The Uses of IP Misuse
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Licensing 101 December 3, 2020 Meet the Speakers
Licensing 101 December 3, 2020 Meet The Speakers Sushil Iyer Adam Kessel Principal Principal fr.com | 2 Roadmap • High level, introductory discussion on IP licensing • Topics – Types of IP – Monetization strategies – Key parts of a license agreement – Certain considerations • Licensing software, especially open source software • Licensing pharmaceutical patents • Trademarks • Trade secrets • Know-how fr.com | 3 Types of IP Patents Trademarks Copyrights Know-how (including trade secrets) fr.com | 4 Monetization Strategies • IP licensing – focus of this presentation – IP owner (licensor) retains ownership and grants certain rights to licensee – IP licensee obtains the legal rights to practice the IP – Bundle of rights can range from all the rights that the IP owner possesses to a subset of the same • Sale – IP owner (assignor) transfers ownership to the purchaser (assignee) • Litigation – Enforcement, by IP owner, of IP rights against an infringer who impermissibly practices the IP owner’s rights – Damages determined by a Court fr.com | 5 What is an IP License? • Contract between IP owner (Licensor) and Licensee – Licensor’s offer – grant of Licensor’s rights in IP • Patents – right to sell products that embody claimed inventions of Licensor’s US patents • Trademarks – right to use Licensor’s US marks on products or when selling products • Copyright – right to use and/or make derivative works of Licensor’s copyrighted work • Trade Secret – right to use and obligation to maintain Licensor’s trade secret – Licensee’s consideration – compensation -
Westlaw Journal INTELLECTUAL PROPERTY
Westlaw Journal INTELLECTUAL PROPERTY Litigation News and Analysis • Legislation • Regulation • Expert Commentary VOLUME 24, ISSUE 2 / MAY 10, 2017 EXPERT ANALYSIS Using Open Source Code for Development of ‘Proprietary’ Software By Nancy A. Del Pizzo, Esq. Rivkin Radler LLP “Open source” commonly refers to software “whose code is made freely available to all users” on the theory that a “crowd-sourced product, where the public is permitted to modify the code, “will be superior to a privately developed” product.1 Software developers may use open source code to help them more efficiently develop new software products, which can reduce the cost of their services. But what sounds like a probable benefit to companies that rely on software development could result in legal liability. This is because companies that employ software developers or contract with them to develop proprietary programs may not be aware that open source code, while free to use, may render their “proprietary” products unprotectable. That’s because code provided via “open source” is typically made available under a license that comes with restrictions — even though it allows for free use and distribution. Those restrictions can be quite rigid. For example, they may include a requirement that any new program using the open source code must become open source as well. In fact, there are more than 100 different licenses associated with open source code.2 Some require that any products made using the code also be provided as open source. Others mandate that any new work developed using the code include a copyright notice acknowledging the author of the open source code used. -
A New Look at Trade Secret Law: Doctrine in Search of Justification
California Law Review VOL. 86 MARCH 1998 No.2 Copyright © 1998 by California Law Review, Inc. A New Look at Trade Secret Law: Doctrine in Search of Justification Robert G. Bonet TABLE OF CONTENTS Introduction .....................................................................................243 I. Where We Are Today-A Brief Summary of Cur- rent Trade Secret Law ................................................................247 A. Information That Qualifies as a Trade Secret ........................248 B. Improper Acquisition, Use or Disclosure ...............................250 II. How We Got Where We Are-An Intellectual History of Trade Secret Law .......................................................251 A. The Emergence of a General Theory of Trade Secret Law ...........................................................................251 B. The Collapse of the General Theory .....................................259 III. Making Sense of Where We Are-Arguments from Efficiency .........................................................................260 A. Incentives to Create ..............................................................262 1. The General Argument ...................................................262 2. The Argument Applied ...................................................264 3. Intermediate Research Results and Nontechnological Information ........................................270 Copyright © 1998 California Law Review, Inc. t Professor of Law, Boston University School of Law. I am grateful to all those who participated -
Abuse of Dominantposition and Switching Costs
UNIVERSITY OF LONDON REFUSAL TO LICENSE: ABUSE OF DOMINANT POSITION AND SWITCHING COSTS NET LE SUBMITTED TO THE LAW DEPARTMENT OF THE LONDON SCHOOL OF ECONOMICS AND POLITICAL SCIENCE FOR THE DEGREE OF DOCTOR OF PHILOSOPHY LONDON, MAY 2004 U /« 3 L \ * f LONDIU) \ WtfV. / UMI Number: U615726 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U615726 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 Th e s e s F 353£ . Library British Library of Political and Economic Science IJW 5S 5 II ACKNOWLEDGEMENT Foremost, I wish to express my deep gratitude to my supervisors, Professor William T. Murphy and Mr. Andrew Murray for their continual support throughout this thesis. Their comments have helped to essentially improve the accuracy of my research. Further, I wish to thank Mr. Giorgio Monti for reviewing my drafts, sharing with me books, giving me invaluable feedback and assistance. Others from LSE whom I would like to thank include Doctors Carsten Sorensen and Ole Hanseth (Department of Information System), Professors Max Steuer, Dany Quah and Michele Picione (Department of Economics) for reading my drafts, generously sharing with me their knowledge, improving my understanding and moreover providing me with excellent research inspiration. -
Validity and Constitutionality of Inter Parte Reviews Before the U.S. Supreme Court
Eastern Kentucky University Encompass Online Theses and Dissertations Student Scholarship 2018 Validity and Constitutionality of Inter Parte Reviews Before the U.S. Supreme Court Helen Kathryn Emmons Kelly Eastern Kentucky University Follow this and additional works at: https://encompass.eku.edu/etd Part of the Intellectual Property Law Commons, and the Public Administration Commons Recommended Citation Emmons Kelly, Helen Kathryn, "Validity and Constitutionality of Inter Parte Reviews Before the U.S. Supreme Court" (2018). Online Theses and Dissertations. 564. https://encompass.eku.edu/etd/564 This Open Access Thesis is brought to you for free and open access by the Student Scholarship at Encompass. It has been accepted for inclusion in Online Theses and Dissertations by an authorized administrator of Encompass. For more information, please contact [email protected]. VALIDITY AND CONSTIUTIONALITY OF INTER PARTE REVIEWS BEFORE THE U.S. SUPREME COURT BY HELEN KATHRYN EMMONS KELLY Submitted to the Faculty of the Graduate School of Eastern Kentucky University in partial fulfillment of the requirements for the degree of MASTERS OF PUBLIC ADMINISTRATION 2018 © Copyright by HELEN KATHRYN EMMONS KELLY 2018 All Rights Reserved. ii ABSTRACT For 400 years, courts have adjudicated disputes between private parties about the validity of patents. Inventors apply for patents to an administrative agency. Patent examiners review the application to determine whether or not an idea is valid to have a patent issued. Patent examiners are people and sometimes errors are made. An administrative agency must have an administrative avenue to review a potential error. Six years ago, Congress created a review with the implementation of inter parte reviews. -
MPEP Identifying and Evaluating Each Claim Limitation
Chapter 2100 Patentability 2101 [Reserved] 2121.03 Plant Genetics Ð What Constitutes -2102 Enabling Prior Art 2103 Patent Examination Process 2121.04 Apparatus and Articles Ð What 2104 Patentable Subject Matter Constitutes Enabling Prior Art 2105 Patentable Subject Matter Ð Living 2122 Discussion of Utility in the Prior Art Subject Matter 2123 Rejection Over Prior Art's Broad 2106 Patent Subject Matter Eligibility Disclosure Instead of Preferred 2106.01 [Reserved] Embodiments 2107 Guidelines for Examination of 2124 Exception to the Rule That the Critical Applications for Compliance with the Reference Date Must Precede the Filing Utility Requirement Date 2107.01 General Principles Governing Utility 2124.01 Tax Strategies Deemed Within the Rejections Prior Art 2107.02 Procedural Considerations Related to 2125 Drawings as Prior Art Rejections for Lack of Utility 2126 Availability of a Document as a 2107.03 Special Considerations for Asserted ªPatentº for Purposes of Rejection Therapeutic or Pharmacological Under 35 U.S.C. 102(a) or Pre-AIA 35 Utilities U.S.C. 102(a), (b), and (d) 2108 [Reserved] 2126.01 Date of Availability of a Patent as a -2110 Reference 2111 Claim Interpretation; Broadest 2126.02 Scope of Reference's Disclosure Reasonable Interpretation Which Can Be Used to Reject Claims 2111.01 Plain Meaning When the Reference Is a ªPatentº but 2111.02 Effect of Preamble Not a ªPublicationº 2111.03 Transitional Phrases 2127 Domestic and Foreign Patent 2111.04 ªAdapted to,º ªAdapted for,º Applications as Prior Art ªWherein,º and ªWherebyº Clauses 2128 ªPrinted Publicationsº as Prior Art 2111.05 Functional and Nonfunctional 2128.01 Level of Public Accessibility Descriptive Material Required 2112 Requirements of Rejection Based on 2128.02 Date Publication Is Available as a Inherency; Burden of Proof Reference 2112.01 Composition, Product, and Apparatus 2129 Admissions as Prior Art Claims 2130 [Reserved] 2112.02 Process Claims 2131 Anticipation Ð Application of 35 U.S.C. -
Protecting Trade Secrets Through Copyright
PROTECTING TRADE SECRETS THROUGH COPYRIGHT For many years businesses have taken steps to protect valuable trade secrets.' Often these steps have severely restricted access to spe- cial documents or to areas of manufacturing plants that contain secret machinery.2 Businesses commonly require employees to sign pledges not to disclose trade secrets during or after their employment.3 Addi- tionally, licensing agreements frequently contain clauses that prohibit the dissemination of secrets or their use following the termination of the agreements.4 Courts sometimes will imply these clauses,5 even if they are not included expressly in the licensing agreements. Recently, some businesses have attempted to gain additional protection by affix- ing copyright notices to their secrets.6 The wisdom of this practice has yet to be examined closely. In 1980 the American Bar Association Committee on Trade Secrets and Interference with Contracts considered for the first time the propriety of marking trade secrets or confidential materials with a copyright notice.7 The committee concluded that no inconsistency arises in placing a copyright notice on material that bears an admoni- tion forbidding disclosure to third parties. The committee viewed copyright protection as a "backup or complement" to laws prohibiting theft or misappropriation of trade secrets.8 A minority of the commit- 1. See R. ELLIS, TRADE SECRETS §§ 1-16 (1953). 2. See Pakula, Non-ContractualIn-House Procedures'forConfidential Information, in PRO- TECTING TRADE SECRETS TODAY 179-87 (T. Arnold ed. 1973) [hereinafter cited as TRADE SECRETS]. See generally Adams, Protectinga Company's Trade Secretsfrom Theft by Its Employ- ees, in PROTECTING AND PROFITING FROM TRADE SECRETS 1979, at 303-43 (R. -
Patents and the Public Domain: Improving Patent Quality Upon Reexamination
