License FUD

The threat of Microsoft's shared-source licenses.

A few proprietary software vendors argue that there is something almost un-American about free software and the GPL. Microsoft has been one of the loudest voices in that chorus of fear. That company's web site describes it this way:

The GNU General Public License (GPL)...poses a significant threat to the IP base of companies seeking to build a business around GPL-covered software. Even businesses who may believe they are “mere users” of GPL software are threatened since they combine what they believe to be separate applications with GPL code. This licensing model has the effect of foreclosing a business' choice of what IP to share with the community and on what terms (www.microsoft.com/business/licensing/ssfaq.asp).

I've already argued elsewhere (see www.rosenlaw.com/html/GPL.PDF) that this supposed GPL threat is hogwash. But, there's a deeper irony to this: Microsoft's own shared-source license is an even greater threat to the software development community. That license is a Trojan horse license that can destroy your open-source and proprietary software unless you are very careful.

The simplest version of Microsoft's shared-source licenses is the one they use to distribute their Windows CE 3.0 source code. That license states, in its second paragraph, “You can use this software for any noncommercial purpose, including distributing derivatives.” The license then makes it clear that running your business operations “would not be considered noncommercial”.

Commercial users—and I consider most open-source software developers to be in that category—must look further in the license to determine the restrictions on use that apply to them. The third paragraph of the license conveys the bad news:

For commercial purposes, you can reference this software solely to assist in developing and testing your own software and hardware for the Windows CE platform. You may not distribute this software in source or object form for commercial purposes under any circumstances.

Note that Microsoft has not given you permission to copy their code or to incorporate it into your own software in a derivative work. Your use of their software for commercial purposes is limited to reference purposes only.

Obviously, you can agree not to make a copy of any portion of the Microsoft software or to use it to create derivative works. But what happens if later you, independently and without consciously remembering what you saw in Microsoft's code, create something substantially the same as their code? Can you still be liable for infringement?

That's where the Trojan horse comes into play. The courts have made it clear that, under copyright law, proof of substantial similarity between your work and another work, along with proof of access to the other work, may be enough to prove infringement, even when you don't realize that you're making a copy.

How easy is it to forget something important that you read? A copyright infringement case from the 1970s will illustrate the problem. In 1976, George Harrison's music company was sued for copyright infringement. A music publisher claimed that Harrison plagiarized his successful song, “My Sweet Lord”, from an earlier successful song, “He's So Fine”. In order to prove copyright infringement, the publisher of “He's So Fine” had to prove not only that there was “striking similarity” between the two songs, but that Harrison had copied the original song when composing his. Harrison admitted that he was familiar with the original song, but that while he was working on “My Sweet Lord” he wasn't conscious of the fact that he was using the “He's So Fine” melody. The court concluded:

In seeking musical materials to clothe his thoughts...there came to the surface of [Harrison's] mind a particular combination that pleased him....Did Harrison deliberately use the music of “He's So Fine”? I do not believe he did so deliberately. Nevertheless, it is clear that “My Sweet Lord” is the very same song as “He's So Fine” with different words, and Harrison had access to “He's So Fine”. This is, under the law, infringement of copyright, and is no less so even though subconsciously accomplished.

—Bright Tunes Music Corp. v. Harrisongs Music, Ltd., 420 F.Supp. 177 (S.D.N.Y. 1976).

Subsequently, Harrison's music company was found liable for some $1.6 million in damages.

Anyone familiar with the art of computer programming will recognize that, as with music, there are rather standard ways to express certain thoughts. Having once seen Microsoft's code, will an expert programmer be able to erase that example from his mind? Even if he or she consciously attempts to forget and does not intend to copy, will his or her subconscious memories be expressed in his later code with sufficient similarity that a court will find copyright infringement has occurred?

I encourage open-source programmers to avoid that risk. Don't look at source code licensed under Microsoft's shared-source licenses unless you're one of the rare breed of humans who can control his or her subconscious.

Legal advice must be provided in the course of an attorney-client relationship specifically with reference to all the facts of a particular situation and the law of your jurisdiction. Even though an attorney wrote this article, the information in this article must not be relied upon as a substitute for obtaining specific legal advice from a licensed attorney.

email: lrosen@rosenlaw.com

Lawrence Rosen is an attorney in private practice in Redwood City, California (www.rosenlaw.com). He is also executive director and general counsel for Open Source Initiative, which manages and promotes the Open Source Definition (www.opensource.org).

______________________

White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState