Managing the complex landscape of IP Business Strategy – Global IP Exchange Feb 28 – Mar 2 Amelia Plantation Resort, FL

The National Law Review is proud to be a sponsor of the 5th Annual Global IP Exchange which will bring together a group of leading IP strategists from some of the largest corporations across all industries. You will have the opportunity to debate and strategize with peers at our interactive sessions and participate in one-on-one meetings with leading solution providers. Benchmark with your peers, gain practical advice and leave the Exchange with new ideas and strategies to take back to the office.  

With the re-draft of 2009 Patent Reform in the works and the landmark June, 2010 Bilski ruling, the IP landscape is set to change significantly over the next few years……and about time, too. Join us this February to hear how Global IP Executives are adapting their IP strategies to mitigate risks, balance litigation costs and raise the value of their IPR through social media.

The 5th Global IP Exchange™ will bring together a group of leading IP strategists from some of the largest corporations across all industries. You will have the opportunity to debate and strategize with your peers at our interactive sessions and participate in one-on-one meetings with leading solution providers.

To ensure the Exchange offers the highest degree of relevancy for attendees, only senior executives responsible for IP management and strategic planning within their corporation are invited. This exclusive format allows you to connect with those peers whose insights you respect most – through exceptional networking, business meetings and strategic information sharing sessions.

The 5th Global IP Exchange™ will take place Tuesday March 1st – with pre-conference workshops on Monday February 28th.  The Conference end Wednesday March 2nd and is located at the Omni Amelia Plantation Resort on Amelia Island Florida.  For More Information and to Register:  Click Here:

 

Anti-Counterfeiting & Brand Protection West Coast – January 24-26 San Francisco, CA

The premiere anti-counterfeiting and brand protection event goes West!

Despite tremendous efforts, our economies continue to suffer from a sharp increase in trade in fake and pirated goods, aided by the Internet which has made it easier for buyers and sellers of counterfeit goods to come together and also to distribute pirated music, movies and software. In order to ensure these traffickers of illegal goods don’t win this war, governments, law enforcement and brands must continue to engage with one another and to work toward a common goal.

To facilitate this, IQPC and Legal IQ are proud to invite you to take part in our next meeting, Anti-Counterfeiting & Brand Protection West Coast taking place January 24 – 26, 2011, at the Hotel Nikko in San Francisco, CA. CLE Credits Are Available.  For More Information and to Register:  http://ow.ly/3tpSp

 

 

Legal and Risk Management Implications of Cloud Computing

We’ve been seeing a whole bunch of things at the National Law Review about the legal risks and risk management issues related to cloud computing.  Accordingly, we’d like to share some of the better articles we’ve come across on the NLR and on Twitter…

For an Overview of What Cloud Computing or SaaS is and the Advantages and Disadvantages for Businesses, Especially Law Firms…..

Are You Ready For the Cloud? from Baker Donelson

Lawyers Should Not Be Wary of SaaS and Cloud Computing by Niki Black of Lawyerist.com

What Cloud Computing Really Means from InfoWorld.com

What Lies Ahead? Business and Legal Issues in the Coming Decade from Much Shelist

For Risk Management and Legal Considerations Related to Cloud Computing or SaaS…..

The Cloud and Your Data from Risk Management

The Legal Issues Around Cloud Computing by Amit Agarwal of Digital Inspiration

Privacy and Information Security for Emerging Businesses by Poyner Spruill

For Specific Things to Consider When Choosing a Cloud Computing Provider….

Putting Cloud Data Storage Providers to the Test by Risk Management

7 Questions For Any Cloud Based Service from the Legal Typist, Inc.

How to Evaluate Cloud Computing Providers by Jason Baker – Data Center Knowledge

Copyright ©2010 National Law Forum, LLC

Registration Symbol Misuse As Trademark Fraud?

Featured Guest Bloggers this week at the National Law Review are from our friends up north in Minneapolis at Winthrop & WeinstineSteven Baird discusses appropriate times to use the “Registered” symbol.

Trademark types frequently encounter brand owners and managers with substantial misunderstanding and confusion about when use of the federal registration notice symbol is lawful. Most of the time a misuse or technical violation results from an honest mistake, but sometimes the misuse is, and starts out intentional, or perhaps the misuse begins to look intentional if it isn’t promptly fixed or corrected upon learning of the misuse.

Section 906 of the U.S. Patent and Trademark Office’s Trademark Manual of Examining Procedure (TMEP) answers some of the most common questions regarding misuse with this guidance:

  • The federal registration symbol should be used only on or in connection with the goods or services that are listed in the federal registration.
  • The federal registration symbol may not be used with marks that are not actually registered in the USPTO.
  • Even if an application is pending, the federal registration symbol may not be used until the mark is registered.
  • Registration in a state of the United States does not entitle a person to use the federal registration notice.
  • A party may use terms such as “trademark,” “trademark applied for,” “TM” and “SM” regardless of whether a mark is registered. These are not official or statutory symbols of federal registration.

This information and guidance, however, begs the question of whether misuse is a serious violation and the possible consequences of misusing the registration symbol? As you may recall, we’ve talked a bit before about possible false advertising claims against the trademark owner who misuses the symbol and a possible unclean hands defense in favor of the trademark owner’s enforcement target, especially when the misuse is accompanied by a bad faith intent to deceive.

As it turns out, we really need to add another important potential consequence to the list, one that I fear will be abused and used for pure tactical advantage in trademark enforcement efforts, namely, assertions of trademark fraud, despite the current heightened standard of fraud, with the Court of Appeals for the Federal Circuit now requiring a specific intent to deceive the Trademark Office. Actually, registration symbol misuse is not really a new ground of trademark fraud, but it has been rather uncommonly and infrequently alleged, at least in recent years.

One of the reasons for my concern of abuse stems from a recent TTAB decision permitting this rather conclusory and bare bones trademark fraud claim to survive a motion to dismiss:

Applicant knowingly and willfully used the ® symbol in connection with the term … in an attempt to deceive or mislead consumers or others in the trade into believing that the mark was registered.

A pdf of the TTAB’s decision with scant analysis — from about six weeks ago — inNorth Atlantic Operating Co., Inc. et al v. DRL Enterprises, Inc. Opposition No. 91158276), is linked here.

Relying only on the above-quoted allegation, the TTAB decided: “We find that the allegation set forth above includes the necessary pleading of intent, and specifies that applicant’s misuse was knowing and willful, and an attempt to deceive or mislead consumers.”

In contrast to most trademark fraud cases where various false and misleading statements — relied upon by the Trademark Office — are the focus of the fraud challenge, in North Atlantic Operating Co., the focus was on an alleged intent to deceive the public, as opposed to the USPTO.

The Federal Circuit has held: “The improper use of a registration notice in connection with an unregistered mark, if done with intent to deceive the purchasing public or others in the trade into believing that the mark is registered, is a ground for denying the registration of an otherwise registrable mark.”Copelands’ Enterprises Inc. v. CNV Inc., 945 F.2d 1563, 20 USPQ2d 1295 (Fed. Cir. 1991). Presumably, the same conduct would sustain a petition to cancel as well. Although, the statutory support for the broader focus is unclear, it appears that an intent to deceive the USPTO is not required, so long as there is an intent to deceive the relevant public regarding registration.

Another reason for my concern stems from the apparently satisfactory yet conclusory fraud allegation. There are simply no details regarding the who, what, where, why, and when, of the alleged trademark fraud, and this failure appears to contradict recent TTAB case law confirming that fraud must be pled with particularity under Fed. R. Civ. P. 9(b). Indeed, our friend John Welch over at the TTABlog has reported multiple times on the TTAB tightening up the pleading requirements for trademark fraud claims, following the Federal Circuit’s landmark decision in In re Boseherehere, and here.

Finally, the Federal Circuit’s Copelands’ Enterprises decision makes clear that how quickly a trademark owner corrects a misuse of the registration notice symbol after learning of the misuse, will impact the determination of whether the trademark owner is charged with an intention to deceive the public. If we couple that guidance with the current uncertainty of whether the requisite intent may be established with a reckless disregard for the truth, trademark types and the brand owners and managers they represent, are all well-advised to pay more attention to what many previously have written off as honest mistakes and technical violations with no real or significant consequences.

Only time will tell whether the registration notice symbol misuse type of trademark fraud claim will remain uncommon or gain traction in our Post-Bose world.

© 1994 – 2010 Winthrop & Weinstine, P. A.

Vampires vs. Zombies – Trademark Registrations

The National Law Review’s featured guest bloggers this week are from our friends up north at Winthrop Weinstine. In keeping with all things Halloween and a bow to pop-culture,  Sharon Armstrong discusses trademark filings in relation to these spooky favorites:  

What is it with zombies these days? If recent memory serves correct, it wasn’t so long ago that a pop-culture junkie like me couldn’t mention the words “creature of the night” without some girl/tween/soccer mom swooning over the likes of one Edward Cullen, the romantic hero of Stephanie Meyer’s wildly popular Twilight series. You know who you are.

Then there was True Blood, The Vampire Diaries, and a slew of other vampire-related books, movies, parodies, and the like, including what may be one of the best fan-made mash-ups ever.

And then came the zombies. I received a copy of Pride and Prejudice and Zombies about a year ago as a gift – and suddenly it seems that zombies, like vampires, are everywhere too.

A recent review of the new television series “The Walking Dead” in the New York Times explains that “[z]ombie movies didn’t die off, but they were overshadowed by vampire mania that has dominated popular culture… Finally, perhaps as a backlash against all the girlish, gothic swooning over ‘Twilight,’ zombies are making a comeback.”

If recent filing activity at the Trademark Office is any indication, then what’s left of 2010 (and 2011) may be The Year of the Zombie. The stats are as follows:

Since September 6, 2006, the date upon which Twilight was first published, the following trademark applications have been filed with the Trademark Office:

  • 132 marks incorporating the term “zombie”
  • 118 marks incorporating the term “vampire”
  • 116 marks incorporating the term “demon”
  • 83 marks incorporating the term “troll”
  • 13 marks incorporating the term “ghoul”
  • 9 marks incorporating the term “corpse”

Of the first two categories, and since April 4, 2009, the date upon which “Pride and Prejudice and Zombies” was published, 84 applications for marks incorporating the term “vampire” have been filed and 69 applications for marks incorporating the term “zombie” have been filed.

Tellingly, the most recent applications incorporating the term “vampire” are for the mark VAMPIRES SUCK, for a variety of goods and services.

© 1994 – 2010 Winthrop & Weinstine, P. A.

About the Author:

Sharon D. Armstrong is an associate in the Intellectual Property practice group. Her practice is focused on the prosecution and enforcement of trademarks and copyrights, and Internet/domain name enforcement and acquisition. She assists clients in nearly all facets of trademark prosecution and enforcement, both foreign and domestic, administrative proceedings before the Trademark Trial and Appeal Board, and intellectual property transactions including due diligence, licensing, trademark acquisitions, settlement, consent and coexistence agreements, and other transfers of rights. Ms. Armstrong also provides assistance with intellectual property litigation and arbitration. Prior to joining Winthrop & Weinstine, Ms. Armstrong was an associate with Greenberg Traurig in Las Vegas, Nevada, a law clerk with the National Endowment for the Humanities, and an arts administrator at Los Angeles Opera. www.winthrop.com /612-604-6463

USPTO Extends and Expands Patent Application Peer Review Program

Under the category of “Who Knew” — National Law Review guest blogger James M. Singer of Pepper Hamilton LLP lets us know about  a US Patent Office Pilot Program which invites public participation in the patent application process.  

The U.S. Patent and Trademark Office has announced an additional one-year pilot of its “Peer To Patent” pilot program, which invites public participation in the patent application process.  The new program launches on October 25, 2010 and will be available through September 30, 2011.

The Peer-to-Patent program is a collaboration between the USPTO, the New York Law School, and others in which participating patent applications receive public scrutiny through comments and prior art submissions on the Peer-to-Patent website.  The peer review period begins approximately one month after the patent application is published, and it lasts for three months.  After the peer review period, the project sends the prior art and comments to the USPTO, and the USPTO advances the application earlier in its queue for examination.  Both the USPTO and the applicant can consider the public comments and submitted prior art during the examination.

Applications that participate in the program can receive the benefit of quicker examination than they would have received if they had merely waited their ordinary turn at the USPTO.  This is especially useful for technologies such as software and telecommunication inventions where the typical wait time to first Office Action often is several years.  In addition, many commenters have suggested that the fact that a patent was peer reviewed patent could be useful in situations such as challenges to validity in litigation — in order words, the fact that a patent went through the program may make a jury less likely to find the patent invalid.

According to the USPTO, the Peer to Patent Program “opens the patent examination process to public participation in the belief that such participation accelerates the examination process and improves the quality of patents. Under the pilot program, inventors can opt to have their patent applications posted on the www.peertopatent.org website. . .. After the review period, the prior art is sent to the USPTO patent examiners for their consideration during examination.”

Changes in the new pilot include:

  • eligible technology classes have expanded to include software, telecommunications, and others;
  • peer review time is reduced to three months (from the previous four months);
  • up to 1,000 applications will be accepted into the program; and
  • peer reviewers may submit up to six items of prior art per application (down from the previous limit of 10).

The original Peer To Patent pilot ran from June 2007 until June 2009.  The original pilot included 189 patent applications, and it received over 600 items of prior art from peer reviewers.  To participate in the program, a pending application must not have published more than 30 days before filing a consent form, and it must fall into an eligible technology class.  Eligible classes include, among others:

  • 260 (certain subclasses) – chemistry of carbon compounds,
  • 380 – cryptography,
  • 424 (certain subclasses) – drug, bio-affecting and body-treating compositions,
  • 702, 703, 705-715, 717 and 718, which relate to certain types data processing and computers, and
  • 726 – information security.

The full list of technology classes eligible for the 2010 pilot is listed at www.uspto.gov/patents/init_events/class_subclasses_for_2010pilot.jsp.  For more details about the Peer to Patent program, visit the Peer to Patent website at www.peertopatent.org.

Copyright © 2010 Pepper Hamilton LLP

Are You Ready For the Cloud?

Meredith L. Williams of Baker Donelson is the National Law Review’s Business of Law Featured blogger.  Meredith discusses the pros and cons of cloud computing for law office operations. 

Introduction

Is cloud computing a shift or is it the next natural step in strategic business development?  Is the cloud  the right answer for your law firm or company?  Is the cloud the right answer for all applications and infrastructure or is it just a piece of the puzzle?  These are a just few of the many questions law firms and companies are asking themselves as they consider a move to the cloud.  There are many reasons why cloud computing is a very seductive solution to the cost cutting environment we find ourselves dealing with today.  However, there are many issues, legal and organizational, that must be considered to determine the validity of the cloud for each environment.

The “cloud” means different things to different people.  For most of us, we have been using cloud computing technology for years without defining the term.  Example cloud environments are extranets, legal research websites, online file storage and much more.  By definition, the cloud is a metaphor  referring to internet based computing in which applications, data, software or network functions are stored on remote servers.  There are presently three types of cloud environments:

  1. Infrastructure as a service or hardware cloud which serves as a data center,
  2. Software as a service or the software cloud, and
  3. Desktop applications operated within a hardware cloud.

Although we have been using the cloud in the past, the difference at this time is the potential of using the cloud for core business applications.

Why the Cloud?

For strategic business leaders, the cloud offers a way to minimize cost, increase mobility, prepare for disaster recovery, offer device flexibility, collaborate on demand and reduce downtime. Let us take a look at the different sections of a law firm and see how the cloud can affect the overall business functions.

In the information management world collaboration is key.  The more a firm can offer needed collaboration tools with a client, the more the client becomes entrenched in that firm culture.  The cloud provides law firms with a unique opportunity to offer clients a collaborative environment in an on-demand system.  The client can truly be connected with the law firm from anywhere with any device in the world.

Fewer applications or errors and easier upgrades are phrases application and support specialists love to hear.  The cloud environment can make them a reality.  The cloud offers software functionality to users regardless of locality or device.  Therefore, fewer setups, downloads and support hours are spent dealing with application changes and upgrades.  This new environment aids a law firm in flexibility allowing the firm to change applications as rapidly as the needs of the users change.

The main concern of most in the applications world is support.  How do current structured IT staffs support an environment when the applications are not local?  What will be the skill set of an applications and desktop support staff individual with applications in the cloud? These are areas IT departments must address before making the move to the cloud.

The cloud offers business and cost savings in a very unique way.  The upfront costs of moving to the cloud are large.  However, over time the cost savings from increased efficiency and reduced hardware, software, support and downtime help to offset the upfront costs.  The biggest hurdle for cloud computing may not be cost but instead data security.  It is easy to argue that a law firm or company can protect its data when it lives in a server room on site with a locked door but how do IT departments protect their data when it sits thousands of miles away on servers not owned by the company?  Law firms will need to determine if this is a deal breaker or is this an area of contract negotiation with the cloud provider.

What are the contractual issues?

Now that we see the potential of cost savings, flexibility, mobility and more,  we will address the contractual issues and concerns each law firm will need to consider.  The first step in any contractual negotiation is due diligence of both parties.  Law firms must evaluate news, law suits, current events, financial stability, customer references, provider longevity and any other possible information that could affect the contractual obligation fulfillment.  Only then can the contract negations begin.

The largest areas of concern in the cloud are data security and privacy. A demonstration of these concerns is seen in the 2009 complaint filed with the Federal Trade Commission (FTC) by the Electronic Privacy Information Center (EPIC) regarding cloud services of Google.  In the complaint, EPIC alleges Google did not adequately safeguard the confidential information obtained from clients.  This complaint raises serious questions for the vendor to address and draft into the contract.  Questions to ask include where the data is stored, what are the physical security measures to protect the data, is a shared resource used in storage, what is the security during transmission, what are the disaster recovery measures and what are security incident response times. In addition, questions around data migration and transition should be addressed.

Another issue to consider is legal compliance.  Highly regulated industries such as health care facilities falling under HIPAA must think twice about moving information to the cloud.  Vendors are expected to maintain the data at the same standard required of the company.  This can become a contractual deal breaker if the vendor will not agree to the higher standards.   The regulated industries affect law firms that maintain work product and client information for clients working in these regulated industries.  Law firms must now consider the standards guaranteed to their clients when moving to the cloud and verify the vendor will agree to that level of maintenance.

A point that is only just beginning to emerge in the cloud discussion is the level of control and ownership of the servers and data existing on the servers.  Questions to consider are data termination and vendor claims and rights to the data.  The control influences discovery, liability and litigation hold processes.  Negotiation can help prevent future claims of spoliation.

Performance, reliability and service features shape the day to day experience of users in the cloud.  Therefore, inquiring about disaster recovery set up, scalability of applications, process for upgrades and feature releases, suspension of services, offline capabilities, base subscription services and add-on services of applications can affect the contract obligations of the vendor, expectations of the client and most importantly cost of the contract.

Global performance and legal compliance of data across international borders are concerns for many large law firms.  Is the vendor only offering a cloud solution that is U.S. based?  This is a discussion point for the contract and can possibly be a deal breaker when adhering to EU standards of compliance.

All of the above contract negotiation points lead to the largest decision, cost.  What is included in the cost of the cloud services?  What is not included?  And the final and most important question to ask, whether the move to the cloud is a benefit if the law firm already owns the software licenses and hardware to maintain the status quo.

What will the courts be deciding?

The courts are well aware of the cloud computing movement.  In Oregon v. Bellar, 217 P. 3d 1094 (Or. App. 2009), the court took note that 69% of U.S. residents that are online utilize at least one cloud site. Due to the unique custodial issues involved with cloud computing, the cloud can present challenges to e-discovery and jurisdictional questions. Decisions concerning these issues are just starting to appear but with conflicting rulings.  The question of what the courts will decided has yet to be seen.

What will the future bring?

As we stated earlier, many of us have been using the cloud for years without calling it the cloud.  The difference surrounds the movement of core business functions such as email and document management to the cloud.  In the past, these features have been kept at a local level.  But as you see above, this is changing.  As more and more cloud providers make their way to the forefront, this movement will only increase.  The question is whether the cloud is the right solution for your law firm?

©2010 Baker, Donelson, Bearman, Caldwell & Berkowitz, PC. All Rights Reserved.

About the Author:

Meredith L. Williams is Baker Donelson’s Director of Knowledge Management.  Although trained as a lawyer, she is not actively engaged in the practice of law.  Instead, she oversees BakerNet, the Firm’s industry-leading intranet, and coordinates strategic growth on behalf of the Firm in knowledge management, competitive intelligence and technology.  Ms. Williams is widely recognized as a leading authority in knowledge management issues for the legal field, and is a frequent presenter and author on knowledge management and competitive intelligence. 901-577-2353 / www.BakerDonelson.com

 

 

Nondisclosure Agreements (NDAs): Not Just a “Standard Form.”

James M. Singer of Pepper Hamilton LLP is the featured guest blogger this week at the National Law Review.  James provides some great reminders about NDA’s Non-Disclosure Agreements. 

Many business transactions start with a nondisclosure agreement (NDA).  Often, one of the first deal points to be negotiated is whose “form” NDA will controls.  However, it’s common for both parties to overlook the fact that there is no “one-size-fits all” form NDA.

Before entering into an NDA, each party should examine the terms to ensure that the agreement makes sense for the party’s business.  Each party should ensure that the agreement adequately protects its own information, while not going so far as to subject the party to confidentiality procedures that can create issues down the road.

Issues to consider when entering into an NDA include:

  1. Nature of the disclosure: Are you more likely to be the discloser or the recipient of confidential information?  If your client will be a discloser, then a strong agreement may benefit the client. If you will only be the recipient, then you might seek a less stringent agreement.
  2. Duration of the confidentiality obligation: Some NDAs require information to be kept confidential forever. Others have a more limited term, such as 2 to 3 years.  A long term is valuable if the disclosure involves proprietary manufacturing processes, chemical compositions, or similar information.  However, if you are disclosing information that will become publicly known anyway — such as design details for a soon-to-be-sold product, or information that will be published in a patent application — then a term greater than 2 or 3 years may only benefit the other party.
  3. Consistency with corporate procedures: Each party should review the terms of the agreement to ensure that the agreement does impose obligations with which it cannot comply.  For example, if you need to disclose the information to contractors who aren’t employees, be sure that the agreement permits that.   I’ve also seen NDAs stating that all individuals who will have access to the information must sign a confidentiality agreement that specifically refers to  the NDA.  Will you require your employees to sign a new agreement that specifically refers to this agreement?  When faced with this type of obligation, consider whether or not you are prepared to comply.
  4. Purpose / Non-use clause: It’s standard for an NDA to prohibit the recipient from disclosing the information.  However, does it also restrict the recipient from internally using the information for its own benefit?  Does it clearly limit the purpose for which the recipient can use the information?  “Purpose” clauses are often filled in after all other terms are negotiated.  Parties should take care so that the purpose clause is as carefully drafted as any other clause.

