Language Selection

English French German Italian Portuguese Spanish

Enforcement of the GNU GPL in Germany and Europe

Filed under
OSS

Abstract

GPL enforcement is successful in Europe. In several court decisions and out of court settlements the license conditions of the GPL have been successfully enforced. In particular, embedded systems are the main focus of such compliance activities. The article describes the practice of enforcement activities and the legal prerequisites under the application of German law.

B. Information about GPL violations

One might think that the detection of GPL violations in proprietary products is difficult or almost impossible, when no source code is at hand or the software is even hidden in an embedded system. In reality, however, there are many different ways to get the necessary information to prove the use of GPL-licensed software.[4] To quote an easy example: On a recent flight, when the entertainment system in the seat in front of me booted, I was surprised to see the typical boot information of the Linux kernel, including a copyright notice of one of my clients.

But GPL violations are not restricted to the Linux kernel. Once, another client of mine was contacted by a customer of a proprietary product asking for support. Thus, my client learned that a header file written by him was made available on the vendor’s website, and that the latter shipped his proprietary product without any information about the fact that the software was licensed under the GPL.

Many violations concern embedded systems.




More in Tux Machines

Why the Open Source Stars Must Align

Open source projects like OpenStack, Docker, OPNFV and OpenDaylight are more supported and better funded than ever before. They mark a broader trend of large, active and well-resourced open source projects that are among the leaders in Big Data, cloud computing, operating systems and development practices. Open source has come a long way in 30 years – and its success marks a new era for the overall OSS community. But success does not come without potential pitfalls. One of the greatest obstacles to project success isn’t the proprietary competition – it’s the lack of communication between large open source projects like OpenStack and Docker. Read more

Myth Busting the Open-Source Cloud Part 1

On the contrary, open-source cloud computing products are designed from the outset with security in mind. For example, there are features such as identity management to monitor who has access to content, and data encryption to safeguard information while it’s at rest or in transit. Furthermore, open-source cloud software is peer-reviewed by community participants, leading to continuous improvements in the quality of security features and mechanisms. This community also monitors and rapidly discloses vulnerabilities and issues, and provides security updates to address them. Read more

What does an adult look like in an open source community?

You're no longer "just an adult." You're now trusted and looked to for opinions on how the community should grow. You're a community elder. You embody the history. You keep the history. You work together with other adults and elders to guide and make the community stronger. And to a certain extent, the community once again looks after you, just as it did in the first phase. Read more