[License-review] For Approval: The Cryptographic Autonomy License

VanL van.lindberg at gmail.com
Fri May 10 12:59:27 UTC 2019

Hi Nigel,

On Fri, May 10, 2019, 7:32 AM Tzeng, Nigel H. <Nigel.Tzeng at jhuapl.edu>

> So…taking the photo site as the example I can:
>    1. Take user image
>    2. Modify it, creating a “modified” or derivative data (denoise,
>    change size, fix white balance, add a watermark, etc)
>    3. Delete the original image from my server
>    4. Have no requirement to return the “modified form” of the data
>    achieving vendor lock in
Good hypo. I see that I was being too imprecise when responding to Bruce.

The CAL enforces data portability for data that is 1) an input or output of
the software, and 2) in which you have an ownership or posessory interest.

Thus the analysis is how the IP laws of your jurisdiction treat the data
stored with the operator. Does the law recognize an ownership or posessory
interest? Then you can get the data back. If not, then no.

Comparing and contrasting the two hypotheticals, I see that I was
implicitly saying that I don't see that the law would recognize that Anna
had an ownership interest in Betty's block, but that the law does recognize
my ownership interest in my photos that you have denoised.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensource.org/pipermail/license-review_lists.opensource.org/attachments/20190510/0afacb65/attachment.html>

More information about the License-review mailing list