Cisco sued for copyright infringement over Linksys router
Free Software Foundation claims Cisco not in compliance with its licensing on several programs
The foundation alleged that "in the course of distributing various products under the Linksys brand, Cisco has violated the licenses of many programs on which the FSF holds copyright, including GCC, binutils, and the GNU C Library." Cisco has denied its users their right to share and modify the software as a result, the foundation said.
Brett Smith, FSF licensing compliance engineer, writing in his blog said the FSF in 2003 learned that the Linksys WRT54G wireless router used a GNU/Linux system in its firmware, "but customers weren't receiving all the source code they were entitled to under our licenses."
Smith added that the FSF began working with Cisco in 2003 to help the company establish a process for complying with FSF's software licenses. It also emerged that other Cisco products were not in full compliance either, according to Smith, who described the FSF's five-year effort to get Cisco compliant as a "running game of Whack-a-Mole."
Cisco has refused to "notify customers about previous violations and inform them about how they can now obtain complete source code," Smith claimed. "The FSF has put in too many hours helping the company fix the numerous mistakes it's made over the years. Cisco needs to take responsibility for its own license compliance," he added.
The complaint was filed in U.S. District Court for the Southern District of New York by the Software Freedom Law Center, which is providing representation to the FSF in the case. A copy of the complaint is available on the FSF Web site.
In a statement, Cisco said, "Cisco is a strong supporter of open source software. Cisco takes its open source software obligations and responsibilities seriously and is disappointed that a suit has been filed by the Free Software Foundation related to our work with them in our Linksys Division. We are currently reviewing the issues raised in the suit, but believe we are substantially in compliance. We have always worked very closely with the FSF and hope to reach a resolution agreeable to the company and the foundation."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts