{ "isDeprecatedLicenseId": false, "licenseText": "NETHACK GENERAL PUBLIC LICENSE\n(Copyright 1989 M. Stephenson)\n(Based on the BISON general public license, copyright 1988 Richard M. Stallman)\nEveryone is permitted to copy and distribute verbatim copies of this license, but changing it is not allowed. You can also use this wording to make the terms for other programs.\nThe license agreements of most software companies keep you at the mercy of those companies. By contrast, our general public license is intended to give everyone the right to share NetHack. To make sure that you get the rights we want you to have, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. Hence this license agreement.\nSpecifically, we want to make sure that you have the right to give away copies of NetHack, that you receive source code or else can get it if you want it, that you can change NetHack or use pieces of it in new free programs, and that you know you can do these things.\nTo make sure that everyone has such rights, we have to forbid you to deprive anyone else of these rights. For example, if you distribute copies of NetHack, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must tell them their rights.\nAlso, for our own protection, we must make certain that everyone finds out that there is no warranty for NetHack. If NetHack is modified by someone else and passed on, we want its recipients to know that what they have is not what we distributed.\nTherefore we (Mike Stephenson and other holders of NetHack copyrights) make the following terms which say what you must do to be allowed to distribute or change NetHack.\nCOPYING POLICIES\n 1. You may copy and distribute verbatim copies of NetHack source code as you receive it, in any medium, provided that you keep intact the notices on all files that refer to copyrights, to this License Agreement, and to the absence of any warranty; and give any other recipients of the NetHack program a copy of this License Agreement along with the program.\n 2. You may modify your copy or copies of NetHack or any portion of it, and copy and distribute such modifications under the terms of Paragraph 1 above (including distributing this License Agreement), provided that you also do the following:\n a) cause the modified files to carry prominent notices stating that you changed the files and the date of any change; and\n b) cause the whole of any work that you distribute or publish, that in whole or in part contains or is a derivative of NetHack or any part thereof, to be licensed at no charge to all third parties on terms identical to those contained in this License Agreement (except that you may choose to grant more extensive warranty protection to some or all third parties, at your option)\n c) You may charge a distribution fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.\n 3. You may copy and distribute NetHack (or a portion or derivative of it, under Paragraph 2) in object code or executable form under the terms of Paragraphs 1 and 2 above provided that you also do one of the following:\n a) accompany it with the complete machine-readable source code, which must be distributed under the terms of Paragraphs 1 and 2 above; or,\n b) accompany it with full information as to how to obtain the complete machine-readable source code from an appropriate archive site. (This alternative is allowed only for noncommercial distribution.)\n For these purposes, complete source code means either the full source distribution as originally released over Usenet or updated copies of the files in this distribution used to create the object code or executable.\n 4. You may not copy, sublicense, distribute or transfer NetHack except as expressly provided under this License Agreement. Any attempt otherwise to copy, sublicense, distribute or transfer NetHack is void and your rights to use the program under this License agreement shall be automatically terminated. However, parties who have received computer software programs from you with this License Agreement will not have their licenses terminated so long as such parties remain in full compliance.\nStated plainly: You are permitted to modify NetHack, or otherwise use parts of NetHack, provided that you comply with the conditions specified above; in particular, your modified NetHack or program containing parts of NetHack must remain freely available as provided in this License Agreement. In other words, go ahead and share NetHack, but don\u0027t try to stop anyone else from sharing it farther.\n", "standardLicenseTemplate": "\u003c\u003cbeginOptional\u003e\u003eNETHACK GENERAL PUBLIC LICENSE\n\n\u003c\u003cendOptional\u003e\u003e \u003c\u003cvar;name\u003d\"copyright\";original\u003d\"(Copyright 1989 M. Stephenson) \";match\u003d\".{0,5000}\"\u003e\u003e\n\n(Based on the BISON general public license, copyright 1988 Richard M. Stallman)\n\nEveryone is permitted to copy and distribute verbatim copies of this license, but changing it is not allowed. You can also use this wording to make the terms for other programs.\n\nThe license agreements of most software companies keep you at the mercy of those companies. By contrast, our general public license is intended to give everyone the right to share NetHack. To make sure that you get the rights we want you to have, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. Hence this license agreement.\n\nSpecifically, we want to make sure that you have the right to give away copies of NetHack, that you receive source code or else can get it if you want it, that you can change NetHack or use pieces of it in new free programs, and that you know you can do these things.\n\nTo make sure that everyone has such rights, we have to forbid you to deprive anyone else of these rights. For example, if you distribute copies of NetHack, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must tell them their rights.\n\nAlso, for our own protection, we must make certain that everyone finds out that there is no warranty for NetHack. If NetHack is modified by someone else and passed on, we want its recipients to know that what they have is not what we distributed.\n\nTherefore we (Mike Stephenson and other holders of NetHack copyrights) make the following terms which say what you must do to be allowed to distribute or change NetHack.\n\nCOPYING POLICIES\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"1.\";match\u003d\".{0,20}\"\u003e\u003e You may copy and distribute verbatim copies of NetHack source code as you receive it, in any medium, provided that you keep intact the notices on all files that refer to copyrights, to this License Agreement, and to the absence of any warranty; and give any other recipients of the NetHack program a copy of this License Agreement along with the program.\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"2.\";match\u003d\".{0,20}\"\u003e\u003e You may modify your copy or copies of NetHack or any portion of it, and copy and distribute such modifications under the terms of Paragraph 1 above (including distributing this License Agreement), provided that you also do the following:\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"a)\";match\u003d\".{0,20}\"\u003e\u003e cause the modified files to carry prominent notices stating that you changed the files and the date of any change; and\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"b)\";match\u003d\".{0,20}\"\u003e\u003e cause the whole of any work that you distribute or publish, that in whole or in part contains or is a derivative of NetHack or any part thereof, to be licensed at no charge to all third parties on terms identical to those contained in this License Agreement (except that you may choose to grant more extensive warranty protection to some or all third parties, at your option)\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"c)\";match\u003d\".{0,20}\"\u003e\u003e You may charge a distribution fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"3.\";match\u003d\".{0,20}\"\u003e\u003e You may copy and distribute NetHack (or a portion or derivative of it, under Paragraph 2) in object code or executable form under the terms of Paragraphs 1 and 2 above provided that you also do one of the following:\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"a)\";match\u003d\".{0,20}\"\u003e\u003e accompany it with the complete machine-readable source code, which must be distributed under the terms of Paragraphs 1 and 2 above; or,\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"b)\";match\u003d\".{0,20}\"\u003e\u003e accompany it with full information as to how to obtain the complete machine-readable source code from an appropriate archive site. (This alternative is allowed only for noncommercial distribution.)\n\n For these purposes, complete source code means either the full source distribution as originally released over Usenet or updated copies of the files in this distribution used to create the object code or executable.\n\n \u003c\u003cvar;name\u003d\"bullet\";original\u003d\"4.\";match\u003d\".{0,20}\"\u003e\u003e You may not copy, sublicense, distribute or transfer NetHack except as expressly provided under this License Agreement. Any attempt otherwise to copy, sublicense, distribute or transfer NetHack is void and your rights to use the program under this License agreement shall be automatically terminated. However, parties who have received computer software programs from you with this License Agreement will not have their licenses terminated so long as such parties remain in full compliance.\n\nStated plainly: You are permitted to modify NetHack, or otherwise use parts of NetHack, provided that you comply with the conditions specified above; in particular, your modified NetHack or program containing parts of NetHack must remain freely available as provided in this License Agreement. In other words, go ahead and share NetHack, but don\u0027t try to stop anyone else from sharing it farther.\n\n", "name": "Nethack General Public License", "licenseId": "NGPL", "crossRef": [ { "match": "N/A", "url": "https://opensource.org/licenses/NGPL", "isValid": true, "isLive": true, "timestamp": "2024-08-19T17:36:16Z", "isWayBackLink": false, "order": 0 } ], "seeAlso": [ "https://opensource.org/licenses/NGPL" ], "isOsiApproved": true, "licenseTextHtml": "\n \u003cdiv class\u003d\"optional-license-text\"\u003e \n \u003cp\u003eNETHACK GENERAL PUBLIC LICENSE\u003c/p\u003e\n\n \u003c/div\u003e\n \u003cdiv class\u003d\"replaceable-license-text\"\u003e \n \u003cp\u003e(Copyright 1989 M. Stephenson)\u003c/p\u003e\n\n \u003c/div\u003e\n\n \u003cp\u003e(Based on the BISON general public license, copyright 1988 Richard M. Stallman)\u003c/p\u003e\n\n \u003cp\u003eEveryone is permitted to copy and distribute verbatim copies of this license, but changing it is not\n allowed. You can also use this wording to make the terms for other programs.\u003c/p\u003e\n\n \u003cp\u003eThe license agreements of most software companies keep you at the mercy of those companies. By contrast,\n our general public license is intended to give everyone the right to share NetHack. To make sure that\n you get the rights we want you to have, we need to make restrictions that forbid anyone to deny you\n these rights or to ask you to surrender the rights. Hence this license agreement.\u003c/p\u003e\n\n \u003cp\u003eSpecifically, we want to make sure that you have the right to give away copies of NetHack, that you\n receive source code or else can get it if you want it, that you can change NetHack or use pieces of it\n in new free programs, and that you know you can do these things.\u003c/p\u003e\n\n \u003cp\u003eTo make sure that everyone has such rights, we have to forbid you to deprive anyone else of these rights.\n For example, if you distribute copies of NetHack, you must give the recipients all the rights that you\n have. You must make sure that they, too, receive or can get the source code. And you must tell them\n their rights.\u003c/p\u003e\n\n \u003cp\u003eAlso, for our own protection, we must make certain that everyone finds out that there is no warranty for\n NetHack. If NetHack is modified by someone else and passed on, we want its recipients to know that\n what they have is not what we distributed.\u003c/p\u003e\n\n \u003cp\u003eTherefore we (Mike Stephenson and other holders of NetHack copyrights) make the following terms which say\n what you must do to be allowed to distribute or change NetHack.\u003c/p\u003e\n\n \u003cp\u003eCOPYING POLICIES\u003c/p\u003e\n\n\u003cul style\u003d\"list-style:none\"\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e 1.\u003c/var\u003e\n You may copy and distribute verbatim copies of NetHack source code as you receive it, in any medium,\n provided that you keep intact the notices on all files that refer to copyrights, to this License\n Agreement, and to the absence of any warranty; and give any other recipients of the NetHack program a\n copy of this License Agreement along with the program.\n \u003c/li\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e 2.\u003c/var\u003e\n You may modify your copy or copies of NetHack or any portion of it, and copy and distribute such\n modifications under the terms of Paragraph 1 above (including distributing this License Agreement),\n provided that you also do the following:\n \n\u003cul style\u003d\"list-style:none\"\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e a)\u003c/var\u003e\n cause the modified files to carry prominent notices stating that you changed the files and\n the date of any change; and\n \u003c/li\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e b)\u003c/var\u003e\n cause the whole of any work that you distribute or publish, that in whole or in part contains\n or is a derivative of NetHack or any part thereof, to be licensed at no charge to all\n third parties on terms identical to those contained in this License Agreement (except that\n you may choose to grant more extensive warranty protection to some or all third parties,\n at your option)\n \u003c/li\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e c)\u003c/var\u003e\n You may charge a distribution fee for the physical act of transferring a copy, and you may at\n your option offer warranty protection in exchange for a fee.\n \u003c/li\u003e\n \n\u003c/ul\u003e\n \u003c/li\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e 3.\u003c/var\u003e\n You may copy and distribute NetHack (or a portion or derivative of it, under Paragraph 2) in\n object code or executable form under the terms of Paragraphs 1 and 2 above provided that\n you also do one of the following:\n \n\u003cul style\u003d\"list-style:none\"\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e a)\u003c/var\u003e\n accompany it with the complete machine-readable source code, which must be distributed under\n the terms of Paragraphs 1 and 2 above; or,\n \u003c/li\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e b)\u003c/var\u003e\n accompany it with full information as to how to obtain the complete machine-readable source\n code from an appropriate archive site. (This alternative is allowed only for noncommercial\n distribution.)\n \u003c/li\u003e\n \n\u003c/ul\u003e\n \u003cp\u003eFor these purposes, complete source code means either the full source distribution as originally released\n over Usenet or updated copies of the files in this distribution used to create the object code or\n executable.\u003c/p\u003e\n\n \u003c/li\u003e\n \n\u003cli\u003e\n \u003cvar class\u003d\"replaceable-license-text\"\u003e 4.\u003c/var\u003e\n You may not copy, sublicense, distribute or transfer NetHack except as expressly provided under this\n License Agreement. Any attempt otherwise to copy, sublicense, distribute or transfer NetHack is void\n and your rights to use the program under this License agreement shall be automatically terminated.\n However, parties who have received computer software programs from you with this License Agreement\n will not have their licenses terminated so long as such parties remain in full compliance.\n \u003c/li\u003e\n \n\u003c/ul\u003e\n \u003cp\u003eStated plainly: You are permitted to modify NetHack, or otherwise use parts of NetHack, provided\n that you comply with the conditions specified above; in particular, your modified NetHack or\n program containing parts of NetHack must remain freely available as provided in this License\n Agreement. In other words, go ahead and share NetHack, but don\u0026apos;t try to stop anyone else\n from sharing it farther.\n \u003c/p\u003e\n\n " }