SlideShare uma empresa Scribd logo
1 de 38
Protecode Inc. 2015 1
Open Source Software:
What Are Your Obligations?
Thursday, April 23rd, 2015
Protecode Inc. 2015
Agenda
 Open Source Software
– What is Open Source?
– Licence and copyrights overview
– Case studies
 Open Source Software Management
– Controlling the adoption of Open Source – Are we using it?
– Open Source attributes. Where are they?
– Software package – preapproval
– Composite projects
– Options – Manual versus automated
 Wrap up and Q/A
2
Martin Callinan,
Director,
Source Code Control
Andrew Katz,
Managing Partner/Chief
Executive,
Moorcrofts LLP
Protecode Inc. 2015
Open Source Everywhere
These companies have dedicated OSS Teams
3
“Every Company Is a
Software Company”
– CEO Mendix
Linux dominates every
sector of computing
(except desktop)
http://www.zdnet.com/article/20-great-years-of-linux-and-supercomputers/
By 2016, the vast majority of
mainstream IT organisations will use
open source in mission-critical
solutions.
https://www.gartner.com/doc/2822619
o 44% of all code created in the world is OSS and
increasing
80% of newly deployed code is open source
o 31% of OSX is OSS, 75% of Android.
o Stats demonstrate OSS more innovative than
proprietary
o 36% lower defects in OSS than comparable
proprietary code
http://transfersummit.com/sites/default/files/materials/rgardler/ts11daffara-notes.pdf
http://www.openforumacademy.org/library/ofa-fellows-reference-library/ofe-fellows-reference-
library/Hosted%20Files/first-conference-proceedingsA4.pdf
What is open source?
• Source code is available
• Freedom to use (for any purpose)
• Freedom to study and modify
• Freedom to distribute (original or modifications)
Open source software
still has an owner, and to
use it you need a licence.
Open Source
Licensing
• There are hundreds of different types of licence.
• They range from very simple to more complex.
• Many licences are easy to comply with
• Some licences are subject to “copyleft”
• ‘Permissive’ or ‘Academic’ licences
• You can do what you want, including building the
code into proprietary products.
• Compliance usually limited to incorporating
disclaimers and attributions if you distribute.
• Examples: BSD, Apache
Easy compliance
• ‘Reciprocal’, ‘Copyleft’, ‘Sharealike’
• If you distribute the program (as-is, or modified),
you must do so under the same terms.
• You can’t incorporate it into proprietary code.
• If you breach, you’re in breach of copyright.
• e.g. GPL, Mozilla, Microsoft Public License
Difficult compliance
Copyleft licences are only relevant on distribution.
But distribution may mean many things:
• Supply to customers
• Transfer to companies within the same group
• Transfer to outsourcing provider
• Use of software over a network (SaaS) (AGPL, OSL)
Distribution?
Distribution in breach of
licence is a breach of
copyright.
Non-copyright risk
issues
• Patents – know your exposure, know if you need
to get a licence (e.g. codecs)
• Bugs (security, in particular)
Why you need to know
what code you are
running.
Case Studies
Financial Services
• Compliance driven by regulator
• Pensions providers required to do due diligence
on their service providers to assess risk of
software failure
• Our client required to undertake an annual audit
of code used to provide solutions to pensions
providers
M&A Transactions
• Open source due diligence now routine in M&A
transactions
• Purchaser/investor will want comfort that the
codebase is clean, and that appropriate
procedures are in place
Heartbleed
• OpenSSL deployed by hundreds of thousands of
end-user companies for encryption in web apps
and elsewhere
• Trillions of dollars of transactions depend on it
• Critical bug found
• Companies had to answer to shareholders and
regulators
Mitigating risk
• Ensure deep knowledge of your codebase
• Employ appropriate practices and procedures to
ensure code cleanliness
• Document provenance
• Test practices and procedures - auditing
Protecode Inc. 2015 24
Martin Callinan – Source Code Control Limited
Open Source Software Management
Protecode Inc. 2015
OSS in Organisations
 Shall we use OSS or do we know if we use OSS already?
– Risk assessment
• Risk of being involved vs risk of not being involved
– Consideration -> Adoption -> Integral part of business
 The most common factors affecting use of OSS in
software projects
– Concerns regarding intellectual property / licensing
– Concerns regarding the security of the software
– Service & support
– Product capabilities/maturity
– Difficulty of adoption / integration
– Software quality – end user satisfaction
– Software enhancements – innovation over time
– Viability of the open source community
25
Protecode Inc. 2015
Licensing Challenges of OSS
 Produced by large number of developers over time
– Bazaar model: policy of fast and frequent releases, release
candidates, possibility of governance impairments
 Questionable due diligence efforts of committers
– Re-licensing efforts may not have been correctly handled
 Code may:
– Contain nested packages with their own set of issues
– Contain code from books or community websites
– Implement patents
– Implement specifications that are subject to a license
– Contain code generated by a tool where the output
could be a derivative of input
– Contain or implement APIs that may have their own obligations
26
Protecode Inc. 2015
Compliance is not always clear
