SlideShare uma empresa Scribd logo
1 de 23
SYMBIOSIS LAW SCHOOL, NOIDA

USE OF LEGAL DATABASE INTERIM
PROJECT
Submitted By:

Antara Rastogi, Rhea Matthai
BBA LLB Batch:2013-18
Div: A
What it is ?

Why it is?

What it is not?

Where to go with it?
WHAT IS MEANT BY OPEN SOURCE?
Open source refers to a computer
program in which the source code
is available to the general public
for use
and/or modification from its original design.
The license shall not restrict any party from
selling or giving away the software as a
component of an aggregate software
distribution
containing programs from
several different sources. The license shall
not require a royalty or other fee for such
sale.

Based on
accessibility
and
responsiveness

Most products
are neither
open nor
closed.

FEATURES

In general, open source projects,
products, or initiatives are those that
embrace
and
celebrate
open
exchange, collaborative participation, rapid
prototyping, transparency, and community
development.

Degree of
openness
depends on
judgment and
control

Derived work
of many
developers
POPULAR OPEN SOURCE SOFTWARES
WHAT IS AN OPEN SOURCE
SOFTWARE?


Open-source software (OSS) is a 
computer software with its source
code made available and licensed with
a license in which the copyright holder
provides the rights to study, change 
and distribute the software to anyone 
and for any purpose. Open-source
software is very often developed in a 
public, collaborative manner.






FEATURES
Free distribution
Must have “source code”
Derived work
Intergrityof the Author‟s
Source Code
No Discrimination Against
Person or Groups
No Discrimination of Fields
Endeavour
ADVANTAGES OF OSS










Free Distribution:
The license does not restrict the party from selling or
giving away the software. The license does not require
a royalty or other fee for such sale.
Lesser hardware costs:
The hardware power consumption is lesser for OSS
compared to other servers like windows. Hence a
cheaper and a older hardware could be used to get the
desired results.
No vendor lock in:
open source software give its users more freedom and
we can affectively address some of the disadvantages
like lack of portability and expensive license fee vendor
lock-in.
Integrated management
OSS use high end technology like common information
model and web based enterprise management this
would result in efficient administration.
Abundant support:
The support for OSS is freely available and can be
accesed though online communities.
DISADVANTAGES






Not totally free;
Though the software is free, we will incur
maintenance and installation charges in
addition to profession advise and support.
Not easy to install:
Not all open source soft wares is easy to
install and setup although its becoming
more useful all the time.
Not easy to use for end users:
Many people who activate the open source
community are developers not end users
of the software so it may not be helpful to
the advantage person looking for basic
help.
OPEN SOURCE SOFT WARE DEVELOPMENT
MODEL
OPEN SOURCE LICENSING


A license demarcates the rights and obligations that a licensor grants to a licensee. Open
source licenses grant licensees the right to copy, modify and redistribute source code or
content. These licenses may also impose obligations.

TYPES OF LICENSES AVAILABLE


CLOSED SOURCE: When source code is not open but kept a secret.

eg. Proprietary Software like Adobe Acrobat
Reader, MacAfee, Apple Software


OPEN SOURCE: a type of license for computer software and other
modified

products that allows the source code, blueprint or design to be used,
and/or shared under defined terms and conditions
eg. Mozilla, Open Office.org, Wikimedia
COPYLEFT
Copyrights are used to protect computer
software but everyone is not using copyrights to
have rights in software. Some are using
copyrights so that no one else may have any
rights in that software; there is a new word for
it: they „copyleft‟ it. Before a software may be
copylefted, its source code must be disclosed. A
disclosed source software can be copylefted or
non-copylefted.
"Copyleft licenses" require licensee to license
specific developments (if they are not restricted
to internal use) to anyone under the original
license. This ensures that everyone who profits
from open-source software will offer their
developments to the developer community.









CYBER LAWS
Inventions, discoveries and technologies widen scientific horizons
but also pose new challenges for the legal world. Information
Technology—brought about by Computers, Internet, and
Cyberspace—has also posed new problems in jurisprudence. These
problems have arisen in all areas of law. The law (statutory or
otherwise) providing answers to these problems or dealing with
Information Technology are sometimes loosely referred to as
'Computer Laws' or 'Information Technology Laws' or simply 'Cyber
Laws'. Intellectual property rights (IPR) are important aspect of
Cyber laws.