Patents and the Public Domain: Improving Patent Quality Upon Reexamination Prepared by Policy Intern Raeanne Young [email protected] May 2008 ELECTRONIC FRONTIER FOUNDATION eff.org Table of Contents EXECUTIVE SUMMARY ........................................................................................................................3 PATENTS AND THE PUBLIC DOMAIN .....................................................................................................4 The Problem With Patent Quality ..................................................................................................4 Policy Rationale: Encouraging Innovation .......................................................................................4 PATENT REEXAMINATION ...................................................................................................................6 Ex parte and Inter partes .............................................................................................................6 OVERALL REEXAMINATION TRENDS ......................................................................................................8 Ex Parte Reexamination Filing Data: July , 98 - December 3, 2007 ...............................................8 Inter Partes Reexamination Filing Data: November 29, 999 - December 3, 2007 .............................0 Comparison of Ex Parte and Inter Partes ......................................................................................0 PROMOTING FAIRNESS IN THE PATENT SYSTEM THROUGH REEXAMINATION .............................................2 -
THE EVOLVING COMMON LAW DOCTRINE of COPYRIGHT MISUSE: a UNIFIED THEORY and ITS APPLICATION to SOFTWARE by Brett .Frischmannt and Dan Mqylai
THE EVOLVING COMMON LAW DOCTRINE OF COPYRIGHT MISUSE: A UNIFIED THEORY AND ITS APPLICATION TO SOFTWARE By Brett .Frischmannt and Dan Mqylai ABSTRACT This Article explores the common law defense of copyright misuse from a variety of angles in an effort to refine and unify ex- isting views. The unified model that emerges is then applied to software copyright, addressing the tension that software creates within copyright law as well as between copyright, patent, and an- titrust law. Part I develops a jurisprudential model for understand- ing the substantive relationship between the copyright misuse doc- trine and copyright, patent, and antitrust laws, and the procedural approaches taken by courts when formulating and applying misuse principles-per se rules and the rule of reason. Part Ill examines four Supreme Court cases that provide guidance for the application of misuse principles in the copyright context. It then turns to an analysis of the application of copyright misuse in the federal courts of appeals. These discussions enable a distillation of guiding prin- ciples from the case law in an attempt to clarify the "current state of the copyright misuse doctrine." Part V applies the principles derived in Parts II and 111 to software copyrights and proposes a per se rule against licensing restrictions upon reverse engineering that complements antitrust-based misuse and the fair use doctrine. Rather than attempt to provide a comprehensive set of public pol- icy-based misuse rules, this Article instead presents a single rule as © 2000 Brett Frischmann and Dan Moylan. t Associate with Wilmer, Cutler & Pickering; M.S., B.A., Columbia University, J.D., Georgetown University Law Center. -
Patents and Monopolization: the Role of Patents Under Section Two of the Sherman Act Ramon A
Marquette Law Review Volume 68 Article 2 Issue 4 Summer 1985 Patents and Monopolization: The Role of Patents Under Section Two of the Sherman Act Ramon A. Klitzke Follow this and additional works at: http://scholarship.law.marquette.edu/mulr Part of the Law Commons Repository Citation Ramon A. Klitzke, Patents and Monopolization: The Role of Patents Under Section Two of the Sherman Act, 68 Marq. L. Rev. 557 (1985). Available at: http://scholarship.law.marquette.edu/mulr/vol68/iss4/2 This Article is brought to you for free and open access by the Journals at Marquette Law Scholarly Commons. It has been accepted for inclusion in Marquette Law Review by an authorized administrator of Marquette Law Scholarly Commons. For more information, please contact [email protected]. PATENTS AND MONOPOLIZATION: THE ROLE OF PATENTS UNDER SECTION TWO OF THE SHERMAN ACT RAMON A. KLITZKE* Section Two of the Sherman Act1 proscribes monopoliza- tion, a broad, ambiguous term that is susceptible of myriads of diverse interpretations in the complex world of business com- petition. Perceptions of monopolization as unlawful, anticom- petitive behavior vary widely, depending upon the various competitive methods utilized to achieve the monopolization. Some of these methods, such as the patent grant, are explicitly sanctioned by statutes and are therefore not unlawful. The patent grant, which is ostensibly a legal monopoly, 2 can be forged by its owner into a most powerful anticompetitive weapon that may be used to transcend the legal limits of its use. In numerous ways it may become a principal actor in the monopolization that is prohibited by Section Two. -
An Empirical Study of the Effects of Ex Ante Licensing Disclosure Policies on the Development of Voluntary Technical Standards
An Empirical Study of the Effects of Ex Ante Licensing Disclosure Policies on the Development of Voluntary Technical Standards by Jorge L. Contreras American University Washington College of Law Washington, DC for NISI National Institute of Standards and Technology U.S. Department of Commerce NIST Standards Services Group Under NIST Contract No. SB134110SEI033 This publication was produced as part of contract SB134110SEI033 with the National Institute of Standards and Technology. The contents of this publication do not necessarily reflect the views or policies of the National Institute of Standards and Technology or the U.S. Government. GCR 11-934 Release Date: June 27, 2011 An Empirical Study of the Effects of Ex Ante Licensing Disclosure Policies on the Development of Voluntary Technical Standards Jorge L. Contreras Table of Contents Acknowledgements and Statement of Interests I. Executive Summary II. Background A. Development of Voluntary Technical Standards B. Patent Hold-Up in Standards-Setting C. SDO Patent Policies D. FRAND Licensing Requirements E. Ex Ante Disclosure ofLicensing Terms as a Proposed Solution F. Criticisms ofEx Ante Policy Policies G. SDO Adoption and Consideration ofEx Ante Policies 1. VITA 2. IEEE 3. ETSJ 4. Consortia (W3C and NGMN) 5. JETF and "Informal" Ex Ante Approaches III. Study Aims and Methodology A. Study Aims B. Methodology 1. SDOs Selected 2. Time Period 3. Historical Data 4. Survey Data IV. Findings and Analysis A. SDO Patent and Licensing Disclosures B. Number ofStandards C. Length ofStandardization Process D. Personal Time Commitment E. Membership F. Quality ofStandards G. Effect on Royalty Rates V. Conclusions Data Appendices List of References Ex Ante Standards Study Report Page i June 27,2011 Acknowledgements This study was funded by the u.s. -
Patentable Software: Analyzing Alice Under a Law-And-Economics Framework and Proposing a New Approach to Software Claims
THIS VERSION MAY CONTAIN INACCURATE OR INCOMPLETE PAGE NUMBERS. PLEASE CONSULT THE PRINT OR ONLINE DATABASE VERSIONS FOR THE PROPER CITATION INFORMATION. NOTE PATENTABLE SOFTWARE: ANALYZING ALICE UNDER A LAW-AND-ECONOMICS FRAMEWORK AND PROPOSING A NEW APPROACH TO SOFTWARE CLAIMS Christian R. Ruiz I. INTRODUCTION Software is a pervasive component in modern inventions, and companies are interested in using patents to protect software. By the early 1990s, the Court of Appeals for the Federal Circuit (the “Federal Circuit”) established that software was patentable.1 This article analyzes the discernable contours of what falls within patentable subject matter regarding software technology in view of Alice v. CLS Bank2 and its precedent. This note also applies policy arguments and a cost-benefit analysis to argue what patent doctrine should dictate regarding the patentability of software. Today, after Alice, what may constitute a patentable software claim is not en- tirely clear. Alice made it harder to patent software technology.3 The majority opinion in Alice indicates that attaching an abstract method to a computer, which is a physical machine, is not enough to render a claim patentable.4 Further, the Supreme Court (the “Court”) subjected patent claims containing software ele- ments to a higher scrutiny than the scrutiny used for patent claims that do not 1 See Diamond v. Diehr, 450 U.S. 175, 192-93 (1981) (affirming the Federal Circuit de- cision that a claim for technology including computer software is patent eligible); In re Lowry, 32 F.3d 1579, 1582 (Fed. Cir. 1994) (finding that a memory containing a data structure should be considered patentable subject matter); State St.