Neo4J Wins a Victory for Trademark Rights in Open Source Products

On May 21, 2020, the US District Court for the Northern District of California granted a motion for judgement on pleadings by Neo4J, a developer of graph database software, in Neo4J, Inc. v. Purethink LLC, 2020 WL 2614871.

Neo4J had brought a trademark infringement suit against Purethink, LLC, an erstwhile reseller of Neo4J’s enterprise products, and its related entity iGov. After the reseller agreement between the parties terminated, Neo4J sued alleging trademark infringement, and the defendant counterclaimed that the trademark had been abandoned.

Neo4J offers both a community edition under GPL/AGPL, as well as a commercial edition, which had additional features only provided under commercial terms. The defendant argued that Neo4J’s trademark was unenforceable because Neo4J used the mark on its open source software as well as its enterprise product. The defendant characterized licensing under GPL and AGPL as “naked licensing” (i.e. licensing of a trademark without exercise of sufficient quality control), which can lead to a loss of rights in the trademark.

The court rejected the argument, saying,”Defendants do not raise any allegations indicating the Plaintiff has failed to exercise actual control over licensees’ use of the trademark….[T]he fact the Plaintiff distributed Neo4J software on an open source basis pursuant to the GPL and AGPL is not, without more, sufficient to establish a naked license or demonstrate abandonment.”

This result is not unexpected, but it is a useful precedent. Open source licenses like GPL are not trademark licenses, and therefore cannot be “naked” trademark licenses. When it comes to stewarding brands, it is the actual work of maintaining quality control, and not the software copyright license terms, that matters. There are many companies that implement an open core business models with community and enterprise editions. While those companies, like any company, are wise to properly manage their brands, that management is by no means antithetical to an open source licensing model.

PolyForm Project Launches Licenses Limiting Competitive Uses of Software

PolyForm Project has launched the last of its first tranche of licenses: Perimeter and Defensive. Each of these licenses are used to make source code available, but place certain limitations on its use.

The Perimeter license prohibits use of the software in a manner competitive with the software. The Defensive license prohibits use in a manner competitive with the products and services of the company licensing the software.

This adds to the PloyForm suite of source-available licenses released last year. Below is a handy chart to show the differences among them.

LicenseUseChangeDistri-buteLimitationNotes
StrictYes  Non-Commercial
NoncommercialYesYesYesNon-CommercialUse to enable R&D and Non-Profit Use
Free-TrialYesYes TrialUse to enable a limited evaluation
Internal UseYesYes InternalEnd user license with source code
Small-BusinessYesYesYesSMBUse to enable commercial use by small organizations
PerimeterYesYesYesNo Competition with SoftwareUse to limit competition with the licensed software
DefensiveYesYesYesNo Competition with LicensorUse to limit competition with all your related products

More information about the PolyForm Project is here.

US Supreme Court Confirms US States Immune to Copyright Infringement

This week (March 23, 2020), in ALLEN ET AL. v. COOPER, GOVERNOR OF NORTH CAROLINA, ET AL the United States Supreme Court ruled that US states cannot be liable for copyright infringement due to sovereign immunity.

In 1996, a salvage company called Intersal discovered the wreck of a pirated slave ship, The Queen Anne’s Revenge, that ran aground off the coast of North Carolina in 1718. Intersal was under a salvage contract from the legal owner of the wreck, which was the State of North Carolina.* Intersal contracted with videographer Frederick Allen to document its efforts. Allen took photos and videos of the recovery for more than a decade and registered copyrights in his works. (Presumably their contract did not provide for an assignment of copyrights that would be typical in such a contract, but those facts were not outlined in the Supreme Court decision.) When North Carolina published some of Allen’s videos and photos online, Allen sued for copyright infringement. The state asserted sovereign immunity as a defense.

US states are immune from legal liability of most kinds in civil lawsuits. However, there are various exceptions. That is why, when one sees lawsuits against state agencies for negligence or other civil claims, they are usually styled with an individual state governor or other official as a defendant. In the US, sovereign immunity is a complex doctrine, given our federal system includes states, which exercise basic sovereign powers, and the federal government, which only has limited powers, the two of which often overlap, and where each kind of authority enjoys some level of sovereign immunity, under doctrine or statute.

The question in this lawsuit was which doctrine trumped: sovereign immunity, or copyright law, as reflected in a federal law called the Copyright Remedy Clarification Act. The US Constitution Article I, §8, gives Congress authority to grant copyrights. The CRCA, in turn, relies on that power, saying that for claims of copyright infringement, a state “shall not be immune, under the Eleventh Amendment [or] any other doctrine of sovereign immunity, from suit in Federal court.”17 U. S. C. §511(a). The Supreme Court unanimously decided that the CRCA was unconstitutional to the extent it authorized a claim in Allen, because Congress lacked constitutional authority to take away the state’s immunity. The court’s opinion left the door open for Congress to amend the CRCA to make it constitutional.

In this opinion, the Court relied on Florida Prepaid Postsecondary Ed. Expense Bd. v. College Savings Bank, 527 U. S. 627, which invalidated provisions of the Patent Remedy Act, a law allowing for patent infringement claims, similar to the CRCA for copyright. When weighing congressional authority against sovereign immunity, “There must be a congruence and proportionality between the injury to be prevented or remedied and the means adopted to that end.” City of Boerne v. Flores, 521 U. S. 507, 520. In Florida Prepaid, the Court defined the scope of unconstitutional patent infringement as “intentional conduct for which there is no adequate state remedy.” In contrast, most copyright infringement claims have no requirement of intent, though some kinds of damages can be enhanced if infringement is willful.

* If you want to read about ownership fights under maritime law, and the technological challenges of shipwreck diving, try Shadow Divers.

Another COVID19 Post: Force Majeure Hygiene

In the last few weeks, it seems every organization I have ever had contact with is telling me their COVID19 plans. While I am impressed that my mortgage company has plans to keep me safe and healthy — even though I have never spoken to nor interacted with any actual human representative of this company since my loan was sold to them nearly 10 years ago — the pandemic now seems to be developing into yet another reason for disingenuous customer outreach, rivaling even the California Consumer Privacy Act in its ability to produce unwanted email in the first month of 2020.

We technology transactions lawyers barely require human contact in the first place, so the most serious long term effect for us may be that we finally have to understand force majeure clauses. For those of you non-lawyers intrepid enough to read this post to this point, that phrase is a legal term of art roughly equivalent to an “Act of God,” and it sets rules about when parties to a contract, particularly suppliers, can breach contracts but not be held legally liable, a legal doctrine sometimes referred to as excusing performance.

Like many of the clauses in the miscellaneous section of a contract, force majeure clauses tend to go unread — or worse, become like the socks collected in the discontinuous time-space continuum of our clothes dryers — an ever-growing laundry list of items no lawyers are brave enough to remove, in case they “miss” something and are later blamed for the omission. But, like all contract clauses, force majeure clauses should be written thoughtfully, or they have the potential to backfire.

What if you say nothing?

First, chances are high that the state statute governing your contract already contains some useful rules about force majeure. That statute may not use the words force majeure at all, so it might be easy to miss. The common terms of art are frustration of purpose, impracticability and impossibility, but modern rules favor impracticability over the older impossibility doctrine. The UCC, for example, says:

§ 2-615. Excuse by Failure of Presupposed Conditions.
Except so far as a seller may have assumed a greater obligation and subject to the preceding section on substituted performance:

(a) Delay in delivery or non-delivery in whole or in part by a seller who complies with paragraphs (b) and (c) is not a breach of his duty under a contract for sale if performance as agreed has been made impracticable by the occurrence of a contingency the non-occurrence of which was a basic assumption on which the contract was made or by compliance in good faith with any applicable foreign or domestic governmental regulation or order whether or not it later proves to be invalid.
(b) Where the causes mentioned in paragraph (a) affect only a part of the seller’s capacity to perform, he must allocate production and deliveries among his customers but may at his option include regular customers not then under contract as well as his own requirements for further manufacture. He may so allocate in any manner which is fair and reasonable.
(c) The seller must notify the buyer seasonably that there will be delay or non-delivery and, when allocation is required under paragraph (b), of the estimated quota thus made available for the buyer.

UCC 2-615

UCC 2-614, Substituted Performance, addresses more specifically unexpected disruptions in availability of carriers and means of payment. UCC 2-616, Procedure on Notice Claiming Excuse, describes the process of notice of the application of Section 2-615.

