Relying on Noncompete Clauses May Not Be the Best Defense of Proprietary Data When Employees Depart

Much of the value of many companies often is wrapped up with and measured by their intellectual property (IP) portfolios. Some forms of IP, such as patents, are known by the public. Others derive their value from being hidden from the public. Many companies, for example, have gigabytes of data or “know-how” that may be worth millions, but only to the extent that they remain secret. This article discusses some ways to keep business information confidential when an employee who has had access to that information leaves the company.

Many companies traditionally turned to employment agreements, specifically noncompete clauses, to protect proprietary competitive information. The legality of noncompetes is in question following the Federal Trade Commission’s (FTC’s) ban on them, which is being challenged in court by the U.S. Chamber of Commerce, causing confusion and concerns about protecting information via noncompete agreements. As covered in Wilson Elser’s prior articles* on this subject, the timeline of the FTC rule in question was as follows:

  • The FTC promulgated new rules to take effect in September 2024 banning all noncompete agreements.
  • The U.S. Supreme Court overturned the 40-year-old method of reviewing agency rules (Chevron Deference), throwing all agency rules, including the FTC’s rule on noncompetes, into question.
  • The District Court for the Northern District of Texas preliminarily enjoined the FTC from enforcing its new rule banning noncompetes.

After this flurry of activity, noncompetes are, for now, not banned. But do they offer an effective solution for businesses seeking to protect their proprietary information?

Noncompete Clauses Are Not Always Effective
Vortexa, Inc. v. Cacioppo, a June 2024 case from the District Court for the Southern District of New York, illustrates the limitations of noncompete clauses in employment agreements. That case presents the familiar fact pattern of an employee leaving and going to work for a competitor. With some evidence of the employee’s access to proprietary competitive information in hand (but no evidence of actual misappropriation), the former employer sought a preliminary injunction to prevent the employee from working for the competitor for one year, the term stated in the noncompete clause in the employee’s contract with the former employer. The contract also included common non-disclosure and confidentiality clauses.

Absent evidence of actual misappropriation, the plaintiff employer relied on the “Inevitable Disclosure” doctrine, which assumes that a departing employee will inevitably disclose confidential information when they go work for a competitor. The court refused to apply this doctrine, explaining that inevitable disclosure may substitute for actual evidence of misappropriation only when the information is a trade secret. Here, none of the information about which the former employer was concerned was a trade secret.

The proprietary information that the former employee had was pricing data, marketing strategies and “intricacies of the business.” These types of information do not, in and of themselves, constitute trade secrets. In addition, the information was not afforded trade secret treatment because (1) some of it was ascertainable by the competitor without reference to the first employer’s information; (2) the companies sell different products; (3) some of the information was developed without the expenditure of a good deal of money and effort; (4) some of the information was provided to clients without a non-disclosure agreement; (5) some of the information was shared on company-wide collaboration channels; and (6) “google drive log records show that [the former employee] opened and viewed these documents, which underlines the lack of security protecting this purportedly confidential information.”

Most of these reasons for the information not being accorded trade secret status cannot be changed by any action of the employer. For example, if information can be generated by means independent of the first employer, that information cannot be protected by trade secret law and nothing the first employer can do will change that after the fact. However, any business seeking to protect its valuable competitive information can change the way that it secures, protects and manages access to its competitive information, and this may be enough to ensure that its information is protected by trade secret law.

What Businesses Should Do to Protect Their Proprietary Competitive Information
Generally, proprietary competitive information can be protected as a trade secret by operation of law or via contract. In many cases, the “boots and suspenders” approach is best – the information should be protected both by contract and by meeting the requirements for protection under trade secret law. As described, a contract alone is sometimes ineffective, so information that derives its value from not being generally known to the public should also be treated in such a manner that the courts would see it as being a trade secret.

Specifically, for something to qualify for trade secret protection under federal and state statues and common law, it must be securely kept and carefully protected from disclosure. Some easy ways to protect information are to (1) restrict access to folders on a company’s internal computer systems, (2) physically lock rooms that contain hard copies and (3) have computers lock automatically when not accessed for set time periods. Protecting information via noncompete, confidentiality and non-disclosure contractual obligations is another way to ensure that information remains secret, such that it is protected under trade secret law. Internal policies on how information may be shared with third parties, such as clients, also are helpful evidence of trade secret treatment. In addition, the business may consider maintaining records on the time, effort and monetary expenditures required to develop proprietary information, which should allow the business to demonstrate that making such information freely available to a competitor is fundamentally unfair.

In some cases, information protected as a trade secret may be the most valuable IP that a company owns. But the value can easily be lost if the company does not properly secure the information. Different scenarios call for different methods of security, and a good rule of thumb to protect information from disclosure by a departing employee is to protect this information both by contract and as a trade secret.

The first step for any business is to think through their overall data protection strategy and consult with experienced intellectual property counsel to put appropriate protections in place.

Patent Infringement Verdict Nixed over Judge’s Stock Ownership

The US Court of Appeals for the Federal Circuit reversed a district court’s opinions and orders and remanded the case for further proceedings before a different district court judge because the original judge had failed to divest all financial interests in the case. Centripetal Networks, Inc. v. Cisco Systems, Inc., Case No. 21-1888 (Fed. Cir. June 23, 2022) (Dyk, Taranto, Cunningham, JJ.)

Centripetal sued Cisco for patent infringement. The original district court judge presided over a 22-day bench trial, which included a more than 3,500-page record, 26 witnesses and more than 300 exhibits. The court heard final arguments on June 25, 2020. While the case was still pending before the district court, the judge learned that his wife owned Cisco stock, valued at $4,687.99. The district court judge notified the parties on August 12, 2020, that he had discovered that his wife owned 100 shares of Cisco stock. He stated that his wife purchased the stock in October 2019 and had no independent recollection of the purchase. He explained that at the time he learned of the stock, he had already drafted a 130-page draft of his opinion on the bench trial, and virtually every issue had been decided. He further stated that the stock did not—and could not have—influenced his opinion on any of the issues in the case. Instead of selling the stock, which might have implied insider trading given his knowledge of the forthcoming order, the judge placed it in a blind trust. Under the terms of the trust, the judge was to be notified when the trust assets had been completely disposed of or when their value became less than $1,000.

Centripetal had no objections. Cisco, however, filed a motion for recusal under 28 U.S.C. § 455(a) and (b)(4). The judge ordered Centripetal to file a response. On October 2, 2020, the court denied Cisco’s motion for recusal. On October 5, 2020, the court issued a 167-page opinion and order containing the judge’s findings that Cisco willfully infringed the asserted claims of the patents-at-issue and awarded Centripetal damages of more than $755 million, pre-judgment interest of more than $13 million and a running royalty of 10%. Cisco moved for amended findings and judgment under Rule 52(b) or a new trial under Rule 59(a)(2). The court denied both motions. Cisco appealed the district court’s findings and asserted that the judge was required to recuse himself under 28 U.S.C. § 455(b) absent divestiture under § 455(f) (the only exception to the bright line rule that a federal judge is disqualified based on a known financial interest in a party).

On appeal, the Federal Circuit addressed two issues: whether the district court judge was relieved of his duty to recuse under § 455(b)(4) because his wife had divested herself of her interest in Cisco under § 455(f), and, if the requirements of § 455(f) were not satisfied, a determination as to the proper remedy.

The Federal Circuit analyzed whether placement of the stock in a blind trust satisfied the divesture requirement of § 455(f). The Court explained that a blind trust is “an arrangement whereby a person, in an effort to avoid conflicts of interest, places certain personal assets under the control of an independent trustee with the provision that the person is to have no knowledge of how those assets are managed.” Centripetal admitted that there are no cases holding that placement of stock in a blind trust constitutes divestment. The Court next turned to the intent of Congress when it drafted the statute. The Court reasoned that to “divest” was understood at the time to mean “dispossess or deprive,” which is only possible when an interest is sold or given away. The Court also noted that Congress used the present tense—that a judge should not sit when he or she has a financial interest in a party. The Court concluded that while placing the stock in a blind trust removed the judge’s wife from control over the stock, it did not eliminate her beneficial interest in Cisco. The Court also found that the Judicial Conference’s Committee on Codes of Conduct had previously ruled that a judge’s use of a blind trust does not obviate the judge’s recusal obligations. Accordingly, the Court found that placing assets in a blind trust is not divestment under § 455(f) and, thus, the district court judge was disqualified from further proceedings in the case.

As for the appropriate remedy, the Federal Circuit considered whether rulings made after August 11, 2020, when the district court judge became aware of his wife’s financial interest in Cisco, should be vacated as a remedy for his failure to recuse. The Court determined that the risk of injustice to the parties weighed against a finding of harmless error and in favor of vacatur. The Court reversed the district court’s opinion and order denying Cisco’s motion for recusal; vacated the opinion and order regarding infringement, damages and post-judgment motions and remanded for further proceedings before a new judge.

© 2022 McDermott Will & Emery

The Way to Protect Your Business? What You Need to Know About Trade Secrets

What do Coca-Cola’s secret formula, McDonalds’ special sauce, and Google’s search algorithm have in common? Each is a protected trade secret. In other words, they are proprietary information vital to these companies’ survival and are among their most valuable corporate secrets.

A trade secret can be anything of value to your company that is unique and not known to persons outside the company. For example, a trade secret can be a recipe, process, formula, strategy, technique, or device that your competitors do not know, do not have, and cannot use.

Trade secret law can be less risky in some respects than other forms of intellectual property like patents, copyrights, and trademarks. The application process for a patent requires that a company disclose the secret itself. With that comes an inherent risk—should the application be denied, the secret is no longer a secret. While the protection afforded by trade secret law may be considered fragile, meaning constant vigilance is required to maintain secrecy, the secret remains a secret; while a patent, even after issuance, carries some risk of post-grant invalidation. By contrast, a trade secret owner may ultimately enjoy greater certainty by maintaining protection, potentially forever. However, a trade secret is entitled to protection only for as long as it is kept a secret. If the information is lawfully disclosed to the public, it is no longer confidential and loses its trade secret protection forever.

Governing Law: Both federal and state law recognize the time and money invested to gain competitive advantages like trade secrets and protect those advantages. Federal Law: Under the controlling federal legislation passed by Congress in 2016, the Defend Trade Secrets Act (“DTSA”) defines a trade secret as something used in a company’s business that (a) is not known or readily accessible by competitors, (b) has commercial value or that provides a competitive advantage in the marketplace, and (c) the owner of the information protects from disclosure through reasonable efforts to maintain its secrecy. Prior to the DTSA’s enactment in 2016, no federal statute promulgated a federal trade secret private right of action.

In addition to the DTSA’s rules regarding trade secrets, additional federal rules apply. The Economic Espionage Act of 1996 makes the theft of trade secrets a federal crime. The Act prohibits the theft of a trade secret by a person intending or knowing that the offense will injure a trade secret owner. The Act also makes it a federal crime to receive, buy, or possess trade secret information knowing it to have been stolen. The Act allows the government to punish thefts of trade secrets by imprisonment up to 15 years and/or fines up to $5 million, depending on whether the defendant is an individual or a corporation. A private party can still sue for trade secret theft even if the federal government files a criminal case under the Economic Espionage Act.

New York State Law: Prior to federal law, most states had some form of trade secret law that varied state to state. The Uniform Trade Secrets Act (“UTSA”) was published in 1979 and amended in 1985 to provide a uniform trade secret law. Many states, including Pennsylvania in 2004 and New Jersey in 2012, adopted the UTSA. Notably, New York did not adopt the UTSA and does not have its own state trade secret statute, and thus relies on the common law.

Under New York common law, “misappropriation” refers to the acquisition of a trade secret by someone who knows that the trade secret was acquired by improper means—theft, bribery, misrepresentation, breach, or inducement of a breach of duty to maintain secrecy. The New York statute of limitations requires that any action for misappropriation be filed three years from the date the misappropriation is discovered. Further, New York law requires that the use of the trade secret be continuous in the operation of a business, rather than one-time use.

Cartier v. Tiffany: Cartier recently filed suit against its luxury rival Tiffany & Co. in New York state court. Cartier v. Tiffany & Co., et al.,650925/2022 (N.Y. Sup.). Richemont-owned Cartier sets out claims against LVMH’s Tiffany & Co. for various contractual and tort claims and trade secret misappropriation against both defendants [Who is the other defendant?]. Cartier seeks preliminary and permanent injunctive relief to require defendants to refrain from using the allegedly misappropriated information and return it to Cartier, as well as a judgment for any “compensatory damages that may be caused by [Tiffany’s] wrongful conduct.”

The complaint states that Tiffany & Co. lured former Cartier employee Megan Marino away from her role as its Assistant Manager for Jewelry Merchandising to learn more about Cartier’s “High Jewelry” collection, where pieces typically cost $50,000 to $10 million.

Cartier claims Marino was bound by non-disclosure and non-solicitation agreements she had signed as part of her role at Cartier and that she breached those agreements by using Cartier’s confidential business information to benefit Tiffany. This information includes Cartier’s “very sensitive and valuable” internal company documents that Marino forwarded to her personal email. Specifically, Marino “referenced a [Cartier] Excel spreadsheet” that “detailed Cartier’s confidential, High Jewelry assortment information.” Based on that spreadsheet, Cartier alleges, Marino “created a new Excel document, derived entirely from Cartier’s confidential information,” including “the total number of High Jewelry pieces at various Cartier locations in the U.S.” Cartier maintains this information is “only accessible by a limited number of Cartier employees [and] not known outside of Cartier” and “allow[s] a sophisticated competitor to replicate key strategies and, with relative ease, to reverse engineer how Cartier allocates, merchandises, and prices its High Jewelry stock.” Cartier claims the proprietary and confidential nature of this information amounts to a trade secret-protected asset.

Cartier further claims Tiffany has a history of poaching employees and maintains a “disturbing culture of misappropriating competitive information.” Given the alleged pattern, Cartier asserts that Tiffany now possesses “a substantial amount of [its] confidential and trade secret information that it obtained from Marino and other former Cartier employees” as a result of their “unlawful taking of Cartier’s valuable confidential information and trade secrets.”

Even if Cartier successfully establishes that it maintains trade secret information that Tiffany misappropriated, the case is hardly straightforward. Establishing damages in cases like this is particularly challenging, as it is difficult to assign a dollar value to trade secret information that will compensate the plaintiff for the economic loss caused by the defendant’s misappropriation. As a result, courts generally have quite a bit of discretion in fashioning damages awards.

©2022 Norris McLaughlin P.A., All Rights Reserved

So You Wanna Play with Copyright? “Joyful Noise” Ostinato Isn’t Original Expression

The US Court of Appeals for the Ninth Circuit affirmed a district court’s order vacating a jury award of damages for copyright infringement and granting judgment as a matter of law, explaining that the musical work alleged to have been copied did not qualify as an original work of authorship but consisted only of “commonplace musical elements.” Marcus Gray PKA Flame et al. v. Katheryn Elizabeth Hudson PKA Katy Perry et al., Case No. 20-55401 (9th Cir. Mar. 10, 2022) (Clifton, Smith, Watford, JJ.)

Key Definitions:

  • A musical scale is a sequence of musical notes or tones by pitch.
  • A subset of seven notes is called the minor scale and can be referred to with alphabetic names (A, B, C, etc.) or scale degrees (1, 2, 3, etc.).
  • An ostinato is a repeating musical figure (for example, 3-3-3-3-2-2).

In 2007, Marcus Gray (Flame) purchased an ostinato and used it in the song “Joyful Noise.” The song was released in 2008. While “Joyful Noise” did not achieve significant commercial success or airtime, it received millions of views online. In 2013, American singer-songwriter Katy Perry created “Dark Horse,” which was a hit, resulting in her performance at the Super Bowl halftime show in 2015.

The “Joyful Noise” ostinato consists of notes, represented as 3-3-3-3-2-2-2-1 and 3-3-3-3-2-2-2-6, whereas Dark Horse’s ostinato contains 3-3-3-3-2-2-1-5. Both have a uniform rhythm and equal note duration in time.

Plaintiffs sued Perry and her co-defendants for copyright infringement. Plaintiffs presented circumstantial evidence that the defendants had a reasonable opportunity to access “Joyful Noise” and that the ostinatos in both songs were substantially similar. Plaintiffs did not present direct evidence that Perry and the others had copied elements of the song, instead relying on testimony from their expert musicologist, Dr. Todd Decker.

Decker testified that the ostinatos were similar in many aspects, but he also testified that there was no single element that caused him to believe the ostinatos at issue were “substantially similar” when viewed “in isolation.” The jury also heard testimony from Perry’s expert, who disagreed altogether that the ostinatos were substantially similar.

The jury found that the defendants had a reasonable opportunity to hear “Joyful Noise” before composing “Dark Horse,” that the two songs contained substantially similar copyrightable expression and that “Dark Horse” used protected material from “Joyful Noise.” The jury found the defendants liable for copyright infringement and awarded $2.8 million in damages. The district court vacated the award and granted judgment as a matter of law to defendants, concluding that the evidence at trial was legally insufficient to show that the “Joyful Noise” ostinato was a copyrightable original expression. The plaintiffs appealed.

The Ninth Circuit explained that because the plaintiffs did not present any direct evidence that the defendants copied the “Joyful Noise” ostinato, they were required to show that the defendants had access to the work and that the ostinatos were substantially similar.

The Ninth Circuit began with its analysis of the “substantially similar” prong, employing a two-part test having “extrinsic” and “intrinsic” components. The Court noted that while it must refrain from usurping the jury’s traditional role of evaluating witness credibility and weighing the evidence, the extrinsic test requires that the Court ensure that the evidence of objective similarities between two works is legally sufficient to serve as the basis of a copyright infringement claim, regardless of the jury’s views. The Court explained that the substantial similarity test focuses on the protectable elements standing alone and disregards non-protectable elements.

To be a protectable element under copyright law, the “Joyful Noise” ostinato had to qualify as “original expression.” Based on the trial record, the Ninth Circuit found that the “Joyful Noise” ostinato consisted entirely of commonplace musical elements, and that the similarities between the two ostinatos did not arise out of an original combination of these elements. Without original expression, no element identified by Flame was individually copyrightable. For example, the Court noted that “the fact that Joyful Noise and Dark Horse both make use of sequences of eight notes played in an even rhythm is a trite musical choice outside the protection of copyright law.”

Finding the evidence presented at trial legally insufficient to establish that the musical elements were individually copyrightable, the Ninth Circuit determined that the jury’s verdict finding defendants liable for copyright infringement was unsupported by substantial evidence. Thus, the Court affirmed the trial court’s grant of judgment as a matter of law.

© 2022 McDermott Will & Emery

Ed Sheeran in “Shape of You” Court Battle

Singer Ed Sheeran is currently giving evidence in a three week High Court copyright trial over his 2017 chart-topping hit “Shape of You.”

Sheeran has been accused by two musicians, Sami Chokri and Ross O’Donoghue, that his hit song, “Shape of You” plagiarises “particular lines and phrases” of their 2015 composition, “Oh Why.” The two songs in question share a similar melody.

The dispute began back in May 2018 and saw Sheeran and his co-writers prevented from obtaining an estimated £20 million in royalties from performances or broadcasts of “Shape of You” after Chokri and O’Donaghue accused Sheeran and his co-writers of “appropriating” their music. Chokri claims that he sent the track to Sheeran in a bid to work with the star, but later heard the chorus on “Shape Of You” – which became the biggest selling single of 2017 in the UK.

Sheeran’s lawyers told the High Court at that time, that the musician and his co-writers had no recollection of having heard the song in question before the dispute began and asked the High Court to declare that he and his co-writers had not infringed Chokri and O’Donoghue’s copyright, with Sheeran also stating his reputation had been tarnished by the allegations.

In July 2018, Chokri and O’Donoghue issued a counterclaim for “copyright infringement, damages and an account of profits in relation to the alleged infringement”.

In a November 2020 ruling, the parties involved “anticipated that they would incur costs in the region of £3 million between them on the dispute”.

Andrew Sutcliffe QC, for Chokri and O’Donoghue, said the question at the heart of the case was “how does Ed Sheeran write his music?” and whether he “makes things up as he goes along during songwriting sessions or whether his songwriting process involves the collection and development of ideas over time which reference and interpolate other artists.”

Whilst the trial plays out in the High Court over the course of the next three weeks, it serves as a timely reminder that content created should be original and independent to avoid falling within the remit of copyright infringement. Otherwise, the risk of copyright infringement can be reduced by:

  • Obtaining relevant authorisations and approvals from a Collective Management Organisation, such as; PPL PRS (the UK’s music licensing company) or the Copyright Licensing Agency (for printed material);
  • Obtaining relevant permissions from a copyright owner/the copyright owner’s agent which may require the payment of licencing fees;
  • Entering into an assignment of intellectual property where copyright work has been produced as part of an underlying contractual agreement; and
  • Checking any relevant copyright/licencing terms to ascertain whether there is permission to reproduce certain content.
Copyright 2022 K & L Gates

To Search or To Sink: The Importance of Clearing Your Brand

So many times in my three decades of practice I’ve shaken my head at the perils a trademark owner can so easily avoid by searching and clearing a mark. The litigations! The unnecessary attorneys’ fees! The time and resources lost! All because my client (or adversary) didn’t conduct a proper trademark search.

Adopting a Trademark

So what’s all the fuss about? Well, before adopting a trademark (that is, a brand name for goods or services) you should have an attorney commission a proper clearance search, review it, and provide you with a well-reasoned opinion as to the availability of the brand for “use” and “registration.” (Yes, they are different things, as explained below.) I’m not talking about an Internet search or an online search of U.S. Trademark Office records, though both can be useful to make sure there aren’t any easily found barriers to use or registration of a mark before a full search is commissioned.

I’m talking about a full clearance search done by a reputable vendor the attorney commissions to uncover all uses (registered and not) of the same or similar marks for the same or similar goods/services as you want to use your brand for. The resulting vendor’s report sent to the attorney is typically anywhere from 300 pages up to 1000 pages. Then the (experienced trademark) attorney reviews it and lets you know in a detailed opinion if the mark is free for you to use and register without entangling you in the risk of a dispute/lawsuit. If it’s not available, you pick another brand, and search again.

Using a Brand and Registering It

So what’s the difference between freedom to use a brand and freedom to register it? In the U.S., “common law” trademark rights can exist based solely upon use (that is use of a trademark without registration). That’s because consumers can associate a brand with a single source (the trademark owner/producer of goods/services) even if it’s not registered. (It’s different in other countries, and searches should be done in every country for which you want to use your brand.)

So it’s possible that there’s a barrier to use but not to registration, because a common law (unregistered) trademark is too similar to the brand you want to use, and is being used in connection with identical or related goods/services as your proposed brand. That’s why you want clearance to both use and register a mark. (Registration is important because it provides you with nationwide rights in your brand; common law trademarks cover only the geographic territory where sales under the brand occur.)

So please clear your mark. It’s pennies on the dollar compared to what you will spend in a dispute or (heaven forbid) litigation. Here’s to happy searching!

©2022 Norris McLaughlin P.A., All Rights Reserved

Petitioner Succeeds in Wiping Out Challenged Claims at PTAB

Background

In Micron Technology Inc. v. Godo Kaisha IP Bridge 1, IPR2020-01007, Paper 36 (P.T.A.B. Dec. 1, 2021), the Patent Trial and Appeal Board found claims 1−17 of U.S. Patent No. 6,424,041, which described semiconductor devices designed to prevent copper from diffusing from wiring into memory storage regions, unpatentable. The Board’s decision, which determined that the claims were unpatentable as obvious in light of the prior art, undertook both a claim construction and obviousness determination.

Claim Construction

The Board’s decision construed two terms: “memory storage portion” and “copper-diffusion blocking means.” The primary dispute regarding “memory storage portion” was whether it must contain “access circuitry.” The Patent Owner argued that the “memory storage portion” must include access circuitry. After reviewing the specification, the Board construed “memory storage portion” to mean “the region where at least the components that are used for the storage of information are located” and determined that no access circuitry was required. Id. at *23. Then, the Board took to determining the meaning of the term “copper-diffusion blocking means,” which was a means-plus-function limitation under 35 U.S.C. § 112. To construe this term, the Board determined what the claimed function was and identified the structures or materials disclosed in the specification that corresponded to the means for performing that function. Considering the specification, the Board agreed with the Petitioner’s proposed construction that the claimed function of the term was “blocking copper diffusion from said wiring portion toward said memory storage portion,” and the corresponding structures were a ceiling film or a vertical wall, and equivalents of these. Id. at *28.

Obviousness

The Board determined that Petitioner made a sufficient showing that claims 1−17 would have been obvious in light of two prior art references, Kishii and Ryan.

The parties disputed whether Kishii taught “a memory storage portion on a main surface of said semiconductor substrate.” Id. at *32. The petitioner argued that Kishii’s stacked fin capacitor was a memory storage portion. The patent owner disputed this contention, arguing that the petitioner did not show that Kishii’s capacitor stored information and the stacked fin capacitor may be used for a different purpose in dynamic random-access memory (“DRAM”), such as a decoupling capacitor that does not store information. Petitioner offered expert testimony, which cited examples where a stacked-fin capacitor had been previously used in a DRAM memory cell, as opposed to decoupling circuitry. The Board was persuaded by Petitioner’s expert and found Kishii’s stacked-fin capacitor was a portion or component of a semiconductor device that stored information.

Next, the Board determined that a person of ordinary skill in the art would have been reasonably motivated to combine Kishii and Ryan to teach using a copper wire, as required by claim 1, given Ryan’s teaching that copper was a preferred material for such interconnect layers due to its low resistivity, low cost, and enhanced reliability. The Board found the final limitation of claim 1 was taught by Kishii, which was determined to teach a protective film that was “structurally indistinguishable” from the ’041 patent and performed the same claimed function as claim 1 required.

Additionally, the Board determined that petitioner made a sufficient showing that claims 13 and 14 would have also been obvious over Liang and El-Kareh. Claims 13 and 14 added the claim limitation – “wherein the memory storage portion is a memory storage portion for accumulating and releasing charges according to information.” Id. at *59. Combining the prediction from El-Kareh that protection against degradation would be necessary, and Liang’s ability to protect against said degradation, the Board determined that the two references taught a reasonable expectation of success for the limitation of claims 13 and 14.

© 2022 Finnegan, Henderson, Farabow, Garrett & Dunner, LLP

Article By Emma N. Ng, Shannon M. Patrick and Amanda K. Murphy, Ph.D. of Finnegan

For more articles on IP, visit the NLR Intellectual Property section.

SCOTUS Shelves Request to Review 11th Circuit Dark Tower Decision, Ending Copyright Saga

The Supreme Court’s refusal to review the Eleventh Circuit’s decision in DuBay v. King marks an end to a 4-year copyright battle concerning the lead character of Stephen King’s acclaimed series, The Dark Tower.  The Eleventh Circuit’s decision affirmed that the King’s anti-hero, Roland Deschain, is not substantially similar to William DuBay’s The Rook comic book character, Restin Dane. The decision illustrates the complexity of literary copyright infringement disputes, where a claim is brought based on a mix of original and stock character elements.

In 2017 William DuBay’s heir, Benjamin DuBay, sued novelist Stephen King, Marvel Entertainment, Sony Entertainment, and others for various counts of copyright infringement, alleging that King copied DuBay’s artistic expression based on purported similarity between lead characters of The Rook (Restin Dane) and The Dark Tower (Roland Deschain). The district court granted summary judgment to King, determining (1) that any similarities between the characters comprise unprotectable general ideas and scènes à faire elements; and (2) that the protectable original character elements in dispute are different, such that “no reasonable jury…could find the works substantially similar.” DuBay appealed.

The principal issue on appeal was whether the district court erred in assessing substantial similarity.  DuBay argued that the characters were substantially similar based on several shared characteristics, including: (1) similar names; (2) interaction with time-travel related towers; (3) having a bird as a companion; (4) having knightly characteristics; (5) wearing Western-style clothing; (6) surviving a fictionalized interpretation of The Alamo; (7) the use of knives; and (8) traveling back in time to save a young boy who becomes a gunslinger. DuBay also argued that the unique combination of these elements made Dane a distinctive character, and that Deschain is a copy of DuBay’s artistic expression in that character.

The Eleventh Circuit addressed DuBay’s contentions in two parts.

First, the court assessed whether each of the claimed character elements merit copyright protection. The court affirmed the district court’s holding that “character names do not merit copyright protection,” since mere words and short phrases cannot be protected under copyright law.  The court reiterated that only original elements of a copyrighted work can be afforded protection, and that certain claimed elements (i.e., “knightly heritage,” time travel to “different times and parallel worlds,” “western attire,” “fictionalized Alamo histories,” and “knife wielding”) are merely general ideas or scènes à faire that are “too general to merit copyright protection.”  The court then reviewed the remaining elements to determine whether the shared characteristics rendered the characters substantially similar.  Although both characters may be broadly similar in having bird companions, a relationship to towers and tower imagery, and past time travel experiences involving the rescue of a young boy, the court found that the depiction of these elements was different in each work.  For example, whereas Dane lives in and travels via tower shaped structures shaped like the namesake chess piece, Deschain embarks on an endless mission to find an elusive Gothic tower that connects parallel worlds and time periods.  Because the portrayals of each original element are distinguishable, the court determined that no reasonable jury could have concluded that the works were similar.

Second, the court examined whether the characters are substantially similar based on each character’s combination of the claimed elements (or the “look and feel” of the characters).  The Court recognized of the potential dangers of comparing works based on individual similarities alone because an original combination of unoriginal elements can potentially sustain a claim of copyright infringement.  However, the court found that any similarities of combined elements were “superficial” at best, and that the “look and feel” analysis actually hurt, rather than helped, DuBay’s case by highlighting differences in expression of shared original character elements.

Takeaway:

The Supreme Court’s refusal to hear Dubay reinforces the basic tenet of copyright law that general ideas or scènes à faire cannot be protected by copyright.  It also reminds litigants that although a combination of original and non-original elements can be protected under copyright law, broad similarities are usually insufficient to sustain a copyright infringement claim.

The case is DuBay v. King, 844 Fed. Appx. 257 (11thCir. 2019), cert. denied, 142 S. Ct. 490 (2021).

Article By Spencer K. Beall and Margaret A. Esquenet of Finnegan

For more intellectual property legal news, click here to visit the National Law Review.

© 2021 Finnegan, Henderson, Farabow, Garrett & Dunner, LLP

The Time Has Come for Trademark Modernization Act Regulations

On Dec. 18, 2021, regulations implementing the Trademark Modernization Act of 2020 (TMA) went into effect. Trademark owners and practitioners should be aware of the new procedures and ensure they are ready for the changes.

Trademark Modernization Act Regulations

Our posts “Three Things to Know About the Trademark Modernization Act of 2020” and “The Trademark Modernization Act of 2020: New Rules and Procedures” from March and May 2021, respectively, gave an overview of the changes that will be implemented with the act. Most notably, the TMA provides for new procedures to challenge trademark registrations based on nonuse – expungement, and reexamination. It is intended that the new ex parte expungement and reexamination proceedings will be faster and more efficient alternatives to cancellation procedures before the Trademark Trial and Appeal Board. You can read the final rule here.

Another significant change is the requirement for filers to verify their identity with the United States Patent and Trademark Office (“USPTO”). This is part of the USPTO’s efforts to protect the integrity of the register and combat fraudulent filings, which have been on the uptick. Beginning in early 2022, the following must verify their identity with the USPTO using one of the verification options that includes an electronic process by ID.me

Trademark owners and corporate officers not represented by an attorney, US-licensed attorneys (including in-house counsel), and Canadian attorneys or agents are required to verify their identity. Paralegals and other support staff working for an attorney must be sponsored by a verified attorney. Trademark owners who are represented by an attorney do not currently need to verify their identities to sign electronic forms sent by their attorney; however, if the representation by that attorney ends, the owners will need to submit to the verification process.

It is important that trademark holders and practitioners prepare for these new policies and procedures to ensure they can complete filings on a timely basis.

Article By Danielle M. DeFilippis of Norris McLaughlin P.A.

For more intellectual property legal news, click here to visit the National Law Review.

©2021 Norris McLaughlin P.A., All Rights Reserved

Healthy Habits for You and Your Company: File Your Annual Reports, Replace Your Air Filters, and Renew Your DMCA Agent Registration

Businesses and people alike each have recurring routine tasks they need to perform to stay in good shape. Every year we prepare corporate filings, undergo our necessary medical examinations, and file our taxes.1 And starting in December 2019, companies began adding a new task to this checklist: renewing their DMCA Agent registration. Is your company prepared?

The DMCA can protect your website from its users’ copyright infringement.

Anyone with a website that allows users to post content to the site, even in a simple comment section, risks liability for copyright infringement based on those users’ posts. The Digital Millennium Copyright Act (“DMCA”) helps website owners mitigate that risk. If you operate a site and you comply with the safe harbor criteria, the DMCA shields you from copyright liability. The DMCA isn’t limited to internet service providers; its safe harbor offers websites an immensely valuable protection against costly and lengthy copyright infringement lawsuits. A registered Agent is only one of the many required elements needed for DMCA compliance, but it’s a crucial requirement that’s easy to overlook.

Congress passed the DMCA in 1998 to strike a balance between protecting the dynamic creativity of internet users and enforcing federal copyright protection. And regardless of whether you think Congress managed to find that balance, the DMCA sets the standard for statutory copyright enforcement on the internet—users ignore it at their peril. Websites that don’t comply with the DMCA must2 screen every comment and post submitted to the site by anyone for potential copyright violations, because the site can be held directly liable for any infringing submissions.3 On the other hand, DMCA compliance makes the website essentially immune from its users’ infringement.

Social media networks are the most obvious beneficiaries of DMCA safe harbor protection. Can you imagine if Facebook or Twitter needed to pre-screen every single post or tweet before it went live? In exchange for this safe harbor protection, the DMCA requires businesses to (among other things) create and enforce copyright takedown procedures for copyright holders to use when they spot potentially infringing content on the website.4

The Designated Agent is a key part of DMCA compliance.

Every organization that seeks safe harbor protection needs to designate an Agent as the organization’s point of contact for takedown notices. The designation is submitted to the U.S. Copyright Office, where it’s published on a searchable database. The designated Agent (which can be one person or an entire department) is then responsible for receiving all of the company’s DMCA takedown notices and then ensuring that they are acted upon.

Each Agent designation is effective for three years. Whenever the designated Agent’s information is updated with the Copyright Office, the three-year clock starts over. But if a three-year period ends without an update or renewal, the designation becomes invalid and the organization’s DMCA safe harbor protection ends with it.

You don’t want to forget about your renewal and you shouldn’t wait three years between checkups.

Fortunately, it’s pretty simple to figure out when your company’s Agent designation will expire. You can check the date that your organization’s Agent was last updated by searching the DMCA Designated Agent Directory and clicking on the name of the Service Provider.5 Add three years to the displayed effective date, and that’s your deadline.

You could, in theory, set a calendar reminder for every three years and forget about the DMCA in the interim, but we don’t recommend it. What if your Agent takes a leave of absence or leaves the company? What if your company reorganizes and the designated department is renamed (or gets lost in the transition)? We recommend that you check your Agent’s status at least once a year, just to be safe. It only takes a moment to do.

When in doubt, check with your attorneys to make sure that your rights are still being protected.

There’s much more to DMCA protection beyond Agent registration. Copyright law is constantly evolving—especially when it comes to the internet. DMCA safe harbor protection has many requirements beyond just having a designated Agent, and there’s a lot at risk if your company doesn’t qualify for the safe harbor. You can’t “undo” a gap in safe harbor protection, but you can close the door on future liability. That’s a door you want to keep shut. As your business’s online presence grows, so does its exposure to potential liability.

So when you’re checking your DMCA Agent registration, don’t just tick the box and wait until the next year. Take the time to consider your DMCA protocols. If your company’s DMCA compliance protocols aren’t up to date and compliant, your safe harbor is in jeopardy. What about the company’s future needs? If your company’s online presence will be growing, is your designated Agent capable of handling an increased caseload of takedown notices? This is an area where it’s better to be safe than sorry.

References:

This article is not meant to provide specific legal or medical advice. If you would like more specific legal advice, please contact an attorney. If you’re looking for specific medical advice, you’re reading the wrong article.
Or at least they really, really should.
3 Damages for copyright infringement are no joke. A successful plaintiff can receive their actual damages while also forcing the infringer to disgorge its profits from the infringement, or can alternatively obtain statutory damages of up to $150,000 per infringed work.
4 Many articles could be (and have been) written on abusive and overzealous DMCA takedown notices, especially since the development of automated takedown services that can act without human interaction. For brevity’s sake, this article won’t dive into those deep waters.
5 If you run a website, you should assume that you’re a service provider under the DMCA.


Copyright © 2020 Ryley Carlock & Applewhite. A Professional Association. All Rights Reserved.

For more on the Digital Millennium Copyright Act, see the National Law Review Intellectual Property law section.