These are just a few areas that parties should consider before signing a confidentiality agreement.  Rather than simply signing an ‘off the shelf” form, each party should carefully review the agreement with its attorneys to ensure that the document fits the business need.

Copyright © 2010 Pepper Hamilton LLP

About the Author:

James M. Singer is a partner in the Intellectual Property Practice Group of Pepper Hamilton LLP.  A registered patent attorney, Mr. Singer provides strategic counseling that helps businesses identify, acquire, license, protect and maximize the value of intangible assets.  Mr. Singer is the author and co-author of several publications, and he publishes IP Spotlight, a blog about topics relevant to the intersection of business and intellectual property law, at http://www.ipspotlight.com/. He also is a frequent public speaker on issues relating to technology and the law, and is recognized in Intellectual Asset Management (IAM) Licensing 250: The World’s Leading Patent and Technology Licensing Lawyers 2010. 412-454-5023 /www.pepperlaw.com

Avoiding Ambiguity in Patent License Agreements

National Law Review featured guest blogger James M. Singer of Pepper Hamilton LLP provides a great analysis of why companies need to take a very close look at the wording in their licensing agreements. 

Recent publications indicate that intangible assets account for between 70 percent and 80 percent of the overall value of United States companies.  For companies that are involved in intellectual property licensing, a significant portion of this value is derived from licensing revenues.  Thus, the agreements in which licenses are granted must be carefully drafted to ensure that agreement clearly explains the rights and obligations of each party.

Unfortunately, too often companies start a license discussion with a form document that does not anticipate issues that the parties may encounter during the licensing relationship.  In addition, a slight ambiguity in the agreement can create headaches for both parties down the road.

In early November I will have the opportunity to speak about patent licensing at a CLE seminar, and when preparing my comments I started thinking about situations that I’ve seen where just a few words in the agreement caused the parties to significantly disagree about the scope of the license, the payment obligations, or other key terms.

For example, when licensing a patent, the licensee also may expect to receive a license to general categories of “related know-how” or “related intellectual property.”  For some companies, it may be relatively easy to identify exactly what falls into these general categories.  However, other licensors — such as large companies, research institutions, and contract manufacturers — may have a wide variety of projects that could be considered “related” to the licensed IP.  These licensors should avoid general categories like “related IP”, or at least narrowly define “related IP” to that developed by specific individual, at a specific time, or under specific conditions.

Another example can be found in a 2009 Seventh Circuit court decision of Sunstar Inc. v. Alberto-Culver Company, which reviewed an agreement whereby Alberto-Culver granted Sunstar a senyoshiyoken in certain trademarks.  The parties differed as to whether the word senyoshiyoken — a Japanese word essentially meaning “exclusive use right” — allowed Sunstar to vary the trademark’s font. The court analyzed the agreement and the term’s Japanese meaning and concluded that the right granted was broad enough to permit the licensee to change the font.

In a 2009 Federal Circuit decision, Corebrace LLC v. Star Seismic LLC, the Court considered whether a license to “make” a patented invention inherently includes the right to have the invention made by a third party contract manufacturer.  The court analyzed its own precedent, along with California state law and concluded that a “have made” right is implicit in a right to “make, use and sell” an invention unless the agreement expressly says otherwise.

The licensing of intangible assets is big business.  Situations such as these show the importance of carefully drafting license agreements to avoid ambiguity.

Unless the agreement is clear, the parties can find themselves interpreting the agreement in vastly different ways, with a significant revenues riding on whose interpretation is correct.

Copyright © 2010 Pepper Hamilton LLP

About the Author:

James M. Singer is a partner in the Intellectual Property Practice Group of Pepper Hamilton LLP.  A registered patent attorney, Mr. Singer provides strategic counseling that helps businesses identify, acquire, license, protect and maximize the value of intangible assets.  Mr. Singer is the author and co-author of several publications, and he publishes IP Spotlight, a blog about topics relevant to the intersection of business and intellectual property law, at http://www.ipspotlight.com/. He also is a frequent public speaker on issues relating to technology and the law, and is recognized in Intellectual Asset Management (IAM) Licensing 250: The World’s Leading Patent and Technology Licensing Lawyers 2010. 412-454-5023 / www.pepperlaw.com

The Impact of ACTA on China’s Intellectual Property Enforcement

The National Law Review is proud to announce one of three winners of our Fall Student Legal Writing Contest.  Yicun Chen is is an LL.M candidate at American University Washington College of Law in Washington DC and she has provided an interesting perspective and explanation of Intellectual Property Right enforcement in China and other developing countries: 

Since October 2007, the United States, Europe and a few close allies[1] have been negotiating a new intellectual property enforcement treaty, Anti-Counterfeiting Trade Agreement (ACTA)[2]. Although China is identified as the main target of counterfeiting activities, it has not been invited to the negotiation table of ACTA. It appears that ACTA negotiating partners have deliberately opted for a plurilateral approach to circumvent possible opposition from developing countries such as China, Brazil and India. However, the long–term aim of ACTA is to establish it as a global standard for intellectual property right (IPR) enforcement and developing countries will face a great pressure to adhere to the treaty. Therefore it is necessary to analyze ACTA in China’s perspective and discuss its potential impacts on China and other developing countries.

