Understanding Open-Source Software – Including Recent Developments

Michael R. Overly
Michael R. Overly
Foley & Lardner LLP

Michael Overly is a partner in Foley & Lardner’s Information Technology & Outsourcing Group and Privacy, Security and Information Management Groups.

Ashley M. Kennedy
Ashley M. Kennedy
Foley & Lardner LLP

Ashley Kennedy is a Technology, Transactions, Cybersecurity & Privacy Practice Group member within Foley & Lardner’s Intellectual Property Department.

On-Demand: January 30, 2025

2 hour CLE

This program is only available to All-Access Pass Members.
Subscribe to Above the Law CLE + myLawCLEs All-Access Pass...
Get this course, plus over 1,000+ live webinars.
Learn More

Program Summary

Every business, regardless of size or industry, uses open-source software—often without realizing it. Open-source software is useful software that is generally provided free of charge and in a format that permits the licensee to freely modify the code. This presentation will provide a comprehensive exploration of key issues related to open-source software from both the vendor’s and the customer’s perspectives. Additionally, it will include the latest updates and developments in this rapidly evolving area.

Key topics to be discussed:

  • Origins of open-source software
  • Benefits and risks of open-source software – There is no such thing as a “free lunch”
  • Types of open-source licenses: Viral v. non-viral licenses
  • Risks to information security and intellectual property
  • Distinguishing between customer and vendor risks/rewards

Closed-captioning available

Speakers

Michael-R.-Overly_Foley-&-Lardner-LLP_myLawCLEMichael R. Overly | Foley & Lardner LLP

Michael Overly is a partner in Foley & Lardner’s Information Technology & Outsourcing Group and Privacy, Security and Information Management Groups. He is one of the few practicing lawyers who have satisfied the rigorous requirements necessary to obtain the Certified Information System Auditor (CISA), Certified Information Systems Security Professional (CISSP), Information Systems Security Management Professional (ISSMP), Certified in Risk and Information Systems Controls (CRISC), Certified Outsourcing Professional (COP), and Certified Information Privacy Professional (CIPP) certifications. He writes and speaks frequently regarding negotiating and drafting technology transactions and the legal issues of technology in the workplace, e-mail, and electronic evidence. He has written numerous articles and books on these subjects and is a frequent commentator in the national press (e.g., the New York Times, Chicago Tribune, Los Angeles Times, Wall Street Journal, ABCNEWS.com, CNN, and MSNBC) and has testified before the U.S. Congress regarding online issues.

 

Ashley M. Kennedy_myLawCLEAshley M. Kennedy | Foley & Lardner LLP

Ashley Kennedy is a Technology, Transactions, Cybersecurity & Privacy Practice Group member within Foley & Lardner’s Intellectual Property Department. Ashley provides counsel on structuring and negotiating technology agreements to create strategic and advantageous business relationships between companies. She has experience drafting and negotiating commercial agreements, including intellectual property licenses, software-as-a-service agreements, distribution agreements, master services agreements, non-disclosure agreements, and technology transfer agreements. Ashley also has experience structuring and addressing the intellectual property components of mergers and acquisitions and other corporate transactions.

Prior to joining Foley as an associate, Ashley served as an associate and summer clerk at an intellectual property-focused law firm, preparing patent applications for the USPTO. She previously worked in the engineering sector for an aerospace and defense company.

Agenda

I. Origins of open-source software | 2:30pm – 3:00pm

II. Benefits and risks of open-source software – There is no such thing as a “free lunch” | 3:00pm – 3:30pm

Break | 3:30pm – 3:40pm

III. Types of open-source licenses: Viral v. non-viral licenses | 3:40pm – 4:00pm

IV. Risks to information security and intellectual property | 4:00pm – 4:20pm

V. Distinguishing between customer and vendor risks/rewards | 4:20pm – 4:40pm

Preview
More CLE Webinars
Upcoming CLE Webinars
Sketching Legacies: A guide to drafting wills and trusts
Sketching Legacies: A guide to drafting wills and trusts Thu, July 17, 2025
On-Demand
Live Replay
Single Member LLCs: Avoiding Risks and Seizing Opportunities
Single Member LLCs: Avoiding Risks and Seizing Opportunities Thu, July 17, 2025
On-Demand
Live Replay
Microsoft Excel for Lawyers (2024 Edition)
Microsoft Excel for Lawyers (2024 Edition) Tue, July 22, 2025
On-Demand
Live Replay