INTELLECTUAL PROPERTY RIGHTS
'What is worth copying is prima facie worth protecting' is the
genesis of intellectual property rights. These rights refer to the
property that is a creation of the mind: inventions, literary and
artistic works, symbols, names, images, and designs used in
commerce.
Copyright
Industrial property . 15
SOURCES OF LEGITIMACY OF OSS






Licensing and each individual license may consist of a
valid, specialized application of contractual norms, either in a
stand-alone framework or representing the enforceable
allocation and re-distribution of property law entitlements in
computer software.

Licensing as a system of information governance may be a
custom or norm that has been effectively adopted as law and
that should justify enforcement of any particular license

licensing as private governance may operate effectively as a
system of private ordering of social arrangements.
THE OPEN SOURCE LICENSE AS A
SPECIALIZED SOFTWARE LICENSE




The open source model is ultimately a specialized application of the general
purpose conventional software license.
First, both “open source” and “closed source” licenses derive their legal
legitimacy from the copyright owners‟ claims to own and control all aspects
of computer program codes that are used by individual end users or
developers. Second, both forms of license assert comprehensive
statements of the scope of the users‟ rights and obligations with respect
both to the code and to the copyright in the code and limit the users‟ rights
only to those granted in the license itself, rather than to any rights supplied
by the Copyright Act or other law. A software license, whether open or
closed source, is a soup-to-nuts statement of the scope of legitimate
behavior by a user or consumer of that software with respect to both the
artifact itself, the information contained in that artifact, and the
copyright, if any, that applies to that information
DIGITAL MILLENIUM COPYRIGHT ACT
(DMCA)


The Digital Millenium Copyright Act provides civil remedies and
the possibility of criminal penalties for two related acts. First, the
act of “overcoming” a “technological measure” that “effectively
controls access” to a copyrighted work is prohibited under
Sec1201(a)(1)(A).21 of „circumvent a technological measure‟
means to unscramble a scrambled work, to decrypt an encrypted
work, or otherwise to avoid, bypass, remove, deactivate, or impair
a technological measure, without the authority of the copyright
owner.” 22 “A technological measure „effectively controls access to
a work‟ if the measure, in the ordinary course of its
operation, requires the application of information, or a process or a
treatment, with the authority of the copyright owner, to gain
access to the work.”
FREE SOFTWARE, GNU AND GPL
Richard Stallman of MIT propounded with the help of lawyers, drafted
the General public licence (GPL). It contains a condition that copylefts
software. Most of the software under the GNU Project are under GPL.
Software, under a GPL licence, is also known as GPLed software.
GPLed software can be integrated with similar GPLed software but not
with any proprietary programmes. However an LGPL (earlier known as
Library and now Lesser General Public License) can be integrated with
almost any kind of software including proprietary software. The GPL
does not require you to release modified version. You are free to make
modifications and use them privately, without ever releasing them.
This applies to organizations (including companies), too; an
organization can make a modified version and use it internally without
ever releasing it outside the organization. But if you release the
modified version to the public in some way,
then the GPL requires you to make the modified source code available
to the programme's users. Thus, the GPL gives permission to release
the modified programme in certain ways and not in other ways; but
the decision, whether to
release it or not, is up to you.
LEGITIMACY OF OPEN SOURCE SOFTWARE


Open‐source software development is a production model that exploits the
distributed intelligence of participants in Internet communities. This model
is efficient because of two related reasons: it avoids the inefficiencies of a
strong intellectual property regime and it implements concurrently design
and testing of software modules. The hazard of open source is that projects
can ‘fork’ into competing versions. However, open‐source communities
consist of governance structures that constitutionally minimize this danger.
Because open source works in a distributed environment, it presents an
opportunity for developing countries to participate in frontier innovation.
FUTURE


OF

OSS

Linus Torwald wrote in a autobiographical book ‘Just for Fun: the Story of an Accidental
Revolutionary’.
‘The GPL and open source model allows for the creation of the best technology. … It also
prevents the hoarding of technology and ensures that anyone with interest won’t be excluded
from its development.’
So open source would rather use the legal weapon of copyright as an invitation to join in the
fun, rather than as a weapon against others. It’s still the same old mantra: Make Love, Not
War, except on a slightly more abstract level.

So many people still believe that the only good software available is that which is found on a
shelf in a store. Everything you do in one way, shape, or form is being influenced by open
mechanisms. One day soon, as far as software is concerned, it will be open.
CONCLUSION






Open source software offers various advantages like the ability to
reduce costs and development time, or to avoid being dependent on
a single vendor. It is therefore to be expected that more and more
companies and institutions will start using open source software.
There is however some risks associated with doing so.
It's important to mention that an immediate switch from proprietary
software development to Open Source development would not be a
wise decision. The changes in concept are massive, and
prematurely adopting this model would likely impact negatively on
the economy in the short term. Rather, gradual adoption to Open
Source development is recommended. It is therefore recommended
to carefully study the license agreement and to make an
assessment of the risks associated with these conditions.
One should always check whether the own application is clearly
separated from software under the GPL. And of course compliance
with the license conditions need to be checked. With a careful
application of the license conditions, it is possible to benefit most
from using open source software while minimizing the risk.
REFERENCES


http://opensource.org/



http://www.w3.org/Status.html



http://eu.conecta.it/paper/Advantages_open_source_soft.html



http://www.iusmentis.com/computerprograms/opensourcesoftware/op
portunity-threat/

Citations


Madison, M. J. (2005). The legitimacy of open source and other
software licenses. University of Pittsburgh School of Law Working Paper
Series, 15.



Von Hippel, E., & Von Krogh, G. (2003). Open source software and the
“private-collective” innovation model: Issues for organization
science. Organization science, 14(2), 209-223.
THANK YOU

Mais conteúdo relacionado

Mais procurados

Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companiesJohan Örneblad
 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)Shivani Rai
 
Open source movement and much more
Open source movement and much moreOpen source movement and much more
Open source movement and much moreMichael Kalika
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensingtravellingpolander
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminarSmit Patil
 
10 Reasons To Use Open Source Software-Defined Networking
10 Reasons To Use Open Source Software-Defined Networking10 Reasons To Use Open Source Software-Defined Networking
10 Reasons To Use Open Source Software-Defined NetworkingVala Afshar
 
SOFIA - Semantic Technologies and Techniques for Interoperable Information in...
SOFIA - Semantic Technologies and Techniques for Interoperable Information in...SOFIA - Semantic Technologies and Techniques for Interoperable Information in...
SOFIA - Semantic Technologies and Techniques for Interoperable Information in...Sofia Eu
 
SMARCOS Newsletter 1st Issue
SMARCOS Newsletter 1st IssueSMARCOS Newsletter 1st Issue
SMARCOS Newsletter 1st IssueSmarcos Eu
 
Going Open: How to Make a Project Open Source
Going Open: How to Make a Project Open SourceGoing Open: How to Make a Project Open Source
Going Open: How to Make a Project Open SourceBlack Duck by Synopsys
 

Mais procurados (10)

Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companies
 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)
 
Open source movement and much more
Open source movement and much moreOpen source movement and much more
Open source movement and much more
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Foss final seminar
Foss final seminarFoss final seminar
Foss final seminar
 
10 Reasons To Use Open Source Software-Defined Networking
10 Reasons To Use Open Source Software-Defined Networking10 Reasons To Use Open Source Software-Defined Networking
10 Reasons To Use Open Source Software-Defined Networking
 
presentation
presentationpresentation
presentation
 
SOFIA - Semantic Technologies and Techniques for Interoperable Information in...
SOFIA - Semantic Technologies and Techniques for Interoperable Information in...SOFIA - Semantic Technologies and Techniques for Interoperable Information in...
SOFIA - Semantic Technologies and Techniques for Interoperable Information in...
 
SMARCOS Newsletter 1st Issue
SMARCOS Newsletter 1st IssueSMARCOS Newsletter 1st Issue
SMARCOS Newsletter 1st Issue
 
Going Open: How to Make a Project Open Source
Going Open: How to Make a Project Open SourceGoing Open: How to Make a Project Open Source
Going Open: How to Make a Project Open Source
 

Destaque

How to Anticipate and Mitigate Emerging Competitors from Adjacent Markets and...
How to Anticipate and Mitigate Emerging Competitors from Adjacent Markets and...How to Anticipate and Mitigate Emerging Competitors from Adjacent Markets and...
How to Anticipate and Mitigate Emerging Competitors from Adjacent Markets and...IntelCollab.com
 
Business Plan: Risks & Challenges
Business Plan: Risks & ChallengesBusiness Plan: Risks & Challenges
Business Plan: Risks & ChallengesKofi Kafui Kornu
 
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE Kak Yong
 
Introduction to political science1
Introduction to political science1Introduction to political science1
Introduction to political science1Abir Chaaban
 
Usability Engineering
Usability EngineeringUsability Engineering
Usability EngineeringEasypeasy
 
Elements of Marketing
Elements of MarketingElements of Marketing
Elements of Marketingjohn3092
 
Factors influencing creativity
Factors influencing creativityFactors influencing creativity
Factors influencing creativityPrince Kumar
 
Nine elements of a marketing plan
Nine elements of a marketing planNine elements of a marketing plan
Nine elements of a marketing planbizplancorner
 
6 Principles of Influence - Robert Cialdini
6 Principles of Influence - Robert Cialdini6 Principles of Influence - Robert Cialdini
6 Principles of Influence - Robert CialdiniCanny Digital
 
C2 power, legitimacy, authority
C2 power, legitimacy, authorityC2 power, legitimacy, authority
C2 power, legitimacy, authorityfrank zane
 
Chapter 4 writing a business plan(entrepreneurship)
Chapter 4 writing a business plan(entrepreneurship)Chapter 4 writing a business plan(entrepreneurship)
Chapter 4 writing a business plan(entrepreneurship)Afzaal Ali
 
Leadership Sources of Power
Leadership Sources of PowerLeadership Sources of Power
Leadership Sources of PowerHolly Justice
 
Market Targeting
Market TargetingMarket Targeting
Market TargetingAbhijith R
 
Drivers, globalization of market, production,
Drivers, globalization of market, production,Drivers, globalization of market, production,
Drivers, globalization of market, production,Anmol Nekpuri
 
Market segmentation presentation
Market segmentation presentationMarket segmentation presentation
Market segmentation presentationAmol Salve
 

Destaque (20)

How to Anticipate and Mitigate Emerging Competitors from Adjacent Markets and...
How to Anticipate and Mitigate Emerging Competitors from Adjacent Markets and...How to Anticipate and Mitigate Emerging Competitors from Adjacent Markets and...
How to Anticipate and Mitigate Emerging Competitors from Adjacent Markets and...
 
Business models overview
Business models overviewBusiness models overview
Business models overview
 
Chap13
Chap13Chap13
Chap13
 
Usability Presentation
Usability PresentationUsability Presentation
Usability Presentation
 
Business Plan: Risks & Challenges
Business Plan: Risks & ChallengesBusiness Plan: Risks & Challenges
Business Plan: Risks & Challenges
 
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE
 
Introduction to political science1
Introduction to political science1Introduction to political science1
Introduction to political science1
 
Usability Engineering
Usability EngineeringUsability Engineering
Usability Engineering
 
Power
PowerPower
Power
 
Elements of Marketing
Elements of MarketingElements of Marketing
Elements of Marketing
 
Factors influencing creativity
Factors influencing creativityFactors influencing creativity
Factors influencing creativity
 
Nine elements of a marketing plan
Nine elements of a marketing planNine elements of a marketing plan
Nine elements of a marketing plan
 
6 Principles of Influence - Robert Cialdini
6 Principles of Influence - Robert Cialdini6 Principles of Influence - Robert Cialdini
6 Principles of Influence - Robert Cialdini
 
C2 power, legitimacy, authority
C2 power, legitimacy, authorityC2 power, legitimacy, authority
C2 power, legitimacy, authority
 
Chapter 4 writing a business plan(entrepreneurship)
Chapter 4 writing a business plan(entrepreneurship)Chapter 4 writing a business plan(entrepreneurship)
Chapter 4 writing a business plan(entrepreneurship)
 
Facility location
Facility locationFacility location
Facility location
 
Leadership Sources of Power
Leadership Sources of PowerLeadership Sources of Power
Leadership Sources of Power
 
Market Targeting
Market TargetingMarket Targeting
Market Targeting
 
Drivers, globalization of market, production,
Drivers, globalization of market, production,Drivers, globalization of market, production,
Drivers, globalization of market, production,
 
Market segmentation presentation
Market segmentation presentationMarket segmentation presentation
Market segmentation presentation
 

Semelhante a Legitimacy of Open Source Softwares

Open source technologies
Open source technologiesOpen source technologies
Open source technologiesankita9765
 
Open source technologies
Open source technologiesOpen source technologies
Open source technologiesankita9765
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary softwareLavan1997
 
Understanding and implementation of open source ecosystems final
Understanding and implementation of open source ecosystems finalUnderstanding and implementation of open source ecosystems final
Understanding and implementation of open source ecosystems finalRachit Technology Pvt Ltd
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future AheadSanjanaa Chindalia
 
Copyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpmCopyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpmAdvocate
 
OPS Ecosystem and Engineering.pptx
OPS Ecosystem and Engineering.pptxOPS Ecosystem and Engineering.pptx
OPS Ecosystem and Engineering.pptxvishnupriyapm4
 
open source and copyright
open source and copyrightopen source and copyright
open source and copyrightguest29e2eb
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsBinary Semantics
 
Open Source Presentation To Portal Partners2
Open Source Presentation To Portal Partners2Open Source Presentation To Portal Partners2
Open Source Presentation To Portal Partners2Viet NguyenHoang
 
Open source technology
Open source technologyOpen source technology
Open source technologyRohit Kumar
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source LicensingMark Radcliffe
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GISJoanne Cook
 
Introduction to Open Source License and Business Model
Introduction to Open Source License and Business ModelIntroduction to Open Source License and Business Model
Introduction to Open Source License and Business ModelMohd Izhar Firdaus Ismail
 

Semelhante a Legitimacy of Open Source Softwares (20)

Open source technologies
Open source technologiesOpen source technologies
Open source technologies
 
Open source technologies
Open source technologiesOpen source technologies
Open source technologies
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary software
 
Understanding and implementation of open source ecosystems final
Understanding and implementation of open source ecosystems finalUnderstanding and implementation of open source ecosystems final
Understanding and implementation of open source ecosystems final
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future Ahead
 
1 Open Source Business
1 Open Source Business1 Open Source Business
1 Open Source Business
 
Copyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpmCopyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpm
 
OPS Ecosystem and Engineering.pptx
OPS Ecosystem and Engineering.pptxOPS Ecosystem and Engineering.pptx
OPS Ecosystem and Engineering.pptx
 
open source and copyright
open source and copyrightopen source and copyright
open source and copyright
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary Semantics
 
Open Source Presentation To Portal Partners2
Open Source Presentation To Portal Partners2Open Source Presentation To Portal Partners2
Open Source Presentation To Portal Partners2
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
 
Open Source VP.pptx
Open Source VP.pptxOpen Source VP.pptx
Open Source VP.pptx
 
Introduction to Open Source License and Business Model
Introduction to Open Source License and Business ModelIntroduction to Open Source License and Business Model
Introduction to Open Source License and Business Model
 
Mis full
Mis fullMis full
Mis full
 
Discuss open sourcelicensing
Discuss open sourcelicensingDiscuss open sourcelicensing
Discuss open sourcelicensing
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Legitimacy of Open Source Softwares

  • 1. SYMBIOSIS LAW SCHOOL, NOIDA USE OF LEGAL DATABASE INTERIM PROJECT Submitted By: Antara Rastogi, Rhea Matthai BBA LLB Batch:2013-18 Div: A
  • 2. What it is ? Why it is? What it is not? Where to go with it?
  • 3. WHAT IS MEANT BY OPEN SOURCE? Open source refers to a computer program in which the source code is available to the general public for use and/or modification from its original design. The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale. Based on accessibility and responsiveness Most products are neither open nor closed. FEATURES In general, open source projects, products, or initiatives are those that embrace and celebrate open exchange, collaborative participation, rapid prototyping, transparency, and community development. Degree of openness depends on judgment and control Derived work of many developers
  • 5. WHAT IS AN OPEN SOURCE SOFTWARE?  Open-source software (OSS) is a  computer software with its source code made available and licensed with a license in which the copyright holder provides the rights to study, change  and distribute the software to anyone  and for any purpose. Open-source software is very often developed in a  public, collaborative manner.    FEATURES Free distribution Must have “source code” Derived work Intergrityof the Author‟s Source Code No Discrimination Against Person or Groups No Discrimination of Fields Endeavour
  • 6. ADVANTAGES OF OSS      Free Distribution: The license does not restrict the party from selling or giving away the software. The license does not require a royalty or other fee for such sale. Lesser hardware costs: The hardware power consumption is lesser for OSS compared to other servers like windows. Hence a cheaper and a older hardware could be used to get the desired results. No vendor lock in: open source software give its users more freedom and we can affectively address some of the disadvantages like lack of portability and expensive license fee vendor lock-in. Integrated management OSS use high end technology like common information model and web based enterprise management this would result in efficient administration. Abundant support: The support for OSS is freely available and can be accesed though online communities.
  • 7. DISADVANTAGES    Not totally free; Though the software is free, we will incur maintenance and installation charges in addition to profession advise and support. Not easy to install: Not all open source soft wares is easy to install and setup although its becoming more useful all the time. Not easy to use for end users: Many people who activate the open source community are developers not end users of the software so it may not be helpful to the advantage person looking for basic help.
  • 8. OPEN SOURCE SOFT WARE DEVELOPMENT MODEL
  • 9. OPEN SOURCE LICENSING  A license demarcates the rights and obligations that a licensor grants to a licensee. Open source licenses grant licensees the right to copy, modify and redistribute source code or content. These licenses may also impose obligations. TYPES OF LICENSES AVAILABLE  CLOSED SOURCE: When source code is not open but kept a secret. eg. Proprietary Software like Adobe Acrobat Reader, MacAfee, Apple Software  OPEN SOURCE: a type of license for computer software and other modified products that allows the source code, blueprint or design to be used, and/or shared under defined terms and conditions eg. Mozilla, Open Office.org, Wikimedia
  • 10.
  • 11.
  • 12. COPYLEFT Copyrights are used to protect computer software but everyone is not using copyrights to have rights in software. Some are using copyrights so that no one else may have any rights in that software; there is a new word for it: they „copyleft‟ it. Before a software may be copylefted, its source code must be disclosed. A disclosed source software can be copylefted or non-copylefted. "Copyleft licenses" require licensee to license specific developments (if they are not restricted to internal use) to anyone under the original license. This ensures that everyone who profits from open-source software will offer their developments to the developer community.
  • 13.       CYBER LAWS Inventions, discoveries and technologies widen scientific horizons but also pose new challenges for the legal world. Information Technology—brought about by Computers, Internet, and Cyberspace—has also posed new problems in jurisprudence. These problems have arisen in all areas of law. The law (statutory or otherwise) providing answers to these problems or dealing with Information Technology are sometimes loosely referred to as 'Computer Laws' or 'Information Technology Laws' or simply 'Cyber Laws'. Intellectual property rights (IPR) are important aspect of Cyber laws. INTELLECTUAL PROPERTY RIGHTS 'What is worth copying is prima facie worth protecting' is the genesis of intellectual property rights. These rights refer to the property that is a creation of the mind: inventions, literary and artistic works, symbols, names, images, and designs used in commerce. Copyright Industrial property . 15
  • 14. SOURCES OF LEGITIMACY OF OSS    Licensing and each individual license may consist of a valid, specialized application of contractual norms, either in a stand-alone framework or representing the enforceable allocation and re-distribution of property law entitlements in computer software. Licensing as a system of information governance may be a custom or norm that has been effectively adopted as law and that should justify enforcement of any particular license licensing as private governance may operate effectively as a system of private ordering of social arrangements.