 Open Source projects use open source projects
 Composite projects may have multiple licenses
– Project license
• A top level license, or top level document listing applicable licenses
• Look for website information, LICENSE, COPYING, or README
files
– Subfolder licenses
• Indicate sub-level OSS projects
• Not always present
– File licenses
– Exceptions: subfolder holding binaries or libraries
• Generally do not have a license document
• You are on your own to determine the binary or library licenses
– Automated code scanning tools should resolve these cases
27
Protecode Inc. 2015
License Compatibility
 Licenses with unacceptable terms
 Licenses with conflicting terms
– Not all licenses are compatible
– Example: GPL (and its varieties) are incompatible with most
other licenses (See https://www.gnu.org/licenses/license-list.html for a detailed list)
28
Protecode Inc. 2015
Establishing A Baseline
 Objective: Identify all 3rd party content
and identify licensing attributes
 Tasks:
– Inspect all source code and build
ingredients to create Bill of Materials (BoM).
– Key files:
• Text files containing license text
• Text files that may make reference to
licenses
• Any other documentation
– Determine the distribution method
• Source? Binary? Deployment?
– Assess the fit with the policy
29
Protecode Inc. 2015
Package Pre-Approval
 Evaluate OSS before it is used
 Workflow Process
– Request/Assess/Approve-Reject
 Information required for pre-approval
– Project & Package Information
• Project name, URL, license, author(s),
type, exportability, etc.
– Usage Model
• Distribution model
– (binary, source, hosted, internal only, etc.)
• Types of derivatives
– (Modified? Linked? Loosely coupled?)
• Organization specific information
– Business unit
– Business justification
• Maintenance and support
30
Protecode Inc. 2015
 Commercial tools are available for building and
managing a code Inventory
– Establish Policies, Pre-Approve packages, Establish a
baseline
– Scripted Bulk Analysis, Library Analysis, Build Analysis
– Developer Assistant real-time desktop analysis
 Complete scanning solution
– Detect third party projects, files or snippets within a portfolio
– Create a Bill of Materials (BoM) of all components
– Report on licenses, copyrights, security vulnerabilities, export
control obligations, encryption content
– Detect, interpret and create Software Package Data Exchange
(SPDX) files
– Report on license obligations and license compatibilities
– Concatenate licenses and notices for distribution with a
product
– Integrate within a development lifecycle using powerful API’s
 Accurate and up to date information
– Driven by a reference Global IP Signatures (GIPS) database
– Updated and synchronized with National Vulnerability
Database 24x7
Automated OSS Management Tools
Protecode Inc. 2015
Wrap Up
 If you do not use Open Source software, you will be left out
– Managed adoption of Open Source software is the way to go
 Compliance requires
– Knowledge of what OSS packages are used
• Creating and maintaining a software Bill of Materials
– Access to OSS package, its licenses, description and notes
– Scanning of the package, determination of its composite nature,
declared and hidden licenses
– Ensuring the terms of the sublicenses are compatible and acceptable.
– Removing any component that is not needed
 Prevention works better than correction
– Package pre-approval, due diligence during development, and at build
time
 Managing Open Source content requires automated tools
– Manual methods are expensive, inaccurate and take too long
32
Protecode Inc. 2015
Q&A
Please type your questions into the chat box to the right
33
Protecode Inc. 2015
About Moorcrofts
 Firm wide focus on corporate, tech and HR law
 Tech expertise across the board, such as:
– Open source licensing
– Software and Hardware agreements
– IPR protection
– Data security
 Work in a range on industries from start ups through to
AIM listed business, including:
– Lifescience, Biotech and Parma
– IT
– Financial
– New Media
 For more information, contact Andrew Katz +44 1628
470003; andrew.katz@moorcrofts.com
34
Protecode Inc. 2015
• Ease the adoption of Open Source Software
• Software source code audits
• Legal risk/licence compliance
• Security vulnerabilities
• Operational risk
• Enable greater use of OSS across the organisations
• Quality code
• Secure code
• Compliant code
• DevOps services
About Source Code Control Limited
Protecode Inc. 2015
About Protecode
Global Supplier of software compliance and security vulnerability
management solutions
Reduce IP uncertainties, manage security vulnerabilities and ensure compliance
36
Complete Set of Solutions
for
Managed Adoption of Open Source
Protecode Inc. 2015
• Book an individual discussion : source@sourcecodecontol.co
• Managing existing OSS projects
• Planning for future OSS adoption
• Code reviews
• Useful resources
• Open Source Initiative
• http://opensource.org/
• Free Software Foundation
• http://www.fsf.org/
• BCS Open Source Specialist Group
• http://ossg.bcs.org/
• For more information about Source Code Control Limited
• http://www.sourcecodecontrol.co
• For more information about Moorcrofts
• http://www.moorcrofts.com/
• Whitepapers, case studies and educational videos from Protecode
• http://www.protecode.com/resources/
Next Steps
Protecode Inc. 2015 38
info@protecode.com
www.protecode.com

Mais conteúdo relacionado

Mais procurados

Owasp_Security_Labeling_System
Owasp_Security_Labeling_SystemOwasp_Security_Labeling_System
Owasp_Security_Labeling_System
luisenriquezA
 

Mais procurados (20)

Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 
nexB: Software Audit for Acquisition Due Diligence
nexB: Software Audit for Acquisition Due DiligencenexB: Software Audit for Acquisition Due Diligence
nexB: Software Audit for Acquisition Due Diligence
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Guide to Open Source Compliance
Guide to Open Source ComplianceGuide to Open Source Compliance
Guide to Open Source Compliance
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
Flight East 2018 Presentation–Patents and Open Source Known and Unknown Risks
Flight East 2018 Presentation–Patents and Open Source Known and Unknown RisksFlight East 2018 Presentation–Patents and Open Source Known and Unknown Risks
Flight East 2018 Presentation–Patents and Open Source Known and Unknown Risks
 
IT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsIT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startups
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Litigation and Compliance in the Open Source Ecosystem
Litigation and Compliance in the Open Source EcosystemLitigation and Compliance in the Open Source Ecosystem
Litigation and Compliance in the Open Source Ecosystem
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
Managing Open Source Software Supply Chains
Managing Open Source Software Supply ChainsManaging Open Source Software Supply Chains
Managing Open Source Software Supply Chains
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Owasp_Security_Labeling_System
Owasp_Security_Labeling_SystemOwasp_Security_Labeling_System
Owasp_Security_Labeling_System
 
Streamline Open Source Compliance with Package Pre-Approval
Streamline Open Source Compliance with Package Pre-ApprovalStreamline Open Source Compliance with Package Pre-Approval
Streamline Open Source Compliance with Package Pre-Approval
 

Destaque

Destaque (10)

20150316-The commingling art of Free and Open Source Software and its license...
20150316-The commingling art of Free and Open Source Software and its license...20150316-The commingling art of Free and Open Source Software and its license...
20150316-The commingling art of Free and Open Source Software and its license...
 
The Art and Science of Open Source Compliance
The Art and Science of Open Source ComplianceThe Art and Science of Open Source Compliance
The Art and Science of Open Source Compliance
 
Palamida Open Source Compliance Solution
Palamida Open Source Compliance Solution Palamida Open Source Compliance Solution
Palamida Open Source Compliance Solution
 
Managing OSS license obligations
Managing OSS license obligationsManaging OSS license obligations
Managing OSS license obligations
 
20150312
2015031220150312
20150312
 
Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016 Free and Open Source Software Litigation in 2016
Free and Open Source Software Litigation in 2016
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
20160821-osln.tw-跨界扎根的台灣開源法律網絡(PDF)
20160821-osln.tw-跨界扎根的台灣開源法律網絡(PDF)20160821-osln.tw-跨界扎根的台灣開源法律網絡(PDF)
20160821-osln.tw-跨界扎根的台灣開源法律網絡(PDF)
 
Open Source License 101
Open Source License 101Open Source License 101
Open Source License 101
 
Open Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsOpen Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common Pitfalls
 

Semelhante a Open Source Software: What Are Your Obligations?

Semelhante a Open Source Software: What Are Your Obligations? (20)

Best practices for simplifying software audits
Best practices for simplifying software auditsBest practices for simplifying software audits
Best practices for simplifying software audits
 
Optimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software ManagementOptimizing The Cost Of Open Source Software Management
Optimizing The Cost Of Open Source Software Management
 
Licensing in Composite Open Source Projects
Licensing in Composite Open Source ProjectsLicensing in Composite Open Source Projects
Licensing in Composite Open Source Projects
 
Licensing in Composite Projects
Licensing in Composite ProjectsLicensing in Composite Projects
Licensing in Composite Projects
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Managing Software Inventories & Automating Open Source Software Compliance
Managing Software Inventories & Automating Open Source Software ComplianceManaging Software Inventories & Automating Open Source Software Compliance
Managing Software Inventories & Automating Open Source Software Compliance
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
 
Your Open Source Program Office
Your Open Source Program OfficeYour Open Source Program Office
Your Open Source Program Office
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software Identification
 
Open Source Governance v2.5
Open Source Governance v2.5Open Source Governance v2.5
Open Source Governance v2.5
 
Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5
 
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
Safeguarding Against the Risks of Improper Open Source Licensing - Valuable...
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developers
 
Introduction to Open Source License and Business Model
Introduction to Open Source License and Business ModelIntroduction to Open Source License and Business Model
Introduction to Open Source License and Business Model
 

Mais de Source Code Control Limited (6)

OpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINALOpenUK A4 x 8pp Re-use Principles June 2016 FINAL
OpenUK A4 x 8pp Re-use Principles June 2016 FINAL
 
Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous Compliance
 
Venture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden RisksVenture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden Risks
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
e-HealthWhitepaper
e-HealthWhitepapere-HealthWhitepaper
e-HealthWhitepaper
 

Último

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Último (20)

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

Open Source Software: What Are Your Obligations?

  • 1. Protecode Inc. 2015 1 Open Source Software: What Are Your Obligations? Thursday, April 23rd, 2015
  • 2. Protecode Inc. 2015 Agenda  Open Source Software – What is Open Source? – Licence and copyrights overview – Case studies  Open Source Software Management – Controlling the adoption of Open Source – Are we using it? – Open Source attributes. Where are they? – Software package – preapproval – Composite projects – Options – Manual versus automated  Wrap up and Q/A 2 Martin Callinan, Director, Source Code Control Andrew Katz, Managing Partner/Chief Executive, Moorcrofts LLP
  • 3. Protecode Inc. 2015 Open Source Everywhere These companies have dedicated OSS Teams 3 “Every Company Is a Software Company” – CEO Mendix
  • 4. Linux dominates every sector of computing (except desktop) http://www.zdnet.com/article/20-great-years-of-linux-and-supercomputers/
  • 5. By 2016, the vast majority of mainstream IT organisations will use open source in mission-critical solutions. https://www.gartner.com/doc/2822619
  • 6. o 44% of all code created in the world is OSS and increasing 80% of newly deployed code is open source o 31% of OSX is OSS, 75% of Android. o Stats demonstrate OSS more innovative than proprietary o 36% lower defects in OSS than comparable proprietary code http://transfersummit.com/sites/default/files/materials/rgardler/ts11daffara-notes.pdf http://www.openforumacademy.org/library/ofa-fellows-reference-library/ofe-fellows-reference- library/Hosted%20Files/first-conference-proceedingsA4.pdf
  • 7. What is open source?
  • 8. • Source code is available • Freedom to use (for any purpose) • Freedom to study and modify • Freedom to distribute (original or modifications)
  • 9. Open source software still has an owner, and to use it you need a licence.
  • 11. • There are hundreds of different types of licence. • They range from very simple to more complex. • Many licences are easy to comply with • Some licences are subject to “copyleft”
  • 12. • ‘Permissive’ or ‘Academic’ licences • You can do what you want, including building the code into proprietary products. • Compliance usually limited to incorporating disclaimers and attributions if you distribute. • Examples: BSD, Apache Easy compliance
  • 13. • ‘Reciprocal’, ‘Copyleft’, ‘Sharealike’ • If you distribute the program (as-is, or modified), you must do so under the same terms. • You can’t incorporate it into proprietary code. • If you breach, you’re in breach of copyright. • e.g. GPL, Mozilla, Microsoft Public License Difficult compliance
  • 14. Copyleft licences are only relevant on distribution. But distribution may mean many things: • Supply to customers • Transfer to companies within the same group • Transfer to outsourcing provider • Use of software over a network (SaaS) (AGPL, OSL) Distribution?
  • 15. Distribution in breach of licence is a breach of copyright.
  • 17. • Patents – know your exposure, know if you need to get a licence (e.g. codecs) • Bugs (security, in particular)
  • 18. Why you need to know what code you are running.
  • 20. Financial Services • Compliance driven by regulator • Pensions providers required to do due diligence on their service providers to assess risk of software failure • Our client required to undertake an annual audit of code used to provide solutions to pensions providers
  • 21. M&A Transactions • Open source due diligence now routine in M&A transactions • Purchaser/investor will want comfort that the codebase is clean, and that appropriate procedures are in place
  • 22. Heartbleed • OpenSSL deployed by hundreds of thousands of end-user companies for encryption in web apps and elsewhere • Trillions of dollars of transactions depend on it • Critical bug found • Companies had to answer to shareholders and regulators
  • 23. Mitigating risk • Ensure deep knowledge of your codebase • Employ appropriate practices and procedures to ensure code cleanliness • Document provenance • Test practices and procedures - auditing
  • 24. Protecode Inc. 2015 24 Martin Callinan – Source Code Control Limited Open Source Software Management
  • 25. Protecode Inc. 2015 OSS in Organisations  Shall we use OSS or do we know if we use OSS already? – Risk assessment • Risk of being involved vs risk of not being involved – Consideration -> Adoption -> Integral part of business  The most common factors affecting use of OSS in software projects – Concerns regarding intellectual property / licensing – Concerns regarding the security of the software – Service & support – Product capabilities/maturity – Difficulty of adoption / integration – Software quality – end user satisfaction – Software enhancements – innovation over time – Viability of the open source community 25
  • 26. Protecode Inc. 2015 Licensing Challenges of OSS  Produced by large number of developers over time – Bazaar model: policy of fast and frequent releases, release candidates, possibility of governance impairments  Questionable due diligence efforts of committers – Re-licensing efforts may not have been correctly handled  Code may: – Contain nested packages with their own set of issues – Contain code from books or community websites – Implement patents – Implement specifications that are subject to a license – Contain code generated by a tool where the output could be a derivative of input – Contain or implement APIs that may have their own obligations 26
  • 27. Protecode Inc. 2015 Compliance is not always clear  Open Source projects use open source projects  Composite projects may have multiple licenses – Project license • A top level license, or top level document listing applicable licenses • Look for website information, LICENSE, COPYING, or README files – Subfolder licenses • Indicate sub-level OSS projects • Not always present – File licenses – Exceptions: subfolder holding binaries or libraries • Generally do not have a license document • You are on your own to determine the binary or library licenses – Automated code scanning tools should resolve these cases 27
  • 28. Protecode Inc. 2015 License Compatibility  Licenses with unacceptable terms  Licenses with conflicting terms – Not all licenses are compatible – Example: GPL (and its varieties) are incompatible with most other licenses (See https://www.gnu.org/licenses/license-list.html for a detailed list) 28
  • 29. Protecode Inc. 2015 Establishing A Baseline  Objective: Identify all 3rd party content and identify licensing attributes  Tasks: – Inspect all source code and build ingredients to create Bill of Materials (BoM). – Key files: • Text files containing license text • Text files that may make reference to licenses • Any other documentation – Determine the distribution method • Source? Binary? Deployment? – Assess the fit with the policy 29
  • 30. Protecode Inc. 2015 Package Pre-Approval  Evaluate OSS before it is used  Workflow Process – Request/Assess/Approve-Reject  Information required for pre-approval – Project & Package Information • Project name, URL, license, author(s), type, exportability, etc. – Usage Model • Distribution model – (binary, source, hosted, internal only, etc.) • Types of derivatives – (Modified? Linked? Loosely coupled?) • Organization specific information – Business unit – Business justification • Maintenance and support 30
  • 31. Protecode Inc. 2015  Commercial tools are available for building and managing a code Inventory – Establish Policies, Pre-Approve packages, Establish a baseline – Scripted Bulk Analysis, Library Analysis, Build Analysis – Developer Assistant real-time desktop analysis  Complete scanning solution – Detect third party projects, files or snippets within a portfolio – Create a Bill of Materials (BoM) of all components – Report on licenses, copyrights, security vulnerabilities, export control obligations, encryption content – Detect, interpret and create Software Package Data Exchange (SPDX) files – Report on license obligations and license compatibilities – Concatenate licenses and notices for distribution with a product – Integrate within a development lifecycle using powerful API’s  Accurate and up to date information – Driven by a reference Global IP Signatures (GIPS) database – Updated and synchronized with National Vulnerability Database 24x7 Automated OSS Management Tools
  • 32. Protecode Inc. 2015 Wrap Up  If you do not use Open Source software, you will be left out – Managed adoption of Open Source software is the way to go  Compliance requires – Knowledge of what OSS packages are used • Creating and maintaining a software Bill of Materials – Access to OSS package, its licenses, description and notes – Scanning of the package, determination of its composite nature, declared and hidden licenses – Ensuring the terms of the sublicenses are compatible and acceptable. – Removing any component that is not needed  Prevention works better than correction – Package pre-approval, due diligence during development, and at build time  Managing Open Source content requires automated tools – Manual methods are expensive, inaccurate and take too long 32
  • 33. Protecode Inc. 2015 Q&A Please type your questions into the chat box to the right 33
  • 34. Protecode Inc. 2015 About Moorcrofts  Firm wide focus on corporate, tech and HR law  Tech expertise across the board, such as: – Open source licensing – Software and Hardware agreements – IPR protection – Data security  Work in a range on industries from start ups through to AIM listed business, including: – Lifescience, Biotech and Parma – IT – Financial – New Media  For more information, contact Andrew Katz +44 1628 470003; andrew.katz@moorcrofts.com 34
  • 35. Protecode Inc. 2015 • Ease the adoption of Open Source Software • Software source code audits • Legal risk/licence compliance • Security vulnerabilities • Operational risk • Enable greater use of OSS across the organisations • Quality code • Secure code • Compliant code • DevOps services About Source Code Control Limited
  • 36. Protecode Inc. 2015 About Protecode Global Supplier of software compliance and security vulnerability management solutions Reduce IP uncertainties, manage security vulnerabilities and ensure compliance 36 Complete Set of Solutions for Managed Adoption of Open Source
  • 37. Protecode Inc. 2015 • Book an individual discussion : source@sourcecodecontol.co • Managing existing OSS projects • Planning for future OSS adoption • Code reviews • Useful resources • Open Source Initiative • http://opensource.org/ • Free Software Foundation • http://www.fsf.org/ • BCS Open Source Specialist Group • http://ossg.bcs.org/ • For more information about Source Code Control Limited • http://www.sourcecodecontrol.co • For more information about Moorcrofts • http://www.moorcrofts.com/ • Whitepapers, case studies and educational videos from Protecode • http://www.protecode.com/resources/ Next Steps
  • 38. Protecode Inc. 2015 38 info@protecode.com www.protecode.com