Impracticability, Impossibility, and Frustration of Purpose

Courts do not require that performance actually be impossible to apply the doctrine embodied in the UCC, merely that it be commercially impracticable, such as due to excessive cost. But the doctrine has its limits. For example, in Watson Labs. v. Rhone-Poulenc, Inc., 178 F. Supp. 2d 1099 (C.D. Cal. 2001), plaintiff Watson sought relief for breach of a pharmaceutical supply agreement. The supplier in the contract, an RPR affiliate, operated a manufacturing plant for the pharmaceutical product in question. At the time the agreement was signed, the plant was already operating under an FDA consent decree, resulting from “violation of numerous… Good Manufacturing Practices” established by FDA regulations, and providing that the FDA could shut down manufacturing in the event of future violations. After the plant was actually shut down and the supply disrupted, the buyer sued for breach of contract and seller invoked the force majeure clause, but the court did not excuse defendants’ failure to perform because the shutdown was foreseeable, and within the defendant’s reasonable control. The court probably gave weight to the fact that the contract was expressly intended to meet all of the plaintiff’s requirements for the drug, and that both parties knew there was no other approved supplier.

Frustration of purpose happens when the supplier is willing to perform, but one of the contract’s basic premises fails. This is sometimes referred to as creating an implied condition to performance. If you are a lawyer, you probably remember from law school the old coronation cases such as Krell v. Henry, 2 K.B. 740 (1903), in which a man rented a room temporarily to watch the coronation parade of King Edward VII. The coronation was rescheduled due to the King’s appendicitis, so the purpose of the contract was frustrated, and the renter was excused from renting the room. Notably, the application of this doctrine resulted in excuse for the buyer, not the seller.

In sum, these doctrines are meant to handle the unexpected — facts that the parties could not have reasonably foreseen when they entered into the contract. They are intended to be general in nature, so they are flexible enough to handle circumstances that are difficult for parties to predict.

Drafting Specific Force Majeure Clauses

One might be tempted this month to change all the contract forms in existence to include “pandemic,” and consider the matter handled, but that’s probably not the right long-term approach. The endlessly-growing-laundry-list is doomed to failure, because it pits the lawyer’s imagination for catastrophe against that of reality, and in that respect, reality always wins. Despite the famously pessimistic imagination of of most lawyers, none of us knows what the next crisis will be. So, think hard about what you write, particularly if you are a seller, because you may be foregoing some of the automatic relief from performance the statute would otherwise provide.

But force majeure clauses don’t merely define what events make performance excusable; they can be used to set the details of what happens when performance is excused. For example, they can outline a specific process for notice of shipment delays, set preferences for allocation of orders among customers in the case of shortage, or set the process to cancel an order or contract if the event persists. These specific remedies and procedures need to be based on the facts of the deal.

Force majeure clauses can also seek to expand the application of the doctrine to specific contingencies, unexpected changes in the cost of the inputs of goods, which may be not captured by background doctrines of impracticability. For example, in the early 2000s, “worldwide semiconductor shortages” were a popular addition to the laundry list, due to a phenomenon that Wikipedia charmingly calls “chip famine.” Otherwise, “[e]conomic events, such as failures of markets, are very difficult to assert as events of force majeure…” ( J. Kelley, “So What’s Your Excuse? An Analysis of Force Majeure Claims,” 2 Texas Journal of Oil, Gas, and Energy Law 91 , 110 (2006).)

If you want to guide a court’s finding of frustration of purpose, you can draft wisely to that effect as well. The purpose of a contract is often set out in its recitals — yet another reason to write them correctly and specifically for the deal.

Does Force Majeure Cover COVID19 Disruptions?

Of course, that’s a trick question because it can’t be answered generally, only with reference to specific facts. The existence of a virus standing alone would not trigger a force majeure clause, but resulting actions or developments could be considered force majeure. For example:

  • Travel restrictions imposed by government or suggested by health authorities
  • Embargoes, export or import restrictions
  • Broad failure of supply chains
  • Closure of public buildings or cancellation of events
  • Quarantines
  • Shortages of products due to hoarding
  • Shortages of medical services or supplies due to pandemic conditions

Courts will generally tend to interpret express force majeure clauses narrowly, and will not excuse performance merely because the of potential existence of a performance problem, or a performance problem with simultaneous causes other than force majeure. General economic downturns that make performance unprofitable do not generally qualify — that’s a risk of doing business. The court will look for a specific external cause that could not be reasonably avoided. For an example of a detailed test used by one federal court, see Transatlantic Fin. Corp. v. United States, 363 F.2d 312, 315 (D.C. Cir. 1966), a case involving the 1956 nationalization of the Suez Canal.