  • 15. THE OPEN SOURCE LICENSE AS A SPECIALIZED SOFTWARE LICENSE   The open source model is ultimately a specialized application of the general purpose conventional software license. First, both “open source” and “closed source” licenses derive their legal legitimacy from the copyright owners‟ claims to own and control all aspects of computer program codes that are used by individual end users or developers. Second, both forms of license assert comprehensive statements of the scope of the users‟ rights and obligations with respect both to the code and to the copyright in the code and limit the users‟ rights only to those granted in the license itself, rather than to any rights supplied by the Copyright Act or other law. A software license, whether open or closed source, is a soup-to-nuts statement of the scope of legitimate behavior by a user or consumer of that software with respect to both the artifact itself, the information contained in that artifact, and the copyright, if any, that applies to that information
  • 16. DIGITAL MILLENIUM COPYRIGHT ACT (DMCA)  The Digital Millenium Copyright Act provides civil remedies and the possibility of criminal penalties for two related acts. First, the act of “overcoming” a “technological measure” that “effectively controls access” to a copyrighted work is prohibited under Sec1201(a)(1)(A).21 of „circumvent a technological measure‟ means to unscramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner.” 22 “A technological measure „effectively controls access to a work‟ if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.”
  • 17.
  • 18. FREE SOFTWARE, GNU AND GPL Richard Stallman of MIT propounded with the help of lawyers, drafted the General public licence (GPL). It contains a condition that copylefts software. Most of the software under the GNU Project are under GPL. Software, under a GPL licence, is also known as GPLed software. GPLed software can be integrated with similar GPLed software but not with any proprietary programmes. However an LGPL (earlier known as Library and now Lesser General Public License) can be integrated with almost any kind of software including proprietary software. The GPL does not require you to release modified version. You are free to make modifications and use them privately, without ever releasing them. This applies to organizations (including companies), too; an organization can make a modified version and use it internally without ever releasing it outside the organization. But if you release the modified version to the public in some way, then the GPL requires you to make the modified source code available to the programme's users. Thus, the GPL gives permission to release the modified programme in certain ways and not in other ways; but the decision, whether to release it or not, is up to you.
  • 19. LEGITIMACY OF OPEN SOURCE SOFTWARE  Open‐source software development is a production model that exploits the distributed intelligence of participants in Internet communities. This model is efficient because of two related reasons: it avoids the inefficiencies of a strong intellectual property regime and it implements concurrently design and testing of software modules. The hazard of open source is that projects can ‘fork’ into competing versions. However, open‐source communities consist of governance structures that constitutionally minimize this danger. Because open source works in a distributed environment, it presents an opportunity for developing countries to participate in frontier innovation.
  • 20. FUTURE  OF OSS Linus Torwald wrote in a autobiographical book ‘Just for Fun: the Story of an Accidental Revolutionary’. ‘The GPL and open source model allows for the creation of the best technology. … It also prevents the hoarding of technology and ensures that anyone with interest won’t be excluded from its development.’ So open source would rather use the legal weapon of copyright as an invitation to join in the fun, rather than as a weapon against others. It’s still the same old mantra: Make Love, Not War, except on a slightly more abstract level. So many people still believe that the only good software available is that which is found on a shelf in a store. Everything you do in one way, shape, or form is being influenced by open mechanisms. One day soon, as far as software is concerned, it will be open.
  • 21. CONCLUSION    Open source software offers various advantages like the ability to reduce costs and development time, or to avoid being dependent on a single vendor. It is therefore to be expected that more and more companies and institutions will start using open source software. There is however some risks associated with doing so. It's important to mention that an immediate switch from proprietary software development to Open Source development would not be a wise decision. The changes in concept are massive, and prematurely adopting this model would likely impact negatively on the economy in the short term. Rather, gradual adoption to Open Source development is recommended. It is therefore recommended to carefully study the license agreement and to make an assessment of the risks associated with these conditions. One should always check whether the own application is clearly separated from software under the GPL. And of course compliance with the license conditions need to be checked. With a careful application of the license conditions, it is possible to benefit most from using open source software while minimizing the risk.
  • 22. REFERENCES  http://opensource.org/  http://www.w3.org/Status.html  http://eu.conecta.it/paper/Advantages_open_source_soft.html  http://www.iusmentis.com/computerprograms/opensourcesoftware/op portunity-threat/ Citations  Madison, M. J. (2005). The legitimacy of open source and other software licenses. University of Pittsburgh School of Law Working Paper Series, 15.  Von Hippel, E., & Von Krogh, G. (2003). Open source software and the “private-collective” innovation model: Issues for organization science. Organization science, 14(2), 209-223.