Jennifer Ding
    • Create new note
    • Create a note from template
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Write
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
    • Invite by email
      Invitee

      This note has no invitees

    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Note Insights
    • Engagement control
    • Transfer ownership
    • Delete this note
    • Save as template
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Versions and GitHub Sync Note Insights Sharing URL Create Help
Create Create new note Create a note from template
Menu
Options
Engagement control Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Write
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       owned this note    owned this note      
    Published Linked with GitHub
    Subscribed
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    Subscribe
    # TTW: Ethics-informed Licensing Old Proposed Location: [Guide for Ethical Research/Ethics-Informed Licensing](https://the-turing-way.netlify.app/ethical-research/ethics-intro.html) New Proposed Location: [Guide to Reproducible Research/Licensing](https://the-turing-way.netlify.app/reproducible-research/licensing.html) ## Background Ethics-informed licenses have evolved from traditional open source licenses in recognition of the use of free and open source software in harmful or unethical applications. While often times these licenses build off of open licenses as a foundation, they often include restrictions based on an ethical value such as a general "do no harm" or more targeted value such as limiting use for law enforcement applications. ## Limitations Adoption has been limited for these licenses so far for various reasons. Some open source developers do not agree with adding restrictions on use, as that would compromise the principles of "openness". Additionally, enforcement of ethical conditions can be challenging from a legal standpoint. ## Ethical Source [Ethical Source](https://ethicalsource.dev/) was created to "empower developers, giving us the freedom and agency to ensure that our work is being used for social good and in service of huan rights." Motivated by the growing use of open source software for technologies such as mass surveillance and racial profiling, the movement aims to reduce this "misuse" of open source software. Ethical Source builds upon open source principles to provide developers additional means to ensure their work is used for applications aligned with ethical values important to them like: - Advocating for workers' rights and human rights - Ensuring protections against violence and discrimination - Protecting privacy A list of Ethical Licenses and their targeted applications can be found on the [Ethical Source website](https://ethicalsource.dev/licenses/) or as part of our [Software Licenses chapter](https://the-turing-way.netlify.app/reproducible-research/licensing/licensing-software.html). ## Responsible AI [Responsible AI licenses](https://www.licenses.ai/) are motivated by the unique harms that machine learning models, and the data used to train them, can create throughout the AI lifecycle. These can include direct harms such as non-consensual data collection and biased or problematic data and model predictions or indirect harms such as the large expenditures of energy used to train state-of-the-art models. (energy used in ML training: https://arxiv.org/abs/1906.02243, https://arxiv.org/abs/2204.05149 - not unique to ML) Responsible AI licenses target specific harms by enacting use-based restrictions to mitigate these potential harms associated with component parts such as data, model, code, or applications. To learn more about different Responsible AI licenses, visit our Machine Learning Licenses chapter. # Thoughts on a combined licencing ethics section - Practical / applied Licencing ethics - https://the-turing-way.netlify.app/reproducible-research/licensing.html - Extended licencing ethics secton that gets more into detail - https://the-turing-way.netlify.app/ethical-research/ethical-research.html - Merging - Free software licences / software freedom te/the-turing-way/issues/2595 - Responsible AI Licences # Reference materials - software - https://www.gnu.org/philosophy/free-sw.html - https://archive.org/details/faif-2.0/mode/2up - https://www.fsf.org/ - https://opensource.org/osd/ - https://sfconservancy.org/ - https://softwarefreedom.org/ - https://ethicalsource.dev/ - media - https://creativecommons.org/ - ML - https://www.licenses.ai/ - For Children - https://fsfe.org/activities/childrensbook/index.en.html - Other / political reform - [Free as in freedom 2.0](https://archive.org/details/faif-2.0/mode/2up) - [What if we could reimagine copyright?](https://www.jstor.org/stable/j.ctt1q1crjg) - [Chokepoint capitalism](https://craphound.com/chokepoint/2022/09/27/twitch-does-a-chokepoint-capitalism/) - [Intellectual Property & Monopoly Capitalism]( https://crashcourseeconomics.org/webinar/intellectual-property-and-monopoly-capitalism) - tools -[Reuse](https://reuse.software/) - Legal - license enforcement - https://opensource.com/article/21/3/test-cases-open-source-licenses - International treaties impacting most nation state level IP law - Berne Convention for the Protection of Literary and Artistic Works https://www.wipo.int/treaties/en/ip/berne/ - TRIPS https://www.wto.org/english/docs_e/legal_e/27-trips_01_e.htm - DMCA https://www.congress.gov/bill/105th-congress/house-bill/2281 - ?relevant EU directives # Ethics-informed Licensing (new) 'Intellectual property (IP)' law is a complex subject, however some understanding of it is important for anyone producing creative works governed by it inlcuding; software, datasets, graphics and more. This is true when producing a work as a contribution to open culture or as a potential commercial venture. Decisions about licencing made at the inception of a project can have long lasting and significant ramificaitons. This section is framed in terms of ethics because of these ramifications, the choices that you make about how your work is licenced shape who can and cannot legally use your work and for what purpose. It aims to be informative about the implications of licencing choices for the use of your work but not to prescribe a specific ethic, as there are divergent schools of thought on the ethics of different licencing choices. Intellectual property is an umbrella term that referes to a number of distinct areas of law, primarily these three: - Copyright - Patent - Trademark What these have in common is the attempt to extend property rights to ingangible goods. Note: There are differences between countries laws on these points and it is worth paying attentention to the particulars of the the law in the juristications where you are working but most nations are signatories to international treaty agreements which somewhat harmonise these laws notably the [TRIPS Agreement](https://www.wto.org/english/docs_e/legal_e/27-trips_01_e.htm). Perhaps the most relevant for software, data and other creative works is copyright. I will dispense quickly with Patents and Trademarks here so we can move on to the main topic of copyright. ## Patents The most important difference between patent and copyright to be immediately aware of is that by default all rights are retained by the author on works made public under copyright wherease patents must be registered before their content is publicly disclosed. Thus if you want to patent something you must do so prior to sharing it publicly. The precise details of what constitutes a disclosure and the strictness of the application of this rule can vary by jurisdiction. Patents on processes and software rather than specific inventions are a matter of contention in US law and explicitly not recognised in EU law (at time of writing). Unlike copyright you generally have to pay to register and maintain a patent. You must also do so in each jurisdication in which you want this patent to apply, though some have reciprocal agreements for recognising patents from other jurisdictions. To ensure that patents held by the authors of software do not impact on the freedom to use and distribute open software some licences specifically include permission to use any applicable patents (for example [Apache 2.0](https://www.apache.org/licenses/LICENSE-2.0.html), see section 3), though this cannot protect against patents held by 3rd parties. <!-- citations needed --> <!-- when should you patent something and when not?--> <!-- IP ownership employment & institutions --> <!-- UK patent info https://www.gov.uk/topic/intellectual-property/patents --> <!-- UK has a related but distinct concept of a 'registered design' https://www.gov.uk/topic/intellectual-property/designs --> ## Trademarks Trademarks are a brand, symbol, or identifying mark associated with a project, product or service. They, like patents must also be registered but unlike patents this can be done after they have been made public. Registering a trade mark generally comes with an administrative fee but is not as costly as maintaining a patent. They are generally legal protected to help prevent impersonation. Consequently trademarks generally only apply with a specific sector as people are unlikely to confuse brands which do completely different things. They can be relevent in the context of the name and logo of a software project, especially when a project changes hands or is forked, in which case the fork may not be able to use the original name of the project even if that project is no longer maintained. Open-source projects not associated with a company which have trademarks may have these held by a legal entity such as a non-profit through which they might also take donations and pay for project infrastructure. <!-- citations needed --> <!-- UK trade mark info https://www.gov.uk/topic/intellectual-property/trade-marks --> ## Copyright <!-- UK copyright info https://www.gov.uk/topic/intellectual-property/copyright --> By default if you make a work publicly available you retain the copyright to that work and all rights that this gives you over it. Anyone wishing to re-use that work must seek to licence the right to do so from you or open themselves to the possibility of a lawsuit for infringing on your copyright. Irrespective of how you choose to licence your work, however, there are some generally accepted exceptions to the protections of copyright that permit the re-use of works or parts of works without the consent of the copyright holder under certain circumstances. These are know as 'fair use' or 'fair dealing' exceptions. Under the 'fair use' standard originating in the USA the following criteria are considered on a case-by-case basis to decide if a use constitutes an infringement of copyright: > From [17 U.S.C § 107](https://www.law.cornell.edu/uscode/text/17/107) > - the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; > - the nature of the copyrighted work; > - the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and > - the effect of the use upon the potential market for or value of the copyrighted work. The 'fair dealing' standard, originating in British law, generally includes more explicity enumerated execptions but with similar intent. <!