Licence laundering or license laundering occurs when a creative work under copyright is copied by another party, who then replaces the original licence with a different one. This party then illegitimately distributes the work with the new licence.

Content laundering edit

The online repository Wikimedia Commons hosts media and other files that are freely licensed,[1]: 422  such as those that are in the public domain, which may be redistributed without consent or royalty payment to the author.[1]: 424  Files uploaded to the repository that have restrictive licensing terms, such as those prohibiting the creation of derivative works or making commercial use of the file, are deleted.

Flickr is a popular source of files for Wikimedia Commons.[2]: 268  Its users upload content they create to Flickr's servers, assigning a licence for each work or accepting a default copyright licence.[3]: 94  It was found that some Flickr users upload content that is not their own creation, and for which they have no authority or licence grant to do so. Some of these works are erroneously assigned a free licence, apparently permitting their unrestricted distribution, including uploading the content to Wikimedia Commons. The practice has come to be known as "Flickr washing" on Wikimedia Commons, as it is the most common site from which licence laundered files are uploaded.[4]

Licence laundering of media and related files is common on image hosting providers such as Flickr or Picasa, and video hosting providers such as YouTube.[5]

Source code laundering edit

In software development, a programmer engages in licence laundering when using source code written by one or more other programmers but removing the licence from the source files or altering the file's header to exclude its revision history or other details.[6] This source code is then modified or integrated into other software, possibly violating the original licence terms.

Another example is using code released under one licence, and redistributing it under a different licence.[7] After SCO Group asserted it owned the intellectual property rights to Unix, a series of SCO/Linux controversies resulted, with SCO Groups chief executive officer Darl McBride stating that "The world is not about stealing people's code, laundering it and saying everything's OK."[8] In SCO Group, Inc. v. Novell, Inc., Novell was found to be the owner of Unix copyrights.[9]

Code for open-source software may be released with a pre-approved non-reciprocal licence permitting its use in other projects, which facilitates license laundering.[10]: 486  To avoid such laundering, developers and project managers should determine the source of the code, and mitigate potential problems with a quality assurance inspection.[10]: 486 

Identification edit

Licence laundering may be identified by detecting inconsistencies in the works. Most content creators use a set of common elements that are consistent throughout their portfolio, for example a style or handwriting. Users engaged in licence laundering typically upload files with a diversity of styles, since the styles reflect those of the author, not the licence laundering uploader.[5]

Image licence laundering may be detected by using reverse image search engines, such as TinEye or Google Images' "Search by Image" feature.[5] These services compare the characteristics of a reference work to a database containing the characteristics for numerous works analyzed by the service provider by spidering the World Wide Web. The results of a reverse image search may indicate the original source of the content.[11]

Another technique involves inspecting the Exif data associated with files. If the data is generally consistent in a set of files, the files were likely generated by the same individual, whereas if the data differ significantly, it may be indicative of a copyright infringement.[5] An example is a set of photographs generated by different camera models.

See also edit

References edit

  1. ^ a b Ayers, Phoebe; Matthews, Charles; Yates, Ben (2008). How Wikipedia Works: And how You Can be a Part of it. No Starch Press. ISBN 9781593271763.
  2. ^ Weinberg, Tamar (2009). The New Community Rules: Marketing on the Social Web. O'Reilly Media. ISBN 978-0-596-15681-7.
  3. ^ Bausch, Paul; Bumgardner, Jim (2006). Flickr Hacks: Tips & Tools for Sharing Photos Online. O'Reilly Media. ISBN 0-596-10245-3.
  4. ^ "License laundering". Wikimedia Commons. 2 June 2016 [Original version published 2009]. Retrieved 5 January 2017.
  5. ^ a b c d Wattenberg, Leo (31 January 2015). "licence considerations". Archived from the original on 26 February 2018. Retrieved 5 January 2017.
  6. ^ "Perens urges firms to go open source". ITNews/nextmedia. 12 November 2007. Retrieved 5 January 2017.
  7. ^ Naughton, Edward J. (11 August 2011). "Operating (system) without a license: Does Section 4 of the GPL leave Google and Android device manufacturers unlicensed? (Part 2)". Emerging Technologies Blog. Brown Rudnick LLP Attorney. Archived from the original on 2017-02-23. Retrieved 11 February 2017.
  8. ^ Weiss, Todd R. (19 May 2003). "Users outraged as SCO stakes Linux legal claim". Computerworld. Retrieved 24 September 2017.
  9. ^ Harvey, Tom (30 March 2010). "Decision in SCO-Novell case ripples beyond Utah". The Salt Lake Tribune. Retrieved 11 February 2017.
  10. ^ a b Davidson, Stephen J.; Levi, Stuart D. (2005). Open Source Software: Risks, benefits & practical realities in the corporate environment. Intellectual property course handbook. Practising Law Institute.
  11. ^ "How can I use TinEye to find the copyright owner of an image?". Frequently asked questions. TinEye. Retrieved 5 January 2017.

Further reading edit