Practical Steps

As with everything in life, the practical steps to addressing force majeure due to the COVID19 pandemic in Q1 2020 are less exciting than reading overwrought news headlines about it. If contracting parties today have concerns about invoking force majeure clauses, those concerns need to be analyzed on a case-by-case basis. The relevant law is state law, so one can’t merely rely on the UCC, even though most state statutes roughly follow it; one must check relevant state cases for more detailed rules. Here are a few citations to relevant statutes for the most common jurisdictions, for a starting point. To find the relevant case law, it’s helpful to turn to an annotated version of the statute, or look for cases that cite the statute.

Keep Calm and Wash Your Hands

As for the rest of it, now is the time to be grateful for whatever free time you have recaptured from cancellation of your doubtless excessive professional commitments, and to do your taxes, plant a victory garden, use up those groceries in your freezer, and watch the new episodes of Better Call Saul. And wash those hands.

Bruce Perens Wins Victory for Free Speech

February 2020 finally saw the end to a legal battle that threatened the ability of open source commentators to express opinions about open source licensing compliance. With the opinion of the Ninth Circuit in Open Source Security v. Perens, the court upheld the right to publicly comment on open source licensing issues free from the threat of meritless litigation.  

Bruce Perens is one of the founders of the Open Source movement. He co-founded the Open Source Initiative and created the Open Source Definition. In the late 1990s, Perens served as Debian Project Leader, and has written software that is now used across the technology world, like the Busybox utilities for Linux. He was a key technician at Pixar for over a decade, and has been a tireless supporter of open source software over the years. Perens maintains a blog, perens.com, where he posts commentary about issues in open source licensing. He is well known and highly respected in the open source community.

Open Source Security, Inc. (OSS) runs a business providing security patches for Linux under the brand Grsecurity. (Patches are updates to software that fix problems in between major updates.) OSS does not share these patches with the kernel maintainers, and that had generated bad blood between them, because most Linux developers share patches freely for everyone’s benefit, as contemplated by the GNU General Public License that applies to the Linux kernel.   Like the kernel, Grsecurity is governed by the GPL. But in an attempt to discourage its customers sharing patches, OSS used a customer agreement that said that OSS had the right to cease supplying future Grsecurity security updates to users that redistribute the Grsecurity software. 

The customer agreement was brought to the attention of Perens, who posted about the agreement on his blog.  He expressed his opinion that customers should avoid the Grsecurity product because the user agreement posed a risk of violating the GPL.  The blog post also stated that Perens was not an attorney, and stated the facts that formed the basis for his opinions, including that the Grsecurity patch is inseparable from Linux and that GPL section 6 prohibits the addition of restrictions on certain rights such as distribution — the main clause that keeps free software free. 

The blog post was then shared to Slashdot, and, true to its tradition of spirited discussion, extensive public comment ensued — on the issue raised in Perens’s post and a host of other issues, including best practices for improving the security of the Linux kernel. Even before that, OSS’s practices were no stranger to controversy.  Linus Torvalds — the primary kernel maintainer who is well known for bluntness in expressing his opinions on the kernel — publicly called the Grsecurity product “pure garbage.” 

Rather than join the Slashdot discussion or contact Perens about his opinion, on July 17, 2017, OSS filed a lawsuit against Perens, asserting that his blog post constituted defamation (among other claims) and seeking millions in damages.  If that sounds surprising, it was. Defamation claims do not usually apply to businesses, and even when they are available under law for comments in a business context, most businesses avoid such claims because of the “Streisand effect” — where it brings more attention to the controversy than if they remain silent.

The defamation claim was deeply flawed, but nevertheless dragged on for over two years through appeal.  To win a defamation claim, a plaintiff must establish that the defendant made a provably false statement of fact. Coastal Abstract Serv., Inc. v. First Am. Title Ins. Co., 173 F.3d 725, 730 (9th Cir. 1999). Opinions, particularly those whose factual basis is disclosed, are not usually actionable due to protections of free speech and public participation. 

In its Complaint ¶¶ 22-23, Open Source Security v. Perens, Case No. 3:17-cv-04002, Dkt. 1 (N.D. Cal. July 17, 2017), OSS claimed that two statements in Bruce’s post were provably false facts: 

  • “It’s my strong opinion that your company should avoid the Grsecurity product sold at grsecurity.net because it presents a contributory infringement and breach of contract risk.” 
  • “As a customer, it’s my opinion that you would be subject to both contributory infringement and breach of contract by employing this product in conjunction with the Linux kernel under the no-redistribution policy currently employed by Grsecurity.”  .  

OSS argued that these statements should be considered the equivalent of facts, rather than opinions, mainly because Perens was a known expert on open source licensing. Opp. to Mot. to Dismiss at 16–17, Open Source Security v. Perens, No. 3:17-cv-04002, Dkt. 20 (N.D. Cal. Oct. 2, 2017).

OSS filed its lawsuit  in the Northern District of California. The case was decisively dismissed: The court found that the blog post contained opinions about an unsettled legal issue—whether the Grsecurity Access Agreement violated the GPL—and not provably false statements of fact.    Order at 2, Open Source Security v. Perens, No. 3:17-cv-04002, Dkt. 53 (N.D. Cal. Dec. 21, 2017).

But Grsecurity had taken a risk in filing and pursuing the lawsuit based on Perens’s expressed opinions, and that risk came to fruition. The U.S. legal system generally does not support broad “fee-shifting” — unlike some jurisdictions that allow the winner of a lawsuit to get attorneys’ fees from the loser.  But there are exceptions, one of which applied in the Perens case. Many states in the United States have laws to deal with specious claims, called “anti-SLAPP” suits. (SLAPP stands for Strategic Lawsuit Against Public Participation.) Anti-SLAPP claims help protect those who speak out on issues of public interest from lawsuits that threaten to stifle their ability to engage in public debate by burdening them with lawsuits and legal fees — exactly the kind of suit that OSS was using to try to silence Perens because it disagreed with his opinions. OSS argued that Perens’s blog post was not a matter of public interest because it was a matter of concern only to a “relatively small, specific audience,” (Opposition to Mot. to Dismiss at 14, Open Source Security v. Perens, Dkt. 20 (Oct. 2, 2017).)but the Ninth Circuit Court of Appeals rejected this argument. The Court recognized that an issue of interest to the open-source software community could meet the public interest threshold by being of critical interest to a narrow segment of society (without deciding that the impact of Perens’ blog post was so limited). Open Source Security, Inc. v. Perens, No. 18-15189 (9th Cir. 2020).

In fact, many questions about the interpretation of GPL are still unsettled. But OSS sought to use the defamation lawsuit to litigate the GPL interpretation question by proxy. That was problematic for a number of reasons including because the contributors to the Linux kernel code — those who may have had a legal right to enforce the GPL relating to OSS’ actions — were not parties to the case.

In its December 21, 2017 order dismissing OSS’s claims, the trial court noted that Mr. Perens’s statements were protected opinions made in a public forum and concerned issues of public interest, and dismissed the case. The court also went on to award Perens attorneys’ fees of over a quarter of a million dollars. Order, Open Source Security v. Perens, No. 3:17-cv-04002, Dkt. 95 (N.D. Cal. June 9, 2018).

OSS appealed both the dismissal and the attorneys’ fees award to the Ninth Circuit.  The appeal was handled by the Electronic Frontier Foundation, working with the law firm O’Melveny & Myers, which handled the case in the district court.  The case was argued on January 22, and on February 6, the Ninth Circuit affirmed the trial court’s decision.

The case underscored an important constitutional principle. Those who comment about legal matters of public interest, particularly unsettled ones, should not have to risk lawsuits and legal fees for expressing their opinions. That is why the anti-SLAPP statutes exist: to prevent bullies with lawyers from shutting down discussion. Expressing opinions on legal topics is also key to the functioning of a society of laws. We should all sleep more soundly knowing that public discourse is protected by outcomes like this one.

Note: I was part of the legal team at O’Melveny that handled this case. Thanks to my excellent colleagues Melody Drummond-Hansen and Kaitlyn Gosewehr for their contributions to this summary, to the entire team at O’Melveny and EFF for their dedicated and excellent work.

Cryptographic Autonomy License Approved by OSI

After a submission process of over a year and three versions, the CAL was approved last week by OSI.

CAL is a copyleft license, requiring a redistributors to make source code available, but more importantly, also contains a requirement to “maintain user autonomy” with respect to user data processed using the software:

4.2. Maintain User Autonomy.
In addition to providing each Recipient the opportunity to have Access to the Source Code, You cannot use the permissions given under this License to interfere with a Recipient’s ability to fully use an independent copy of the Work generated from the Source Code You provide with the Recipient’s own User Data.
“User Data” means any data that is an input to or an output from the Work, where the presence of the data is necessary for substantially identical use of the Work in an equivalent context chosen by the Recipient, and where the Recipient has an existing ownership interest, an existing right to possess, or where the data has been generated by, for, or has been assigned to the Recipient.
4.2.1. No Withholding User Data. Throughout any period in which You exercise any of the permissions granted to You under this License, You must also provide to any Recipient to whom you provide services via the Work, a no-charge copy, provided in a commonly used electronic form, of the Recipient’s User Data in your possession, to the extent that such User Data is available to You for use in conjunction with the Work.
4.2.2. No Technical Measures that Limit Access.  You may not, by the use of cryptographic methods applied to anything provided to the Recipient, by possession or control of cryptographic keys, seeds, or hashes, by other technological protection measures, or by any other method, limit a Recipient's ability to access any functionality present in the Recipient's independent copy of the Work, or deny a Recipient full control of the Recipient's User Data.
4.2.3. No Legal or Contractual Measures that Limit Access.  You may not contractually restrict a Recipient's ability to independently exercise the permissions granted under this License. You waive any legal power to forbid circumvention of technical protection measures that include use of the Work, and You waive any claim that the capabilities of the Work were limited or modified as a means of enforcing the legal rights of third parties against Recipients.

The intention of this license was to help preserve a user’s access to its own data. The license was promulgated by Holochain, which develops a framework on which developers can build their own applications. Holochain is a distributed ledger technology that was designed to avoid the scalability issues of familiar block-chain based systems like Bitcoin and Ethereum. It uses peer-to-peer networking for processing where “every device on the network gets its own secure ledger, or Holochain, and can function independently while also interacting with all the other devices.” The conditions of the license disallow use of the software with distributed-ledger applications that withhold from a user cryptographic keys that control the user’s own data in the network.

We want Holochain apps to be trusted as maximizing end-user autonomy and control. As that starts to happen, we can’t let someone claim their software is a “Holochain” app if they are actually maintaining central control of end-user cryptographic keys. Otherwise, people will think they’re in control of their accounts, money, personal information, or communications without realizing, at any moment, someone could strip them of their autonomy via revocation keys or a master seed.

https://medium.com/holochain/understanding-the-cryptographic-autonomy-license-172ac920966d

At the center of the OSI license approval controversy was whether the conditions requiring sharing users’own data were effectively a restriction in violation of section 6 of the Open Source Definition, or a necessity to compel behavior to preserve freedom, similar to the “Installation Information” requirements of GPL3.

The controversy over the scope of copyleft these days remains brisk. Regarding CAL, it was so heated that OSI founder Bruce Perens resigned in protest, as the license approached approval. There is a also a larger controversy over whether copyleft licenses written by single companies, and not part of the community drafting process, should be approved, regardless of content.

New Slide Presentation: Basics of Open Source Software Licensing

I am very pleased to announce that my narrated slide presentation on the basics of open source software licensing is now live on COSS Media.

The presentation is suitable for initial training for engineers, lawyers and businesspersons in corporate settings. This is a compact version of the training I have been giving to clients for years.

Creative Commons Non-Commercial Does Not Exclude Copy-for-Hire

The end of 2019 brought an interesting decision that could bear on open source licensing. The case interpreted a Creative Commons license, but raised an issue that crops up regularly for open source.

In Great Minds v. Office Depot, the Ninth Circuit affirmed dismissal of a copyright infringement claim by a publisher against a copy shop.  Great Minds published a curriculum called Eureka Math. It sold copies, but also made Eureka Math available for download online under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (“CC-NC”).

Schools and school districts, intending to use the materials under CC-NC, paid Office Depot to make copies of Eureka Math for use in their schools. Two principles were taken as given: that the schools’ intended use of the materials was authorized under CC-NC, but that if Office Depot were considered a licensee under CC-NC License, its use would not be authorized.

The Court held that Office Depot was not a licensee, because a “licensee’s hiring of a third-party copy service to reproduce licensed material strictly for the licensee’s own permitted use does not turn that third party into a licensee” under the CC-NC License.  The Court specifically addressed Section 2(a)(5)(A) of CC-NC , concluding that Office Depot was not a “downstream recipient” of Eureka Math.  The Court also disagreed with Great Minds’ “volitional” arguments, explaining the “absurd” results of treating copies made by a third-party copy shop differently from copies made by the schools’ own employees. 

This case bears on a common question for open source licensing: If a company has customized but not distributed GPL software that was developed by others, can the company engage a contractor to test or further develop that software without licensing the contractor under GPL? Most companies that ask this question put it a different way: Is engaging an contractor “distribution” that invokes copyleft requirements?

Based on this case, and on custom and practice, the answer is no. The contractor need not be licensed under GPL. Companies often take this issue seriously, because they wish to preserve their right to use “private copies” without disclosing source code under GPL.

Thanks to Patrick Nack-Lehman for his help preparing this post.