-- citations needed --> For anyone wishing to circulate their work and grant others the right to re-use, remix, or re-distribute that work free of charge, coming to individual licening arangements with everyone who might want to do this is obviously impractical. To address this there exist numerous pre-made 'off-the-self' licenses that you can apply to your work. Which of these you choose shapes how and under what circumstances others are permitted to re-use your work without infinging on your copyright. pre-made Licences exist that are tailored to the differences between different types of works. For example there are licences intended to be used for software and licences intended to be used for other creative works such as images & prose (text). In addition there are now licences tailored for machine learning / artificial inteligence models as these are comprised of several parts, including: training data, code, and model weights. Each of these parts may be licenced differently and there is even some dispute as to wether model weights are subject to copyright at all under current law. <!-- citations needed --> This is an area which is likely to see (by legal standards) rapid changes in the near future given recent developments in the comercialisation of ML models. ### Where to find open licenses for different types of work - Code - The [Open Source Initiaitive (OSI)](https://opensource.org/licenses/) maintains a list of [approved Licences](https://opensource.org/licenses/) open-source licences - [Free Software Foundation](https://www.fsf.org/) maintains a [list of GPL-Compatible Free Software Licenses](https://www.gnu.org/licenses/license-list.html#SoftwareLicenses) - [GNU/FSF recomendations](https://www.gnu.org/licenses/license-recommendations.html) - [choosealicense.com](https://choosealicense.com/) provides a tool to guide you through the license choice project. - [Organisation for ethical source](https://ethicalsource.dev/) maintains a list of [ethical source licenses](https://ethicalsource.dev/licenses/) - Prose, Images, Audio, Video, Datasets, etc. - [Creative Commons (CC)](https://creativecommons.org/) - [Creative Commons License Chooser](https://creativecommons.org/choose/) ![figure from https://libguides.gwu.edu/opentextbooks/creative_commons](https://s3.amazonaws.com/libapps/accounts/22603/images/CC-License-Chart.png) <!-- alt text needed! --> - Machine Learning (ML) / artificial inteligence (AI) systems - Creative commons and Software licences can be applied to different parts of ML/AI systems, CC to training data and weights, software licences to code used in training / depoyment. - [Responsible AI Licenses (RAIL)](https://www.licenses.ai/) There are some general principles which apply to licences across the different types of entity that they try to licence. Licences can generally be placed on a spectrum from proprietary, through permissive, to 'share alike' or 'copy-left' (the opposite of copyright). This spectrum is something of a oversimplification and there are some extensions and caveats we'll get to later. Perissively licenced things can generally be used by anyone for any purpose. A popular minimal example of this for software is known as the [MIT licence](https://mit-license.org/), for other works [CC0](https://creativecommons.org/share-your-work/public-domain/cc0/) the 'public domain' licence. Copy-left licences attempt to ensure that any re-distributions or derived works also remain 'free', the cannonical example is the [GPL](https://www.gnu.org/licenses/gpl-3.0.html). Unlike permissively licenced content which can be modified and redistributed under a different licence including as a part of a closed and/or for profit project. ### What is 'free' software? The concept of copy-left licences and their first example, the GPL, originate with Richard Stallman who founded the free-software foundation (FSF) in 1985. <!-- citations needed --> The four fundemental freedoms of free/libre* software: - Freedom 0: The freedom to run the program as you wish, for any purpose. - Freedom 1: The freedom to study how the program works, and change it, so it does your computing as you wish. Access to the source code is a precondition for this. - Freedom 2: The freedom to redistribute copies so you can help others in your community. - Freedom 3: The freedom to distribute copies of your modified versions to others. By doing this, you can give the whole community a chance to benefit from your changes. Access to the source code is a precondition for this. Other influential definitions of free and open-source software include: The Debian project's [Debian Free Software Guidelines (DFSG)](https://www.debian.org/social_contract#guidelines), and the open source initiative (OSI)'s [Open Source Definition](https://opensource.org/osd/). Note* The word 'free' in english does not distinguish something being moneratily free 'gratis' from politically free 'libre'. This is