This paper will analyze ACTA’s impact on China in both legislative and practical perspectives. Part I will take a text analysis of ACTA and compare it with Chinese intellectual property (IP) law. Part II will discuss the practical problem of IP enforcement in China and the potential impact of ACTA on it. Part III will give the conclusion that ACTA will not improve the IP enforcement in China even if it becomes a global standard.

I. Legislation—Text Comparison of ACTA and Chinese IP Laws

The main body of the draft ACTA has four sections, making provisions on “Civil Enforcement”, “Border Measures”, “Criminal Enforcement” and “Intellectual Property Rights Enforcement in the Digital Environment.” The following paragraphs will analyze the key issues in these sections and compare them with the corresponding parts in Chinese IP laws.

A. Intermediary Liability

The draft text of ACTA proposes to impose intermediary liability on Internet service providers (ISPs) and other third parties. This provision is broadly criticized for its threat to free speech and access to information. Moreover, some worry that governments would take advantage of this provision for censorship.

Similar to ACTA, China also imposes the intermediary liability on ISPs and adopts “notice and take down” system. The main legislation regulating Internet piracy and liability of ISPs is Measures for the Administrative Protection of Internet Copyright of China (MAPIC). Effective on May 30, 2005, the MAPIC provides that an ISP will be liable for administrative penalties if it clearly knows an Internet content provider’s copyright-infringing act through its network or if it fails to remove copyright infringed material upon the request of a copyright holder. [3] Different from ACTA, to balance the rights between copyright holders and Internet content providers, MAPIC also provides that where any ISP removes relevant content in light of the notice of a copyright owner, the Internet content provider may send a counter-notice to both the ISP and the copyright owner, stating that the removed content does not infringe upon the copyright.[4] After the counter-notice is sent, the ISP may immediately reinstate the removed content without liabilities for the reinstatement.[5]

However, MAPIC then provides that if an ISP fails to take measures to remove relevant content after it receives the copyright owner’s notice and meanwhile the content damages the “public benefits,” it may be punished by administration departments.[6] But the content providers do not have equal remedy when the ISP ignores theirs counter-notice. Thus, the law induces ISPs to perform in favor of copyright holders’ interests. Moreover, the definition of “public benefit” under MAPIC is very ambiguous and it often used by government as justification for censorship. Accordingly, people worry that if ACTA put liability for file sharing on ISPs, then they will be forced to create their own censorship campaigns, especially in the countries with a lack of democracy. The facts in China prove that such anxiety is not groundless. The burden on ISPs to act as gatekeepers is likely to be onerous. Their liabilities are not limited to IP infringement but also cover defamation, privacy and sensitive political content. With the limited resources of ISPs and special political environment in China, the intermediary liability makes Chinese ISPs play an active role in censorship but rather ineffective role in IPR protection.

B. Damage

With respect to damage assessment, ACTA would require courts to consider certain measures of damage submitted by the right holder, including “the lost profits, the value of the infringed good or service, measured by themarket price, [o]r the suggested retail price.”  Compare to ACTA, the assessment of damage in Chinese IP laws is more general and abstract. Chinese IP laws (including copyright, trademark and patent law) only provide that the damage awards are based on the losses suffered by the right holders or the profit obtained by the infringers.[7] But no provision in these laws provides the specific measures to determine the losses and profits. Thus in practice, different courts and different cases in the same court share different criteria when determining the amount of damages. The recoveries are also usually quite low by Western standards. That is an important reason for West claiming weak IPR enforcement in China.

However, the damage assessment based on market price or suggested retail price as proposed in ACTA is also unreasonable, especially in developing countries like China. The IPR holders from developed countries always complain about the great losses they suffer in China. The lost profits they claimed are based on the market price of a genuine item multiplied by the number of illegal copies sold in Chinese market. But they may ignore the fact that the number of consumers of genuine items cannot be as many as the consumers of fake ones. For example, suppose the market price of genuine software is $ 100, while the price of the pirated one is only $ 5. Then suppose ten million consumers would buy the pirated software, but you cannot imagine the same amount of consumers in China can afford the genuine ones. Therefore, the normal measure of damage in China’s court is usually based on the defendant’s illicit gains rather than the plaintiff’s own losses due to the uncertainty associated with calculating theoretical losses. Since the infringers usually sell their illegal copies at a much lower price than the market price charged by IPR holders, such illicit gains is often modest compared to the lost profits the right holders claim.

C. Criminal Liability

Article 61 of TRIPS requires that criminal liability should be applied “in cases of willful trademark counterfeiting or copyright piracy on a commercial scale.” China applies this provision to its domestic laws providing that infringers shall be prosecuted for his criminal liability for IPR infringement on a commercial scale where circumstances are serious.[8] By clarifying “serious circumstances,” Chinese IP laws raise the threshold for criminal prosecution—the illegal profits gained from trademark counterfeiting or copyright piracy must exceed $8,500 and the burden of the proof rests on prosecutors or police. Thus in practice, the criminal enforcement of IPR infringement is rare and unusually, and most IP cases continue to be handled through the civil procedure or administrative system. Developed countries often criticize the high threshold for China to initiate criminal enforcement. However, it is groundless to say Chinese IP law is beyond the scope of TRIPS since “commercial scale” under TRIPS means “counterfeiting or piracy carried on at the magnitude or extent of typical or usual commercial activity with respect to a given product in a given market.”

In contrast, ACTA dramatically lowers the bar for individuals to be found criminally liable for a variety of offences. As Kimberlee Weatherall[9] summarizes, ACTA “redefines ‘commercial scale’ to include: 1. Any IPR infringement for purpose of commercial advantage or private finical gain (no matter how low the number); and 2. Significant willful infringement without motivation for financial gain.” Since ACTA asserts to target at criminal and commercial activities rather than private acts, then there is no justification for extending criminal liability beyond large scale infringement that is direct and intentional.

Nevertheless, were China forced to adopt criminal provisions as ACTA provides, there would still be flexibility in enforcement. The definition of “significant willful” in ACTA is ambiguous, thus signatory parties have discretions to detail their own criteria to determine the infringers’ “significant willfulness.”

D. Border Measure

In terms of border measure, TRIPS only applies custom measures to copyright piracy and trademark counterfeiting. However, ACTA expands the provision to patent infringement. Many people question the practicability of this provision since patent infringement is usually less obvious compared to trademark counterfeiting.  As Kimberlee Weatherall[10] points out, for trademark- infringing goods, such as fake Louis Vuitton bags, the infringing nature is clear on the face of the goods. For patent-infringing goods, the infringement is not so obvious on surface and thus it would impose heavy burden on custom resources.

Similar to ACTA, the border measures in China include trademark, copyright as well as patent infringement.[11] But in practice, the great majority of cases dealt with by Chinese Customs involved trademarks, with only a few cases related to copyrights or patents. One key reason is the relative ease of discovering and distinguishing infringing trademarks.

II. Practice—The Impact of ACTA on the IP Enforcement in China

After having access to WTO, China has made great progress in IP law legislation. And according to the above text comparison, we can see the gap between ACTA and Chinese IP law is much narrower than many people’s imagination. However the effective enforcement of IPR has been little explored in China. Therefore, it is important to explore not only legislative but also practical cause of the problem and evaluate the impact of ACTA on China’s IPR progress. Examining the history and reality in Chinese society, there are three rooted reasons leading to the enforcement deficiency of IP law: China’s cultural uniqueness, innovation insufficiency and institutional impediments.

A. Culture Uniqueness

In contrast to individualism in the West, collectivism — a traditional and socialist value — substantially influences the cultural, social and legal areas in China. Collectivism has a long tradition based on Confucianism, which prioritizes the needs of the group over the rights of individuals.[12] Historically, there was little protection of individual rights, especially in the intellectual property field.[13]Copying and sharing created works without any compensation was widely accepted in traditional China. Moreover, intellectuals, much esteemed in Chinese society, wanted their work to be copied because the highest form of admiration is in the imitation and recreation of writings, art, or other works.

With the establishment of Socialist China in 1949, the Chinese government set up a political and legal system based on the Soviet model, which deemed individual property rights to be the antitheses of socialist principles. As China Expert Dr. Robert Weatherley has pointed out, for the sake of maintaining a stable and harmonious community, Chinese citizens are strongly promoted to abandon any rights in favor of the society.[14] IPR, as a form of individual right, is often sacrificed in favor of collective interests. Thus collectivist ideology is bound to erode the foundation of IPR protection. In a word, communal property is a part of Chinese culture that dates from the teaching of Confucianism through the birth of Communism. Questioning the idea of public property and recognizing the importance of private property takes great resources and social will.

However, collectivism has been facing new challenges since 1979, when the Chinese government initiated economic reform. The dramatic transformation in the economic, cultural and social areas fundamentally reshaped the mind of Chinese citizens. Unfortunately, the government did not bring political reform in line with its economic reform. A consequence has been that “individual aspirations of the citizens are fostered and fulfilled without a corresponding regulatory system.”[15] The increasing social and political problems, due to the unbalanced economic growth, frustrate the effort of ordinary Chinese citizens to earn their living through normal channels. In order to survive in such disordered society, people have to try every possible approach. Ironically, the money worship that socialist society criticized over decades ago now has been upheld as a recognized credo of many people, [16] who are shameless to earn money even through illegal ways like piracy and counterfeiting. Therefore, traditional values have been dramatically diminished and replaced by extreme pragmatism, which gives rise to moral vacuum and thus undermines the ethical foundation of IPR protection.

From the analysis above it is evident that the problematic IPR enforcement in China results from its cultural and political uniqueness. Now China has been moving towards establishing a legal system that increasingly seeks to restrain the power of the state, and promises individuals the ability to assert their rights and interests in reliance on law. Chinese authorities note that China is “trying to achieve in a dozen years what it had taken the Western world a century to do.”[17]In only a quarter century, China has evolved from a country with no IP protection to one with a broad system of IP laws. However, Rome was not built in a day. The standards developed in ACTA in protection and enforcement of IPR are much higher than what already exists under the TRIPS Agreement and IP laws in most developing countries. As Professor Peter Yu points out, developing countries have struggled to meet their obligations under TRIPS Agreement.[18] It is unreasonable to require them to abide by the much more stringent ACTA standards. Moreover, the efficient enforcement of law depends on healthy political and legal environments; it is impossible for a society with upheaval and extreme pragmatism to perfectly enforce a stringent treaty like ACTA. As the largest developing country in the world facing many challenges, such as political reform, adopting ACTA to improve IPR enforcement is unpractical and unlikely to be the top priority in China.

B. Innovation Insufficiency

As scholars John R. Allison and Lianlian Lin observed, “China has followed the typical pattern of a developing nation by depending heavily on foreign investment and imported technology before being able to generate substantial internal growth and technological advancement on its own.”[19] Due to the lack of technological innovation in China, strict IPR enforcement cannot bring great benefit to current Chinese companies. In contrast, it means many Chinese companies have to pay a large sum of royalties to foreign proprietors, thereby resulting in increasing production costs. Correspondingly, the Chinese government finds neither political will nor domestic pressure to substantially enforce IPR.

Moreover, the enforcement of the international IP agreements like ACTA is difficult for many developing countries partly because the developed countries have set the intellectual property standards. Although commentators and policymakers in developing countries have questioned the fairness of the agreement, developed countries won the negotiation game by forming coalitions among themselves and by convincing their less-developed counterparts to join them. However, since China and many other developing countries lack technological innovation, the incentives provided by IPR (for investment in research and development) are not meaningful.

Admittedly, it is necessary to create home-grown intellectual property in China. Although imitation provides many Chinese companies with great short-term profits, it discourages domestic innovation, which is a long-run driver of economic growth. However, as Yu point out, the linkage between IP protection and innovation ability depends on whether the intellectual property system is struck at the right balance.[20] If the IP system overprotects, it will limit public access to needed knowledge and eventually impede innovations based on existing technologies. Unfortunately, ACTA is a treaty that prioritizes enforcement of IP through a strong penalty scheme without the essential protection like fair use that provide much needed balance. Therefore, enforcing such treaty will favor foreign rights holder at the expense of the local constituents.

C. Institutional Impediments

Intellectual property protection in China follows a two-track system. The first is the judicial track, where complaints are filed through the court system. The second and most prevalent is the administrative track, where an IPR holder files a complaint at the local administrative office. Unfortunately, the lack of legal formalism in judicial system and ambiguous responsibility in administrative agencies contribute to inefficiencies in IPR enforcement. Accordingly, if these specific problems are not solved, the adoption of ACTA will still be inefficient in improving the IRP enforcement in China.

The lack of judicial independence, which results in local protectionism, greatly harms the efficiency of IPR enforcement. Although China’s Constitution gives a textual commitment to an independent judiciary, the practical operation of the institutional system precludes any true independence. Judges are subject to removal by the local congresses, which create political pressure to rule in favor of local agencies and businesses rather than foreign rights holders.

Another element that harms the efficiency of IPR enforcement is overlapping jurisdictions among national ministers and between central and local government administrations. Effective enforcement of IPR protection requires reasonable arrangement of responsibility and resources among different authorities. However, China’s vertical administration system not only results in overlapping jurisdiction between enforcement administrations, but it also causes parallel enforcement mechanisms.

Although China’s IP enforcement through judicial and administrative tracks is imperfect, it is by no means a good way to solve the problem by adopting the uniform rules of ACTA. Because of differences in political, economic and cultural conditions, laws that work well in on country do not always suit the needs and interests of another.[21] Many westerners believe the main cause of IP infringement is that the penalties in developing countries are too light to prohibit the infringing activities. Thus many provisions in ACTA provide civil and criminal liabilities.  However, according to China’s specific condition, it is more important to establish judicial independence and arrange reasonable responsibilities between different IP authorities, without which other strategies are meaningless. In a word, people in different countries should decide by themselves what laws they want to adopt to make the legislation process more accountable to the local conditions.

III. Conclusion

The goal of ACTA is to create a new standard of intellectual property enforcement above the TRIPs Agreement, and then establish the treaty as global standard. However, the universal provisions of ACTA ignore the uniqueness of different countries, especially the unique conditions in developing countries. The extremely high standards provided in ACTA for IPR enforcement are beyond the ability of China and many other developing countries. And for developed countries, strong IP protection in treaties with weak enforcement in global practice is meaningless.


[1]The negotiating parties include: the United States, the European Community, Switzerland, Japan, Australia, the Republic of Korea, New Zealand, Mexico, Jordan, Morocco, Singapore, the United Arab Emirates and Canada

 

[2] Anti- Counterfeiting Trade Agreement Informal Predecisional/Deliberative Draft: Aug. 25, 2010, PIJIP IP ENFORCEMENT DATABASE,http://sites.google.com/site/iipenforcement/acta

[3]Measures for the Administrative Protection of Internet Copyright of China, Admin Regs. §5 to 6 (2005).

[4]Id. § 7.

[5]Id.

[6]Id. §11.

[7]See Copyright Law of China, §48, Trademark Law of China, §56; Paten Law of China, § 60.

[8].  See Copyright Law of China, § 47; Trademark Law of China, § 59.

[9]Kimberlee Weatherall, ACTA in April 2010: Summary of Concerns,http://works.bepress.com/cgi/viewcontent.cgi?article=1019&context=kimweatherall

[10]Id.

[11]See generally Border Measure, Regulations, 2010.

[12]See William P. Alford, To Steal a Book is an Elegant Offense: Intellectual Property Law in Chinese Civilization 10, 12 (1995).

[13]Id. at27.

[14]Robert Weatherley, The Discourse of Human Rights in China: Historical and Ideological Perspectives 93, 104 (1999)

[15]Wei Shi, Incurable or Remediable? Clues to Undoing the Gordian Knot Tied by Intellectual Property Rights Enforcement in China, 30 U. Pa. J. Int’l L. 541, 550(2008)

[16]id.

[17]Mark Landler, At Forum, Leaders Confront Annual Enigma China, N.Y. Times, Jan 30,2005

[18]Yu, Peter K.  Six Secret (And Now Open) Fears of ACTA, June,14 2010. Southern Methodist University Law Review, Vol. 63, 2010

[19]John R. Allison & Lianlian Lin, The Evolution of Chinese Attitudes Toward Property Rights in Invention and Discovery, 20 U. Pa. J. Int’l Econ. L. 735, 774 (1999)

[20]Yu, supra note 17

[21]John F. Duffy,  Harmony and Diversity in Global Patent Law, 17 Berkeley Tech. L.J. 685, 707-08(2002).

© 2010 YICUN CHEN

About the Author:

Yicun Chen is an LL.M candidate at American University Washington College of Law. She has broad legal background with in-depth experience in intellectual property, media and business law. Prior to her move to Washington, DC, she worked as an assistant professor at Zhejiang University City College in China, researching and publishing intellectual property papers in both Chinese and English. She also supported local municipality with projects on intellectual property and media law. In addition, she was an experienced attorney, supporting and advising corporations, non-profit organizations, and governmental agencies on licensing issues, patents, corporate compliance, and negotiating / closing high-value deals.