Conformance Handbook for OpenChain Specification 1.1

Similar documents
OpenChain Conformance 2016-H1 Specification

OpenChain Conformance 2016-H1 Conformance Check

OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off]

OpenChain Specification Version 1.3 (DRAFT)

Giving Everyone Access To Open Source Best Prac8ces

This slide is relevant to providing either a single three hour training session or explaining how a series of shorter sessions focused on per chapter

FOSS Training Reference Slides for the OpenChain Specification 1.1

CURRICULUM. FOSS Training Reference Deck, Version 2 FINAL DRAFT Designed for the OpenChain Specification 1.0

Competency Definition

CURRICULUM. Core FOSS Compliance Version 1 Designed for Version 1 of the OpenChain Specification

Compliance Verification Program Governance Guide

Northern Virginia Community College Social Media Guidelines

28 September PI: John Chip Breier, Ph.D. Applied Ocean Physics & Engineering Woods Hole Oceanographic Institution

Digital Preservation Policy. Principles of digital preservation at the Data Archive for the Social Sciences

ISO/ IEC (ITSM) Certification Roadmap

Rules for LNE Certification of Management Systems

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

Track 1 // Collaboration & Partnerships

A 3-STEP APPROACH FOR FDA UNIQUE DEVICE IDENTIFIER (UDI) COMPLIANCE

Open Data Policy City of Irving

Enterprise resilience and the role of Standards

Agenda. Bibliography

Systems and software engineering Requirements for managers of information for users of systems, software, and services

Blood Processing Database for Kality User s Manual. V 1.0

Examination Regulations for Employee Certification regarding Usability Engineering

MNsure Privacy Program Strategic Plan FY

Open Source Software Licence at CERN Recommendations from the OSL Task Force François Fluckiger, Editor 20 April; 2012

Google Cloud & the General Data Protection Regulation (GDPR)

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004

General Data Protection Regulation (GDPR) The impact of doing business in Asia

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

Building a Resilient Security Posture for Effective Breach Prevention

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

How to choose the right Data Governance resources. by First San Francisco Partners

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036

NSF Data Management Plan Template Duke University Libraries Data and GIS Services

Acceptable Use of Policy

Introduction to the American Academy of Forensic Sciences Standards Board

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Avanade s Approach to Client Data Protection

Scientific Data Policy of European X-Ray Free-Electron Laser Facility GmbH

Canadian Anti-Spam Legislation (CASL) Compliance Policy. 2. Adopt Canadian Anti-Spam Legislation (CASL) Compliance Policy.

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC

Authorized Training Provider Application Process

Michel Ruffin Software coordination manager

Why you should adopt the NIST Cybersecurity Framework

Open Source Implementation for IEEE Standards. IEEE-SA Corporate Advisory Group Ad Hoc on Open Source

GOARN s role in the SEARO Regional Framework on Operational Partnerships for Emergency Response

Professional Training Course - Cybercrime Investigation Body of Knowledge -

CDISC Operating Procedure COP-001 Standards Development

Redefining Software- Defined Networking

2016 APNIC Survey Results Asia Pacific Network Information Centre

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 1: Processes and tiered assessment of conformance

Video Services Forum Rules of Procedure

Evolving Compliance Needs in Acquisitions Case Study

Supersedes Policy previously approved by TBM

Adobe Fonts Service Additional Terms. Last updated October 15, Replaces all prior versions.

ONBOARDING APPLICATION

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK)

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

Canada s Anti-Spam Legislation (CASL) What it means for Advisors. Distributor Learning & Development

Security Awareness, Training, And Education Plan

Request for Proposal for Technical Consulting Services

International Nonproliferation Export Control Program (INECP) Government Outreach for Enterprise Compliance

Policy for Certification of Private Label Products Within the Cradle to Cradle Certified Certification Scheme. Version 1.0.

SOC for cybersecurity

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

Data Governance. Mark Plessinger / Julie Evans December /7/2017

Handbook December 2018

Data Processing Agreement

SLAS Special Interest Group Charter Application

STATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project

FHIR Trademark FAQs. FHIR Trademark FAQs 7-Sep-16 Page 1 of 5

HIPAA For Assisted Living WALA iii

NDSA Web Archiving Survey

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

SSL Certificates Certificate Policy (CP)

A Checklist for Cybersecurity and Data Privacy Diligence in TMT Transactions

HIPAA Security Checklist

HIPAA Security Checklist

April 17, Ronald Layne Manager, Data Quality and Data Governance

Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization

Opportunities and Obstacles for Enabling the Use of Geospatial Applications

Strategic Action Plan. for Web Accessibility at Brown University

ISO/IEC :2015 IMPACT ON THE CERTIFIED CLIENT

Department of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise

Introduction to OpenDaylight: An Open Source Community around Software-Defined Networking

Current API 1509, Sec. 6.7 Provisional Licensing

The Address Point Data Standard for Minnesota Overview and Frequently Asked Questions

American Association for Laboratory Accreditation

MULTI-YEAR ACCESSIBILITY PLAN

Subject: University Information Technology Resource Security Policy: OUTDATED

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY

Convergence of BCM and Information Security at Direct Energy

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

There have been several changes to IDEA since it was passed in The MDE-OSE has regularly issued new policies to address changes in Federal regul

Draft Applicant Guidebook, v3

Data Subject Access Request Procedure. Page 1 KubeNet Data Subject Access Request Procedure KN-SOP

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)

Transcription:

Conformance Handbook for OpenChain Specification 1.1 Revision 1 Miriam Ballhausen, Shane Coughlan Copyright 2017 The OpenChain Project. This document is licensed under the Creative Commons Attribution License 4.0 (CC-BY-4.0). A copy of the license can be obtained here.

Introduction 3 Our Goals 3 Vision 3 Mission 3 Definitions 4 G1: Know Your FOSS Responsibilities 5 G2: Assign Responsibility for Achieving Compliance 7 G3: Review and Approve FOSS Content 8 G4: Deliver FOSS Content Documentation and Artifacts 9 G5: Understand FOSS Community Engagement 10

Introduction The OpenChain Initiative began in 2013 when a group of software supply chain open source practitioners observed two emerging patterns: 1) significant process similarities existed among organizations with mature open source compliance programs; and 2) there still remained a large number of organizations exchanging software with less developed programs. The latter observation resulted in a lack of trust in the consistency and quality of the compliance artifacts accompanying the software being exchanged. As a consequence, at each tier of the supply chain, downstream organizations were frequently redoing the compliance work already performed by other upstream organizations. A study group was formed to consider whether a standard program specification could be created that would: i) facilitate greater quality and consistency of open source compliance information being shared across the industry; and ii) decrease the high transaction costs associated with open source resulting from compliance rework. The study group evolved into a work group, and in April 2016, formally organized as a Linux Foundation collaborative project. Our Goals Vision The vision for the project is to enable a software supply chain where free/open source software (FOSS) is delivered with trusted and consistent compliance information. Mission The mission is to establish requirements to achieve effective management of free/open source software (FOSS) for software supply chain participants, such that the requirements and associated collateral are developed collaboratively and openly by representatives from the software supply chain, open source community, and academia. In accordance with the Vision and Mission, this specification defines a set of requirements that if met, would significantly increases the probability that an open source compliance program had achieved a sufficient level of quality, consistency and completeness; although a program that satisfies all the specification requirements does not guarantee full compliance. The requirements represent a base level (minimum) set of requirements a program must satisfy to be considered OpenChain Conforming. 1 This conformance check corresponds to the OpenChain Specification 1.1. It is designed to assess the status of OpenChain conformance. 1 See https://wiki.linuxfoundation.org/_media/openchain/openchainspec-1.1.draft.pdf

Definitions The definitions used in this document correspond to the definitions used in the OpenChain 2 Specification 1.1. 2 See https://wiki.linuxfoundation.org/_media/openchain/openchainspec-1.1.draft.pdf

G1: Know Your FOSS Responsibilities 1.a. Do you have a documented policy that governs FOSS license compliance of the Supplied Software distribution (e.g., via training, internal wiki, or other practical communication method)? No Yes Reference to Specificati on 1.1; 1.1.1 1.b. Is the policy internally communicated? 1.1. 1.c. 1.d. Do you have a documented procedure that communicates the existence of the FOSS policy to all Software Staff? Do you have FOSS training materials (e.g., slide decks or online course) covering the following topics? 1.1.2 1.2; 1.2.1 1.d.i The FOSS policy and where to find it. 1.2 1.d.ii 1.d.iii Basics of Intellectual Property law pertaining to FOSS and FOSS licenses, FOSS licensing concepts (including the concepts of permissive and copyleft licenses), 1.2 1.2 1.d.iv FOSS project licensing models, 1.2 1.d.v 1.d.vi 1.e. 1.f. Software Staff roles and responsibilities pertaining to FOSS compliance specifically and the FOSS policy in general, Process for identifying, recording and/or tracking of FOSS components contained in Supplied Software? Do you track the completion of the training for all Software Staff? Have 85% or more of the Software Staff completed a FOSS training within the last 24 months? 1.2 1.2 1.2.2 1.2; 1.2.3 1.g Do you have a process for reviewing the Identified Licenses to determine the obligations, restrictions and rights granted by each license? 1.3

1.h Do you have a documented procedure to review and document the obligations, restrictions and rights granted by each Identified License governing the Supplied Software. 1.3.1

G2: Assign Responsibility for Achieving Compliance No Yes Reference to Specificati on 2.a. 2.b. 2.c. 2.d. 2.e. 2.f. 2.g. Have you assigned individual(s) responsible for receiving external FOSS compliance inquiries ( FOSS Liaison )? Is the FOSS Liaison function publicly identified (e.g. via an email address and/or the Linux Foundation s Open Compliance Directory)? Do you have a documented procedure that assigns responsibility for receiving FOSS compliance inquiries? Have you assigned a person, group or function responsible for managing internal FOSS compliance? The FOSS Compliance role and FOSS Liaison can be the same individual. Is legal expertise pertaining to FOSS compliance accessible to the FOSS Compliance Role (e.g., internal or external)? Have you assigned responsibilities to develop and maintain FOSS compliance policy and processes? Do you have a documented procedure for handling review and remediation of non-compliant cases? 2.1, 2.2.1 2.1.1 2.1.2, 2.2.3 2.2.1 2.2.2 2.2.3 2.2.4, 2.1.2

G3: Review and Approve FOSS Content No Yes Reference to Specification 3.a Do you have a documented procedure for identifying, tracking and archiving information about the collection of FOSS components from which a Supplied Software release is comprised? 3.b Do you have FOSS component records for each Supplied Software release which demonstrates the documented procedure was properly followed? 3.c Have you implemented a procedure that handles at least the following common FOSS license use cases for the FOSS components of each supplied Supplied Software release? 3.1.1 3.1.2 3.2.1 3.c.i distributed in binary form; 3.2 3.c.ii distributed in source form; 3.2 3.c.iii integrated with other FOSS such that it may trigger copyleft obligations; 3.2 3.c.iv contains modified FOSS; 3.2 3.c.v contains FOSS or other software under an incompatible license interacting with other components within the Supplied Software; 3.2 3.c.vi contains FOSS with attribution requirements. 3.2

G4: Deliver FOSS Content Documentation and Artifacts No Yes Reference to Specificati on 4.a. 4.b. 4.c. 4.d. Do you have a documented procedure that describes a process that ensures the Compliance Artifacts are distributed with Supplied Software as required by the Identified Licenses? Do you archive copies of the Compliance Artifacts of the Supplied Software? Can you easily retrieve the archived copies of the Compliance Artifacts of the Supplied Software? Are the copies of the Compliance Artifacts archived for at least as long as the Supplied Software is offered or as required by the Identified Licenses (whichever is longer)? 4.1.1 4.1.2 4.1.2 4.1.2

G5: Understand FOSS Community Engagement No Yes Reference to Specificatio n 5.a. 5.b. 5.c. 5.d. Do you allow employees to contribute to FOSS projects on behalf of your organization? Do you have a documented FOSS contribution policy? Is your Software Staff aware of the existence of the FOSS Contribution Policy (e.g. via training, internal wiki, or other practical communication method)? Provided the FOSS contribution policy permits contributions, do you have a documented procedure that describes the FOSS contribution process? 5.1 5.1.1 5.1.2 5.2.1