<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Wed, May 8, 2019 at 8:07 PM VanL <<a href="mailto:van.lindberg@gmail.com">van.lindberg@gmail.com</a>> wrote:</div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="auto"><div dir="auto"><div dir="ltr" style="font-family:sans-serif"><span style="font-family:Arial,Helvetica,sans-serif">In order for Betty to have a duty vis a vis Anna, Anna needs to be a Recipient of the Work from Betty.</span></div></div></div></blockquote><div><br></div><div>What if Anna performs the work? It seems to me that all participants in a blockchain system would have to perform the work to at least one other user. Since your language seems oriented toward a system with a system operator who potentially hoards data, most users would probably be performing the software to that system operator. Potentially this is your customer.</div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="auto"><div dir="auto">The CAL does not contain a concept of "Derived Data," so I am somewhat unsure how to respond to your #2.</div></div></blockquote><div><br></div><div>The problem is that Anna's data exists in a modified form. It's been digitally signed by Betty along with data added by Betty.</div><div><br></div><div>So, Anna gets a copy of the blockchain after Betty adds her block. She now has a lawful interest in it, in terms of possession. But not in the key that Betty used to sign it?</div><div><br></div><div>I am not yet seeing that your language regarding cryptographic keys and user data is sufficiently selective. It just says "cryptographic keys" and that they are the keys necessary to "process user data". Process can mean many things, including applying a digital signature.</div><div><br></div><div><span class="gmail-im" style="color:rgb(80,0,80)"><div dir="auto"><blockquote style="font-family:sans-serif;margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div>Note your definition of "Source Code":</div><div><br></div><div><span style="color:rgb(36,41,46);font-family:-apple-system,blinkmacsystemfont,"segoe ui",helvetica,arial,sans-serif,"apple color emoji","segoe ui emoji","segoe ui symbol";font-size:16px">o) “Source Code” means the form of the work preferred for making modifications, including any comments, design documentation, help materials, installation instructions, <b>cryptographic keys</b>, and any information reasonably necessary to compile the Source Code into Object Code <b>or Process User Data</b> using generated Object Code.</span> <br></div><div><br></div><div>Emphasis mine. Perhaps modulated by a comma, the definition of source code seems to include cryptographic keys used to process user data.</div></div></blockquote></div><div dir="auto"><br></div></span><div dir="auto">> This is mixing two different concepts. The above concerns User Data, this concerns source code.</div><div dir="auto"><br></div><div>It seems to me that the above is concerning both source code and user data. To quote again:</div></div><div><br></div></div><blockquote style="margin:0 0 0 40px;border:none;padding:0px"><div class="gmail_quote"><div><div><span style="color:rgb(36,41,46);font-family:-apple-system,blinkmacsystemfont,"segoe ui",helvetica,arial,sans-serif,"apple color emoji","segoe ui emoji","segoe ui symbol";font-size:16px"><b>cryptographic keys</b>, and any information reasonably necessary to compile the Source Code into Object Code <b>or Process User Data</b> using generated Object Code.</span><span style="color:rgb(80,0,80);font-family:sans-serif"> </span> </div></div></div></blockquote><div class="gmail_quote"><div><div><br></div><div>I am still reading this as "cryptographic keys necessary to process user data". If that is not what it says, perhaps splitting this into two sentences is appropriate.</div><div dir="auto"><br></div><div dir="auto">> If Betty has a code signing key necessary to execute the object code, then that code signing key must be provided so that Anna can compile and run the source code in other contexts.</div><div dir="auto"><br></div><div>But not process user data? The text arguably says yes, you are saying no.</div></div><div><br></div><div> Thanks</div><div><br></div><div> Bruce</div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="auto"><div dir="auto"></div></div>
</blockquote></div></div>