Monday, December 2, 2019

Intellectual property (IP) issues for hiring employees

Hiring employees is important for scaling and growth. However there are IP issues related to hiring employees. Margot Davis, Junior Partner at Innovate LLP, and I co-authored a blog post on IP issues for hiring employees. This blog post is available at:

https://innovatellp.com/2019/12/02/intellectual-property-ip-issues-for-hiring-employees/

Friday, November 8, 2019

IP issues when working with contractor or on contract

Companies and individuals work a lot with contractors or on a contract basis. Margot Davis, Junior Partner at Innovate LLP, and I co-authored a blog post on IP considerations when working with contractor or on contract. This blog post is available at:

https://innovatellp.com/2019/11/06/ip-issues-when-working-with-contractor-or-on-contract/

Monday, March 4, 2019

Maximizing portfolio value through smart claim drafting – claim diversification

This is part of an ongoing series of blog posts aimed at helping patent applicants in maximizing the value of their portfolio through smart and savvy claim drafting.

As explained previously, three very important factors in determining value of patent portfolio value are:
  • Likelihood of use of the claimed invention by attractive target companies,
  • Ease of enforcement of infringement of the patent claims, and
  • Difficulty of invalidation of the patent claims.

-   Two well-known types of patent claims are system and method claims. A system claim covers the structural features of an apparatus which has been invented. A method claim is usually a series of steps describing how an invention is to be applied. Each jurisdiction treats system and method claims differently from other jurisdictions. Since the value of a patent portfolio is heavily driven by the value of the United States (US) patents within the portfolio, the rest of this discussion will focus on US patents.

Under US law each of these types of claims have advantages and disadvantages when it comes to ease of infringement and difficulty of invalidation. System claims may be more difficult to enforce than method claims, because of the need to point to an underlying apparatus. However this potentially makes system claims more difficult to invalidate. Also, to prove direct infringement of a system claim via use, the Federal Circuit Court has stated that in order to prove an infringing “use” of a system under 35 USC 271(a), a patentee must demonstrate use (i.e., “control” and “benefit”) of the claimed system by an accused direct infringer. Further, the Court held that “to use a system, a person must control (even if indirectly) and benefit from each claimed component.” The direct or indirect control required “is the ability to place the system as a whole into service.” For make and sale, the manufacturer would be subject to a direct infringement claim for having made, sold, or offered to sell the infringing apparatus.

Method claims may be easier to enforce due to not needing to show an underlying apparatus. However this also makes them easier to invalidate. Furthermore there are other legal defences which can be used against method claims. For example, the Federal Circuit Court ruled in NTP vs. RIM (2005) that for a method claim to be infringed by a process, every step in the process must be practiced in the US. In performing its analysis, the Court noted that Congress has expressed the view that method claims can only be infringed under the “use” category of infringement, and held that RIM had not sold, offered for sale, or imported the entirety of the method. If a step of the process is practiced outside the US, then the process does not infringe the method claim. The Federal Circuit has confirmed this reasoning in subsequent cases. A major issue with method claims in the US is “divided” infringement, that is, where different parties perform the steps described.

Claim diversification, that is, drafting different types of claims, is a good strategy to improve scope of coverage by targeting multiple potential infringement scenarios.

Here are two examples of how claim diversity can be used to improve the scope of protection:

Example 1: Patent for a software application or “app”

A high level approach to utilize claim diversification in a patent for an app is:

1)  Draft a set of system claims targeted towards the implementation of the system on the client side or user device side: This set of claims could be used to target either the producer of the app or the vendor of the app, as these parties would have made and sold the app.

2)  If the app performs functions on the server-side, then it is worthwhile to draft a set of system claims targeted towards the implementation of the system on the server-side. This set of system claims could be used to target a service provider.

3)  Draft one or more sets of method claims targeted towards the producer and/or the vendor of the app, using the previously described three step approach for writing targeted method claims towards software app producers/vendors.

Example 2: Patent for a physical product

A high level approach to utilize claim diversification for a patent for a physical product is:

1)  Draft one or more sets of system claims targeted towards the physical product: This set of claims could be used to target the manufacturer of the physical product or the vendor of the physical product, as these parties would have made or sold the physical product.

