Browse Definitions :
Definition

BSD licenses

BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.

As a low restriction and requirement license type, Berkeley Source Distribution (BSD) licenses are used for the distribution of many freeware, shareware and open source software. BSD licenses are much like the license that accompanied the original BSD. The original BSD Unix license was first written in 1969. There are 4 main clauses of the classic BSD license:

  1. The BSD UNIX license states one may copy, modify and redistribute the code so long as one retains a copy of the original copyright statement.
  2. The copyright statements must include a clear statement of two restrictions for use of the distributed software.
  3. A disclaimer for limitations of liability that include not claiming authorship of the code where the code was not written by the user and not suing the author of the program for unexpected or undesirable functionality.
  4. The stipulation that one doesn’t use the name of the software or its authors to advertise or promote work derived from modification of the distributed code without prior written consent.

Similarly, other BSD licenses can have these clauses but may not include them all. As a base, the first two clauses are a part of any BSD license. There are two, three and four clause BSD licenses.

One of the main differences between a GNU General Public License (GNU GPL or simply GPL), the most common type of license for free software, and a BSD license is that GPL are copyleft, meaning any derivative code produced from the original free open source code must remain free. BSD licenses may allow for derivative works to become paid software.

This was last updated in October 2018

Continue Reading About BSD licenses

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close