Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTELLECTUAL PROPERTY STRATEGIES August 19, 2010.

Similar presentations


Presentation on theme: "INTELLECTUAL PROPERTY STRATEGIES August 19, 2010."— Presentation transcript:

1 INTELLECTUAL PROPERTY STRATEGIES August 19, 2010

2 Panelists David Starr The Nath Group Mary Boney Denison Manelli, Denison and Selter Judy Branzelle, General Counsel Goodwill Industries International Inc.

3 What is Intellectual Property? Your organization’s DNA that makes it unique such as: Patents,Trademarks Patents,Trademarks Copyrights Copyrights Trade Secrets Trade Secrets Here are 5 easy rules to protect your IP

4 Rule 1: Select a Strong Mark Search and register in the U.S. PTO. Search and register in the U.S. PTO. Use trademark registration symbols ®. Use trademark registration symbols ®. Vigilantly police the mark (watch services). Vigilantly police the mark (watch services). Keep track of required maintenance filings so the mark doesn’t abandon. Keep track of required maintenance filings so the mark doesn’t abandon.

5 WHAT TO WATCH OUT FOR Trademark infringement DilutionCounterfeits Defamatory speech Brand tarnishment Impersonation False or misleading advertising

6 RULE 2: Control Your Domain Names TIP: Appoint a Domain Name Strategist at your company. -Register and maintain domain names and usernames on key sites. - How many do you need? - Consider defensive filing strategies. - Do you want a watch service? - Would you spend $185,000 to become a domain registry for your most important mark? E.g. “.ibm”

7 RULE 3: Use Licenses Who are you willing to license material to? Who are you willing to license material to? For what purpose? For what purpose? For how long- 1 yr, 5 yrs, forever? For how long- 1 yr, 5 yrs, forever? How will you verify no further use when the license expires? How will you verify no further use when the license expires?

8 RULE 4: Police Use of Your Marks on Social Media Sites Determine most relevant sites for monitoring. Determine most relevant sites for monitoring. –Facebook, MySpace and other social networking sites to make certain fan uses do not misrepresent as “official”. –Twitter – make certain users are not impersonating corporate personnel or the corporation itself. –Second Life and other virtual worlds that may feature virtual versions of a company and/or its products. –e-Bay for counterfeit products.

9 RULE 5: Protect Your Copyrighted Materials –File for copyright protection in important assets. –Prominently display IP protection: © 2010 H. David Starr –Understand Scope of Licenses. –Ensure you are not using copyright protected music or photographs, or that you have a proper license. –Sharing Content on Web does not divest copyright ownership.

10 GOODWILL ® GII owns marks, license to members through Member Agreement. GII owns marks, license to members through Member Agreement. Consistent version of mark; Brand manual, ®, TM. Consistent version of mark; Brand manual, ®, TM. Use watch services, member report infringers, dedicated social media person. Use watch services, member report infringers, dedicated social media person. Use templates for licensing, monitor end dates. Use templates for licensing, monitor end dates.

11 CONTACT US- We’re Glad to Help! Mary Boney Denison Mary Boney Denison Manelli Denison & Selter PLLC H. David Starr H. David Starr Nath Law Group NATH (6284) Judy Branzelle Judy Branzelle Goodwill Industies International Inc


Download ppt "INTELLECTUAL PROPERTY STRATEGIES August 19, 2010."

Similar presentations


Ads by Google