictions on the right to modify or
Companies originally used OSS as stand-alone software primarily distribute that software.
to support their internal operations. Today many companies:
There is no warranty and the OSS is provided “as is.”
Combine OSS with their proprietary internal management or
In no event will the party who modifies and distributes
operations software. the OSS be liable for damages.
Include OSS in their customer-facing proprietary software.
Integrate OSS into products, either as stand-alone software or
with proprietary software, to be sold to customers. These include:
For more information on how companies use OSS, see Practice No license fees. Businesses can avoid paying significant license
Note, Open-source Software: OSS: The Business Context (www. fees by using OSS instead of similar proprietary software. For
practicallaw.com/0-500-4366).
example, a business could use a Linux-based operating system
OSS provides several commercial advantages for businesses. instead of licensing the right to deploy a fee-based operating
Copyright © 2011 Practical Law Publishing Limited and Practical Law Company, Inc. All Rights Reserved. 2
system. From a cost-basis standpoint, OSS is especially valuable Practice Note, Open-source Software: The OSS Licenses (www.
for small businesses and start-ups looking to use effective practicallaw.com/0-500-4366).
software on a tight budget.
Reduced development time and expense. Software developers RISKS
are often under pressure to meet deadlines and expense
Companies that use OSS, whether intentionally or inadvertently,
budgets. For a developer, it may be more efficient to download
without an OSS use and compliance plan face certain legal and
and integrate existing OSS code instead of writing new code.
business risks, such as:
Use of reliable code. Instead of developing untested software,
Risk to intellectual property. Incorporating OSS into a
software developers can use OSS source code that has been
company’s software can affect the proprietary nature of
openly tested, used and improved by others.
its intellectual property. Depending on the terms of the
Ability to maintain and improve the code. To have workable license under which a company is using certain OSS, it may
software that a software developer can modify and maintain, the inadvertently cause intellectual property rights in its proprietary
developer must have access to the source code. However, most software, including any confidential algorithms and related
proprietary software is licensed solely in object code format, making trade secrets, to enter the public domain if it fails to integrate
it impossible for the licensee to actively maintain or improve the the OSS properly. This can affect the value of the software and,
software. If the software’s functionality declines and requires to an extent, the company itself.
maintenance, the licensee must go back to the software owner or
Risk to future revenue. Some companies develop software
a third party authorized by the licensor to perform maintenance. In
internally that they might want to commercialize or sell at a
contrast, an OSS user can modify the code on its own.
later date, either as a stand-alone product or as part of the
Access to third-party improvements. Some OSS licenses company’s acquisition. The integration of OSS into a company’s
require licensees to disclose any modifications or software could dilute the commercial value of the product
improvements they make to the OSS code to the licensing and compromise the company’s ability to fully exploit its
organization. This disclosure requirement allows other commercial potential.
licensees to access and implement improvements that they
Acquisition risk. Without performing adequate due diligence,
may be unable to develop themselves.
companies risk acquiring software, or a company whose assets
include proprietary software, that has a diluted value because
LIMITATIONS AND RISKS IN USING OSS of the inclusion of OSS.
There are several barriers to successfully integrating OSS into a Competitive risk. Depending on the terms of the relevant
company’s information technology (IT) systems. Although OSS OSS license, incorporating OSS into a company’s proprietary
licenses vary widely in scope, application and legal effect, most software and redistributing it to employees, suppliers,
include certain underlying obligations and restrictions. Along with contractors or customers could result in that software being
these limitations are various risks associated with OSS use that considered part of the public domain. This would allow the
can threaten a company’s valuable intellectual property rights. company’s competitors to access its code at no charge.
In addition, a growing number of copyright owners have recently
been pursuing the enforcement of OSS licenses through litigation. RISING LITIGATION
Historically, few cases have been brought against licensees for their
LIMITATIONS use of OSS. Recently, however, copyright owners have been more
OSS licenses can contain many obligations and restrictions on aggressively enforcing the terms of OSS licenses against alleged
how licensees may use, modify, integrate or distribute OSS. infringers, claiming that violations of an OSS license create liability for
An OSS license may provide, for example, that if the licensee copyright infringement.
distributes software containing OSS code to third parties, it must:
Do so under the same OSS license from which that code was Jacobsen v. Katzer & Kamind Associates, Inc.
initially licensed. In an opinion viewed as a major development in open source law, the US
Place no restrictions on the recipient’s right to modify or distribute Court of Appeals for the Federal Circuit ruled that failure to comply with
the OSS beyond what is provided in the applicable OSS license. the conditions of an OSS license may constitute copyright infringement.
In Jacobsen v. Katzer & Kamind Associates, Inc., the Federal Circuit
Make that product’s corresponding source code available
held that the terms of an OSS license governing users’ modification and
to the recipient.
distribution rights were limits to the scope of the license, and a failure
An OSS license may also include a requirement for the licensee to comply with those terms could form a viable copyright infringement
to contribute any modifications, improvements or other derivative claim. The court stated that compliance with open source requirements,
works the licensee develops back to the original OSS code base while different than traditional licensing fees in the commercial setting,
for others to use or develop. For more information on OSS licenses were entitled to no less legal recognition (Jacobsen v. Katzer & Kamind
and corresponding obligations and restrictions that may apply, see Assocs., Inc., 535 F.3d 1373 (Fed. Cir. 2008)).
3 Copyright © 2011 Practical Law Publishing Limited and Practical Law Company, Inc. All Rights Reserved.
Open-source Software: Use and Compliance
Software Freedom Conservancy Inc. v. Best Buy Co., Inc. et al. Evaluate current OSS procedures, if any. Counsel should
coordinate with personnel responsible for managing software
Another copyright infringement case that is considered significant
development, use and maintenance (typically the chief
for OSS licensors and the OSS community as a whole is the
information officer or equivalent) to identify and review any
ongoing matter of Software Freedom Conservancy Inc. v. Best Buy
current OSS risk management processes. Together, counsel
Co., Inc. et al. Software Freedom Conservancy (SFC) is alleging
and the relevant personnel should identify any gaps in these
that various electronics retailers and manufacturers sold and
processes, and note the corresponding business and legal risks
distributed electronic products, such as high-definition televisions,
that may result from these gaps. This step should be carried
digital video recorders, DVD players, video cameras and wireless
out in a collaborative manner to encourage interdepartmental
routers, embedded with firmware that contained a copy or a
agreement and minimize the risk of being considered intrusive.
derivative work of OSS known as BusyBox without complying with
Understand how software is or will be developed. With
the terms of the GNU General Public License, version 2 (GPLv2)
(Software Freedom Conservancy Inc. v. Best Buy Co., Inc. et the exception of companies in the software business, most
al., No. 09-10155 (S.D.N.Y. filed Dec. 14, 2009)). Although still software development work is outsourced to third-party
developers. However, third-party developers sometimes
pending, this case highlights the importance of complying with the
attempt to accelerate the development process and save time
licensing terms of OSS. For more information on the enforcement
by using existing OSS without the customer ever knowing.
of GPLv2, see Practice Note, Open-source Software: Current OSS
Additionally, many third-party developers subcontract work to
Legal Issues (www.practicallaw.com/0-500-4366).
software engineers residing overseas. As a result, counsel may
need to navigate through several layers to find out where the
Free Software Foundation, Inc. v. Cisco Systems, Inc.
development is ultimately taking place to effectively identify
OSS licensors have also recently taken action to compel and address OSS use by third-party developers.
companies that use OSS to comply with the obligations set out in
Set up an OSS working group. Companies should form
the applicable OSS license. In a case involving the Free Software a working group of key stakeholders (including legal, IT,
Foundation, Inc. (FSF) and Cisco Systems, Inc., FSF brought an operations and management) to evaluate relevant business
action against Cisco to force it to publish source code that Cisco goals, and develop an OSS strategy and policy. The roles,
acquired with its acquisition of The Linksys Group Inc. Linksys responsibilities and leadership of group members should be
had incorporated another company’s software containing OSS clearly communicated.
into its own proprietary software, and the license to which the
Appoint an OSS compliance officer. An individual should be
OSS was subject required OSS users to provide public access to
designated to act as the chief compliance officer to:
the complete and corresponding source code of its underlying
software (Free Software Found., Inc. v. Cisco Sys., Inc., No. 08- drive development and implementation of the OSS policy;
10764 (S.D.N.Y. filed Dec. 11, 2008)). monitor OSS use and ensure that employees and third-party
contractors are complying with the OSS policy;
For more information on these cases, see Box, Rising Litigation.
train
personnel on the OSS policy and the appropriate use of
OSS; and
DEVELOPING AN OSS COMPLIANCE POLICY regularlyadvise the OSS working group on issues or risks
OSS policies can be structured in many different ways depending that may arise.
on how a company intends to use OSS in consideration of its
Because the risks of using OSS are so significant, companies
overall business objectives. Some types of policies are designed
typically appoint a senior manager who is already employed in the
solely to manage a company’s use of OSS in its internal business,
company’s IT or compliance department.
while others are structured to also accommodate the incorporation
of OSS in customer-facing products. A company should carefully Develop an OSS use strategy statement. A company
consider how best to design the OSS policy to meet its risk can provide operational direction for its business units on
management objectives without compromising operational developing and adopting an OSS policy by creating a short,
flexibility or overly burdening personnel. concise strategy statement that sets out the company’s high-
level business objectives for using or acquiring OSS. By clearly
Once a company has committed to implementing an OSS use and
communicating its objectives, a company’s business units
compliance program, it should take the following steps to develop
can more easily coordinate on implementing an OSS policy
the governing OSS policy: that helps, rather than obstructs, the overall operation of the
Understand the company’s business objectives. Counsel business. When drafting a strategy statement, a company
should first communicate with the key business stakeholders should ensure that its approach to using, or not using,
to develop a common understanding of how the company uses OSS should be tailored to complement its overall product
or intends to use OSS, and determine how the intended use of development, revenue generation and cost containment plans.
OSS best aligns with company’s overall business, intellectual Develop a plan for creating and implementing the OSS
property and risk management goals. policy. Once the company has finalized its OSS strategy,
Copyright © 2011 Practical Law Publishing Limited and Practical Law Company, Inc. All Rights Reserved. 4
RISING LITIGATION
JACOBSEN V. KATZER & KAMIND ASSOCIATES, INC. Following these rulings, the parties settled the matter.
The defendant agreed to a permanent injunction that
In Jacobsen, the court considered a copyright holder’s
bars it from improperly using the plaintiff’s software and
ability to dedicate certain work to free public use and
further agreed to pay a judgment of $100,000 in the
yet enforce an open source copyright license to control
plaintiff’s favor (Jacobsen v. Katzer, No. 06-01905 (N.D.
the future distribution and modification of that work (a
Cal. Feb. 18, 2010)).
nonexclusive OSS license).
5 Copyright © 2011 Practical Law Publishing Limited and Practical Law Company, Inc. All Rights Reserved.
Open-source Software: Use and Compliance
be concise and clearly worded to avoid ambiguity and Integration approvals. Sets out clear guidelines on when
ensure that employees and third-party contractors are aware OSS can be integrated with proprietary software and who
of their respective responsibilities; may authorize it. This reduces the risk of OSS infecting the
company’s proprietary software.
identify applicable roles and responsibilities for employees
and third-party contractors who may be involved in the Integration requirements. Describes how OSS can be integrated
development or deployment of software that contains OSS; with the company’s proprietary software. Typically, companies
require their developers to ensure that the OSS is sufficiently
set out the criteria and decision points for OSS use;
segregated from their proprietary software, often by creating
identify information to be collected and tracked; and interfaces between an OSS module and a company’s proprietary
include the name and contact information of the OSS software that allow each to operate as independent modules.
compliance officer and any other key employees responsible OSS license information. Specifies that the license agreement
for implementing the policy and enforcing its guidelines. associated with the OSS must be printed out and retained. The OSS
Copyright © 2011 Practical Law Publishing Limited and Practical Law Company, Inc. All Rights Reserved. 6
compliance officer should maintain copies of all these licenses and OSS license due diligence. Requires a check to determine if
coordinate with the OSS working group to ensure that the company there is a better alternative to OSS software that is subject to an
complies with the terms of each license. The officer should also overly restrictive license. Before turning away from using the
have copies of most or all of the other existing OSS licenses that are OSS, a company should first check whether different software
publicly available to reference against the applicable license. that is similarly functional can be obtained under a different,
Development controls and checkpoints. Sets out the relevant less restrictive license.
controls and checkpoints to be implemented during the “build” Monitoring OSS use and enforcing the OSS policy. Provides
phase of a software development project, including: guidelines for tracking the use of OSS and ensuring that
when OSS is first added to a software build; a company’s employees and third-party contractors are
when internally developed software is created or modified; complying with the OSS policy. For example, a company can
implement a reporting system (whether written or online) to
at each transitional phase in the software development
track when employees or contractors integrate OSS during
process; and
each phase of project development. This type of system would
when considering modifications on an OSS project. allow companies to monitor OSS use from the very beginning
Component review periods. Identifies at what phase or phases of of the project and inform senior management of the company’s
development the component review process should take place. use of OSS early in the process.
Verification phase. Creates a defined verification phase when
questions can be posed about all components of a software
product before its final release. Practical Law Company provides
Documenting modifications. Requires any modifications made practical legal know-how for law firms,
to the OSS to be documented. This can be done by flagging law departments and law schools.
all of the original OSS code with a code identifier and requiring
Our online corporate, securities and
software developers to include code identifiers in any further
modifications to the code. finance resources help lawyers practice
Headers. Provides that headers in the OSS code should not be efficiently, get up to speed quickly
altered and developers should retain any comments previously and spend more time on the work that
included in the code headers. matters most. This Practice Note is
Re-naming. Instructs that, to the extent possible, developers just one example of the many resources
should not re-name modules in the OSS code. Maintaining the
original module names will make it easier later on to trace the
Practical Law Company offers. Discover
original OSS source code. for yourself what the world’s leading
Interface documentation. Requires developers to carefully law firms and law departments use to
document all software interfaces that are created to allow a enhance their practices.
company’s proprietary code to interact with OSS.
Scanning. Determines when to scan for OSS code. Some
companies scan for all OSS code during development. This can
be time consuming, but it is a good way to preserve a snapshot Contact Us
of what OSS is being used at each phase of the project and
Practical Law Company
subsequently track its integration.
747 Third Avenue, 36th Floor
New York, NY 10017
ADDITIONAL OSS RISK PREVENTION PROVISIONS 646.562.3405
To minimize the risks associated with OSS use, an OSS policy [email protected]
generally requires careful due diligence before obtaining or www.practicallaw.com
incorporating the OSS. This includes:
OSS audits. Calls for an audit of the software code to determine
the existence of any OSS whenever a company is considering
acquiring or licensing business-critical software. Companies often
turn to third-party specialists to conduct this type of due diligence.
Intellectual property due diligence. Requires an evaluation of
the potential risk to any intellectual property strategies before
the integration of OSS with proprietary software is allowed. Even
small changes to OSS code can affect a company’s ability to
file for patents or may affect an existing patent license.
2-11 7 Copyright © 2011 Practical Law Publishing Limited and Practical Law Company, Inc. All Rights Reserved.
Use of PLC websites and services is subject to the Terms of Use (http://us.practicallaw.com/2-383-6690)
and Privacy Policy (http://us.practicallaw.com/8-383-6692).