Apple-Samsung Trade Dress Case Demonstrates Potential Value of Design Patents

A jury awarded Apple more than $1 billion in damages after finding that smartphones sold by Samsung diluted Apple’s trade dress and infringed Apple’s design and utility patents. After a partial retrial limited to determining the appropriate amount of damages, Apple still arose victorious with a $930 million award. Samsung moved for judgment as a matter of law and for a new trial. The district court denied those motions, and Samsung appealed. On May 18, 2015, the Federal Circuit upheld the jury’s verdict of design and utility patent infringement, but reversed the finding of trade dress dilution.

Trade Dress Claims

At issue on appeal was whether Apple’s purported registered and unregistered trade dress associated with its iPhone 3G and 3GS products is functional. Because trademark law gives the trademark owner a “perpetual monopoly,” a design that is functional cannot serve as protectable trade dress. Apple Inc. v. Samsung Elecs. Co., Ltd., No. 14-1335, slip op. at 7 (Fed. Cir. May 18, 2015). The standard is even higher when the owner claims trade dress protection over the configuration of a product, as opposed to product packaging or other forms of trade dress. Slip op. at 8. In fact, the court noted that Apple had not cited a single Ninth Circuit case finding trade dress of a product configuration to be non-functional. Id.

Apple claimed the following elements as its unregistered trade dress:

  • a rectangular product with four evenly rounded corners;
  • a flat, clear surface covering the front of the product;
  • a display screen under the clear surface;
  • substantial black borders above and below the display screen and narrower black borders on either side of the screen; and
  • when the device is on, a row of small dots on the display screen, a matrix of colorful square icons with evenly rounded corners within the display screen, and an unchanging bottom dock of colorful square icons with evenly rounded corners set off from the display’s other icons.

Slip op. at 9. “In general terms, a product feature is functional if it is essential to the use or purpose of the article or if it affects the cost or quality of the article.” Id. (quoting Inwood Labs., Inc. v. Ives Labs., Inc., 456 U.S. 844, 850 n.10 (1982)). Because this case came to the Federal Circuit on appeal from a district court sitting in the Ninth Circuit, the Federal Circuit applied the Ninth Circuit’s Disc Golf test for determining whether a design is functional. Under that test, courts consider whether: (1) the design yields a utilitarian advantage; (2) alternative designs are available; (3) advertising touts the utilitarian advantages of the design; and (4) the particular design results from a comparatively simple or inexpensive method of manufacture. Slip op. at 10. Because this purported trade dress was not registered, Apple had the burden to prove its validity, which required Apple to show that the product features at issue “serve[] no purpose other than identification.” Id. (citing Disc Golf Assoc., Inc. v. Champion Discs, 158 F.3d 1002, 1007 (9th Cir. 1998)). The court of appeals applied those factors and found extensive evidence supporting Samsung’s claim that the alleged trade dress was functional. Slip op. at 12–14.

In addition to the unregistered product configuration discussed above, Apple also asserted a claim based on US Registration 3,470,983, which covered the design details in each of the 16 icons on the iPhone’s home screen framed by the iPhone’s rounded-rectangular shape with silver edges and a black background. Slip op. at 15. Although Apple enjoyed an evidentiary presumption of validity for its registered trade dress, the court again looked to the Disc Golffactors and found that Samsung met its burden of overcoming that presumption and proving the trade dress was functional and the registration invalid. Slip op. at 16. Because the court held Apple’s purported trade dress was functional, it vacated the jury’s verdict on Apple’s claims for trade dress dilution and remanded that portion of the case for further proceedings. Slip op. at 17.

Design Patent Claims

Apple fared better on its design patent claims. Here, Apple asserted three design patents directed to the “front face” (D’677 patent), “beveled front edge” (D’087 patent) and “graphical user interface (GUI)” (D’305 patent) of its iPhone products.

design patent claims - apple samsung

Samsung challenged the court’s claim construction and jury instructions for failing to “ignore[]” functional elements of the designs from the claim scope, such as rectangular form and rounded corners. Slip op. at 20. The court disagreed, finding that Samsung’s proposed rule to eliminate entire elements from the scope of design claims was unsupported by precedent. Id. Rather, the court found that both the claim construction and jury instructions properly focused the infringement analysis on the overall appearance of the claimed design. Id. at 21.

This victory was financially significant for Apple, as the court found they were entitled to Samsung’s entire profits on its infringing smartphones as damages. Like the district court, the court of appeals found that 35 U.S.C. § 289 explicitly authorizes the award of total profit from the article of manufacture bearing the patented design, rather than an apportionment of damages based only on the infringing aspects of the device (i.e., external features and not internal hardware/software). The court of appeals interpreted Samsung’s argument as imposing an “apportionment” requirement on Apple—a requirement the Federal Circuit previously rejected in Nike, Inc. v. Wal-Mart Stores, Inc., 138 F.3d 1437, 1441 (Fed. Cir. 1998). Thus, Apple maintains a claim to at least a significant portion of the $930 million damages award in the case.

Summary and Takeaways

Ultimately, after holding that Apple’s purported trade dress covering elements of the iPhone’s overall shape, black-bordered display screen, and matrix of colorful square icons was invalid, the district court upheld the jury’s verdict that Samsung’s devices infringed Apple’s design patents relating to the iPhone’s overall shape, display screen, and matrix of colorful square icons. The image depicted in Apple’s now-invalid trade dress registration is below on the left. Figures from two of its still-valid design patents are on the right. Although the overlap in what was claimed in these different forms of intellectual property is readily apparent, Apple lost on one set of claims and prevailed on the other.

design patent apple samsung iphone

It remains to be seen how damages associated with the design patent claims differ from damages associated with the now-invalid trade dress claims. But this much is clear: the Federal Circuit has given a reason for companies to reevaluate the role of design patents in their intellectual property portfolios. The time and expense associated with obtaining design patents will not suit all products, but for the right product, they can provide a valuable method of recovery in litigation involving similar product designs.

Apple Gets Another Bite At $368 Million Verdict

IMS_expert_blktype-transparent

You don’t get two bites at the apple, it is sometimes said, but Apple Inc. is getting a second bite at defending itself against a massive damages award after the Federal Circuit Court of Appeals vacated a $368 million jury verdict in a patent infringement case.

The court vacated the award because it found that the plaintiff’s damages expert improperly relied on a model known as the Nash Bargaining Solution to calculate reasonable royalty damages.

Federal district courts have split on whether to allow expert testimony using the Nash Bargaining Solution, but the Federal Circuit held that the expert failed to establish the tie between the Nash theorem and the facts of this case.

The underlying issue in the case was whether two of Apple’s products — FaceTime, which allows secure video calling between Apple devices, and VPN On Demand, which creates a virtual private network from an iOS device — infringed four patents owned by VirnetX, a Nevada software and licensing company.

A jury in federal court in Tyler, Texas, concluded that all four patents were valid and that Apple had infringed them. It awarded VirnetX damages of $368 million.

Proving Reasonable Royalties

On appeal, the Federal Circuit upheld the jury’s verdict of infringement with regard to the VPN On Demand product but reversed and remanded aspects of the infringement verdict with regard to the FaceTime product.

The court then turned its attention to Apple’s challenges of the testimony of VirnetX’s damages expert. In a patent case, when infringement is found, a court is to award damages “adequate to compensate for the infringement, but in no event less than a reasonable royalty for the use made of the invention by the infringer.”

To establish a reasonable royalty rate in this case, VinetX’s expert offered three alternative methods of calculation. Apple challenged the admissibility of all three methods under Daubert, but over Apple’s objection, the trial court admitted the testimony.

On appeal, however, the Federal Circuit found problems with all three theories.

Smallest Salable Unit

The expert’s first theory was to apply a one percent royalty rate to the base. He derived the one percent rate from the royalty VirnetX typically sought in licensing its patents. For the base, he used what he called the “smallest salable unit” — the lowest sale price of each model of the iOS devices that contained the challenged features. With this theory, he calculated the total damages to be $708 million.

Apple argued that the expert erred by using the entire market value of its products as the royalty base without demonstrating that the patented features drove the demand for those products. The Federal Circuit agreed.

“The law requires patentees to apportion the royalty down to a reasonable estimate of the value of its claimed technology, or else establish that its patented technology drove demand for the entire product,” the court explained. “VirnetX did neither.”

The court went on to say that the expert “did not even try to link demand for the accused device to the patented feature, and failed to apportion value between the patented features and the vast number of nonpatented features contained in the accused products.”

The Nash Bargaining Solution

For both the expert’s second and third theories — each of which he used only with regard to FaceTime — he relied on the Nash Bargaining Solution, a so-called game theory developed in 1950 by John Nash, a mathematician and co-winner of the 1994 Nobel Prize in economics.

In his first use of the Nash theorem, the expert began by calculating the profits associated with the use of FaceTime. He did this based on the revenue generated by Apple’s addition of a front-facing camera on its mobile devices. He then determined that, under the Nash theory, the parties would have split this revenue 50/50. However, after accounting for Apple’s stronger bargaining position, he concluded that Apple would have taken 55 percent of the profits and VirnetX, 45 percent. That amounted to $588 million in damages.

For his second use of the Nash theorem, the expert assumed that FaceTime “drove sales” for Apple’s iOS products. Eighteen percent of all iOS sales would not have occurred without the addition of the FaceTime feature, he concluded. Based on that, he calculated the amount of Apple’s profits that he believed were attributable to FaceTime and apportioned 45 percent of those profits to VirnetX. That amounted to $606 million in damages for FaceTime.

Apple challenged both these theories, arguing that the expert’s use of the 50/50 split as a starting point was akin to the 25 percent rule of thumb for royalties that the Federal Circuit had rejected in earlier cases. Here again, the Federal Circuit agreed with Apple’s argument.

The problem, the court explained, is that the Nash theorem arrives at a result that follows from a certain set of premises. Here, the expert never tied his use of the theorem to the facts of the case.

“Anyone seeking to invoke the theorem as applicable to a particular situation must establish that fit, because the 50/50 profit-split result is proven by the theorem only on those premises,” the court said. In this case, the expert never did that.

Based on these conclusions, the court vacated the damages award and sent the case back to the district court for further proceedings.

Has an expert ever used the Nash Bargaining Solution, or other game theory, in one of your cases? If so, was the result positive?

OF

Apple Inc. v. Rensselaer Polytechnic Institute and Dynamic Advances, LLC, Decision Denying Institution

DrinkerBiddle

Takeaway: A voluntary dismissal of a litigation without prejudice will not nullify service of a complaint for purposes of 35 U.S.C. § 315(b) if that litigation is immediately continued in a consolidated case.

In its Decision, the Board denied institution of the Inter Partes Review as time-barred under 35 U.S.C. § 315(b) because it was not filed within the statutory period of 35 U.S.C. § 315(b).  The date of service of two different complaints was an issue of primary focus by the Board.

In a first patent litigation, Patent Owner (Dynamic Advances) filed a complaint on October 19, 2012. Dynamic Advances, LLC v. Apple Inc., No. 1:12-cv-01579-DNH-CFH (N.D.N.Y.)(Dynamic I).  The complaint for the first litigation was served on Petitioner (Apple) on October 23, 2012.  In a second patent litigation, Rensselaer Polytechnic Institute and Dynamic Advances jointly filed a complaint on June 3, 2013. Rensselaer Polytechnic Inst. & Dynamic Advances, LLC v. Apple Inc., No. 1:13-cv-00633-DNH-DEP (N.D.N.Y.)(Dynamic II).  The complaint for the second litigation was served on Petitioner (Apple) on June 6, 2013.

The Petition in the instant proceeding was filed on January 3, 2014.  Thus, the service date of October 23, 2012 for the first litigation (Dynamic I) was more than 12 months prior to the filing of the Petition, whereas the service date of June 6, 2013 for the second litigation (Dynamic II) was less than 12 months prior to the filing date of the Petition.  The Board found that service of the first complaint on October 23, 2012, rather than service of the second complaint on June 6, 2013, controlled for purposes of determining whether the requested inter partes review was time-barred under 35 U.S.C. § 315(b).  Because the service date of October 23, 2012 for the first litigation (Dynamic I) was more than 12 months prior to the filing of the Petition, the Board found that the Petition was not filed within the statutory period of 35 U.S.C. § 315(b).

The Board’s rationale in reaching this conclusion related to the fact that on July 22, 2013, the court ordered consolidation of Dynamic I and Dynamic II under Fed. R. Civ. P. 42.  In doing so, the court ordered that pursuant to a joint stipulation of the parties, Dynamic I was “dismissed without prejudice and the parties would proceed to litigate their claims and defenses in [Dynamic II].”

Petitioner argued that under the decision in Macauto U.S.A. v. BOS GmbH & KG, IPR2012-0004 (“holding that a voluntary dismissal without prejudice nullified service of the complaint for purposes of 35 U.S.C. § 315(b)”), service of the first complaint on October 23, 2012 was not effective.  According to Petitioner, as in Macauto, the facts of the present case have the effect of leaving the parties as if the first action had never been brought.

The Board disagreed, finding that “Dynamic I cannot be treated as if that case had never been filed under the rationale of Macauto.”  Instead, the Board found that it was “persuaded that the circumstances in the instant case weigh in favor of close scrutiny of the effect of the dismissal of Dynamic I, because that cause of action, although dismissed, was continued immediately in Dynamic II.”

This proceeding was the third time that Petitioner had petitioned for inter partes review against the ‘798 patent.  In IPR2014-00077, institution was denied.  IPR2014-00320 was filed concurrently with the petition for this proceeding.

Apple Inc. v. Rensselaer Polytechnic Institute and Dynamic Advances, LLC,IPR2014-00319
Paper 12: Decision Denying Institution of Inter Partes Review
Dated: June 12, 2014
Patent 7,177,798 B2
Before: Josiah C. Cocks, Bryan F. Moore, and Miriam L. Quinn
Written by: Moore
Related proceedings: IPR2014-00077; IPR2014-00320; Dynamic Advances, LLC v. Apple Inc., No. 1:12-cv-01579-DNH-CFH (N.D.N.Y.); Rensselaer Polytechnic Inst. & Dynamic Advances, LLC v. Apple Inc., No. 1:13-cv-00633-DNH-DEP (N.D.N.Y.)

Of:

The White House Big Data Report & Apple’s iOS 8: Shining the Light on an Alternative Approach to Privacy and Biomedical Research

DrinkerBiddle

Big data derives from “the growing technological ability to capture, aggregate, and process an ever-greater volume, velocity, and variety of data.”[i] Apple’s just-releasediOS 8 software development kit (“iOS 8 SDK”) highlights this growth.[ii] The iOS 8 SDK touts over 4,000 application programming interface calls including “greater extensibility” and “new frameworks.”iii For example, HomeKit and HealthKit, two of these new frameworks, serve as hubs for data generated by other applications and provide user interfaces to manage that data and related functionality.[iv] HealthKit’s APIs “provide the ability for health and fitness apps to communicate with each other … to provide a more comprehensive way to manage your health and fitness.”[v] HomeKit integrates home automation functions in a central location within the iOS device, allowing users to lock/unlock doors, turn on/off cameras, change or view thermostat settings, turn lights on/off, open garage doors and more – all from a single app.[vi] The iOS 8 SDK will inevitably lead to the development of countless apps and other technologies that “capture, aggregate, and process an ever-greater volume, velocity, and variety of data,” contributing immense volumes of data to the already-gargantuan big data ecosystem.

In the context of our health and wellbeing, big data – which includes, but is definitely not limited to, data generated by future iOS 8-related technologies – has boundless potential and can have a momentous impact on biomedical research, leading to new therapies and improved health outcomes. The big data reports recently issued by the White House and the President’s Council of Advisors on Science and Technology (“PCAST”) echo this fact. However, these reports also emphasize the challenges posed by applying the current approach to privacy to big data, including the focus on notice and consent.

After providing some background, this article examines the impact of big data on medical research. It then explores the privacy challenges posed by focusing on notice and consent with respect to big data. Finally, this article describes an alternative approach to privacy suggested by the big data reports and its application to biomedical research.

Background

On May 1, 2014, the White House released its report on big data, “Big Data: Seizing Opportunities, Preserving Values” (“WH Report”). The WH Report was supported by a separate effort and report produced by PCAST, “Big Data and Privacy: A Technological Perspective” (“PCAST Report”).[vii] The privacy implications of the eports on biomedical research – an area where big data can arguably have the greatest impact – are significant.

Notice and consent provide the foundation upon which privacy laws are built. Accordingly, it can be difficult to envision a situation where these conceptual underpinnings, while still important, begin to yield to a new approach. However, that is exactly what the reports suggest in the context of big data. As HealthKit and iOS 8 SDK demonstrate, we live in a world where health data is generated in numerous ways, both inside and outside of the traditional patient-doctor relationship. If given access to all this data, researchers can better analyze the effectiveness of existing therapies, develop new therapies faster, and more accurately predict and suggest measures to avoid the onset of disease, all leading to improved health outcomes. However, existing privacy laws often restrict researchers’ access to such data without first soliciting and obtaining proof of appropriate notice and consent.[viii] Focusing on individual notice and consent in some instances can be unnecessarily restrictive and can stall the discovery and development of new therapies. This is exacerbated by the fact that de-identification (or pseudonymization) – a process typically relied upon to alleviate some of these obstacles – is losing its effectiveness or would require stripping data of much meaningful value. Recognizing these flaws, the WH Report suggests a new approach where the focus is taken off of the collection of data and turned to the ways in which parties, including biomedical researchers, use data – an approach that allows researchers to maximize the possibilities of big data, while protecting individual privacy and ensuring that data is processed in a reasonable way.

The Benefits of Big Data to Biomedical Research

Before discussing why a new approach to privacy in the context of big data and biomedical research may be necessary, it is first important to understand the role of big data in research. As noted, the concept of big data encompasses “the growing technological ability to capture, aggregate, and process an ever-greater volume, velocity, and variety of data.”[ix] The word “growing” is essential here, as the sources of data contributing to the big data ecosystem are extensive and will continue to expand, especially as Internet-enabled devices such as those contemplated by HomeKit continue to develop.[x] These sources include not only the traditional doctor-patient relationship, but also consumer-generated and other non-traditional sources of health data such as those contemplated by HealthKit, including wearable technologies (e.g., Fitbit), patient-support sites (e.g., PatientsLikeMe.com), wellness programs, electronic/personal health records, etc. These sources expand even further when non-health data is combined with lifestyle and financial data.[xi]

The WH Report recognizes that these new abilities to collect and process information have the potential to bring about “unexpected … advancements in our quality of life.”[xii] The ability of researchers to analyze this vast amount of data can help “identify clinical treatments, prescription drugs, and public health interventions that may not appear to be effective in smaller samples, across broad populations, or using traditional research methods.”[xiii] In some instances, big data can in fact be the necessary component of a life-changing discovery.[xiv]

Further, the WH Report finds that big data holds the key to fully realizing the promise of predictive medicine, whereby doctors and researchers can fully analyze an individual’s health status and genetic information to better predict the onset of disease and/or how an individual might respond to specific therapies.[xv] These findings have the ability to affect not only particular patients but also family members and others with a similar genetic makeup.[xvi] It is worth noting that the WH Report highlights bio-banks and their role in “confronting important questions about personal privacy in the context of health research and treatment.”[xvii]

In summary, big data has a profound impact on biomedical research and, as a necessary result, on those that benefit from the fruits of researchers’ labor. The key to its realization is a privacy regime that can unlock for researchers vast amounts of different types of data obtained from diverse sources.

Problems With the Current Approach

Where the use of information is not directly regulated by the existing privacy framework, providing consumers with notice and choice regarding the processing of their personal information has become the de facto rule. Where the collection and use of information is specifically regulated (e.g., HIPAA, FCRA, etc.), notice and consent is required whenever information is used or shared in a way not permitted under the relevant statute. For example, under HIPAA, a doctor can disclose a patient’s personal health information for treatment purposes (permissible use) but would need to provide the patient with notice and obtain consent before disclosing the same information for marketing purposes (impermissible use). To avoid this obligation, entities seeking to share data in a way not described in the privacy notice and/or permitted under applicable law can de-identify the data, to purportedly make the data anonymous (for example, John Smith drives a white Honda and makes $55,000/year (identified) v. Person X drives a white Honda and makes $55,000/year (de-identified)).[xviii] Except under very limited circumstances (e.g., HIPAA limited data sets), the requirements regarding notice and consent apply equally to biomedical research as to more commercial uses.

In the context of big data, the first problem with notice and consent is that it places an enormous burden on the individual to manage all of the relevant privacy notices applicable to the processing of that individual’s data. In other words, it requires individuals to analyze each and every privacy notice applicable to them (which could be hundreds, if not more), determine whether those data collectors share information and with whom, and then attempt to track that information down as necessary. As the PCAST Report not-so-delicately states, “[i]n some fantasy world, users actually read these notices, understand their legal implications (consulting their attorneys if necessary), negotiate with other providers of similar services to get better privacy treatment, and only then click to indicate their consent. Reality is different.”[xix] This is aggravated by the fact that relevant privacy terms are often buried in privacy notices using legalese and provided on a take-it-or-leave-it basis.[xx] Although notice and consent may still play an important role where there is a direct connection between data collectors and individuals, it is evident why such a model loses its meaning when information is collected from a number of varied sources and those analyzing the data have no direct relationship with individuals.

Second, even where specific privacy regulations apply to the collection and use of personal information, such rules rarely consider or routinely allow for the disclosure of that information to researchers for biomedical research purposes, thus requiring researchers to independently provide notice and obtain consent. As the WH Report points out, “[t]he privacy frameworks that currently cover information now used in health may not be well suited to … facilitate the research that drives them.”[xxi] And as previously noted, often times biomedical researchers require non-health information, including lifestyle and financial data, if they want to maximize the benefits of big data. “These types of data are subjected to different and sometimes conflicting federal and state regulation,” if any regulation at all.[xxii]

Lastly, the ability to overcome de-identification is becoming easier due to “effective techniques … to pull the pieces back together through ‘re-identification’.”[xxiii] In fact, the very techniques used to analyze big data for legitimate purposes are the same advanced algorithms and technologies that allow re-identification of otherwise anonymous data.[xxiv] Moreover, “meaningful de-identification may strip the data of both its usefulness and the ability to ensure its provenance and accountability.”[xxv] In other words, de-identification is not as useful as it once was and further stripping data in an effort to overcome this fact could well extinguish any value the data may have (using the example above, car type and salary may still provide marketers with meaningful information (e.g., individuals with a similar salary may be interested in that car type), but the information “white Honda” alone is worthless). [xxvi]

The consequences of all this are either 1) biomedical researchers are deprived of valuable data or provided meaningless de-identified data, or 2) individuals have no idea that their information is being processed for research purposes. Both the benefits and obstacles relating to big data and biomedical research led to the WH Report’s recognition that we may need “to look closely at the notice and consent framework” because “focusing on controlling the collection and retention of personal data, while important, may no longer be sufficient to protect personal privacy.”xxvii] Further, as the PCAST Report points out, and as reflected in the WH Report, “notice and consent is defeated by exactly the positive benefits that big data enables: new, non-obvious, unexpectedly powerful uses of data.”xxviii So what does this new approach look like?

Alternative Approach to Big Data: Focus on Use, Not Collection[xxix]

The WH Report does not provide specific proposals. Rather, it suggests a framework for a new approach to big data that focuses on the type of use of such data and associated security controls, as opposed to whether notice was provided and consent obtained at the point of its collection. Re-focusing attention to the context and ways big data is used (including the ways in which results generated from big data analysis are used) could have many advantages for individuals and biomedical researchers. For example, as noted above, the notice and consent model places the burden on the individual to manage all of the relevant privacy notices applicable to the processing of that individual’s data and provides no backstop when those efforts fail or no attempt to manage notice provisions is made. Where the attention focuses on the context and uses of data, it shifts the burden of managing privacy expectations to the data collector and it holds entities that utilize big data (e.g., researchers) accountable for how data is used and any negative consequences it yields.[xxx]

The following are some specific considerations drawn from the reports regarding how a potential use framework might work:

  • Provide that all information used by researchers, regardless of the source, is subject to reasonable privacy protections similar to those prescribed under HIPAA.[xxxi] For example, any data relied upon by researchers can only be used and shared for biomedical research purposes.
  • Create special authorities or bodies to determine reasonable uses for big data utilized by researchers so as to realize the potential of big data while preserving individual privacy expectations.[xxxii] This would include recognizing and controlling harmful uses of data, including any actions that would lead to an adverse consequence to an individual.[xxxiii]
  • Develop a central research database for big data accessible to all biomedical researchers, with universal standards and architecture to facilitate controlled access to the data contained therein.[xxxiv]
  • Provide individuals with notice and choice whenever big data is used to make a decision regarding a particular individual.[xxxv]
  • Where individuals may not want certain data to enter the big data ecosystem, allow them to create standardized data use profiles that must be honored by data collectors. Such profiles could prohibit the data collector from sharing any information associated with such individuals or their devices.
  • Require reasonable security measures to protect data and any findings derived from big data, including encryption requirements.[xxxvi] 
  • Regulate inappropriate uses or disclosures of research information, and make parties liable for any adverse consequences of privacy violations.[xxxvii]

By offering these suggestions for public debate, the WH and PCAST reports have only initiated the discussion of a new approach to privacy, big data and biomedical research. Plainly, these proposals bring with them numerous questions and issues that must be answered and resolved before any transition can be contemplated (notably, what are appropriate uses and who determines this?).

Conclusion

Technologies utilizing the iOS 8 SDK, including HealthKit and HomeKit, illustrate the technological growth contributing to the big data environment. The WH and PCAST reports exemplify the endless possibilities that can be derived from this environment, as well as some of the important privacy issues affecting our ability to harness these possibilities. The reports constitute their authors’ consensus view that the existing approach to big data and biomedical research restricts the true potential big data can have on research, while providing individuals with little-to-no meaningful privacy protections. Whether the suggestions contained in the WH and PCAST reports will be – or should be – further developed is an open question that will undoubtedly lead to a healthy debate. Yet, in the case of the PCAST Report, the sheer diversity of players recognizing big data’s potential and associated privacy implications – including, but not limited to, leading representatives and academics from the Broad Institute of Harvard and MIT, UC-Berkeley, Microsoft, Google, National Academy of Engineering, University of Texas at Austin, University of Michigan, Princeton University, Zetta Venture Partners, National Quality Forum and others – provides hope that this potential will one day be realized – in a way that appropriately protects our privacy.[xxxviii]

WH Report Summary: click here.

PCAST Report Summary: click here.

Article By:

Of:

[i] WH Report, p. 2.

[ii] See Apple’s June 2, 2014, press release, Apple Releases iOS 8 SDK With Over 4,000 New APIs, last found at http://www.apple.com/pr/library/2014/06/02Apple-Releases-iOS-8-SDK-With-Over-4-000-New-APIs.html.

[iii] Id.

[iv] Id.

[v] Id.

[vi] Id.

[vii] The White House and PCAST issued summaries of their respective reports, including their policy recommendations, which can be easily found at the links following this article.

[viii] WH Report, p. 7.

[ix] WH Report, p. 2.

[x] WH Report, p. 5.

[xi] WH Report, p. 23.

[xii] WH Report, p. 3.

[xiii] WH Report, p. 23.

[xiv] WH Report, p. 6 (the WH Report includes two research-related examples of the impact of big data on research, including a study whereby the large number of data sets made “the critical difference in identifying the meaningful genetic variant for a disease.”).

[xv] WH Report, p. 23.

[xvi] WH Report, p. 23.

[xvii] WH Report, p. 23.

[xviii] In privacy law, “anonymous” data is often considered a subset of “de-identified” data. “Anonymized” data means the data has been de-identified and is incapable of being re-identified by anyone. “Pseudonymized” data, the other primary subset of “de-identified” data, replaces identifying data elements with a pseudonym (e.g., random id number), but can be re-identified by anyone holding the key. If the key was destroyed, “pseudonymized” data would become “anonymized” data.

[xix] PCAST Report, p. 38.

[xx] PCAST Report, p. 38.

[xxi] WH Report, p. 23.

[xxii] WH Report, p. 23.

[xxiii] WH Report, p. 8.

[xxiv] WH Report, p. 54; PCAST Report, pp. 38-39.

[xxv] WH Report, p. 8.

[xxvi] The PCAST Report does recognize that de-identification can be “useful as an added safeguard.” SePCAST Report, p. 39. Further, other leading regulators and academics consider de-identification a key part of protecting privacy, as it “drastically reduces the risk that personal information will be used or disclosed for unauthorized or malicious purposes.“ Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy, Ann Cavoukian, Ph.D. and Khaled El Emam, Ph.D. (2011), last found at http://www.ipc.on.ca/images/Resources/anonymization.pdf. Drs. Cavourkian and El Emam argue that “[w]hile it is clearly not foolproof, it remains a valuable and important mechanism in protecting personal data, and must not be abandoned.” Id.

[xxvii] WH Report, p. 54.

[xxviii] PCAST Report, p. 38; WH Report, p. 54.

[xxix] This approach is not one of the official policy recommendations contained in the WH Report. However, as discussed above, the WH Report discusses the impact of big data on biomedical research, as well as this new approach, extensively. Further, to the extent order has any meaning, the first recommendation made in the PCAST Report is that “[p]olicy attention should focus more on the actual uses of big data and less on its collection and analysis.” PCAST Report, pp. 49-50.

[xxx] WH Report, p. 56.

[xxxi] WH Report, p. 24.

[xxxii] WH Report, p. 23.

[xxxiii] PCAST Report, p. 44.

[xxxiv] WH Report, p. 24.

[xxxv] PCAST Report, pp. 48-49.

[xxxvi] PCAST Report, p. 49.

[xxxvii] PCAST Report, pp. 49-50.

[xxxviii] It must be noted that many leading regulators and academics have a different view on the importance and role of notice and consent, and argue that these principles in fact deserve more focus. Seee.g.The Unintended Consequences of Privacy Paternalism, Ann Cavoukian, Ph.D., Dr. Alexander Dix, LLM, and Khaled El Emam, Ph.D. (2014), last found at http://www.privacybydesign.ca/content/uploads/2014/03/pbd-privacy_paternalism.pdf.