often sumarised along the lines of: "free as in speech, not necessarily free as in beer" Thus the phrase 'libre software' is sometimes encountered in english to succinctly distinguish the concept of software which respects your liberty from software which is finacially free to use ('gratis'). It is also common to encounter the acronyms FOSS (Free and open-source software) and FLOSS (Free/libre and open source software) The FSF contends that all software should respect these freedoms and that all software which does not respect these freedoms creates an asymetric relationship between the users and developers of that software which can readily be abused by the developers to exploit their users. If developers are bad stewards of a free software projects the friction for replacing them is low as all of the work put into the software does not need to be re-done. A 'fork' of the project can be made, developed and maintained by different developers whom the community of users deem a better steward. This is not true of proprietary projects where the developers own the rights to the code and thus cannot be readily replaced by the community of users if they begin to abuse these users who are now held captive by switching costs. Copy-left licences are an attempt to ensure that software remains effectively under community ownership and cannot be used to make propritary software which does not respect the four freedoms and may thus result in the abuse of its users. To attempt to acheive this goal copy-left software requires that when distributing copy-left software or derived works that you do so under the same terms as the original licence. Creative commons 'share-alike' licences attempt the same thing for other content. Copy-left licences do not prohibit comercial use of code, indeed numerous companies exist which develop copy-left projects and sell support services for deploying those projects instead of using proprietary licences which would incentivise an unhealthy relationship with their users, [Nextcloud](https://nextcloud.com/) is an excellent example. Nextcloud make use of the [AGPL v3.0](https://www.fsf.org/bulletin/2021/fall/the-fundamentals-of-the-agplv3) a license which extends the protections of the GPL to software used over a network. It gives users who interact with this software over a network, for example by using a web service, rather than run it on their own computers the right to access a copy of the source code; which they are further free to modify and distribute as is usual for the GPL. Within copy-left licences there are 'strong' and 'weak' copy-left licences. 'Strong' copy-left licenses require that combined works which contain them as a library also carry the same license but weak copy-left licenses permit their re-distribution as a library within a combined work under a different license. We will define derived and combined works in the section on licence compatability where the detaileed implications of the distictions between strong & weak copyleft, and permissive licencing are explored in more practical detail. <table> <thead> <tr> <th colspan="3">Free</th> <th rowspan="3">Proprietary</th> </tr> <tr> <th colspan="2">Copyleft</th> <th rowspan="2">Permissive</th> </tr> <tr> <th>Strong</th> <th>Weak</th> </tr> </thead> <tbody> <tr> <td>GPL<sup>1</sup> CDDL<sup>2</sup></td> <td>LGPL<sup>3</sup> MPL<sup>4</sup></td> <td>BSD<sup>5</sup> MIT<sup>6</sup> Apache</td> <td>Research Only: No&nbsp;copying, No&nbsp;modification</td> </tr> </tbody> <caption> <div class="footnote"> <sup>1</sup>GPL: GNU General Public License <sup>2</sup>CDDL: Common Development and Distribution License <sup>3</sup>LGPL: GNU Lesser General Public License <sup>4</sup> MPL: Mozilla Public License <sup>5</sup> BSD: Berkeley Software Distribution <sup>6</sup> MIT: Massachusetts Institute of Technology </div> Licenses can either be Free or Proprietary, with Free Licenses further classified as Copyleft or Permissive. </caption> </table> ### What are 'Ethical source' and 'Responsible AI' Licenses? Both 'Ethical source' & 'Responsible AI' Licenses seek to place restrictions on the uses to which the licensees can but the software or machine learning system to prohibit their use for unethical activities. #### 'Ethical Source' The ethical source movement seeks to affirmatively protect specific user rights by curtailing freedom 0, the freedom to use software 'for any purpose' and prohibiting the use of the software for unethical purposes. Consequently these licence by the classical definitions of free and open-source software from the FSF and OSI would not be considered free or open-source licences, they do however generally resemble them in the other three cirteria of the definition. Their merits verus conventional open-source licenses has be the subject of some debate and their adoption has thus far been relatively limited. A leading figure in this movement is Coraline Ada Ehmke creator of the [contributor covenant](https://www.contributor-covenant.org/), the [Hippocratic License](https://firstdonoharm.dev/), and the founder in 2020 of the [organisation for ethical source](https://ethicalsource.dev/). In the words of its advocates [Ethical Source](https://ethicalsource.dev/) was created to "empower developers, giving us the freedom and agency to ensure that our work is being used for social good and in service of human rights." Motivated by the growing use of open source software for technologies such as mass surveillance and racial profiling, the movement aims to reduce this "misuse" of open-source software. Ethical Source extends upon the principles of open source to provide developers additional means to ensure their work is used for applications aligned with ethical values important to them like: - Advocating for workers' rights and human rights - Ensuring protections against violence and discrimination - Protecting privacy A list of Ethical Licenses and their targeted applications can be found on the [Ethical Source website](https://ethicalsource.dev/licenses/). The core hippocratic licence, for example, prohibits a variety of human rights abuses and mandates equal pay for equal work. It can be further extended using [their licence building tool](https://firstdonoharm.dev/build/) with modules covering: - Fossil Fuel Divestment - Ecocide - Extractive Industries - Boycott / Divestment / Sanctions - Taliban - Myanmar - Xinjiang Uygur Autonomous Region - US Tariff Act - Mass Surveillance - Military Activities - Law Enforcement - Media - Social Auditing - Workers on Board of Directors - Supply Chain Transparency - Copyleft Licensees are given 30 days upon notification of a violation or harm to remedy them before the license is terminated. The potential difficulty of demonstrating compliance with these terms and of bringing effective legal action against any party not complying with them has attracted some skepticism about the effectiveness of this approach. #### Responsible AI Licenses These same principles developed in 'ethical source' apply to the 'Open' variants of the licences from RAIL (Responsible AI Licences). In that they are attempting to place restrictions on the uses to which licencees can put the thing being licenced. Traditional software has many of the same concerns which affect machine learning models and indeed also often contain assets such as images which may be licenced differently from software with which they are bundled. The primary differences being governance of data used in training the models (see: Data Governance for the Machine Learning Pipeline) and the lack of interpretability of the decisions of many ML systems, though this latter point can also be an issue for conventional systems if they are closed. RAIL provides a succinct way of expressing licences for combined machine learning systems which include, the data on which they were trained, the software used to specify this, the model weights generated as a result and the applications which provide an interface to the resulting model. RAIL provides these definitions of the modifiers that can be applied to their licenses: > - **D**ata: The dataset(s) used to pretrain or train an AI Model. > - **A**pplication/service: Any executable software code or application, including API-based remote access to software. > - **M**odel: Machine-learning based assemblies (including checkpoints), consisting of learnt weights and parameters (including optimizer states), corresponding to the model architecture. > - **S**ource: The source code and scripts associated with the AI system. Therefore: > - RAIL-D: RAIL License includes Use Restrictions only applied to the data > - RAIL-A: RAIL License includes Use Restrictions only applied to the application/executable > - RAIL-M: RAIL License includes Use Restrictions only applied to the model > - RAIL-S: RAIL License includes Use Restrictions only applied to the source code These are the restrictions placed on the licencee of a RAIL-M license: > You agree not to use the Model or Derivatives of the Model: > a. In any way that violates any applicable national, federal, state, local or international law or regulation; > b. For the purpose of exploiting, harming or attempting to exploit or harm minors in any way; > c. To generate or disseminate verifiably false information and/or content with the purpose of harming others; > d. To generate or disseminate personal identifiable information that can be used to harm an individual; > e. To generate or disseminate information and/or content (e.g. images, code, posts, articles), and place the information and/or content in any context (e.g. bot generating tweets) without expressly and intelligibly disclaiming that the information and/or content is machine generated; > f. To defame, disparage or otherwise harass others; > g. To impersonate or attempt to impersonate (e.g. deepfakes) others without their consent; > h. For fully automated decision making that adversely impacts an individual’s legal rights or otherwise creates or modifies a binding, enforceable obligation; > i. For any use intended to or which has the effect of discriminating against or harming individuals or groups based on online or offline social behavior or known or predicted personal or personality characteristics; > j. To exploit any of the vulnerabilities of a specific group of persons based on their age, social, physical or mental characteristics, in order to materially distort the behavior of a person pertaining to that group in a manner that causes or is likely to cause that person or another person physical or psychological harm; > k. For any use intended to or which has the effect of discriminating against individuals or groups based on legally protected characteristics or categories; > l. To provide medical advice and medical results interpretation; > m. To generate or disseminate information for the purpose to be used for administration of justice, law enforcement, immigration or asylum processes, such as predicting an individual will commit fraud/crime commitment (e.g. by text profiling, drawing causal relationships between assertions made in documents, indiscriminate and arbitrarily-targeted use). RAIL-S licences carry their [Software Usage Restrictions](https://www.licenses.ai/source-code-license). This flow diagram guides you through the choice of a suitable RAIL: ![source: https://www.licenses.ai/blog/2022/8/18/naming-convention-of-responsible-ai-licenses](https://images.squarespace-cdn.com/content/v1/5c2a6d5c45776e85d1482a7e/381a69a4-28d9-4b6a-be5c-516330e7d8b9/diagram.png) <!-- alt text needed! --> RAIL license can be used in closed applications and Open RAIL licenses are permissive with respect to the model and software but not with respect to the usage restrictions. Note that there is not an effective equivalent to a copyleft version of the Open RAIL licences. None of them require that the software or models contained in them also be similarly licenced in derived works, only that the usage restrictions be retained. This could be a useful extension to these license adding an 'L' for copy**L**eft and including a clause making any software, model weights, or sourcecode in the bundle strong copyleft. #### Potential Risks In the absence of case law deciding on license enforement decisions for these licences it is as yet unknown what (if any) administrative burden may be associated with demonstrating compliance with ethical source and RAIL licences. Whilst unlikely for any given user of software licenced in this fashion it is hypothetically possible that such licences could be weaponised by bad actors seeking to impose costs on the entities using the licences, as [has occured before](https://onezero.medium.com/beware-the-copyleft-trolls-a8b85c66b7eb) with 'exploits' in open licences. A well intentioned organisation using tools under such a licence could theortically be sued for not complying with the terms of these licences and have to pay legal fees and/or incur other expenses associated with demonstrating compliance with the terms, depending on decisions made during the legal process. These licenses becasuse they impose greater restrictions on their licencees expose a greater attack surface for such bad actors as compliance with the terms of conventional free software licences is relatively easy. To comply you can simply share the code, if you have a well managed internal code repositories this should be inexpensive, if you have to comb through your git history to remove secrets you illadvisedaly committed then things might get more expensive. ### Licencing enforcement There have been a number of successful legal cases that have been brought in defence of the terms of copyleft licenses obliging the parties abusing the terms of these licenses to appropriately release their code. But this can be hard to discover as it is not immediately obvious if copyleft code has been used from looking at a blackbox propreitary end product. <!-- citations needed --> Organisation which take legal action in defence of free software, and which can provide information and resources for anyone else seeking to do the same include: - [Software Freedom concervancy](https://sfconservancy.org/) - [Software Freedom Law Centre](https://softwarefreedom.org/) - [FSF - licensing and compliance](https://www.fsf.org/licensing/) - [Free Software Foundation Europe (FSFe) - legal work](https://fsfe.org/activities/legal.en.html) - [Electronic Fontiers Foundation - legal cases](https://www.eff.org/cases) ### Being a wellcoming space to those who do not want to use proprietary software Some people avoid using non-free software on principle to the greatest extent that they can. It is highly impractical to completley avoid all non-free software in the world today so many have compromises and workarounds. This might include measures such as only running proprietry code in a sandbxed environment like a web browser but this can impose an additional burden on these users. This is especially true if proprietary tools do not offer first class feaures in browers or support free software operating systems like Linux. Consequently the choice to use open infrastructure is important if you want to be inclusive of people who adhere strongly to the free software ethos and consider being asked to use non-free software as an imposition. A small minority of people simply will not participate if doing so requires that they use non-free software. ### Pertinant edge cases #### Contributor Licence Agreements The holder of the copyright on a copy-left project can still re-licence that project or dual-licence that project under a different licence for example to grant exclusive rights to comercially distribute that project with proprietary extentions or to make future versions propritary. In a large community developed project this would require the consent of all contributors as they each own the copyright to their contributions. To get around this some copy-left projects developed by companies that comercially licence proprietary extensions to these projects ask their contributors to sign contributor licence agreements (CLAs) which assigns the contributor's copyright to the company so that they can legally dual-licence the project. #### 'Source Available' Under a proprietary licence the code is generally not made public. Some projects share their code but do not licence it's re-use, modification or redistribution this is known as being 'source available' or 'shared-source', the [Vivaldi](https://vivaldi.com/) web browser is an example of such a project. ## Further reading - Other / political reform - [Free as in freedom 2.0](https://archive.org/details/faif-2.0/mode/2up) - [What if we could reimagine copyright?](https://www.jstor.org/stable/j.ctt1q1crjg) - [Chokepoint capitalism](https://craphound.com/chokepoint/2022/09/27/twitch-does-a-chokepoint-capitalism/) - [Intellectual Property & Monopoly Capitalism]( https://crashcourseeconomics.org/webinar/intellectual-property-and-monopoly-capitalism) - tools -[Reuse](https://reuse.software/) - Legal - International treaties impacting most nation state level IP law - Berne Convention for the Protection of Literary and Artistic Works https://www.wipo.int/treaties/en/ip/berne/ - TRIPS https://www.wto.org/english/docs_e/legal_e/27-trips_01_e.htm - DMCA https://www.congress.gov/bill/105th-congress/house-bill/2281 - ?relevant EU directives # notes 3. Restrictions. 1. If You distribute any portion of the Contribution, You must include a complete copy of this License with the distribution; and 2. You agree that the Contribution, or any derivative work of the Contribution, will not be used by You or any third party subject to Your control, to: a. Surveillance i. Detect or infer any legally protected class or aspect of any person, as defined by U.S. Federal Law; and ii. Detect or infer aspects and/or features of an identity any person, such as name, family name, address, gender, sexual orientation, race, religion, age, location (at any geographical level), skin color, society or political affiliations, employment status and/or employment history, and health and medical conditions. Age and medical conditions may be inferred solely for the purpose of improving software/hardware accessibility and such data should not be cached or stored without the explicit and time limited permission of Licensor b. Computer Generated Media i. Synthesize and/or modify audio-realistic and/or video-realistic representations (indistinguishable from photo/video recordings) of people and events, without including a caption, watermark, and/or metadata file indicating that the audio-realistic and/or video-realistic representations were generated using the Contribution. c. Health Care i. Predict the likelihood that any person will request to file an insurance claim; ii. Determine an insurance premium or deny insurance applications or claims; iii. Predict the likelihood that any person request to file an insurance claim based on determining a lifestyle of a person, medical-test reports, demographic details of a person and/or online activity of a person; iv. Determine an insurance premium or deny insurance applications or claims based on data determining a lifestyle of a person, medical-test reports, demographic details of a person, and/or online activity of a person; v. Deny an insurance claim based on any predicted likelihood of the possibility of insurance fraud; and vi. Diagnose a medical condition without human oversight. 3. Restrictions referenced in Section 3.2 MUST be included as an enforceable provision by You in any type of legal agreement governing the use and/or distribution of the Work or any Derivative Works, and You shall give notice to subsequent users You Distribute to, that the Work or any Derivative Works are subject to Section 3.2. You shall require all of Your users who use the Work or any Derivative Works to comply with the terms of Section 3.2. 4. Criminal i. Predict the likelihood that a crime will be committed by any person; ii. Predict the likelihood, of any person, being a criminal or having committed a crime; iii. Predict the likelihood, of any person, being a criminal, based on the person’s facial attributes or another person’s facial attributes; iv. Predict the likelihood, of any person, having committed a crime, based on the person’s facial attributes or another person’s facial attributes; v. Predict the likelihood that a crime will be committed by any person, based on the person’s facial attributes or another person’s facial attributes; vi. Predict a likelihood of a crime being committed by any person, based on evidence collected, facial and emotion analysis, or other such features vii. Use personal data and/or personal characteristics or features such as: name, family name, address, gender, sexual orientation, race, religion, age, location (at any geographical level), skin color, society or political affiliations, employment status and/or history, health and medical conditions (including physical, mental), family history, social media and publicly available data, image or video analysis of an individual or a group(s) of individuals, heart-rate, perspiration, breathing, and brain imaging and other metabolic data to predict the likelihood a person will engage in criminal behavior; and viii. Predict the likelihood of a person being a criminal based on the person or other User’s facial attributes.

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password

    or

    By clicking below, you agree to our terms of service.

    Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully