© 2012 Sean C. Crandall, all rights reserved. UTSA CITE Entrepreneurship Boot Camp Intellectual Property for Entrepreneurs Feb. 8, 2013 Sean C. Crandall.

Slides:



Advertisements
Similar presentations
What’s Yours In Mine: Intellectual Property and Copyright For the Magazine Media Publisher Jim Sawtelle Partner and Co-leader, Media, Publishing and Marketing.
Advertisements

© 2012 Sean C. Crandall, all rights reserved. UTSA CITE Entrepreneurship Boot Camp Intellectual Property for Entrepreneurs Jan. 28, 2012 Sean C. Crandall.
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
Patents Copyright © Jeffrey Pittman. Pittman - Cyberlaw & E- Commerce 2 Legal Framework of Patents The U.S. Constitution, Article 1, Section 8:
Intellectual Property Ronan Fitzpatrick School of Computing, Dublin Institute of Technology. September 2008.
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Chapter 7.5 Intellectual Property Content, Law and Practice.
Intellectual Property An intangible asset, considered to have value in a market, based on unique or original human knowledge and intellect. Intellectual.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Applications for Intellectual Property International IP Protection IP Enforcement Protecting Software JEFFREY L. SNOW, PARTNER NATIONAL SBIR/STTR CONFERENCE.
Intellectual Property and Commercializing Technology Identifying, Protecting, Growing and Commercializing Intellectual Property in both Academic and Commercial.
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
1 Intellectual Property Basics What is intellectual property? Intellectual properties are intangible products of the mind. These include:
INTRODUCTION TO INTELLECTUAL PROPERTY LAW Professor Fischer Class 1: Introduction August 20, 2009.
IP=Increased Profits How to Make Your IP Work For You Rachel Lerner COSE Fall 2006.
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
Intellectual Property Law for the Non-IP Lawyer Eugene J. Han, Senior Legal Counsel O’Reilly Auto Parts.
Intellectual Property and Internet Law
What is copyright? the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or.
Presented by: PAMELA C. GAVIN A trademark or service mark is any distinctive word, name, symbol or device, used by a person or entity to indicate.
Chapter 25 Intellectual Property Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
Intro to Intellectual Property 05/13/2015. Exponential Inventor Intro to Intellectual Property 05/13/2015 Why is IP Important? Everyone makes a big deal.
INTELLECTUAL PROPERTY 101 & Software Audits Institute of Management Accountants January 20, 2010 Presented By: Jay Richardson & Allison Brennan Attorneys.
MSE602 ENGINEERING INNOVATION MANAGEMENT
I DENTIFYING AND P ROTECTING I NTELLECTUAL P ROPERTY Tyson Benson
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 7 Intellectual Property.
Intellectual Property 101 For Entrepreneurs HMC Entrepreneurial Conference Claremont, California March 6, 2004 Stephen H. LaCount.
Intellectual Property GE 105 Introduction to Engineering Design.
1 Patent Law in the Age of IoT The Landscape Has Shifted. Are You Prepared? 1 Jeffrey A. Miller, Esq.
Patent Law Presented by: Walker & Mann, LLP Walker & Mann, LLP 9421 Haven Ave., Suite 200 Rancho Cucamonga, Ca Office.
Introduction to IP Ellen Monson Director Intellectual Property Office University of Cincinnati.
5020 Montrose Blvd., Suite 750 Houston, TX (fax) (mobile) WHAT IN-HOUSE COUNSEL NEEDS TO KNOW ABOUT IP August.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
Intellectual Property and Entrepreneurship Presented at IEEE/ComSoc, Boston Section June 2, 2011 George Jakobsche For additional information, see accompanying.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
© 2012 Sean C. Crandall, all rights reserved. UTSA CITE Entrepreneurship Boot Camp Intellectual Property for Entrepreneurs Oct. 6, 2012 Sean C. Crandall.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Fundamentals of Business Law Summarized Cases, 8 th Ed., and Excerpted Cases, 2 nd Ed. ROGER LeROY MILLER Institute for University Studies Arlington, Texas.
Intellectual Property Chapter 5. Intellectual Property Property resulting from intellectual, creative processes—the products of an individual’s mind.
Intellectual Property & Export Controls Presented by Madelynne Farber, Sandia Vincent Branton, Pacific Northwest Murray Baxter, Savannah River May 26,
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
An Intellectual Property Primer
©2006 Prentice Hall 12-1 Chapter 12 Entrepreneurship: Successfully Launching New Ventures, 1/e Bruce R. Barringer R. Duane Ireland.
INTELLECTUAL PROPERTY LAW FOR NON-IP PRACTITIONERS: ETHICS AND ISSUE SPOTTING FOR EFFECTIVE REPRESENTATION Philip Furgang Furgang & Adwar, L.L.P. New York,
Intellectual Property Basics: What Rules Apply to Faculty, Staff, and Student Work Product? Dave Broome Vice Chancellor and General Counsel October 15,
Margaret Polson Polson Intellectual Property Law, PC US Design Patents Overview.
Chapter 10 Intellectual Property Rights Twomey, Business Law and the Regulatory Environment (14th Ed.)
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
Fundamentals of Intellectual Property
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
1 Mark Twain: "The reports of my death are greatly exaggerated."
Boston New York San Francisco Washington, DC Woods Hole Oceanographic Institute Understanding Intellectual Property June 4, 2008.
Entrepreneurship CHAPTER 8 SECTION 1.  When you develop a new product or service, you create an asset that must be protected.  Intellectual property.
Patent Review Overview Summary of different types of Intellectual Property What is a patent? Why would you want one? What are the requirements for patentability?
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 5 Intellectual Property and Internet.
Chapter 10 Intellectual Property and Internet Law.
Technology Transfer Office
Brief Overview of Research Intellectual Property (IP)
Essentials of the legal environment today, 5e
Intellectual Property
U. S. Copyright Basics.
INTELLECTUAL PROPERTY AND CYBER PIRACY
Intellectual Property and Commercializing Technology
TRADEMARKS, SERVICE MARKS and COPYRIGHTS LEGAL PROTECTIONS AND USE AS ASSETS FOR CONSULTANTS AND EARLY STAGE BUSINESS By Robert A. Adelson, Esq. Partner,
Presentation transcript:

© 2012 Sean C. Crandall, all rights reserved. UTSA CITE Entrepreneurship Boot Camp Intellectual Property for Entrepreneurs Feb. 8, 2013 Sean C. Crandall Registered Patent Attorney Jackson Walker L.L.P

Objectives You want to make money Big Business has all the money, and you can’t compete with them Your assets are worthless EXCEPT –Patents –Copyright –Trademark –Trade Secret

Quiz A B

© 2012 Sean C. Crandall, all rights reserved. PATENTS

Patents What are they? –Right to exclude others from making, selling, using, or importing the claimed subject matter. –Does not grant a right to make, use, sell, or import. Duration –About 20 years

Subject Matter Statutory Subject Matter: –Machines –Compositions –Articles of manufacture –Software (sort of) “Everything under the sun made by man” (sort of)

Bilski Machine or Transformation Test –Tied to a “particular machine” Need guidance on whether a general-purpose computer is a “particular machine” –Transforms matter Transforming data that directly represent matter may be sufficient MoT is absolutely not the sole test for method claim eligibility. But it is the only test that matters.

Avoid Subject Matter Problems Designing Around Bilski –Tie in hardware where possible (“A method for removing red eye from a photograph comprising … receiving a digital photograph from a digital camera ….”) –Beauregard claims are now in question. (Cybersource Corp. v. Retail Decisions, Inc., No (Fed. Cir. Aug. 16, 2011)).

Statutory Requirements Utility Novelty Nonobviousness

Utility (Family Values)

Utilitaire Haute Couture

Utility for the Gentlemen

Utility Catch 22

Utility (Get Rowdy!)

Novelty “A translating device comprising [A] a body of semiconductive material [B] having zones of opposite conductivity type [C] separated by a barrier, [D] an ohmic connection to each zone remote from the barrier, and [E] a rectifying contact on one zone closely adjacent to the barrier.” (U.S. Pat. 2,502,488)

Patent Claims Invention (Elements A, B, C, D, E) Subtract Prior Art: -ABC Subtract Obvious Improvements: -ABCD Patentable Claim: ABCDE –Note that ABC is a better claim if you can get it. If your attorney leaves “killer features” out of some of your claims, that may be a good thing.

Patent Infringement Claim No.ElementsAccused DeviceInfringes?Claim Value 1.AA AB ABC ABCD Yes Very High 2.ABA AB ABC ABCD No Yes High 3.ABCA AB ABC ABCD No Yes Moderate 4.ABCDA AB ABC ABCD No Yes Low

Patent Drafting Get a registered patent attorney Do not ever, under any circumstances, try to write a patent yourself. No, not even if you’re really smart. No, not even you. Your tax attorney can’t write a patent for you. You need a registered patent attorney.

You’re Doomed SMITH-LEAHY MARCH 15, 2013 YOU’RE DOOMED

Priority Senate passed Smith-Leahy “America Invents Act” Sept. 8, Written by Big Business, for Big Business.

Priority (35 U.S.C § 102(a)(1)) “A person shall be entitled to a patent unless the claimed invention was…” –the claimed invention was patented, –described in a printed publication, –or in public use, –on sale, or –otherwise available to the public before the effective filing date of the claimed invention

“First Inventor to File” (102(a)(2)) “Or…” in an application for patent …[that] names another inventor and was effectively filed before the effective filing date of the claimed invention.

One Year Grace Period (Sort of…) 102(a)(1) “disclosure” doesn’t count if— made 1 year or less before and –(A) …made by the inventor …or by another who obtained the subject matte disclosed directly or indirectly from the inventor …; or –(B) the subject matter disclosed had … been publicly disclosed by the inventor … or another who obtained the subject matte disclosed directly or indirectly from the inventor or[.]

When should you file your patent application? How long can you safely wait before filing?

Design Patents =$1e9

© 2012 Sean C. Crandall, all rights reserved. TRADEMARK

Quiz A B

Trademark What is it? –Protection for “source identifiers.” –Right to exclude others from riding the coattails of your good will. Duration –Perpetual if: Continual use Continues to be a source identifier

Hypothetical E incorporates under the name “Seraph Image Manipulation LLC” and receives an assumed name certificate. B starts selling a software program called “Seraphimage.” What result?

Priority Incorporation and Assumed Name Certificate HAVE NO TRADEMARK VALUE

Priority Acquiring Priority –Use in commerce –File federal TM application Including Intent to Use Knowing junior user loses –Actual notice –Constructive notice

Genericization Victim of your own success All of the following used to be trademarks: –zipper –thermos –escalator –linoleum –aspirin –heroin –butterscotch –netbook

Genericization Trademarks in Danger: –Xerox –Kleenex –Vaseline –Band-Aid –Rollerblade Saved by Timely Obsolescence? –Polaroid –Walkman (but…) If it ceases to be a source identifier and instead comes to identify the goods themselves, it is no longer a trademark.

Trademark Strength Generic –“Hammer” (for hammers) –Image Editor (for image editing software) –Zipper (even though it used to be a strong trademark) Descriptive –“Delicious Tamales” –“Alamo [Anything]” (if in San Antonio) –Can be protectable if you use it long enough –Initially weak/narrow –But … “McDonald’s”

Trademark Strength Suggestive –“Rhino” (hardened bed linings) –“Pier One” (sale of retail imported goods) –“Panda Express” (Chinese restaurants) –Protectable Arbitrary and Fanciful –“Oracle” (Does not actually predict the future) –“Kodak” (Doesn’t mean anything in any language) –Protectable and legally strong –Initially weak from a marketing standpoint –With time, can become practically invincible (Exxon), except genericization

Infringement Elements of a Lawsuit –Priority –Protectability –Likelihood of Confusion

Infringement Likelihood of Confusion –Jury Question Do you find by a preponderance of the evidence that potential customers are likely to confuse “Sign of the Beefeater” (restaurant) with “Beefeater” (gin)?

Action Steps Promptly file a federal application –Nationwide priority –Helps make the mark protectable –Trumps state registrations

Action Steps Investigate junior users before sending nasty letters –If mark is not registered, may have territorial rights. –If junior user has rights, your nasty letter makes his case for him

© 2012 Sean C. Crandall, all rights reserved. COPYRIGHT

Copyright What is it? Right to exclude others from copying the protected work. Exclusive right to make derivative works.

Duration Life +70 (individual author) 95 – 120 years (works for hire) Created before Jan. 1, 1978 = different rules (very messy). Published in U.S. before 1923 = public domain.

Acquiring a Copyright When you play God, the result is copyrighted –Except: Ideas, methods, functional products, de minimis creativity ProtectedNot Protected ExpressionIdeas and Facts FormFunction and Content CreativityEffort and Aggregation

Ownership Individual—Vests automatically Employee & Works for Hire—Vests in employer if in the course and scope of employment. Contract Work (esp. s/w)—Vests immediately in contractor. Software is not work for hire unless by an employee.

Hypothetical E swears a blood oath to convey copyright to B in the presence of a Catholic Priest, Jewish Rabbi, Mormon Bishop, Protestant Pastor and Baptist Preacher. Result?

Assignments and Licenses Assignments must be in writing Exclusive licenses must be in writing Non-exclusive licenses may be in writing, oral, by course of performance, or implied by the circumstances.

Tiers of Protection Automatic –Attaches at moment of creation Notice –(c) 2012 Your Name, All rights reserved. Registration –Online form at –$40 filing fee –Easy Peasy! (Except maybe software)

Hypothetical E writes software. B hires E’s former employee, who copies code (abt. 1%). Total sales = $50M. E registers and sues. Defenses –No knowledge. –Prior non-infringing version successful. –Can’t prove lost sales. What result?

Damages (w/out Timely Reg.) Losses$0 Infringer’s Profits$0 Statutory Damages$0 Attorneys’ Fees$0 Nominal Damages$1 Total Damages$1 Attorneys’ Fees Incurred: $350,000

Hypothetical Same as before, but E registers one day before B starts infringing.

Damages (Timely Reg.) Losses$0 Infringer’s Profits$0 Statutory Damages$30,000 ($150k if willful) Attorneys’ Fees$350,000 Nominal Damages$0 Total Damages$500,000 Attorneys’ Fees Incurred: $350,000

Infringement There must be copying. –Substantial similarity + access. Compare allegedly infringing work to registered work (not necessarily the work copied). Abstraction –The state operates games in which people kill each other to entertain the elite citizens. –A girl named Katnip volunteers to participate in the annual Anger Games to save her sister, and a boy named Peter, who is in love with Katnip, is also selected. Katnip and Peter form an alliance and defeat the others, but then decide to take their own lives rather than kill each other …

Hypothetical E requires online activation (stops working after 30 days). H purchases a legal copy but hacks around activation key. Has H violated E’s copyright?

DMCA DMCA § 1201: “No person shall circumvent a technological measure that effectively controls access to a work protected under this title.” No copyright infringement is required Ownership and fair use are not valid defenses –Maybe—see MGE UPS Systems Inc v. GE Consumer and Industrial Inc, et al., (5th Cir. Jul. 20, 2010).

Benefits Why use “effective technological measures”? –May get attorneys’ fees and statutory damages even without timely registration Up to $2,500 per act of circumvention. –Stiff criminal penalties

DMCA Exceptions Examples: –Breaking CSS on DVDs for criticism or commentary (notably, not to just watch a DVD that you lawfully own). –Jailbreaking your iPhone. –Obsolete or damaged dongles.

© 2012 Sean C. Crandall, all rights reserved. TRADE SECRET

Trade Secret Elements –It’s a SECRET. –Confers a competitive advantage –Reasonable efforts to keep it SECRET Examples: –Formula for Coca-Cola –The Colonel’s 11 herbs and spices –Your source code

Trade Secret Protecting a Trade Secret –No registration –KEEP IT A SECRET! –Non-disclosure agreements (get an attorney) –Employee confidentiality agreements (the more draconian, the better) –Posted notices Duration –As long as you KEEP IT SECRET

Security Think ahead –Which story do you want the infringer to tell the jury? “There were hundreds of copies of the process just lying around everywhere. I didn’t even realize it was considered secret.” vs. “After agreeing to the $10,000 penalty for disclosing the secret process, I disabled the armed guard with a drugged dart. I had to wear an insulating body suit to defeat the heat sensors, then climb up into the air duct. Getting around the laser grid took some time, but the real problem was the motion sensors. I spent hours getting across the room. Since the safe was impossible to crack, I had to bug the CEO’s bedroom and listen to him talk in his sleep for months. Then I had to painstakingly copy the process by hand, since it was on blue non-copy paper. Once I had my copy, I had to carefully replace the wax seal and mark it with the duplicate signet ring I had carefully constructed from the putty impression of the real signet ring I’d gotten when I …”

Hypothetical E develops red eye removal algorithm. E hires 10 programmers. Signed confidentiality agreements. Copies of process individually water marked. Policy is to keep process in locked drawers. Flow chart posted by receptionists desk. Weekly meetings to discuss security program. What result?

Security Designing a Security Program –Put Everyone on Notice –Signed Confidentiality Agreements –Restrict Access –Log Access –Termination Procedures –Non-compete Agreements –Periodic Audits

© 2012 Sean C. Crandall, all rights reserved. Questions?

© 2012 Sean C. Crandall, all rights reserved. Support Materials Protecting Software: IP Basics: A Practical Guide to the GNU GPL: