Hiring employees is important for scaling and growth. However there are IP issues related to hiring employees. Margot Davis, Junior Partner at Innovate LLP, and I co-authored a blog post on IP issues for hiring employees. This blog post is available at:
https://innovatellp.com/2019/12/02/intellectual-property-ip-issues-for-hiring-employees/
Ramesh Rajaduray covers topics of interest in intellectual property to companies and inventors in the high technology space.
Monday, December 2, 2019
Friday, November 8, 2019
IP issues when working with contractor or on contract
Companies and individuals work a lot with contractors or on a contract basis. Margot Davis, Junior Partner at Innovate LLP, and I co-authored a blog post on IP considerations when working with contractor or on contract. This blog post is available at:
https://innovatellp.com/2019/11/06/ip-issues-when-working-with-contractor-or-on-contract/
https://innovatellp.com/2019/11/06/ip-issues-when-working-with-contractor-or-on-contract/
Monday, March 4, 2019
Maximizing portfolio value through smart claim drafting – claim diversification
This is part of an ongoing series
of blog posts aimed at helping patent applicants in maximizing the value of
their portfolio through smart and savvy claim drafting.
As explained previously, three very important factors in determining value of patent portfolio
value are:
- Likelihood of use of the claimed invention by attractive target companies,
- Ease of enforcement of infringement of the patent claims, and
- Difficulty of invalidation of the patent claims.
- Two well-known types of patent
claims are system and method claims. A system claim covers the structural
features of an apparatus which has been invented. A method claim is usually a
series of steps describing how an invention is to be applied. Each jurisdiction
treats system and method claims differently from other jurisdictions. Since the
value of a patent portfolio is heavily driven by the value of the United States
(US) patents within the portfolio, the rest of this discussion will focus on US
patents.
Under US law each of these types
of claims have advantages and disadvantages when it comes to ease of
infringement and difficulty of invalidation. System claims may be more
difficult to enforce than method claims, because of the need to point to an
underlying apparatus. However this potentially makes system claims more
difficult to invalidate. Also, to prove direct infringement of a system claim
via use, the Federal Circuit Court has stated that in order to prove an
infringing “use” of a system under 35 USC 271(a), a patentee must demonstrate
use (i.e., “control” and “benefit”) of the claimed system by an accused direct
infringer. Further, the Court held that “to use a system, a person must control
(even if indirectly) and benefit from each claimed component.” The direct or
indirect control required “is the ability to place the system as a whole into
service.” For make and sale, the manufacturer would be subject to a direct
infringement claim for having made, sold, or offered to sell the infringing apparatus.
Method claims may be easier to
enforce due to not needing to show an underlying apparatus. However this also
makes them easier to invalidate. Furthermore there are other legal defences
which can be used against method claims. For example, the Federal Circuit Court ruled
in NTP vs. RIM (2005) that for a method claim to be infringed by a process,
every step in the process must be practiced in the US. In performing its
analysis, the Court noted that Congress has expressed the view that method
claims can only be infringed under the “use” category of infringement, and held
that RIM had not sold, offered for sale, or imported the entirety of the
method. If a step of the process is practiced outside the US, then the process
does not infringe the method claim. The Federal Circuit has confirmed this
reasoning in subsequent cases. A major issue with method claims in the US is
“divided” infringement, that is, where different parties perform the steps
described.
Claim diversification, that is,
drafting different types of claims, is a good strategy to improve scope of
coverage by targeting multiple potential infringement scenarios.
Here are two examples of how
claim diversity can be used to improve the scope of protection:
Example 1: Patent for a software application or “app”
A high level approach to utilize
claim diversification in a patent for an app is:
1) Draft a set of system claims targeted towards
the implementation of the system on the client side or user device side: This
set of claims could be used to target either the producer of the app or the
vendor of the app, as these parties would have made and sold the app.
2) If the app performs functions on the
server-side, then it is worthwhile to draft a set of system claims targeted
towards the implementation of the system on the server-side. This set of system
claims could be used to target a service provider.
3) Draft one or more sets of method claims targeted
towards the producer and/or the vendor of the app, using the previously
described three step approach for writing targeted method claims towards
software app producers/vendors.
Example 2: Patent for a physical product
A high level approach to utilize
claim diversification for a patent for a physical product is:
1) Draft one or more sets of system claims targeted
towards the physical product: This set of claims could be used to target the
manufacturer of the physical product or the vendor of the physical product, as
these parties would have made or sold the physical product.
2) Draft one or more sets of method claims targeted
towards the manufacturer and/or the vendor of the physical product, using the
previously described three step approach for writing targeted method claims
towards physical product manufacturers/vendors.
As explained previously, the fact pattern of
each case may be unique; and the future state of US patent law is uncertain and
unpredictable. A further technique which can be employed by a patent strategist
to address both these issues is by filing continuation applications to keep the
family alive. The strategist can therefore adapt the claims to ever-changing
patent law and to address different fact patterns and potential targets.
Thursday, February 7, 2019
New USPTO Patent Guidelines and Important Considerations for Software Patent Applications
The USPTO issued new patent subject matter eligibility guidelines on January 7, 2019, which may improve certainty and make it easier to obtain software patents. Margot Davis, Junior Partner at Innovate LLP, and I co-authored a blog post on important considerations for software patent applications in light of these new guidelines. This blog post is available at:
https://innovatellp.com/2019/02/07/new-uspto-patent-guidelines-and-important-considerations-for-software-patent-applications/
https://innovatellp.com/2019/02/07/new-uspto-patent-guidelines-and-important-considerations-for-software-patent-applications/
Wednesday, January 2, 2019
Cybersecurity and intellectual property flight risk reduction
Cybersecurity has become
increasingly important and relevant to businesses. According to the Canadian federal
government, about 70% of Canadian businesses have been victims of cyberattacks. According to IBM the
average consolidated total cost of a data breach in 2016 was CAD 4 million.
This cost is likely to further increase.
A major reason for
cybersecurity is the protection of trade secrets. In Canada, trade secrets are,
as explained by Justice Biron in the Positron
Inc. v. Desroches et al. case “…usually formulas, manufacturing processes
unique to its owner and which have been revealed confidentially to an employee”.
Justice Biron further explained that “[a trade secret is] knowledge or
‘savoir-faire’ belonging to the employer and revealed by him for the sole
purpose of permitting the employee to produce what the trade secret enables him
to do.”
In the United States (US), the
Defend Trade Secrets Act (DTSA) defines a trade secret as “all forms and types
of financial, business, scientific, technical, economic, or engineering
information, including patterns, plans, compilations, program devices,
formulas, designs, prototypes, methods, techniques, processes, procedures,
programs, or codes, whether tangible or intangible, and whether or how stored,
compiled, or memorialized physically, electronically, graphically,
photographically, or in writing if (A) the owner thereof has taken reasonable
measures to keep such information secret; and (B) the information derives
independent economic value, actual or potential, from not being generally known
to, and not being readily ascertainable through proper means by, another person
who can obtain economic value from the disclosure or use of the information.”
A key characteristic of trade
secrets is that ownership is tied to confidentiality. If a trade secret is
discovered or revealed to the public, then the organization ceases to own the
trade secret. As explained in a previous blog post,
IP flight risk is the risk of losing valuable IP from a company. Specifically
then, the risk of losing a valuable trade secret is tied to its risk of loss of
confidentiality.
Then for trade secrets, IP flight risk reduction practice ties
together with cybersecurity policy closely. As explained previously, IP flight
risk reduction comprises three steps:
1) Instituting
an “IP aware” mindset within the company via the formulation, implementation
and dissemination of an effective IP policy. Such a policy will:
a) prompt
the employee to proactively consider whether valuable IP is being created;
b) explain
the processes necessary to identify and secure the ownership of the IP; and
c) identify
the key people and their responsibilities in carrying out the processes.
2) Securing
the company’s IP ownership by using appropriate IP ownership clauses, and
3) Running
periodic IP mining or discovery sessions to identify IP created within the
company.
Applying these steps specifically to trade secrets within the
cyber realm:
Step 1: Instituting an “IP aware” mindset within the company via
the IP policy.
A well formulated IP policy will:
a. Prompt
the employee to proactively consider whether a valuable trade secret is being
created;
b. Explain
the processes necessary to identify and secure the confidentiality of the trade
secret, including cybersecurity processes; and
c. Identify
the key people for process implementation, including cybersecurity processes.
Step 2: Securing the company’s trade secret ownership via
agreements or clauses in agreements
The following should be used to maintain trade secret confidentiality:
a. Appropriate
agreements such as non-disclosure agreements, including outlines of “best
practice” cybersecurity measures.
b. Appropriate
clauses in agreements such as employee, contractor and partnership agreements,
including cybersecurity specific clauses.
Step 3: Running periodic mining or discovery sessions
Periodic IP mining or discovery
sessions should be utilized to discover and document trade secrets created
within the company. By doing this, vital trade secrets can be identified and ownership
of the trade secret can also be documented. Finally, the value and importance
of the trade secret can also be documented. The cybersecurity team should be
informed of the results of these processes.
Good IP flight risk management practice complements cybersecurity
in the following ways:
- Identifying
valuable trade secrets as a precursor to being secured: Good
identification results in better tracking and securing of relevant trade secrets,
resulting in more complete coverage.
- Prioritizing
trade secrets based on the importance to the organization: Once
trade secrets have been identified and the value to the organization has been
determined, the cybersecurity team can set the required level of protection
accordingly.
- Better
regulation of access: As part of the prioritization process, the cybersecurity team can
determine who has access and provide temporary access on an “as-needed” basis
to trusted employees. This makes management and securing of trade secrets
easier.
- Deterrent
to misuse and misappropriation: If an action involves misuse
or misappropriation of a trade secret, then the party carrying out the action
may be punished. The determination of misuse/misappropriation and corresponding
punishment depend heavily on factors such as:
o
measures taken to maintain confidentiality;
o
the
degree to which the owner regards and treats the information as confidential;
o
the
degree to which the recipient regards and treats the information as
confidential; and
o
whether
the recipient ought to have known that the information was confidential;
Therefore
the combination of a strong IP flight risk reduction strategy and cybersecurity
policy makes it likely that misuse or misappropriation is likely to result in
harsh punishment. It also signals message that the organization takes trade
secret protection seriously. Together these act as deterrents to misuse and
misappropriation.
Subscribe to:
Posts (Atom)