Free software group files copyright lawsuits
Battle over BusyBox includes mid-call hangups, conflicting claims
IDG News Service - The Software Freedom Law Center, an organization focused on protecting open-source and free software, has filed copyright lawsuits against two U.S. companies, alleging that they are redistributing software in violation of the GNU GPL (General Public License).
The SFLC filed lawsuits Monday on behalf of the developers of BusyBox against High-Gain Antennas of Parker, Colorado, and Xterasys of City of Industry, California. The lawsuits, filed in U.S. District Court for the Southern District of New York, allege that the companies are distributing BusyBox illegally, without meeting the GPL requirement of providing access to the source code of their implementation.
BusyBox, available since November 1999, is a lightweight set of standard Unix utilities commonly used in embedded systems licensed under GPL version 2. The two companies are distributing "BusyBox, or a modified version of BusyBox that is substantially similar to BusyBox," the lawsuits allege. The lawsuits ask the court to give the BusyBox developers the profits from that software, plus other damages.
But Richard Bruckner, CEO of High-Gain Antennas, said the SFLC is mistaken about the GPL violation. The company, which makes wireless broadband antennas and related products, uses firmware from a company called Edimax, not BusyBox, and makes the source code available, at the request of customers, he said.
Bruckner said he tried to explain the situation in a conference call with SFLC officials but was hung up on. During that first conversation SFLC was "already asking for money," he said. "What they need to do is get their act together and read the source code."
If the SFLC doesn't end its threats, High-Gain Antennas may file a countersuit, Bruckner added.
But Dan Ravicher, SFLC's legal director, said the organization has tried to work with both companies and has not gotten adequate responses. The two sides may still be able to settle the lawsuits out of court, he said.
"There is a hope, but since neither defendant wanted to resolve the matter privately previously, we'll have to see if they want to do so now," he said. "In the end, we can hope to settle all we want, but if the defendants don't want to do so, we can't force them to. All we can do is ask the court to force the defendants to comply with the law."
Ravicher also said he's confident in the lawsuits. "The evidence we collected during our investigation was sufficient for us to form a basis for our belief that they are distributing BusyBox and are not doing so in compliance with the GPL," he said.
If either case filed is heard before a judge, it would be the first time that a GPL infringement lawsuit has gone to trial in the U.S.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts