1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
|
The Hacktivismo Enhanced-Source Software License Agreement
Everyone is permitted to copy and distribute verbatim copies of this
license document. You may use content from this license document as
source material for your own license agreement, but you may not use
the name "Hacktivismo Enhanced-Source Software License Agreement ,"
("HESSLA") or any confusingly similar name, trademark or service-mark,
in connection with any license agreement that is not either (1) a
verbatim copy of this License Agreement, or (2) a license agreement
that contains only additional terms expressly permitted by The HESSLA.
INTRODUCTORY STATEMENT
Software that Hacktivismo[fn1] releases under this License Agreement
is intended to promote our political objectives. And, likewise, the
purpose of this License Agreement itself is political: Namely, to
compliment the software's intended political function. Hacktivismo
itself exists to develop and deploy computer software technologies
that promote fundamental human rights of end-users. Hacktivismo also
seeks to enlist the active participation and involvement of people
around the world, to help us improve these software tools, and to take
other actions (including actions that involve using and distributing
our software, and the advancement of similarly-minded software
projects of others) that promote human rights and freedom worldwide.
[fn1] http://hacktivismo.com/
Because of our non-commercial objective of promoting end-users'
freedoms, Hacktivismo has some special, and admittedly ambitious,
licensing needs. This License Agreement enhances the benefits of
published source code by backing up our human rights projects with
appropriate remedies enforceable in court.
The Freedoms We Promote: When we speak of the freedom of end-users, we
are talking about basic freedoms recognized in the Hacktivismo
Declaration,[fn2] the International Covenant on Civil and Political
Rights,[fn3] the Universal Declaration of Human Rights,[fn4] and other
documents that recognize and promote freedom and human
dignity. Principal among these freedoms are:
[fn2] http://hacktivismo.com/about/declarations/
[fn3] http://www.unhchr.ch/html/menu3/b/a_ccpr.htm
[fn4] http://www.un.org/Overview/rights.html
Freedom of Expression: The freedom of opinion and expression
"include[s] freedom to seek, receive and impart information and ideas
of all kinds, regardless of frontiers,"[fn5] and the freedom to choose
one's own medium of expression. The arbitrary use of technological
censorship measures to block or prevent access to broad categories of
speech and expression including the work of critics, intellectuals,
artists, journalists, and religious figures is seldom, if ever,
justified by any legitimate governmental objective. And, to the extent
that technology enables censorship decisions to be removed from public
scrutiny and review, technology-based censorship mechanisms are
especially suspect and dangerous to civil society. When repressive
governments and other institutions of power seek to deprive people of
this basic freedom, people have the right to secure, employ and deploy
the tools necessary to reclaim the freedoms to which they are
justifiably entitled.
[fn5] Article 19, Universal Declaration of Human Rights.
Freedom of Collective Action and Association: People have and should
have the "freedom of peaceful assembly and association."[fn6] This
freedom includes the right of people to work together to secure
constructive change in their personal, economic, and political
circumstances. When repressive governments or other institutions of
power seek to deprive people (including users of the Internet) of
their freedoms of voluntary assembly, association, and common
enterprise, people have the right to secure, employ and deploy
technologies that reclaim the freedoms to which they are justifiably
entitled.
[fn6] Article 20(1), Universal Declaration of Human Rights.
Freedoms of Thought, Conscience, Sexuality, and Religion: People have
and should have the freedom of "thought, conscience, and
religion."[fn7] This right "includes freedom to change religion or
belief, and freedom, either alone or in community with others, in
public or private, to manifest any religion or belief in teaching,
practice, worship and observance, regardless of doctrine."[fn8] Every
person, regardless of sex or sexual preference, and with reciprocal
respect for the corresponding rights of all others, has and should
have the right to determine and choose, freely and without coercion,
whether, how and with whom he or she shall fully enjoy the most
private and personal aspects of human life, including individual
sexuality, reproduction, and fertility. Moreover, "[t]he explicit
recognition and reaffirmation of the right of all women to control all
aspects of their health, in particular their own fertility, is basic
to their empowerment."[fn9] When repressive governments and other
institutions of power seek to deprive people of these basic freedoms,
they have the right to secure, employ and deploy the tools necessary
to reclaim the freedoms to which they are justifiably entitled.
[fn7] Article 18, Universal Declaration of Human Rights.
[fn8] Id.
[fn9] Paragraph 17, Beijing Declaration of the Fourth United Nations
Conference on Women (Sept. 15, 1995).
Freedom of Privacy: Every person has the right to be free from
"subject[ion] to arbitrary interference with his [or her] privacy,
family, home or correspondence"[fn10] -- digitally, or by any other
means or methodology. This freedom of privacy includes the right to be
free from governmental or private surveillance that might interfere
with or deter the rightful exercise of any other freedoms of any
person. In the context of software tools that enable people to reclaim
their freedoms, all end-users have and should have the right to secure
and use tools that are free from the surreptitious insertion into
their software of "backdoors," "spy-ware," escrow mechanisms, or other
code or techniques that might promote surveillance, or subvert
security (including cryptographic security), confidentiality,
anonymity, authenticity and/or trust.
[fn10] Article 12, Universal Declaration of Human Rights.
Reasons For Enhancing "Free" and "Open-Source" Licensing: Developing a
new software license is never a trivial task and this License
Agreement has presented special challenges for Hacktivismo. Because of
our human rights objectives, this License Agreement includes some
specific terms and conditions that, as a technical matter, depart from
the previously-recognized and established definitions of "free"[fn11]
software and "open source"[fn12] software.
[fn11] http://www.gnu.org/philosophy/free-sw.html
[fn12] http://www.opensource.org/docs/definition_plain.php
We have therefore coined the term "enhanced source" to describe this
License Agreement because we have sought to combine most of the
freedom-promoting benefits of "free" or "open-source" software
(including mandatory disclosure of any changes or modifications
Licensees make to the source code, whenever they release modified
versions of HESSLA-licensed Programs or other Derivative Works), with
additional enhanced license and contractual terms that are intended to
promote the freedom of end-users. The Hacktivismo Enhanced-Source
Software License Agreement promotes our objectives in an enhanced
manner by including contractual terms that empower both Hacktivismo
and qualified end-users with greater flexibility and leverage to
maintain and recover human rights, through the mechanism of the
contract itself including terms that are designed to enhance both our
enforcement posture and that of qualified end-users in court.
To be sure, Hacktivismo enthusiastically endorses and supports the
goals and objectives of the Free Software movement and those of the
open source community. In particular, we owe a special debt of
gratitude to the Free Software Foundation, to the Open Source
Initiative, and to many exceedingly talented people who have
contributed to Free Software and open source projects and endeavors
over the years.
Ultimately, however, after reviewing the field of possibilities among
previously-existing "open source" and "free" licenses, Hacktivismo has
concluded that none of them fully meets our requirements. Writing our
own License Agreement enables us to pursue our human rights objectives
more effectively. This licensing endeavor represents a first step
toward achieving our objectives, and no doubt informed feedback,
scholarship, and learned commentary will enable us to pursue our
objectives even more effectively in the future.
Benefits That Carry Over From Free Software: Before we explain how an
"enhanced source" License Agreement specifically differs from a "free"
or "open source" license, we believe it is helpful to explain in
greater detail what the principal advantages, and freedom-enhancing
aspects, of "free" software are.
When we speak of "free software," we refer to important personal
freedoms, and not price. In addition to terms that are intended to
promote the freedoms of Expression, Thought, Collective Action and
Privacy (along with other human rights) of all end-users, the
Hacktivismo Enhanced-Source Software License Agreement is also
designed and intended to promote the following freedoms:
· You have the freedom to distribute copies of the software (and
charge for this service if You wish);
· You have the freedom of access to the source code, to inspect and
verify (and even to improve, if You can) the integrity and
functionality of the software;
· So long as You do not subvert or infringe the freedoms of
end-users by doing so, You have the freedom to change the
software or to use parts of it in new Programs;
· You have the freedom to know You can do these things.
The licenses for most computer software programs are designed to take
away Your freedom to share software or change source code. This kind
of software is designated as proprietary or "closed." The Hacktivismo
Enhanced-Source Software License Agreement -- like other license
agreements that have served as inspiration for our work -- is intended
to promote both Your freedom to share our software with others, and
Your freedom to change and improve the software. Your right under this
License Agreement to look at the source not only enables You to
contribute Your own efforts to Hacktivismo's human rights projects,
but also serves as an additional level of assurance to You as an
end-user that unwelcome, hidden surprises have not been inserted into
the software, that could compromise Your rights and freedoms when You
use the software.
HESSLA Helps Safeguard Additional End-User Freedoms: In order to
understand why this License Agreement must be described as "enhanced
source," and cannot strictly speaking be considered either a "free" or
"open source" license agreement, it is helpful to consider the
possibility that a programmer might insert malicious code, such as a
computer virus, a keystroke logger, or "spyware" into a program that
has previously been released under a "free software" license
agreement.[fn13] The act of inserting malicious code into software, if
done by a private individual or company (though many governments will
contend they are not required to play by the same rules as the rest of
us), may well violate criminal laws and result in civil tort
liability. It is, of course, also possible to deter such malicious
behavior by including, in a software license agreement, a specific
contractual term that prohibits such behavior meaning that any
licensee who violates the prohibition against malicious code can be
sued by the licensor (or by third-party beneficiaries who the licensor
has explicitly identified as alternate or additional enforcers of the
agreement) for money damages and a court order forbidding any
continued violation.
[fn13]In this regard, a the following hypothetical illustration should
be particularly helpful. If an organization of computer security
enthusiasts were to release, under the GNU General Public License
("GPL"), a program called "Grey Eminence 3000" ("GE3K") a
remote-administration tool for Microsoft Windows, that helps
illustrate how insecure this particular commercial product happens to
be it should hardly be surprising that the United States Secret
Service and Federal Bureau of Investigation, after making some loud
and misleading apocalyptic noises about "computer hackers" to Congress
and in the media (primarily in a largely successful effort to increase
their technology budgets), would also study the software to see what
it does, how it does it, and whether any of those capabilities happen
to be features that law enforcement might find helpful. Of course, if
the U.S. federal law enforcement community were to announce, several
months later, that it had commissioned the development of "classified"
quasi-viral computer-intrusion and surveillance software called "Magic
Candle" the capabilities of which law enforcement does not plan to
disclose to the public, and the source code for which will remain a
closely-guarded secret then inquiring minds might become curious as to
whether "Magic Candle" contains any of the GPLed code that was written
for "GE3K" (or any other free or open-source software, for that
matter). Needless to say, under the right factual circumstances, if
any GPLed code from GE3K found its way into "Magic Candle," then the
U.S. government or its software development contractor might well be
obligated to reveal to the public all the source code for "Magic
Candle." Nevertheless, so long as the "Magic Candle" source is never
publicly released for comparison purposes, then everyone with
legitimate questions about GPL compliance faces a chicken-and-egg
problem. So long as the source of "Magic Candle" remains secret,
detection of a GPL violation becomes dramatically more difficult
(particularly so if, additionally, nobody outside law enforcement has
access to the compiled executables), which means the worldwide
community of Internet users and software developers has only the
United States government's solemn assurance that no GE3K code was used
cold comfort at best.
Previous Licenses Provide More Limited Protection Against Government
and Other Surveillance: No software license agreement that qualifies
as "free" or "open source" may contain any restriction as a term of
the license agreement that in any way qualifies any Licensee's
prerogative (no matter who they are or what their motives may be) to
make changes to code. In other words, an "open source" license
agreement, to qualify for the "open source" label, may not even
contain a term that prohibits the insertion of destructive viruses or
"trojan horses" into derivative code. Likewise, no "free" or "open
source" license agreement can in any way contain (as a license term)
any restriction on the use of software not even a prohibition against
unlawful surveillance or other malicious uses of the software.
The "open source" and "Free Software" communities rely principally on
voluntary compliance[fn14] with the disclosure provisions of license
agreements (although many "free" and "open source" license agreements,
such as BSD-style licenses, do not require changed code to be
disclosed, and in fact enable modified versions of programs to be
"taken proprietary") and on social mechanisms of enforcement, as means
to detect, prevent, deter, and remedy abuses.
[fn14]As the example in Note 13 illustrates, it is sometimes difficult
to determine whether the source disclosure requirement of the GPL has
been violated, such as when a modified version of a program has been
distributed without source, precisely because detection of a
disclosure violation depends in part on the disclosure of the source
of derivative works in order to compare whether a putative derivative
really does contain code derived from a GPLed parent work.
The Hacktivismo Enhanced-Source Software License Agreement does not in
any way sacrifice or surrender the enforcement techniques and
safeguards available under license agreements such as the GNU General
Public License. Rather, the HESSLA enhances the options available to
Hacktivismo and to qualified end-users, by providing additional
enforcement options. Moreover, for the purpose of promoting the
freedoms of both programers and end-users, through the enforced
mandatory disclosure of code modified by third-parties, this License
Agreement has advantages over many of the licenses (such as BSD-style
licenses) that fully qualify as "free" or "open-source" license
agreements.
What makes this License Agreement an "enhanced source" License
Agreement, instead of a "free software" license agreement, is that the
Hacktivismo Enhanced-Source Software License Agreement contains
specific, very limited restrictions on modification and use of
software by Licensees, as part of a calculated trade-off of rights and
responsibilities that is intended to promote the freedom of end-users.
The Enhanced-Source Bargain Reinforces End-User Freedoms: To protect
Your rights, we need to make restrictions that forbid anyone to deny
You specific rights or to ask You to surrender these rights. To
protect Your human rights as an end-user of this program or any work
based on it, we need to make restrictions that forbid You and all
other Licensees of this software (including, without limitation, any
government Licensees) from using this code to subvert the human rights
of any end-user.
We protect Your rights and the rights of all end-users with two steps:
(1) copyright the software, and (2) offer You this License Agreement
which gives You qualified legal permission to copy, distribute and/or
modify the software.
The restrictions shared by all Licensees translate into certain
responsibilities for You and for everyone else (including governmental
entities everywhere) if You distribute copies of the software, if You
use it, or if You modify it.
In this regard, the methodology we employ is not materially different
from the methodology Free Software Foundation employs in the GNU
General Public License (the "GPL"). The methodology is to exchange the
Author's permission to copy, change, and/or distribute a copyrighted
work, for every Licensee's acceptance of terms and conditions that
promote the licensor's objectives. In both this License Agreement and
the GPL, the terms and conditions that each Licensee must accept are
intended to discriminate against certain very narrow, limited kinds of
human endeavor, that are inconsistent with the licensor's political
objectives. In other words, the GPL requires each Licensee to promise
not to engage in the activity of 'propertizing,' or 'taking
proprietary,' modifications to GPLed code; modified code must also be
released under the GPL, and cannot be released in the form of "closed"
executables, or otherwise be made "proprietary." Likewise, the
Hacktivismo Enhanced Source Software License Agreement discriminates
against undesirable activity such as surveillance, introduction of
certain kinds of malicious code, and human rights violations, as well
as discriminating against "propertizing" behavior such as might
violate the GPL. Subject to these narrow restrictions, Licensees under
either license agreement enjoy very broad latitude to change, use,
explore, modify, and distribute the software much broader than they
would enjoy with typical "proprietary" software packages.
As with "copyleft" licenses such as the GPL, under the Hacktivismo
Enhanced Source Software License Agreement, programmers (including,
most importantly, programmers working for governments) do not have
unfettered or completely unlimited "freedom" for purposes of what they
can do with HESSLA-licensed code. Just as with the GPL, they do not
have the "freedom" to convert HESSLA-licensed code into "closed" or
"proprietary" code. People who create derivative works based on an
HESSLA-licensed program and distribute those works have a
corresponding obligation to "give back," and not merely to "take,"
HESSLA-licensed code.
If You distribute copies of such an HESSLA-licensed program, whether
gratis or for a fee, You must give the recipients all the rights and
responsibilities that You have. You must ensure that they, too, are
told of the terms of this License Agreement, including the freedoms
they have, and the kinds of uses and modifications that are
forbidden. You must communicate a copy of this License Agreement to
them as part of any copy, modification, or re-use of source or object
code, so they know their rights and responsibilities.
Thus, the main difference between this License Agreement and the GPL
is not the methodology we employ,[fn15] but the scope and breadth of
the political objectives we seek to promote. Simply put, the political
objectives we promote are somewhat broader than the explicit political
goals that the Free Software Foundation seeks to promote through the
GPL. Our goals include a somewhat broader range of human rights than
the specific copyright-related rights with which the GPL is
principally concerned. But, while we are concerned with the entire
field of human rights rather than a subset, we want to make it
perfectly clear that we also embrace, share, and seek to promote, the
goals we share with the Free Software movement.
[fn15] There is a modest difference, but it is not large, and mostly
philosophical. Some experts on the GPL draw a distinction between a
"contract" and a pure "license," by taking the position that a pure
"license" does not impose "contractual" conditions on a Licensee only
conditions that would otherwise (but for the license) be subsumed
within with exclusive rights that the licensor has under copyright
law. Thus, the licensor has the right to exclude anyone else from such
activities as making copies, making derivative works, publicly
performing a work, and other exclusive rights specified by
statute. But, concerning the act of "using" a computer software
program, in instances in which a copy is not made (or, in the trivial
sense that a copy is made only temporarily from a storage medium to
memory, to enable software to be "used"), the Free Software Foundation
takes the position that United States law, at least, does not confer
an exclusive right on the copyright holder (or, as others would argue,
the United States statute qualifies the holder's exclusive right to
copy),because the U.S. Copyright Act specifically exempts from the
exclusive right to make copies, a copy made from (for example) a
computer hard drive to volatile memory, in connection with the process
of executing computer software. So far as we can determine, the Free
Software Foundation does not argue that it is impossible
"contractually" to impose conditions on use, as part of the bargain
one strikes, when conditionally allowing Licensees to make copies of a
program. Rather, for philosophical reasons, the Free Software
Foundation voluntarily chooses not to include what it views as
"contractual" conditions in the GPL. In this sense, Hactivismo takes
the position that the HESSLA is clearly a "contract" and contains
"contractual" terms, such that it should not be considered a "pure
license," under the nomenclature employed by the Free Software
Foundation. However, in our view, precisely because both the HESSLA
and the GPL are clearly conditional grants of permission to do things
from which the Licensee would otherwise be excluded (i.e., the
Licensee must undertake certain obligations in exchange for permission
to copy, modify, or distribute, a work), the key point is that the
methodology is quite similar.
Compared with the GPL, aspects of the HESSLA give both end-users and
programmers (including, most importantly, governmental end-users and
programmers) marginally less leeway to make malicious use of the
program, or to insert malicious code into a program, than they would
have under a traditional "copyleft" software license. These aspects of
the HESSLA (such as the requirement that the program cannot be used to
violate human rights, or forbidding the insertion of "spy-ware" or
surveillance mechanisms into derivative works) are included because
our ultimate objective is to preserve and promote the human rights of
end-users, including their privacy and their right of free expression.
In other words, unlike many programmers, we are not just in the
business of developing and distributing open-standards
technologies. We're also trying to empower end-users (including
end-users in totalitarian regimes) with software tools that promote
fundamental freedoms while also seeking as best we can to protect
these end-users from being arrested, beaten, or worse. Our objective
of promoting end-user freedoms, including the freedoms of people in
politically repressive countries, is precisely the factor that has led
Hacktivismo to develop this License Agreement instead of using
another.
The HESSLA Also Includes Features To Enhance Government
Accountability: To this end, we have sought and intend to ensure, to
the fullest extent that law (including, without limitation, the law of
contract and of copyright licensing) enables us to do so,[fn16] that
no government or other institution may do anything with this computer
software or the underlying source code without becoming a Licensee
bound by the terms of this License Agreement, subject to the same
restrictions on modification and use as anyone else.
[fn16] "Everyone has the right to an effective remedy by the competent
national tribunals for acts violating . . . fundamental rights . . ."
Article 8, United Nations Declaration of Human Rights.
Accordingly, this License Agreement includes several terms that are
aimed explicitly at governmental entities, in order to maximize
enforceability against such entities. Respect for the Rule of Law
means that no governmental entity is above the law, and that no
governmental entity should be permitted to use its status as a
mechanism for circumventing the requirements of this License
Agreement.
Any use, copying or modification of this software by any governmental
official or governmental entity anywhere in the world is a voluntary
act, which act the governmental official or entity is free to forego
if it does not wish to be bound by this License Agreement. This
License Agreement seeks to establish as clearly as possible two
important checks on the improper use of government power. First, the
voluntary election to use, copy, or modify, this software by any
government or governmental official constitutes a waiver of all
immunities that might otherwise be asserted, against enforcement of
this License Agreement by the Author, or assertion by end-users or
others of any human rights laws that may have been violated by a
government employing the Software. Second, any such government or
governmental official not only subjects itself to enforcement action
in its own courts, but also explicitly and voluntarily subjects itself
to enforcement action in the courts of other nations that are likely
to be more objective, for the purpose of giving effect to the terms of
this License Agreement.
Mechanism of Contract Acceptance: This License Agreement treats any
use of the software as acceptance of the terms of this License
Agreement. To understand the significance of this, it is important to
distinguish between the law governing copyright and the law governing
offer and acceptance for the purpose of contract formation (which
gives the offeror the power to specify the manner of acceptance). The
question of whether copyright confers an exclusive right of use on the
author of a program is certainly an interesting one. Under United
States law, see 17 U.S.C. 117(a)(1), a limited exception to the
exclusive right to copy exists if one makes a second copy "created as
an essential step in the utilization of the computer program in
conjunction with a machine and that it is used in no other manner."
This License Agreement presupposes that there is no exclusive right to
use in the Copyright Act, just an exclusive right to copy. However,
You may not make a copy for anyone else unless they are subject to the
terms of this License Agreement. Nor may You permit anyone to use Your
copy or any other copy You have made unless they are subject to the
terms of this License Agreement. You may not make a copy for Your own
use or the use of anyone else without the Author's leave to make that
copy. And any use, modification, copying, or distribution by anyone
constitutes acceptance of the License Agreement, for purposes of
contract law. In other words, the License Agreement is designed so
that there is no loophole permitting anyone to claim the ability to
use, copy, distribute, or modify the Program or any Software based on
it without subjecting themselves voluntarily to its terms.
On "Shrinkwrap," "Click-Wrap," "Use-Wrap" and "Copy-Wrap" License
Agreements: Arguably, some kinds of software license agreements have
more in common with legislation than they do with the bargained-for,
negotiated agreements that come to mind when most people think of
"contracts." Particularly if a software licensor has sufficient market
power to be deemed a monopoly, or if certain proposed expansions of
the law of software licensing, masquerading as "codifications," are
widely adopted, the ability of a private entity to impose legal
prohibitions and duties on virtually everyone else as though the
licensor has assumed powers that customarily belong to legislative
bodies is both breathtaking and deeply troubling. Of course, we are
hardly the first to distribute software under a license agreement that
imposes conditions on a take-it-or-leave-it basis. This technique is,
as everyone knows, extremely common with proprietary software. And
some of the conditions unilaterally imposed by proprietary licensors
range from the ridiculous to the obscene. But even certain kinds of
"free" and "open-source" software licenses, such as the GPL, depend on
the continued viability of legal rules that enable at least some
reasonable conditions to be imposed by software licensors on a
take-it-or-leave-it basis, with essentially automated methods of
acceptance. Courts have been divided as to how far these kinds of
licensor-driven automated agreements can go. And we cannot say that we
will be unhappy if courts or legislatures ultimately reach a consensus
that sharply limits what conditions licensors can impose through such
mechanisms. However, while the law is still developing, we think
nothing could be more appropriate than to enlist the techniques that
institutions of power have used to limit freedom and instead to
re-purpose the techniques of "copy-wrap" or "use-wrap" licensing by
putting them to use for humanitarian purposes and using them to
promote the human rights of end-users. To deny us the use of these
techniques, courts and other law-making institutions would be required
simultaneously to disarm, to the same degree, proprietary software
manufacturers that possess vast market power. And, unlike the
conditions imposed by many proprietary vendors, the conditions we
impose through this License Agreement are hardly onerous for any
end-user (unless, of course, the end-user wants to act maliciously or
engage in surveillance).
No Warranty: Next, for each author's protection and our own, we want
to make certain that everyone understands that there is no warranty
for this software. And, if the software is modified by someone else
and passed on, we want its recipients to know that what they have is
not the original, so that any problems introduced by others will not
reflect on the original authors' reputations.
Software Patents: Software patents constantly threaten any project
such as this one. We wish to avoid the danger that redistributors of a
HESSLA-licensed program will individually obtain patent licenses, in
effect making the program proprietary. To prevent this, we have
included terms by which any Author must, if it has patented (or
licensed a patent covering) any technology embodied in any Program or
Software released under this License Agreement, grant all HESSLA
Licensees of the Program or Software a royalty-free license of that
technology. Any Licensees who release derivative works, as permitted
by this License Agreement, are required to grant a royalty-free patent
license of any patented technology.
Anyone Can Release Original Software Under The HESSLA: Although this
License Agreement is drafted with Hacktivismo's objectives in mind,
perhaps it will meet other authors' needs as well. If You are
considering using this License Agreement for Your own software
(meaning the code is not a work based on Hacktivismo's program in
which case all derivative works must be released under this License
Agreement but rather Your code is original software that You have
developed yourself) and if You have no special reason to prefer this
License Agreement to some license that has a more robust and
widely-understood track-record, then in most instances we encourage
You to use the GPL (or, even better, release concurrently under both
the HESSLA and the GPL), because a considerable body of interpretive
literature and community custom has grown up around that License
Agreement. The Open Software License, see <
http://www.rosenlaw.com/osl.html >, is newer and has less of a track
record. But You may also want to consider that licensing option (as
well as the option of concurrent OSL/HESSLA licensing).
Any author of original software can release that software under this
License Agreement, if You choose to do so; not just
Hacktivismo. Hacktivismo is the author and owner of software released
by Hacktivismo under this License Agreement. But original software
released by other Authors would be owned and licensed by them.
Ultimately, we think it is important to emphasize to other Authors
that Programs they have written can be released under both the HESSLA
and some other license simultaneously (for, example, a program that is
presently GPLed by its Author can be released simultaneously under
both the GPL and the HESSLA, at the Author's discretion). If You are
an Author of original work, You need neither the permission of the
Free Software Foundation nor of Hacktivismo to elect to release
software simultaneously under both licenses. The advantage of such a
voluntary double-licensing is that it will enable developers to
produce hybrid software packages (combining the functionality
available through, say, Hacktivismo's Six-Four APIs, with some of the
functionality of one or more popular GPL-licensed communications
programs) and to release the hybrid packages under the HESSLA, without
causing those developers to run afoul of the GPL, the HESSLA or
both. Such an arrangement maximizes the potential benefit to both the
developer community and to end-users worldwide. Software released
under a BSD-style license, as a general matter, can be used to produce
a hybrid program, mixing HESSLA-licensed code with code that was
previously subject to a BSD license. The HESSLA requires that, in such
an instance, the hybrid code must be released under the HESSLA (to
avoid weakening the end-user protections and affirmative rights
afforded by the HESSLA). Hacktivismo is more than happy to consult
with any software developer about the license terms that should apply
to any Software that is derivative of any Program of which Hacktivismo
is Author. If another Author has released code under the HESSLA, then
that Author has primary decision-making authority about the manner in
which his her or its software is licensed, but Hacktivismo is happy to
field any questions hat may be posed by such an Author or by any
developer who is building on another Author's HESSLAed code.
License Revisions: This License Agreement is subject to revision,
prior to the release of the Hacktivismo Enhanced-Source Software
License Agreement, Version 1.0. We invite interested parties from the
international academic and legal communities to offer comments and
suggestions on ways to improve this License Agreement, prior to the
time that The HESSLA version 1.0 is released.
The terms of the latest and most up-to-date version of this License
Agreement, up to and including version 1.0, shall be deemed
automatically to supersede the terms of any lower-numbered version of
this License Agreement with respect to any Licensee who became a
Licensee under the lower-numbered version of the HESSLA.
The terms of the latest and most up-to-date version of this License
Agreement will always be published on the Hacktivismo Website,
http://www.hacktivismo.com/.
The precise terms and conditions for copying, distribution, use and
modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION, USE AND/OR MODIFICATION
0. DEFINITIONS. The following are defined terms that, whenever used in
this License Agreement, have the following meanings:
0.1 Author: "Author" shall mean the copyright holder of an Original
Work (the "Program") released by the Author under this License
Agreement.
0.2 Copy: "Copy" shall mean everything and anything that constitutes a
copy according to copyright law, without limitation. A "copy" does not
become anything other than a "copy" merely because, for example, a
governmental or institutional employee duplicates the Program or a
part of it for another employee of the same institution or
Governmental Entity, or merely because it is copied from one computer
to another, or from one medium to another, or multiple copies are made
on the same medium, within the same institutional or Governmental
Entity.
0.3 Derivative Work: A "Derivative Work" or "work based on the
Program" shall mean either the Program itself or any work containing
the Program or a portion of it, either verbatim or with modifications
and/or translated into another language. (Hereinafter, translation is
included without limitation in the term "modification."). In the
unlikely event that, and to the extent that, this contractual
definition of "Derivative Work" is later determined by any tribunal or
dispute-resolution body to be different is scope from the meaning of
"derivative work" under the copyright law of any country, then the
broadest and most encompassing possible definition either the
contractual definition of "Derivative Work," or any broader and more
encompassing statutory or legal definition, shall control. Acceptance
of this contractually-defined scope of the term "Derivative Work" is a
mandatory pre-condition for You to receive any of the benefits offered
by this License Agreement.
0.3.1 Mere aggregation of another work not based on the Program with
the Program (or with a Derivative Work based on the Program) on a
volume of a storage or distribution medium does not bring the other
work under the scope of this License Agreement.
0.4 License Agreement: When used in this License Agreement, the terms
"this License" or "this License Agreement" shall mean The Hactivismo
Enhanced-Source Software License Agreement, v. 0.1, or any subsequent
version made applicable under the terms of Section 15.
0.5 Licensee: The term "Licensee" shall mean You or any other
Licensee, whether or not a Qualified Licensee.
0.6 Original Work: "Original Work" shall mean a Program or other work
of authorship, or portion thereof, that is not a Derivative Work.
0.7 Program: The "Program," to which this License Agreement applies,
is the Original Work (including, but not limited to, computer
software) released by the Author under this License Agreement.
0.8 Qualified Licensee: A "Qualified Licensee" means a Licensee that
remains in full compliance with all terms and conditions of this
License Agreement. You are no longer a Qualified Licensee if, at any
time, You violate any terms of this License Agreement. Neither the
Program nor any Software based on the Program may be copied,
distributed, performed, displayed, used or modified by You, even for
Your own purposes, unless You are a Qualified Licensee. A Licensee
other than a Qualified Licensee remains subject to all terms and
conditions of this License Agreement, and to all remedies for each
cumulative violation as set forth herein. Loss of the status of
Qualified Licensee signifies that violation of any terms of the
License Agreement subjects a Licensee to loss of most of the benefits
that Qualified Licensees enjoy under this License Agreement, and to
additional remedies for all violations occurring after the first
violation.
0.9 Software: "Software" or "the Software" shall mean the Program, any
Derivative Work based on the Program or a portion thereof, and/or any
modified version of the Program or portion thereof, without
limitation.
0.10 Source Code: The term "Source Code" shall mean the preferred form
of a Program or Original Work for making modifications to it and all
available documentation describing how to access and modify that
Program or Original Work.
0.10.1 For an executable work, complete Source Code means all the
Source Code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and
installation of the executable. However, as a special exception, the
Source Code distributed need not include anything that is normally
distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on
which the executable runs, unless that component itself accompanies
the executable.
0.10.2 "Object Code:" Because of certain peculiarities of current
export-control rules, "object code" of the Program, or any modified
version of the Program, or Derivative Work based on the Program, must
not be exported except by way of distribution that is ancillary to the
distribution of the Source Code. The "Source Code" shall be understood
as the primary content transferred or exported by You, and the "object
code" shall be considered as merely an ancillary component of any such
export distribution.
0.11 Strong Cryptography: "Strong Cryptography" shall mean
cryptography no less secure than (for example, and without limitation)
a 2048-bit minimum key size for RSA encryption, 1024-bit minimum key
size for Diffie-Hellman (El Gamal), or a 256-bit minimum key size for
AES and similar symmetric ciphers.
0.12 Substandard Key-Selection Technique: The term "Substandard
Key-Selection Technique" shall mean a method or technique to cause
encryption keys to be more easily guessed or less secure, such as by
(i) causing the selection of keys to be less than random, or (ii)
employing a selection process that selects among only a subset of
possible keys, instead of from among the largest set of possible keys
that can securely be used consistent with contemporary knowledge about
the cryptographic techniques employed by You. The following
illustrations elaborate on the foregoing definition:
0.12.1 If the key-generation or key-selection technique for the
encryption algorithm You employ involves the selection of one or more
prime numbers, or involves one or more mathematical functions or
concatenations performed on one or more prime numbers, then each prime
number should be selected from a very large set of candidate prime
numbers, but not necessarily from the set of all possible prime
numbers (e.g., inclusion of the number 1 in the candidate set, for
example, may in some instances reduce rather than enhance security),
and absolutely not from any artificially small set of candidate primes
that makes the guessing of a key easier than would be the case if a
secure key-generation technique were employed. In all instances, the
primes should be selected at random from among the candidate set. If
there is a customary industry standard for maximizing the security
associated with the key-generation or key-selection technique for the
cryptosystem You select, then (with attention also to the requirements
of Section 0.11), You should employ a key-generation or selection
technique no less secure than the customary industry standard for
secure use of the cryptosystem.
0.12.2 If the key-generation or key-selection technique for the
encryption algorithm You employ involves the selection of a random
integer, or the transformation of a random integer through one or more
mathematical processes, then the selection of the integer shall be at
random from the largest possible set of all possible integers
consistent with the secure functioning of the encryption algorithm. It
shall not be selected from an artificially small set of integers
(e.g., if a 256-bit random integer serves as the key, then You could
not set 200 of the 256 bits as "0," and randomly generate only the
remaining 56 bits producing effectively a 56-bit keylength instead of
using the full 256 bits).
0.12.3 In other words, Your key-generation technique must promote
security to the maximum extent permitted by the cryptographic
method(s) and keylength You elect to employ, rather than facilitating
eavesdropping or surveillance in any way. The example of GSM
telephones, in which 16 of 56 bits in each encryption key were set at
"0," thereby reducing the security of the system by a factor of
65,536, is particularly salient. Such artificial techniques to reduce
the security of a cryptosystem by selecting keys from only a
less-secure or suboptimal subset of possible keys, is prohibited and
will violate this License Agreement if any such technique is employed
in any Software.
0.13 You: Each Licensee (including, without limitation, Licensees that
have violated the License Agreement and who are no longer Qualified
Licensees, but who nevertheless remain subject to all requirements of
this License Agreement and to all cumulative remedies for each
successive violation), is referred to as "You."
0.13.1 Governmental Entity: "You" explicitly includes any and all
"Governmental Entities," without limitation. "Governmental Entity" or
"Governmental Entities," when used in this License Agreement, shall
mean national governments, sub-national governments (for example, and
without limitation, provincial, state, regional, local and municipal
governments, autonomous governing units, special districts, and other
such entities), governmental subunits (without limitation,
governmental agencies, offices, departments, government corporations,
and the like), supra-national governmental entities such as the
European Union, and entities through which one or more governments
perform governmental functions or exercise governmental power in
coordination, cooperation or unison.
0.13.2 Governmental Person: "You" also explicitly includes
"Governmental Persons." The terms "Governmental Person" or
"Governmental Persons," when used in this License Agreement, shall
mean the officials, officers, employees, representatives, contractors
and agents of any Governmental Entity.
1. Application of License Agreement. This License Agreement applies
to any Program or other Original Work of authorship that contains a
notice placed by the Author saying it may be distributed under the
terms of this License Agreement. The preferred manner of placing such
a notice is to include the following statement immediately after the
copyright notice for such an Original Work:
"Licensed under the Hacktivismo Enhanced-Source Software License
Agreement, Version 0.1"
2. Means of Acceptance Use, Copying, Distribution or Modification By
Anyone Constitutes Acceptance. Subject to Section 14.1 (concerning the
special case of certain Governmental Entities) any copying,
modification, distribution, or use by You of the Program or any
Software, shall constitute Your acceptance of all terms and conditions
of this License Agreement.
2.1 As a Licensee, You may not authorize, permit, or enable any person
to use the Program or any Software or Derivative Work based on it
(including any use of Your copy or copies of the Program) unless such
person has accepted this License Agreement and has become a Licensee
subject to all its terms and conditions.
2.2 You may not make any copy for Your own use unless You have
accepted this License Agreement and subjected yourself to all its
terms and conditions.
2.3 You may not make a copy for the use of any other person, or
transfer a copy to any other person, unless such person is a Licensee
that has accepted this License Agreement and such person is subject to
all terms and conditions of this License Agreement.
2.4 It is not the position of Hacktivismo that copyright law confers
an exclusive right to use, as opposed to the exclusive right to copy
the Software. However, for purposes of contract law, any use of the
Software shall be considered to constitute acceptance of this License
Agreement. Moreover, all copying is prohibited unless the recipient of
a copy has accepted the License Agreement. Because each such recipient
Licensee is contractually obligated not to permit anyone to access,
use, or secure a copy of the Software, without first accepting the
terms and conditions of this License Agreement, use by non-Licensees
is effectively prohibited contractually because nobody can obtain a
copy of, or access to a copy of, any Software without (1) accepting
the License Agreement through use, and (2) triggering some Licensee's
obligation to require acceptance as a precondition of copying or
access.
3. "Qualified Licensee" Requirement: Neither the Program nor any
Software or Derivative Work based on the Program may be copied,
distributed, displayed, performed, used or modified by You, even for
Your own purposes, unless You are a "Qualified Licensee." To remain a
Qualified Licensee, You must remain in full compliance with all terms
and conditions of this License Agreement.
4. License Agreement Is Exclusive Source of All Your Rights:
4.1 You may not copy, modify, or distribute the Program, or obtain any
copy, except as expressly provided under this License Agreement. Any
attempt otherwise to copy, modify, obtain a copy, sublicense or
distribute the Program is void, and will automatically terminate Your
rights under this License Agreement and subject You to all cumulative
remedies for each successive violation that may be available to the
Author. However, Qualified Licensees who have received copies from You
(and thereby have received rights from the Author) under this License
Agreement, and who would otherwise qualify as Qualified Licensees,
will not have their rights under their License Agreements suspended or
restricted on account of anything You do, so long as such parties
remain in full compliance.
4.2 You are not required to accept this License Agreement and prior to
the time You elect to become a Licensee and accept this License
Agreement, You may always elect instead not to copy, use, modify,
distribute, compile, or perform the Program or any Software released
under this License Agreement. However, nothing else grants You
permission to copy, to obtain or possess a copy, to compile a copy in
object code or executable code from a copy in source code, to modify,
or to distribute the Program or any Software based on the
Program. These actions are prohibited by law if You do not accept this
License Agreement. Additionally, as set forth in Section 2, any use,
copying or modification of the Software constitutes acceptance of this
License Agreement by You.
4.3 Each time You redistribute the Program (or any Software or
Derivative Work based on the Program), the recipient automatically
receives a License Agreement from the Author to copy, distribute,
modify, perform or display the Software, subject to the terms and
conditions of this License Agreement. You may not impose any further
restrictions on the recipients' exercise of the rights granted
herein. You are not responsible for enforcing compliance by third
parties to this License Agreement. Enforcement is the responsibility
of the Author.
5. Grant of Source Code License.
5.1 Source Code Always Available from Author: Author hereby promises
and agrees except to the extent prohibited by export-control law to
provide a machine-readable copy of the Source Code of the Program at
the request of any Licensee. Author reserves the right to satisfy this
obligation by placing a machine-readable copy of the Source Code of
the most current version of the Program in an information repository
reasonably calculated to permit inexpensive and convenient access by
You for so long as Author continues to distribute the Program, and by
publishing the address of that information repository in a notice
immediately following the copyright notice that applies to the
Program. Every copy of the Program distributed by Hacktivismo (but not
necessarily every other Author) consists of the Source Code
accompanied, in some instances, by an ancillary distribution of
compiled Object Code, but the continued availability of the Source
Code from the Author addresses the possibility that You might have
(for any reason) not received from someone else a complete, current,
copy of the Source Code (lack of which would, for example, prevent You
from exporting copies to others without violating this license, see
Section 8).
5.2 Grant of License. If and only if, and for so long as You remain a
Qualified Licensee, in accordance with Section 3 of this License
Agreement, Author hereby grants You a world-wide, royalty-free,
non-exclusive, non-sublicensable copyright license to do the
following:
5.2.1 to reproduce the Source Code of the Program in copies;
5.2.2 to prepare Derivative Works based upon the Program and to edit
or modify the Source Code in the process of preparing such Derivative
Works;
5.2.3 to distribute copies of the Source Code of the Original Work
and/or of Derivative Works to others, with the proviso that copies of
Original Work or Derivative Works that You distribute shall be
licensed under this License Agreement, and that You shall fully inform
all recipients of the terms of this License Agreement.
6. Grant of Copyright License. If and only if, and for so long as You
remain a Qualified Licensee, in accordance with Section 3 of this
License Agreement, Author hereby grants You a world-wide,
royalty-free, non-exclusive, non-sublicensable license to do the
following:
6.1 to reproduce the Program in copies;
6.2 to prepare Derivative Works based upon the Program, or upon
Software that itself is based on the Program;
6.3 to distribute (either by distributing the Source Code, or by
distributing compiled Object Code, but any export of Object Code must
be ancillary to a distribution of Source Code) copies of the Program
and Derivative Works to others, with the proviso that copies of the
Program or Derivative Works that You distribute shall be licensed
under this License Agreement, that You shall fully inform all
recipients of the terms of this License Agreement;
6.4 to perform the Program or a Derivative Work publicly;
6.5 to display the Program or a Derivative Work publicly; and
6.6 to charge a fee for the physical act of transferring a copy of the
Program (You may also, at Your option, offer warranty protection in
exchange for a fee).
7. Grant of Patent License. If and only if, and for so long as You
remain a Qualified Licensee, in accordance with Section 3 of this
License Agreement, Author hereby grants You a world-wide,
royalty-free, non-exclusive, non-sublicensable license Agreement,
under patent claims owned or controlled by the Author that are
embodied in the Program as furnished by the Author ("Licensed Claims")
to make, use, sell and offer for sale the Program. Subject to the
proviso that You grant all Licensees a world-wide, non-exclusive,
royalty-free license under any patent claims embodied in any
Derivative Work furnished by You, Author hereby grants You a
world-wide, royalty-free, non-exclusive, non-sublicensable license
under the Licensed Claims to make, use, sell and offer for sale
Derivative Works.
8. Exclusions From License Agreement Grants. Nothing in this License
Agreement shall be deemed to grant any rights to trademarks,
copyrights, patents, trade secrets or any other intellectual property
of Licensor except as expressly stated herein. No patent license is
granted to make, use, sell or offer to sell embodiments of any patent
claims other than the Licensed Claims defined in Section 7. No right
is granted to the trademarks of Author even if such marks are included
in the Program. Nothing in this License Agreement shall be interpreted
to prohibit Author from licensing under additional or different terms
from this License Agreement any Original Work, Program, or Derivative
Work that Author otherwise would have a right to License.
8.1 Implied Endorsements Prohibited. Neither the name of the Author
(in the case of Programs and Original Works released by Hacktivismo,
the name "Hacktivismo"), nor the names of contributors who helped
produce the Program may be used to endorse or promote modifications of
the Program, any Derivative Work, or any Software other than the
Program, without specific prior written permission of the
Author. Neither the name of Hacktivismo nor the names of any
contributors who helped write the Program may be used to endorse or
promote any Program or Software released under this License Agreement
by any person other than Hacktivismo.
9. Modifications and Derivative Works. Only Qualified Licensees may
modify the Software or prepare or distribute Derivative Works. If You
are a Qualified Licensee, Your authorization to modify the Software or
prepare or distribute Derivative Works (including permission to
prepare and/or distribute Derivative Works, as provided in Sections
5.2.2, 5.2.3, 6.2, 6.3, and 6.6) is subject to each and all of the
following mandatory terms and conditions (9.1 through 9.6, inclusive):
9.1 You must cause the modified files to carry prominent notices
stating that You changed the files and the date of any change;
9.2 If the modified Software normally reads commands interactively
when run, You must cause it, when started running for such interactive
use in the most ordinary way, to print or display an announcement
including an appropriate copyright notice and a notice that there is
no warranty (or else, saying that You provide a warranty) and that
users may redistribute the program under this License Agreement, and
telling the user how to view a copy of this License
Agreement. (Exception: if the Program itself is interactive but does
not normally print such an announcement, Your Derivative Work based on
the Program is not required to print an announcement.);
9.3 Any Program, Software, or modification thereof copied or
distributed by You, that incorporates any portion of the Original
Work, must not contain any code or functionality that subverts the
security of the Software or the end-user's expectations of privacy,
anonymity, confidentiality, authenticity, and trust, including
(without limitation) any code or functionality that introduces any
"backdoor," escrow mechanism, "spy-ware," or surveillance techniques
or methods into any such Program, Software, or modification thereof;
9.4 Any Program, Software, or modification thereof copied or
distributed by You, that employs any cryptographic or other security,
privacy, confidentiality, authenticity, and/or trust methods or
techniques, including without limitation any Derivative Work that
includes any changes or modifications to any cryptographic techniques
in the Program, shall employ Strong Cryptography.
9.5 Any Program, Software, or modification thereof copied or
distributed by You, if it contains any key-generation or selection
technique, must not employ any Substandard Key-Selection Technique.
9.6 No Program or Software copied or distributed by You may transmit
or communicate any symmetric key, any "private key" if an asymmetric
cryptosystem is employed, or any part of such key, nor may it
otherwise make any such key or part of such key known, to any person
other than the end-user who generated the key, without the active
consent and participation of that individual end-user. If a private or
symmetric key is stored or recorded in any manner, it must not be
stored or recorded in plaintext, and it must be protected from reading
(at a minimum) by use of a password. Use of steganography or other
techniques to disguise the fact that a private or symmetric key is
even stored is strongly encouraged, but not absolutely required.
10. Use Restrictions: Human Rights Violations Prohibited.
10.1 Neither the Program, nor any Software or Derivative Work based on
the Program may used by You for any of the following purposes (10.1.1
through 10.1.5, inclusive):
10.1.1 to violate or infringe any human rights or to deprive any
person of human rights, including, without limitation, rights of
privacy, security, collective action, expression, political freedom,
due process of law, and individual conscience;
10.1.2 to gather evidence against any person to be used to deprive any
person of human rights;
10.1.3 any other use as a part of any project or activity to deprive
any person of human rights, including not only the above-listed
rights, but also rights of physical security, liberty from physical
restraint or incarceration, freedom from slavery, freedom from
torture, freedom to take part in government, either directly or
through lawfully elected representatives, and/or freedom from
self-incrimination;
10.1.4 any surveillance, espionage, or monitoring of individuals,
whether done by a Governmental Entity, a Governmental Person, or by
any non-governmental person or entity;
10.1.5 censorship or "filtering" of any published information or
expression.
10.2 Additionally, the Program, any modification of it, or any
Software or Derivative Work based on the Program may not be used by
any Governmental Entity or other institution that has any policy or
practice (whether official or unofficial) of violating the human
rights of any persons.
10.3 You may not authorize, permit, or enable any person (including,
without limitation, any Governmental Entity or Governmental Person) to
use the Program or any Software or Derivative Work based on it
(including any use of Your copy or copies of the Program) unless such
person has accepted this License Agreement and has become a Licensee
subject to all its terms and conditions, including (without
limitation) the use restrictions embodied in Section 10.1 and 10.2,
inclusive.
11. All Export Distributions Must Consist of or Be Ancillary to
Distribution of Source Code. Because of certain peculiarities of
current export-control law, any distribution by You of the Program or
any Software may be in the form of Source Code only, or in the form or
Source Code accompanied by compiled Object Code, but You may not
export any Software in the form of compiled Object Code only. Such an
export distribution of compiled executable code must in all cases be
ancillary to a distribution of the complete corresponding
machine-readable source code, which must be distributed on a medium,
or by a method, customarily used for software interchange.
12. EXPORT LAWS: THIS LICENSE AGREEMENT ADDS NO RESTRICTIONS TO THE
EXPORT LAWS OF YOUR JURISDICTION. It is Your responsibility to comply
with any export regulations applicable in Your jurisdiction. From the
United States, Canada, or many countries in Europe, export or
transmission of this Software to certain embargoed destinations
(including, but not necessarily limited to, Cuba, Iran, Iraq, Libya,
North Korea, Sudan, and Syria), may be prohibited. If Hacktivismo is
identified as the Author of the Program (and it is not the property of
some other Author), then export to any national of Cuba, Iran, Iraq,
Libya, North Korea, Sudan or Syria, or into the territory of any of
these countries, by any Licensee who has received this Software
directly from Hacktivismo or from the Cult of the Dead Cow, or any of
their members, is contractually prohibited and will constitute a
violation of this License Agreement. You are advised to consult the
current laws of any and all countries whose laws may apply to You,
before exporting this Software to any destination. Special care should
be taken to avoid export to any embargoed destination. An Author other
than Hacktivismo may substitute that Author's legal name for
"Hacktivismo" in this Paragraph, in relation to any Program released
by that Author under this Paragraph.
13. Contrary Judgments, Settlements and Court Orders. If, as a
consequence of a court judgment or allegation of patent infringement
or for any other reason (not limited to patent issues), conditions are
imposed on You (whether by court order, agreement or otherwise) that
contradict the conditions of this License Agreement, they do not
excuse You from the conditions of this License Agreement. If You
cannot distribute so as to satisfy simultaneously Your obligations
under this License Agreement and any other pertinent obligations, then
as a consequence You may not distribute the Software at all. For
example, if a patent license would not permit royalty-free
redistribution of the Program by all those who receive copies directly
or indirectly through You, then the only way You could satisfy both it
and this License Agreement would be to refrain entirely from
distribution of the Program.
It is not the purpose of this Section 13 to induce You to infringe any
patents or other property right claims or to contest validity of any
such claims; this Section has the sole purpose of protecting the
integrity of the software distribution system reflected in this
License Agreement, which is implemented by public license
practices. Many people have made generous contributions to the wide
range of software distributed through related distribution systems, in
reliance on consistent application of such distribution systems; it is
up to the Author/donor to decide if he or she is willing to distribute
software through any other system and a Licensee cannot impose that
choice.
14. Governmental Entities: Any Governmental Entity ("Governmental
Entity" is defined broadly as set forth in Section 0.13.1) or
Governmental Person (as "Governmental Person" is defined broadly in
Section 0.13.2), that uses, modifies, changes, copies, displays,
performs, or distributes the Program, or any Software or Derivative
Work based on the Program, may do so if and only if all of the
following terms and conditions (14.1 through 14.10, inclusive) are
agreed to and fully met:
14.1 If it is the position of any Governmental Entity (or, in the case
of any "Governmental Person," if it is the position of that
Governmental Person's Governmental Entity) that any doctrine or
doctrines of law (including, without limitation, any doctrine(s) of
immunity or any formalities of contract formation) may render this
License Agreement unenforceable or less than fully enforceable against
such Governmental Entity, or any Governmental Person of such
Governmental Entity, then prior to any use, modification, change,
display, performance, copy or distribution of the Program, or of any
Software or Derivative Work based on the Program, or any part thereof,
by the Governmental Entity, or by any Governmental Person of that
Governmental Entity, the Governmental Entity shall be required to
inform the Author in writing of each such doctrine that is believed to
render this License Agreement or any part of it less than fully
enforceable against such Governmental Entity or any Governmental
Person of such entity, and to explain in reasonable detail what
additional steps, if taken, would render the License Agreement fully
enforceable against such entity or person. Failure to provide the
required written notice to the Author in advance of any such use,
modification, change, display, performance, copy or distribution,
shall constitute an irrevocable and conclusive waiver of any and all
reliance on any doctrine, by the Governmental Entity, that is not
included or that is omitted from the required written notice (failure
to provide any written notice means all reliance on any doctrine is
irrevocably waived). Any Governmental Entity that provides written
notice under this subsection is prohibited, as are all of the
Governmental Persons of such Governmental Entity, from making any use,
change, display, performance, copy, modification or distribution of
the Software or any part thereof, until such time as a License
Agreement is in place, agreed upon by the Author and by the
Governmental Entity, that such entity concedes is
fully-enforceable. Any use, modification, change, display,
performance, copy, or distribution following written notice under this
Paragraph, but without the implementation of an agreement as provided
herein, shall constitute an irrevocable and conclusive waiver by the
Governmental Entity (and any and all Governmental Persons of such
Governmental Entity) of any and all reliance on any legal doctrine
either referenced in such written notice or omitted from it.
14.2 Any Governmental Entity that uses, copies, changes, modifies, or
distributes, the Software or any part or portion thereof, or any
Governmental Person who does so (whether that person's Governmental
Entity contends the person's action was, or was not, authorized or
official), permanently and irrevocably waives any defense based on
sovereign immunity, official immunity, the Act of State Doctrine, or
any other form of immunity, that might otherwise apply as a defense
to, or a bar against, any legal action based on the terms of this
License Agreement.
14.2.1 With respect to any enforcement action brought by the Author in
a United States court against a foreign Governmental Entity, the
waiver by any Governmental Entity as provided in Subparagraphs 14.1
and 14.2 is hereby expressly acknowledged by each such Governmental
Entity to constitute a "case . . . in which the foreign state has
waived its immunity," within the scope of 28 U.S.C. 1605(a)(1) of the
Foreign Sovereign Immunities Act of 1976 (as amended). Each such
Governmental Entity also specifically agrees and concedes that the
"commercial activity" exceptions to the FSIA, 28 U.S.C. 1605(a)(2),
(3) are also applicable. With respect to an action brought against the
United States or any United States Governmental Entity, in the courts
of any country, the U.S. Governmental Entity shall be understood to
have voluntarily agreed to a corresponding waiver of immunity from
actions in the courts of any other sovereign.
14.2.2 With respect to any enforcement action brought by an authorized
end-user (as a third-party beneficiary, under the terms of
Subparagraphs 14.3 and 14.10) in a United States court against a
foreign Governmental Entity, the waiver by any Governmental Entity as
provided in Subparagraphs 14.1 and 14.2 is hereby expressly
acknowledged by each such Governmental Entity to constitute a "case
. . . in which the foreign state has waived its immunity," within the
scope of 28 U.S.C. 1605(a)(1) of the Foreign Sovereign Immunities Act
of 1976 (as amended). . Each such Governmental Entity also
specifically agrees and concedes that the "commercial activity"
exceptions to the FSIA, 28 U.S.C. 1605(a)(2), (3) are also
applicable. With respect to an action brought against the United
States or any United States Governmental Entity, in the courts of any
country, the U.S. Governmental Entity shall be understood to have
voluntarily agreed to a corresponding waiver of immunity from actions
in the courts of any other sovereign.
14.2.3 With respect to any action or effort by the Author in the
United States to execute a judgment against a foreign Governmental
Entity, by attaching or executing process against the property of such
Governmental Entity, the waiver by any Governmental Entity as provided
in Subparagraphs 14.1 and 14.2 is hereby expressly acknowledged by
each such Governmental Entity to constitute a case in which "the
foreign state has waived its immunity from attachment in aid of
execution or from execution," in accordance with 28 U.S.C. 1610(a)(1)
of the Foreign Sovereign Immunities Act of 1976 (as amended). Each
such Governmental Entity also specifically agrees and concedes that
the "commercial activity" exceptions to the FSIA, 28 U.S.C.
1610(a)(2), (d) are also applicable. With respect to an action brought
against the United States or any United States Governmental Entity, in
the courts of any country, the U.S. Governmental Entity shall be
understood to have voluntarily agreed to a corresponding waiver of
immunity from actions in the courts of any other sovereign.
14.2.4 With respect to any action or effort brought by an authorized
end-user (as a third-party beneficiary, in accordance with
Subparagraphs 14.3 and 14.10) in the United States to execute a
judgment against a foreign Governmental Entity, by attaching or
executing process against the property of such Governmental Entity,
the waiver by any Governmental Entity as provided in Subparagraphs
14.1 and 14.2 is hereby expressly acknowledged by each such
Governmental Entity to constitute a case in which "the foreign state
has waived its immunity from attachment in aid of execution or from
execution," in accordance with 28 U.S.C. 1610(a)(1) of the Foreign
Sovereign Immunities Act of 1976 (as amended). Each such Governmental
Entity also specifically agrees and concedes that the "commercial
activity" exceptions to the FSIA, 28 U.S.C. 1610(a)(2), (d) are also
applicable. With respect to an action brought against the United
States or any United States Governmental Entity, in the courts of any
country, the U.S. Governmental Entity shall be understood to have
voluntarily agreed to a corresponding waiver of immunity from actions
in the courts of any other sovereign.
14.3 Any Governmental Entity that uses, copies, changes, modifies,
displays, performs, or distributes the Software or any part thereof,
or any Governmental Person who does so (whether that person's
Governmental Entity contends the person's action was, or was not,
authorized or official), and thereby violates any terms and conditions
of Section 9 (restrictions on modification), or Paragraph 10 (use
restrictions), agrees that the person or entity is subject not only to
an action by the Author, for the enforcement of this License Agreement
and for money damages and injunctive relief (as well as attorneys'
fees, additional and statutory damages, and other remedies as provided
by law), but such Governmental Entity and/or Person also shall be
subject to a suit for money damages and injunctive relief by any
person whose human rights have been violated or infringed, in
violation of this License Agreement, or through the use of any
Software in violation of this License Agreement. Any person who brings
an action under this section against any Governmental Person or Entity
must notify the Author promptly of the action and provide the Author
the opportunity to intervene to assert the Author's own
rights. Damages in such a third-party action shall be measured by the
severity of the human rights violation and the copyright infringement
or License Agreement violation, combined, and not merely by reference
to the copyright infringement. All end-users, to the extent that they
are entitled to bring suit against such Governmental Entity by way of
this License Agreement, are intended third-party beneficiaries of this
License Agreement. Punitive damages may be awarded in such a
third-party action against a Governmental Entity or Governmental
Person, and each and every such Governmental Entity or Person
conclusively waives all restrictions on the amount of punitive
damages, and all defenses to the award of punitive damages to the
extend such limitations or defenses depend upon or are a function of
such person or entity's status as a Governmental Person or
Governmental Entity.
14.4 Any State of the United States, or any subunit or Governmental
Entity thereof, that uses, copies, changes, modifies, displays,
performs, or distributes the Software of any part thereof, or any of
whose Governmental Persons does so (whether that person's Governmental
Entity contends the person's action was, or was not, authorized or
official), unconditionally and irrevocably waives for purposes of any
legal action (i) to enforce this License Agreement, (ii) to remedy
infringement of the Author's copyright, or (iii) to invoke any of the
third-party beneficiary rights set forth in Section 14.3 -- any
immunity under the Eleventh Amendment of the United States
Constitution or any other immunity doctrine (such as sovereign
immunity or qualified, or other, official immunity) that may apply to
state governments, subunits, or to their Governmental Persons.
14.5 Any Governmental Entity (including, without limitation, any State
of the United States), that uses, copies, changes, modifies, performs,
displays, or distributes the Software or any part thereof, or any of
whose Governmental Persons does so (whether that person's Governmental
Entity contends the person's action was, or was not, authorized or
official), unconditionally and irrevocably waives for purposes of any
legal action (i) to enforce this License Agreement, (ii) to remedy
infringement of the Author's copyright, or (iii) to invoke any of the
third-party beneficiary rights set forth in Section 14.3 any doctrine
(such as, but not limited to, the holding in the United States Supreme
Court decision of Ex Parte Young) that might purport to limit remedies
solely to prospective injunctive relief. Also explicitly and
irrevocably waived is any underlying immunity doctrine that would
require the recognition of such a limited exception for purposes of
remedies. The remedies against such governmental entities and persons
shall explicitly include money damages, additional damages, statutory
damages, consequential damages, exemplary damages, punitive damages,
costs and fees that might otherwise be barred or limited in amount on
account of governmental status.
14.6 Any Governmental Entity that uses, copies, changes, modifies,
displays, performs, or distributes the Software or any part thereof,
or any of whose Governmental Persons does so (whether that person's
Governmental Entity contends the person's action was, or was not,
authorized or official), unconditionally and irrevocably waives for
purposes of any legal action (i) to enforce this License Agreement,
(ii) to remedy infringement of the Author's copyright, or (iii) to
invoke any of the third-party beneficiary rights set forth in Section
14.3 any and all reliance on the Act of State doctrine, sovereign
immunity, international comity, or any other doctrine of immunity
whether such doctrine is recognized in that government's own courts,
or in the courts of any other government or nation.
14.6.1 Consistent with Subparagraphs 14.2.1 through 14.2.4, this
waiver shall explicitly be understood to constitute a waiver not only
against suit, but also against execution against property, for
purposes of the Foreign Sovereign Immunities Act of 1976 (as
amended). All United States Governmental Entities shall be understood
to have agreed to a corresponding waiver of immunity against (i) suit
in the courts of other sovereigns, and (ii) execution against property
of the United States located within the territory of other countries.
14.7 Governmental Persons, (i) who violate this License Agreement
(whether that person's Governmental Entity contends the person's
action was, or was not, authorized or official), or (ii) who are
personally involved in any activity, policy or practice of a
governmental entity that violates this License Agreement (whether that
person's Governmental Entity contends the person's action was, or was
not, authorized or official), or (iii) that use, copy, change, modify,
perform, display or distribute, the Software or any part thereof, when
their Governmental Entity is not permitted to do so, or is not a
Qualified Licensee, or has violated the terms of this License
Agreement, each and all individually waive and shall not be permitted
to assert any defense of official immunity, "good faith" immunity,
qualified immunity, absolute immunity, or other immunity based on his
or her governmental status.
14.8 No Governmental Entity, nor any Governmental Person thereof may,
by legislative, regulatory, or other action, exempt such Governmental
Entity, subunit, or person, from the terms of this License Agreement,
if the Governmental Entity or any such person has voluntarily used,
modified, copied, displayed, performed, or distributed the Software or
any part thereof.
14.9 Enforcement In Courts of Other Sovereigns Permitted. By using,
modifying, changing, displaying, performing or distributing any
Software covered by this License Agreement, any Governmental Entity
hereby voluntarily and irrevocably consents, for purposes of (i) any
action to enforce the terms of this License Agreement, and (ii) any
action to enforce the Author's copyright (whether such suit be for
injunctive relief, damages, or both) to the jurisdiction of any court
or tribunal in any other country (or a court of competent jurisdiction
of a subunit, province, or state of such country) in which the terms
of this License Agreement are believed by the Author to be
enforceable. Each such Governmental Entity hereby waives all
objections to personal jurisdiction, all objections based on
international comity, all objections based on the doctrine of forum
non conveniens, and all objections based on sovereign or governmental
status or immunity that might otherwise be asserted in the courts of
some other sovereign.
14.9.1 The Waiver by any Governmental Entity of a country other than
the United States shall be understood explicitly to constitute a
waiver for purposes of the Foreign Sovereign Immunities Act of 1976
(see Subparagraphs 14.2.1to 14.2.4, inclusive, supra), and all United
States Governmental Entities shall be understood to have agreed to a
waive correspondingly broad in scope with respect to actions brought
in the courts of other sovereigns.
14.9.2 Forum Selection Non-U.S. Governmental Entities. Governmental
Entities that are not United States Governmental Entities shall be
subject to suit, and agree to be subject to suit, in the United States
District Court for the District of Columbia. The Author or an
authorized end-user may bring an action in another court in another
country, but the United States District Court for the District of
Columbia, shall always be available as an agreed-upon forum for such
an action. At the optional election of any Author (or, in the case of
a third-party claim, any end-user asserting rights under Subparagraphs
14.3 and 14.10), such a suit against a non-U.S. Governmental Entity or
Person may be brought in the United States District Court for the
Southern District of New York, or the United States District Court for
the Northern District of California, as a direct substitute for the
United States District Court for the District of Columbia, for all
purposes of this Subparagraph.
14.9.3 Forum Selection U.S. Governmental Entities. All United States
Governmental Entities shall be subject to suit, and agree to be
subject to suit, in the following (non-exclusive) list of fora:
Ottawa, Canada, London, England, and Paris, France. The Author or an
authorized end-user may bring action in another court that can
exercise jurisdiction. But the courts in these three locations shall
always be available (at the option of the Author or an authorized
end-user) as a forum for resolving any dispute with the United States
or a governmental subunit thereof. Except as provided in Subparagraph
14.10, any and all United States Governmental Persons shall be subject
to suit wherever applicable rules of personal jurisdiction and venue
shall permit such suit to be filed, but no such United States
Governmental Person may assert any defense based on forum non
conveniens or international comity, to the selection of any particular
lawful venue.
14.10 Enforcement Of Claims For Human Rights Violations. By using,
copying, modifying, changing, performing, displaying or distributing
the Software covered by this License Agreement, any Governmental
Entity, or Governmental Person hereby voluntarily and irrevocably
consents -- for purposes of any third-party action to remedy human
rights violations and other violations of this License Agreement (as
reflected in Section 14.3) -- to the jurisdiction of any court or
tribunal in any other country (or a court of competent jurisdiction of
a subunit, province, or state of such country) in which the
third-party beneficiary reasonably believes the relevant terms of this
License Agreement are enforceable. The Governmental Entity or Person
hereby waives all objections to personal jurisdiction, all objections
based on international comity, all objections based on the doctrine of
forum non conveniens, and all objections based on sovereign or
governmental status or immunity that might otherwise be asserted in
the courts of some other sovereign.
14.10.1 Waiver of Immunity and Forum Selection. The presumptively
valid and preferred fora identified in Subparagraphs 14.9.2 and 14.9.3
shall also apply for purposes of Subparagraph 14.10. All Governmental
Entities are subject to the same Waiver of Immunity as set forth in
Subparagraphs 14.2.1 to 14.2.4, inclusive.
15. Subsequent Versions of HESSLA. Hacktivismo may publish revised
and/or new versions of the Hacktivismo Enhanced-Source Software
License Agreement from time to time. Such new versions will be similar
in spirit to the present version, but may differ in detail to address
new problems or concerns.
Each version is given a distinguishing version number. Any Program
released by Hacktivismo under a version of this License Agreement
prior to Version 1.0, shall be considered released under Version 1.0
of the Hacktivismo Enhanced-Source Software License Agreement, once
Version 1.0 is formally released. Prior to Version 1.0, any Software
released by Hacktivismo or a Licensee of Hacktivismo under a
lower-numbered version of the HESSLA shall be considered automatically
to be subject to a higher-number version of the HESSLA, whenever a
later-numbered version has been released.
Concerning the work of any other Author, if the Program specifies a
version number of this License Agreement which applies to it and "any
later version," You have the option of following the terms and
conditions either of that version or of any later version published by
Hacktivismo. If the Program does not specify a version number of this
License Agreement, You may choose any version after 1.0, once version
1.0 is published by Hacktivismo, and prior to publication of version
1.0, You may choose any version of the Hacktivismo Software License
Agreement then published by Hacktivismo. If the Program released by
another Author, specifies only a version number, then that version
number only shall apply. If "the latest version," is specified, then
the latest version of the HESSLA published on the Hacktivismo Website
shall always apply at all times.
16. DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED UNDER THIS
LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTY, EITHER EXPRESS OR
IMPLIED, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF
NON-INFRINGEMENT AND WARRANTIES THAT THE ORIGINAL WORK IS MERCHANTABLE
OR FIT FOR A PARTICULAR PURPOSE. THE SOFTWARE IS PROVIDED WITH ALL
FAULTS. THE ENTIRE RISK AS TO THE QUALITY OF THE ORIGINAL WORK IS WITH
YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY
CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO LICENSE TO ORIGINAL
WORK IS GRANTED HEREUNDER EXCEPT UNDER THIS DISCLAIMER.
17. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO
LEGAL THEORY, WHETHER TORT (INCLUDING THE AUTHOR'S NEGLIGENCE),
CONTRACT, OR OTHERWISE, SHALL THE AUTHOR BE LIABLE TO ANY PERSON FOR
ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF
ANY CHARACTER ARISING AS A RESULT OF THIS LICENSE OR THE USE OF THE
SOFTWARE INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL,
WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER
COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PERSON SHALL HAVE BEEN
INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF
LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY
RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW
PROHIBITS SUCH LIMITATION, BUT SHALL EXCLUDE SUCH LIABILITY TO THE
EXTENT PERMITTED BY LAW. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS
EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.
18. ENCRYPTION KEYS AND PUBLIC KEY INFRASTRUCTURE. SOFTWARE RELEASED
UNDER THIS LICENSE AGREEMENT MAY REQUIRE A DIGITAL CERTIFICATE, OR AN
ENCRYPTION KEY "SIGNED" BY A TRUSTED PARTY, TO FUNCTION. AUTHOR
UNDERTAKES NO RESPONSIBILITY FOR THE PROPER, SECURE, AND ADEQUATE
FUNCTIONING OF ANY CRYPTOGRAPHIC SYSTEMS, OF ANY CRYPTOGRAPHIC KEYS,
OR FOR THE TRUSTWORTHINESS OF ANY END-USER, ANY ISSUER OF
CERTIFICATES, OR OF ANY SIGNER OF ENCRYPTION KEYS. USE OF THIS
SOFTWARE IS AT THE END-USER'S SOLE AND EXCLUSIVE RISK. IN ANY
PUBLIC-KEY INFRASTRUCTURE ("PKI") SYSTEM, AN END-USER'S LEGAL
RELATIONSHIP WITH THE END-USER'S CERTIFICATION AUTHORITY DOES NOT
INCLUDE OR ENCOMPASS ANY LEGAL RELATIONSHIP WITH THE AUTHOR, AND IS
GOVERNED SOLELY AND EXCLUSIVELY BY THE CERTIFICATION AUTHORITY'S
CERTIFICATION PRACTICE STATEMENT AND CERTIFICATION AGREEMENTS. AUTHOR
ASSUMES NO RESPONSIBILITY FOR THE ACTIONS OR OMISSIONS OF ANY END-USER
OR ANY CERTIFICATION AUTHORITY.
18. Saving Clause. If any portion of this License Agreement is held
invalid or unenforceable under any particular circumstance, the
balance of the License Agreement is intended to apply and the License
Agreement as a whole is intended to apply in other circumstances.
END OF TERMS AND CONDITIONS
|