Open Source Initiative sets out plan to curb proliferation of open source licenses

The Open Source Initiative has published a draft plan aimed at reducing the proliferation of different open source licences.

The Open Source Initiative has published a draft plan aimed at reducing the proliferation of different open source licences.

The OSI’s proliferation committee said the aim of its proposals was to help the open source community determine which licences are useful in which circumstances.

But it rejected the option of recommending that everyone use the widely adopted general public licence (GPL), saying this was unrealistic. The rejection comes just weeks after the second discussion draft of the GPL’s version 3 was published by the Free Software Foundation and the Software Freedom Law Center.

Instead, the committee is proposing to group licences together under five descriptive headings – licenses that are popular and widely used or with strong communities, special purpose licences, licences that are redundant with more popular licences, non-reusable licences and other/miscellaneous licences.

The committee’s draft report says, “We realise that the majority of open source projects currently use the GPL and that the GPL does not always play well with other licences. We also realise that the GPL is a great licence choice for some people and not so great a licence choice for others.

“Thus, we can't just recommend that everybody use the GPL. While such a recommendation would solve the licence proliferation problem, it is not realistic.”

Vote for your IT greats

Who have been the most influential people in IT in the past 40 years? The greatest organisations? The best hardware and software technologies? As part of Computer Weekly’s 40th anniversary celebrations, we are asking our readers who and what has really made a difference?

Vote now at:



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Business applications



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...