Why the GPL Sinks SCO’s Copyright Infringement Claims, Even if it Owned the Copyrights

Editor’s note: This is a very long, but informative article. It’s worth the read. If you are new to the Free Software community, you need to have some understanding of the license that governs it, or at least one of the main licenses.

I’ve started to wonder if Novell or IBM has explained to SCO’s Chapter 11 Trustee Edward Cahn how the GPL works. It cuts through all the other ways SCO is bound to lose, in my view. Then, I thought: why not just explain it myself? You never know. It might prove useful to put it all in one place. So, here goes, SCO and the GPL.

As you may recall, if you’ve been around since 2003, SCO’s position on the GPL has been that while it may have distributed its code under the GPL, it didn’t mean to do it, that it never knowingly distributed Unix or Unixware code under the GPL. I’d like to briefly explain why that excuse doesn’t matter to either Novell or IBM. IBM of course has always taken the position that it hasn’t infringed any copyrights, no matter who owns them. But let’s take SCO’s words at face value, and pretend that they are true. Then how does the GPL moot their claims?

So you can try to prove me wrong, if you are so inclined, before I begin, I’ll point you to Groklaw’s permanent page on the GPL, where you can find resources to a great deal more information on all versions of the GPL. I’ll be focusing here on GPLv2, the license that Linux code is distributed under.

What SCO Said:

Here’s how then-SCO executive Chris Sontag explained SCO’s position to CNET in June of 2003:

And LinuxTag said in a statement, “Until a few weeks ago, SCO itself distributed the Linux kernel…as a member of the UnitedLinux alliance. Thus, even if SCO owns parts of the Linux kernel, it has made them into Free Software by distributing them under the GPL.”

Not so, counters SCO’s Sontag.

“The GPL requires the intentional act of the legal copyright holder to affirmatively and knowingly donate the source code to the GPL,” Sontag said. “You can’t inadvertently GPL your code.”

Continue reading at Groklaw.

Related Posts

What is Containerbuddy? Containerbuddy is a shim written in Go to help make it easier to containerize existing applications. It can act as PID1 in the container and fork/exec...
Controlling screen cursors with thoughts Using a new brain-computer training approach, 14 volunteers learned in only six minutes how to move a screen cursor with their thoughts. Near-instant ...
Adobe Photoshop now available for Chromebooks, but… In partnership with Google, Adobe is now offering Photoshop, its flagship photo-editing software, on Chromebooks. But, and there is a but, that doe...
5 performance tips for Node.js applications Node.js is single-threaded and uses non-blocking I/O, allowing it to scale and support tens of thousands of concurrent operations. It shares these...
Video Fingerprinting Offers Search Solution The explosive growth of video on the internet calls for new ways of sorting and searching audiovisual content. A team of European researchers has deve...
Computer Program Recognizes Human Emotions from Conversation Analysis Researchers from the Universidad Politécnica de Madrid's Facultad de Informática have developed a computer program capable of human emotion recognitio...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*