Final Section 336(e) Regulations Allow Step-Up in Asset Tax Basis in Certain Stock Acquisitions

Sheppard Mullin 2012

Final regulations were issued last month under IRC Section 336(e). These regulations present beneficial planning opportunities in certain circumstances.

For qualifying transactions occurring on or after May 15, 2013, Section 336(e) allows certain taxpayers to elect to treat the sale, exchange or distribution of corporate stock as an asset sale, much like a Section 338(h)(10) election. An asset sale can be of great benefit to the purchaser of the stock, since the basis of the target corporation’s assets would be stepped up to their fair market value.

To qualify for the Section 336(e) election, the following requirements must be met:

  1. The selling shareholder or shareholders must be a domestic corporation, a consolidated group of corporations, or an S corporation shareholder or shareholders.
  2. The selling shareholder or shareholders must own at least 80% of the total voting power and value of the target corporation’s stock.
  3. Within a 12-month period, the selling shareholder or shareholders must sell, exchange or distribute 80% of the total value and 80% of the voting power of the target stock.

Although the rules of Section 338(h)(10) are generally followed in connection with a Section 336(e) election, there are a few important differences between the two elections:

  1. Section 336(e) does not require the acquirer of the stock to be a corporation. This is probably the most significant difference; and, to take advantage of this rule, purchasers other than corporations may wish to convert the target without tax cost to a pass-through entity (e.g., LLC) after the purchase.
  2. Section 336(e) does not require a single purchasing corporation to acquire the target stock. Instead, multiple purchasers—individuals, pass-through entities and corporations—can be involved.
  3. The Section 336(e) election is unilaterally made by the selling shareholders attaching a statement to their Federal tax return for the year of the acquisition. Purchasers should use the acquisition agreement to make sure the sellers implement the anticipated tax strategy

Section 336(e) offers some nice tax planning opportunities, by allowing a step up in tax basis in the target’s assets where a Section 338(h)(10) election is not allowed.

Example: An S corporation with two shareholders wishes to sell all of its stock to several buyers, all of which are either individuals or pass-through entities with individual owners. A straight stock purchase would not increase the basis of the assets held inside the S corporation, and an LLC or other entity buyer would terminate the pass-through tax treatment of the S corporation status of the target. A Section 338(h)(10) election is not available since the purchaser is not a single corporation. However, a Section 336(e) election may be available, whereby the purchase of the stock would be treated as a purchase of the corporation’s assets (purchased by a “new” corporation owned by the purchasers). The purchasers could then convert the purchased corporation (the “new” corporation with the stepped-up assets basis) into an LLC, without tax, thereby continuing the business in a pass-through entity (single level of tax) with a fully stepped-up tax asset basis.

Article By:

 of

If You Pay More, Do You Actually Get More? Re: Limited Partnerships and Limited Liability Companies

AM logo with tagline

The typical private fund is organized as a limited partnership or limited liability company that is managed by a general partner or manager.  The fund manager is usually compensated in three ways – an annual management fee (often 2%), a carried interest (often 20%), and an investment in the fund (often 1%).  In a recently presented paper, Professors David T. Robinson and Berk A. Sensoy tackled the question of whether private fund managers actually earn their keep.

Given the limited rights of limited partners and members and asymmetrical access to information, one might expect that these professors would conclude that fund managers who charge more, actually under perform.  Based on an analysis of 837 buyout and venture capital private equity funds from 1984-2010 to, the two scholars reach the opposite conclusion:

[W]e find no evidence that high-fee funds underperform an on a net-of-fee basis [sic].  Management fees and carried interest are generally unrelated to net-of-fee cash flow performance.  This suggests that private equity GPs that receive higher compensation earn it in the form of higher gross returns.  When we examine the relation between GP ownership and performance, our evidence flatly contradicts the argument that GPs with low skin in the game demonstrate poor performance.

You can read the entire paper here.  Unfortunately, the authors don’t reveal the source of their data, but rather mysteriously describe it as having been “obtained from a large, institutional limited partner with extensive investments in private equity”.  The paper was presented at the inaugural Sustainability and Finance Symposium held last week which was hosted by the California Public Employees Retirement System and the UC Davis Graduate School of Management.

Article By:

 of

 

Consumer Financial Services Basics 2013 – September 30 – October 01, 2013

The National Law Review is pleased to bring you information about the upcoming  Consumer Financial Services Basics 2013.

CFSB Sept 30 2013

When

September 30 – October 01, 2013

Where

  • University of Maryland
  • Francis King Carey School of Law
  • 500 W Baltimore St
  • Baltimore, MD 21201-1701
  • United States of America

Facing the most comprehensive revision of federal consumer financial services (CFS) law in 75 years, even experienced consumer finance lawyers might feel it is time to get back in the classroom. This live meeting is designed to expose practitioners to key areas of consumer financial services law, whether you need a primer or a refresher.

It is time to take a step back and think through some of these complex issues with a faculty that combines decades of practical experience with law school analysis. The classroom approach is used to review the background, assess the current policy factors, step into the shoes of regulators, and develop an approach that can be used to interpret and evaluate the scores of laws and regulations that affect your clients.

Legal Marketing Association (LMA) Conference Recap: Pricing, Profitability and the Role of Legal Marketing

LMA_Midwest Logo 300x125

How do you measure success? Ask a lawyer and she may say, “By the number of hours I bill.” Ask a marketer and he may answer, “By the number of clients my firm has.” Ask an economist and he will tell you, “By how profitable we are.”

As we’ve seen in recent years, a firm can have a long list of clients and/or bill a staggering number of hours, but it won’t necessarily stop them from going under. However, this much is true: a profitable firm is a successful firm. In the LMA Annual Conference session titled, “Pricing, Profitability, and the Role of Marketing,” panelists Toby Brown, director of strategic pricing and analytics at Akin Gump Strauss Hauer & Feld LLP, and Colleen Nihil, firm-wide director of project management at Dechert LLP, explained how a long list of clients and/or billing a large number of hours can actually lower profits.

Toby and Colleen went on to explain why legal marketers need to understand profitability and law firm economics, in general. As one of the four “P’s” of marketing (along with product, promotion and place), pricing is well-within our realm, yet is often overlooked. They further illustrated how we can use this internal law firm knowledge to our advantage in winning and keeping clients.

A major part of the discussion was geared towards how to create value-based billing for a client. Why do clients want it? What makes a client a good candidate for this arrangement? What type of research should be done? How should it be handled internally within the firm? Each question was addressed plainly:

Why do clients want a value-based billing arrangement?

Many prefer this to the classic hours-based arrangement simply because it provides an element of predictability. Clearly, all clients want cost-savings and efficiency. However, the panelists advised that the firm should first have a conversation with the client about setting up a new pricing arrangement. Understanding what the client wants and why they want it should guide the firm when setting up a new agreement.

What makes a client a good candidate for this arrangement?

Obviously, a client with very predictable legal needs is the best client for a value-based billing arrangement. However, many clients could be eligible if enough good, solid research is conducted, which leads to the next question:

What type of research should be done?

Research on the client’s past history with the firm is imperative in order to decide if it is eligible for value-based billing and what a reasonable and fair pricing structure will look like. Two approaches were discussed:

Bottom-Up

  1. Compare and contrast the client against other similar clients at the firm – size, revenue, industry, etc.
  2. Pull benchmarking data: What services does the firm provide to client? How much does each matter cost? Is there any outlying data?
  3. Don’t look at just historic data, but also look at how the firm can drive down costs. Think about using zero-based budgeting for this process.
  4. Build out the matter. Look at what strategy will be taken on the matter and figure out the firm’s value.
  5. Model the matter based on different types of rate structures (fixed-fee and other alternative fee arrangements)
  6. This approach will require the firm to categorize matters better in order to ensure reliable benchmarking.

Top-Down

  1. Start from an estimated figure for the matter.
  2. Create a scoping conversation, asking the questions: What will double the figure? What will make it shrink? What is the likelihood of…? Determine the cost of the matter, not the price.

How should value-based billing be handled internally within the firm?

Toby and Colleen stressed the importance of educating attorneys on profitability and its four drivers:

  1. Rates
  2. Realization (percentage of money collected versus standard billing rate)
  3. Productivity (number of billed hours per time-keeper, per year)
  4. Leverage (amount of non-partner work versus partner work performed)

Once attorneys learn how profitability works, they can begin to structure their matters in a way to increase profitability (rather than hours or simple revenue). However, some attorneys learn how to “game the system” which can lead to unhealthy profitability; this is something that should be monitored. Toby directed the audience to his paper, “The Four Horsemen of Law Firm Profitability,” which dives deeper into law firm economics.

Toby and Colleen summed up their presentation in three bullet points:

  • Focus on the work that you can have the biggest impact on
  • Understand your clients’ pain points
  • Make sure you have this information before responding to an RFP.

These points fed into their overarching message, “It’s not what you do, it’s what you choose not to do.” In the end, increasing profitability and implementing value-based billing arrangements come down to trust and communication between the firm and client. Once those two pillars are established, a new pricing agreement can easily be built with the two parties coming from places of understanding and a mutual interest in success.

Article By:

 of

Tips to Avoid a HR Nightmare: The Top 4 Mistakes Employers Make – Part II

GT Law

More than ever, employers are facing serious claims from disgruntled workers.  This two-part series discusses the top four tips for employers to avoid claims from unhappy workers:

1.         Failure to document unsatisfactory job performance. 

2.         Failure to terminate bad workers before it is too late.

3.         Failure to enforce the company’s harassment policy. 

4.         Failure to give a reason for employment termination.

Part I covered why it is important to document bad performance and why it is not a good idea to keep poor performers on your payroll.  In this installment, learn why it is imperative to deal with harassment claims properly and quickly and why employers should provide a reason for termination.

Mistake #3:    Failure to enforce the company’s harassment policy. 

It is important to follow the company’s harassment policy and procedures for dealing with harassment claims.  Respond quickly and effectively to any complaints of harassment or discrimination, whether by co-workers, customers, or other third parties.  For example, even employers with the best policies and training programs on investigating workplace conduct and harassment can be held liable if they fail to investigate a harassment complaint.  If the employer does not take corrective action when discovering the failure, these types of actions can appear to a jury as “utter indifference” on the part of the employer and consequently lead to an award of punitive damages. It is therefore important to take prompt and effective action.

Mistake #4:    Failure to give a reason for employment termination.

Make sure you follow the company’s rules and be consistent – discipline and treat all employees the same for all infractions.  Be honest and upfront with the employee about the reason(s) you are letting him/her go.  If the employer does not give an explanation when it terminates employment, employees will try to figure out why they were fired and likely will presume the reason was discriminatory.  At the time of termination, have a witness present, such as another supervisor or manager.  If appropriate, you can give the employee a chance to explain his/her side of the story, but you do not need to change your termination decision.

See Part I of this article here.

 

Article By:

 of

Comprehensive Immigration Reform Proceeds to Senate Floor, Heated Debate Expected to Follow

GT Law

On June 11th, the U.S. Senate voted to move the “Border Security, Economic Opportunity, and Immigration Modernization Act” (S. 744), the comprehensive immigration reform bill drafted by the “Gang of Eight,” to the floor for debate, where it is expected to face dozens of amendments in the coming weeks. The final vote to begin debate on the landmark legislation was 84 in favor and 15 against. Below are some of the key issues that this bill faces on its way to a final vote in the Senate:

Border Security: Senator John Cornyn (R-TX) has signaled support for implementing border security triggers – including a 90% apprehension rate of illegal border crossings – before putting undocumented immigrants on the path to permanent residency. Senator Cornyn’s amendment would also introduce a biometric exit system as well as a nationwide electronic employment eligibility verification program. The measure has already stirred opposition from Democratic senators and immigration advocates, who liken it to a “poison pill” that will indefinitely delay the citizenship prospects of the estimated 11 million undocumented immigrants already in the United States.

Senator Marco Rubio (R-FL), a member of the “Gang of Eight,” has also indicated that he may not be able to support the legislation in its current form without strengthened border security measures. To this end, Senator Rubio and his colleague, Senator Tom Coburn (R-OH) may propose an amendment that would transfer the responsibility for drafting, but not enforcing, a border security plan from the U.S. Department of Homeland Security (DHS) to Congress. Several other drafters of the bill, including Senator Charles Schumer (D-NY), expressed a willingness to include border security triggers so long as they are “both achievable and specific.”

Taking a more expansive approach, Senator Rand Paul (R-KY) plans to offer an amendment that would require Congress to draft and enforce a border security plan, as well as to vote on border security every year for the first five years after the bill takes effect. Democratic senators and immigration advocates oppose this measure, citing unpredictability and partisanship as future hurdles to implementing a path to citizenship.

Taxes: Senator Jeff Sessions (R-AL) plans to re-introduce two amendments that would require families to provide a valid Social Security number to receive a child tax credit and deny the earned-income tax credit to immigrants with temporary legal status, respectively. Both measures previously failed in committee on a party-line vote.

Senator Orrin Hatch (R-UT) is also expected to offer an amendment that would require immigrants to demonstrate that they have paid back taxes and remained current on present obligations as they progress toward citizenship. Senator Hatch may also introduce a measure that would ban immigrants who are legal permanent residents from receiving Affordable Care Act subsidies for five years.

Guns: Senator Richard Blumenthal (D-CT) may offer two amendments restricting access to guns for undocumented immigrants. One of the provisions would eliminate the loophole that allows certain immigrants to purchase firearms, while another would require the Attorney General to alert the Secretary of Homeland Security when an undocumented immigrant or temporary visitor to the U.S. attempts to buy a firearm. Currently, both categories of individuals are legally barred from purchasing firearms.

Same-Sex Benefits: Senator Patrick Leahy (D-VT) is weighing whether to revive an amendment that he reluctantly declined to introduce in committee due to the opposition of his Republican colleagues. The measure would permit U.S. citizens in state-recognized same-sex marriages to apply for permanent residency on behalf of a same-sex spouse, a benefit that is currently afforded to heterosexual couples only.

Article By:

 of

China’s First-Ever National Standard on Data Privacy – Best Practices for Companies in China on Managing Data Privacy

Sheppard Mullin 2012

Companies doing business in China should take careful notice that China is now paying more attention to personal data privacy collection. This would be an opportune time for private companies to internally review existing data collection and management practices, as well as determine whether these fall within the new guidelines, and where necessary, develop and incorporate new internal data privacy practices.

The Information Security Technology-Guide for Personal Information Protection within Public and Commercial Systems (“Guidelines”), China’s first-ever national standard for personal data privacy protection, came into effect on February 1, 2013. The Guidelines, while not legally binding, are just what they purport to be – guidelines – some commentators view these as technical guidelines. However, the Guidelines should not be taken lightly as this may be a pre-cursor of new legislation ahead. China is not quite ready to issue new binding legislation, but there are indications it seeks to develop consistency with other internationally accepted practices, especially following recent data legislation enacted in the region by neighboring Hong Kong and other Asian countries.

What should companies look for when examining existing data privacy and collection policy and practices? As the Guidelines provide for rules on collecting, handling, transferring and deleting personal information, these areas of a company’s current policies should be reviewed.

“Personal Information”

What personal information is subject to the Guidelines? The Guidelines define “personal information” as “computer data that may be processed by an information system, relevant to a certain natural person, and that may be used solely or along with other information to identify such natural person.”

“General” and “Sensitive” Personal Information

The Guidelines makes a distinction on handling “general” as opposed to “sensitive” personal information. Sensitive personal information is defined as “information the leakage of which will cause adverse consequences to the subject individual” e.g. information such as an individual’s identity card, religious views or fingerprints.

Consent Required

If an individual’s personal information is being collected, that individual should be informed as to the purpose and the scope of the data being collected; tacit consent must be obtained- the individual does not object after being well informed. With “sensitive” personal information being collected, a higher level of consent must be obtained prior to collection and use; the individual must provide express consent and such evidence be retained.

Notice

Best practices dictate a well-informed notice be given the individual prior to collection of any personal information. The notice should clearly spell out, among other items, what information is being collected, the purpose for which the information will be used, the method of collection, party to whom the personal information will be disclosed and retention period.

Cross Border Transfer

The Guidelines further limit the transfer of personal information to any organization outside of P.R. China except where the individual provides consent, the government authorizes the transfer or the transfer is required by law. It is unclear as to which law applies where transfer is “required by law”- PRC law or law of any other country.

Notification of Breach

There is a notification requirement. The individual must be notified if personal information is lost, altered or divulged. If the breach incident is material, then the “personal information protection administration authority.” The Guidelines, however, do not define or make clear this administration authority is here.

Retention and Deletion

Best practices for a company is to minimize the amount of personal information collected. Personal information once used to achieve their intended purpose should not be stored and maintained, but immediately deleted.

The Guidelines may not be binding authority, but at a minimum sets certain standards for the collection, transfer and management of personal information. Especially for companies operating in China, the Guidelines is a call to action, and for implementation of best practices relating to data privacy. Companies should take this opportunity to assess their data privacy and security policies, review and revise customer information intake procedures and documentation, and develop and implement clear, company-wide internal data privacy policies and methods.

Article By:

 of

Handbags and High-Heeled Shoes: Recent Trademark Disputes in the World of Fashion

Dickinson Wright Logo

When Paul Simon first sang about “diamonds on the soles of her shoes” in the 1980’s, he was apparently more fashion forward than we realized.  Less than a decade later, in the early 1990’s, the fashion house of Christian Louboutin began selling women’s high-fashion designer footwear displaying a distinctive red, glossy sole on the bottom of high-heeled shoes. Legend has it, Louboutin came up with the idea when he painted red nail polish on a pair of women’s shoes because they “lacked energy.”  These shoes soon became highly sought after by celebrities and consumers of haute couture everywhere.

Louboutin federally registered its red-colored sole for footwear as a trademark with the U.S. Patent and Trademark Office in 2008. In 2011, Louboutin sought to enforce those rights by suing Yves Saint Laurent for selling red shoes that displayed red soles. In its Resort 2011 collection, the American branch of YSL featured purple, navy, green…and red shoes that all had soles of matching color. Louboutin took exception to the red-soled shoes and tried to stomp out YSL’s allegedly infringing activity.

At the district court level, a New York judge ruled against Louboutin’s request that YSL be enjoined from selling red-soled shoes. On appeal in September of 2012, the U.S. Court of Appeals for the Second Circuit expressly held that Louboutin could protect its iconic red-soled shoes, except when the entire shoe itself is red.  Therefore, YSL was allowed to continue selling its monochromatic red shoes. Both parties have claimed victory and the case was dismissed in December.

The defendant in a case brought by Coach, Inc., and recently decided, did not fare quite so well. In 2010, Coach sued the owner of the Southwest Flea Market located in Memphis, Tennessee for contributory trademark infringement, claiming he knew, or should have known, that some of the vendors at the flea market were selling counterfeit Coach Handbags and other infringing products. Prior to filing suit, Coach had sent letters to the defendant, putting him on notice of the infringement. Even after the filing of the suit, multiple raids were conducted at the flea market, and more than 4,600 counterfeit Coach products were seized.

In the case pending in the U.S. District Court for the Western District of Tennessee, the magistrate judge granted summary judgment to Coach in 2012, ruling that the owner of the flea market was contributorily liable for the infringement, and the jury awarded Coach more than $5 million in damages. The case was appealed and last month the U.S. Court of Appeals ruled, for the first time ever, on the question of whether the owner of a flea market can be held liable for contributory trademark infringement. The answer was a resounding “yes”, as the court upheld the lower court’s ruling and the $5.04 million damage award. In its ruling, the court admonished the flea market owner for engaging in “ostrich-like behavior”, willfully ignoring the infringing activities occurring at the market, showing that the high price of fashion applies not just to the cost of the merchandise, but also to not respecting the trademarks by which that merchandise is known.

Article By:

 of

Social Media & Emerging Employer Issues: Are You Protected?

McBrayer NEW logo 1-10-13

On June 13, 2013, Business First of Louisville and McBrayer hosted the second annual Social Media Seminar. The seminar’s precedent, Social Media: Strategy and Implementation, was offered in 2012 and was hugely successful. This year’s proved to be no different. Presented by Amy D. Cubbage and Cynthia L. Effinger, the seminar focused on emerging social media issues for employers. If you missed it, you missed out! But don’t worry, a seminar recap is below and for a copy of the PowerPoint slides click here.

McBrayer: If a business has been designated an entity that must comply with HIPAA, what is the risk of employees using social media?

Cubbage: Employers are generally liable for the acts of their employees which are inconsistent with HIPAA data privacy and security rules. As employees’ use of social networking sites increase, so does the possibility of a privacy or security breach. An employee may be violating HIPAA laws simply by posting something about their workday that is seemingly innocent. For instance, a nurse’s Facebook status that says, “Long day, been dealing with a cranky old man just admitted into the ER” could be considered a HIPAA violation and expose an employer to sanctions and fines.

 

McBrayer: Should businesses avoid using social media so that they will not become the target of social media defamation?

Effinger: In this day and age it is hard, if not impossible, for a business to be successful without some use of social media. There is always the risk that someone will make negative comments about an individual or a business online, especially when anonymity is an option. Employers need to know the difference between negativity and true defamation. Negative comments or reviews are allowed, perhaps even encouraged, on some websites. If a statement is truly defamatory, however, then a business should make efforts to have the commentary reported and removed. The first step should always be to ask the internet service provider for a retraction of the comment, but legal action may sometimes be required.

 

McBrayer: When does a negative statement cross the line and become defamation?

Effinger: It is not always easy to tell. First, a statement must be false. If it is true, no matter how damaging, it is not defamation. The same goes for personal opinions. Second, the statement must cause some kind of injury to an individual or business, such as by negatively impacting a business’s sales, to be defamation.

 

McBrayer: Can employers ever prevent employees from “speaking” on social media?

Effinger: Employers should always have social media policies in place that employees read, sign, and abide by. While it is never really possible to prevent employees from saying what they wish on social media sites, some of their speech may not be protected by the First Amendment’s freedom of speech clause.

 

McBrayer: What constitutes “speech” on the internet? Is “liking” a group on Facebook speech? How about posting a YouTube video?

Effinger: This is a problem that courts and governmental employment agencies, like the National Labor Relations Board, are just starting to encounter. There is no bright-line rule for what constitutes “speech,” but it is safe to say that anything an employee does online that is somehow communicated to others (even “liking” a group or posting a video) qualifies.

 

McBrayer: Since a private employer is not bound by the First Amendment, can they terminate employees for social media actions with no repercussions?

Effinger: No! In fact, it could be argued that private employees are afforded more protection for what they say online than public employees. While a private employer has no constitutional duty to allow free speech, the employer is subject to state and federal laws that may prevent them from disciplining an employee’s conduct. As a general rule, private employees have the right to communicate in a “concerted manner” with respect to “terms and conditions” of their employment. Such communication is protected regardless of whether it occurs around the water cooler or, let’s say, on Twitter.

 

McBrayer: It seems like the best policy would be for employers to prohibit employees from discussing the company in any negative manner. Is this acceptable?

Effinger: It is crucial for companies to have social media policies and procedures, but crafting them appropriately can be tricky. There have been several instances where the National Labor Relations Board has reviewed a company’s policy and found its overly broad restrictions or blanket prohibitions illegal. Even giant corporations like General Motors and Target have come under scrutiny for their social media policies and been urged to rewrite them so employees are given more leeway.

 

McBrayer: Is social media a company asset?

Cubbage: Yes! Take a moment to consider all of the “followers”, “fans”, or “connections” that your business may have through its social media accounts. These accounts provide a way to constantly interact with and engage clients and customers. Courts have recently dealt with cases where a company has filed suit after a rogue employee stole a business account in some manner, for instance by refusing to turn over an account password. Accounts are “assets,” even if not tangible property.

 

McBrayer: What is the best way for an employer to protect their social media accounts?

Cubbage: Social media accounts should first be addressed in a company’s operating agreement. Who gets the accounts in the event the company splits? There are additional steps every employer should take, such as including a provision in social media policies that all accounts are property of the business. Also, there should always be more than one person with account information, but never more than a few. Treat social media passwords like any other confidential business information – they should only be distributed on a “need to know” basis.

Article By:

 of

 

Supreme Court – Being Unanimous Appears to be Part of the Justices’ DNA

Bracewell & Giuliani Logo

On June 13, 2013, the U.S. Supreme Court unanimously decided in Association for Molecular Pathology v. Myriad Genetics, Inc. that naturally occurring DNA segments are not patent eligible because they are products of nature and merely isolating such segments does not change their status for patent eligibility. However, complementary DNA (cDNA) is patent eligible because it is not naturally occurring.

Isolated DNA sequences – patent ineligible

In the third opinion since 2010 dealing with the scope of patent eligibility,the Court found that Myriad’s claims directed towards isolated DNA segments fell “squarely within the law of nature exception.” Slip op. at 13.  Myriad discovered an “important and useful gene, but separating that gene from its surrounding genetic material is not an act of invention.” Slip op. at 12. The Court rejected the idea that isolation of DNA segments requires severing of chemical bonds, which creates a non-naturally occurring molecule. While Myriad may have expended a significant amount of research effort to discover the location of the genes of interest, effort alone does not render such subject matter patentable.

For landmark Supreme Court decisions regarding patent eligibility, please click here.

cDNA sequences – patent eligible

The Court noted that cDNA differs from isolated DNA segments and does not present the same obstacles for patent eligibility. Notable distinctions, according to the Court, are that cDNA’s creation results in an exons-only molecule, which is not naturally occurring. While acknowledging that the nucleotide sequence of cDNA is dictated by nature, the Court focused on the fact that creation of cDNA “unquestionably creates something new.” Slip op. at 17. cDNA is distinct from the DNA from which it was derived, and thus is not a product of nature. However, the Court noted that, in some instances, such as a very short segment of DNA having no intervening introns, the cDNA may be indistinguishable from the DNA. In such a situation, that cDNA is not patent eligible.

What the Court did not decide

The Court was careful to note that its decision did not implicate method claims, patents on new applications based on discoveries related to specific genes, or patentability of DNA in which the order of naturally occurring nucleotides has changed. Thus, the eligibility of methods of manipulating DNA, applications of knowledge learned from DNA segments, and manipulations of DNA sequences are questions still on the table.

Standing

An additional interesting aside is the Court’s approach to the declaratory judgment standing issue. The Court, in footnote 3, simply indicates that under all of the circumstances presented, the MedImmune standard had been met. Whether this opens the door to additional declaratory judgment actions in the future is uncertain.

Impact

This decision will likely not have a devastating impact on the patent portfolio of genetic diagnostic companies. These companies typically focus more on patents directed towards multi-gene products, methods, and cDNAs than on claims directed to isolated DNA sequences to protect their genetic tests. Nevertheless, should a company seek to assert a patent with claims directed to isolated DNA sequences, such an assertion will now be subjected to summary judgment motions based on the patent ineligibility of such claims.

In the long term, however, today’s decision will likely have a big impact on businesses engaged in developing chemical and biological therapeutics, with patents directed to isolated naturally occurring compounds. The Court has held that merely separating a segment of DNA from its natural surrounding is “not an act of invention.” How such analysis could be applied in the chemical and pharmaceutical arts remains to be seen. The Court’s opinion likely will be used to attack chemical and pharmaceutical patents directed towards naturally occurring compounds like proteins, antibodies, and other naturally occurring biomolecules. Whether such patents fall within chemical compositions or focus on the chemical changes, which result from isolation that the Court has suggested may be patentable, will likely be determined on a case by case basis.

Lastly, in an era of ever polarizing politics, it is fascinating to see that this decision, like most other recent U.S. Supreme Court decisions involving patents,is a 9-0 decision.  All of the current justices unanimously agree on what is the appropriate scope of patent eligibility.


Bilski v. Kappos, 130 S. Ct. 3218 (2010) and Mayo Collaborative Services v. Prometheus Lab., Inc., 132 S. Ct. 1289 (2012) are two unanimous U.S. Supreme Court decisions dealing with the patent eligibility of method claims.

See Bilski v. Kappos, 130 S. Ct. 3218(2010); Mayo v. Prometheus, 132 S. Ct. 1289(2012); Caraco Pharm. Lab., Ltd. v. Novo Nordisk A/S, 132 S. Ct. 1670 (2012); Kappos v. Hyatt, 132 S. Ct. 1690 (2012); Bowman v. Monsanto Co., No. 11-796 (2013).

Article By:

of