Enforcement of the GNU GPL in Germany and Europe

A. Rationale for enforcement of the GPLAt present, the enforcement of the GPL license conditions is driven by single developers and organizations supporting Free Software. Most famous is Mr. Harald Welte, former maintainer of the Netfilter/Iptables project, who is running the enforcement project gpl-violations.org. Some years ago, Mr. Welte became aware of the fact that many manufacturers use the Linux kernel in their products without complying with the GPL conditions, and give the necessary credit to the Free Software community. His letters to the companies remained mostly unanswered or negotiations were so protracted that by the time the source code was eventually published, the relevant product was no longer available for sale. Therefore, he decided to take legal action in a more formal way.

After the first enforcement cases became public, more and more interested parties informed Mr. Welte about other violations. He then decided to establish ‘www.gpl-violations.org’ to provide a platform for enforcement activities and public documentation of his and others’ efforts to bring commercial GPL users into GPL compliance.[1] Having access to modified source codes of technical devices is a strong motivation to participate in the enforcement of the GPL, and thus many people support gpl-violations.org.

In 2006, the FSF Europe launched a Freedom Task Force (FTF) to collect and share knowledge about Free Software law and safeguard the interests of Free Software projects. FTF cooperates with gpl-violations.org with regard to GPL compliance issues and facilitates  the European Legal Network (ELN), where lawyers and representatives of companies from the software industry maintain a lively exchange of ideas.[2] This strategic approach has been enhanced and refined, and has had impact on the general behaviour of IT industries with regard to GPL compliance.

GPL is popular not just among developers but also among companies because it helps secure a proper competition with regard to a particular software product and prevents unfair withholding of improvements of the software released in the Free Software world. Moreover, as the dual licensing model – i.e. offering a software product under the GPL and a proprietary license – is widely used, it can be expected that companies will also start to enforce their rights in the near future. Even companies that distribute GPL products without holding copyrights may soon begin to enforce the GPL by relying on unfair competition law (instead of copyright law) in order to obtain the complete corresponding source codes of improved software solutions from their competitors.[3]

B. Information about GPL violationsOne might think that the detection of GPL violations in proprietary products is difficult or almost impossible, when no source code is at hand or the software is even hidden in an embedded system. In reality, however, there are many different ways to get the necessary information to prove the use of GPL-licensed software.[4] To quote an easy example: On a recent flight, when the entertainment system in the seat in front of me booted, I was surprised to see the typical boot information of the Linux kernel, including a copyright notice of one of my clients.

But GPL violations are not restricted to the Linux kernel. Once, another client of mine was contacted by a customer of a proprietary product asking for support. Thus, my client learned that a header file written by him was made available on the vendor’s website, and that the latter shipped his proprietary product without any information about the fact that the software was licensed under the GPL. Continue reading.

Related Posts

KDE Gears Up to a Free Cloud Day 2 of Camp KDE kicked off with a bang when Frank Karlitschek announced the start of a significant new KDE project. The ownCloud initiative will com...
On Selling Exceptions to the GNU GPL When I co-signed the letter objecting to Oracle's planned purchase of MySQL 1 (along with the rest of Sun), some free software supporters were surpris...
Privacy Isn’t Dead – It’s Not Even Sleeping It’s become something of a predictable phenomenon: an article, op-ed, or blog post will surface with an incendiary quote indicating that privacy is de...
Internet Explorer’s dominant market share eroding Remember when Internet Explorer ruled the Web, to the tune of about 98% of the browser market share? Those were happy days for Internet Explorer. Unti...
Google Superbowl Ad Explains The Need for Search Privacy Google's ad during yesterday's Superbowl explained in less than a minute how the story of someone's life can be pieced together from their search quer...
A Privacy Agenda for the New Administration This is the first post in a three part series directed at restoring some of the civil liberties we've lost over the past eight years. Today's post is ...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*