2)  Draft one or more sets of method claims targeted towards the manufacturer and/or the vendor of the physical product, using the previously described three step approach for writing targeted method claims towards physical product manufacturers/vendors.

As explained previously, the fact pattern of each case may be unique; and the future state of US patent law is uncertain and unpredictable. A further technique which can be employed by a patent strategist to address both these issues is by filing continuation applications to keep the family alive. The strategist can therefore adapt the claims to ever-changing patent law and to address different fact patterns and potential targets.

Thursday, February 7, 2019

New USPTO Patent Guidelines and Important Considerations for Software Patent Applications

The USPTO issued new patent subject matter eligibility guidelines on January 7, 2019, which may improve certainty and make it easier to obtain software patents. Margot Davis, Junior Partner at Innovate LLP, and I co-authored a blog post on important considerations for software patent applications in light of these new guidelines. This blog post is available at:

https://innovatellp.com/2019/02/07/new-uspto-patent-guidelines-and-important-considerations-for-software-patent-applications/

Wednesday, January 2, 2019

Cybersecurity and intellectual property flight risk reduction



Cybersecurity has become increasingly important and relevant to businesses. According to the Canadian federal government, about 70% of Canadian businesses have been victims of cyberattacks. According to IBM the average consolidated total cost of a data breach in 2016 was CAD 4 million. This cost is likely to further increase.

A major reason for cybersecurity is the protection of trade secrets. In Canada, trade secrets are, as explained by Justice Biron in the Positron Inc. v. Desroches et al. case “…usually formulas, manufacturing processes unique to its owner and which have been revealed confidentially to an employee”. Justice Biron further explained that “[a trade secret is] knowledge or ‘savoir-faire’ belonging to the employer and revealed by him for the sole purpose of permitting the employee to produce what the trade secret enables him to do.”

In the United States (US), the Defend Trade Secrets Act (DTSA) defines a trade secret as “all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if (A) the owner thereof has taken reasonable measures to keep such information secret; and (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, another person who can obtain economic value from the disclosure or use of the information.”

A key characteristic of trade secrets is that ownership is tied to confidentiality. If a trade secret is discovered or revealed to the public, then the organization ceases to own the trade secret. As explained in a previous blog post, IP flight risk is the risk of losing valuable IP from a company. Specifically then, the risk of losing a valuable trade secret is tied to its risk of loss of confidentiality.

Then for trade secrets, IP flight risk reduction practice ties together with cybersecurity policy closely. As explained previously, IP flight risk reduction comprises three steps:

          1) Instituting an “IP aware” mindset within the company via the formulation, implementation and dissemination of an effective IP policy. Such a policy will:
a) prompt the employee to proactively consider whether valuable IP is being created;
b) explain the processes necessary to identify and secure the ownership of the IP; and
c) identify the key people and their responsibilities in carrying out the processes.
        2) Securing the company’s IP ownership by using appropriate IP ownership clauses, and
        3) Running periodic IP mining or discovery sessions to identify IP created within the company.

Applying these steps specifically to trade secrets within the cyber realm:

Step 1: Instituting an “IP aware” mindset within the company via the IP policy.

A well formulated IP policy will:

a.       Prompt the employee to proactively consider whether a valuable trade secret is being created;
b.      Explain the processes necessary to identify and secure the confidentiality of the trade secret, including cybersecurity processes; and
c.       Identify the key people for process implementation, including cybersecurity processes.

Step 2: Securing the company’s trade secret ownership via agreements or clauses in agreements

The following should be used to maintain trade secret confidentiality:

a.      Appropriate agreements such as non-disclosure agreements, including outlines of “best practice” cybersecurity measures.
b.      Appropriate clauses in agreements such as employee, contractor and partnership agreements, including cybersecurity specific clauses.

Step 3: Running periodic mining or discovery sessions

Periodic IP mining or discovery sessions should be utilized to discover and document trade secrets created within the company. By doing this, vital trade secrets can be identified and ownership of the trade secret can also be documented. Finally, the value and importance of the trade secret can also be documented. The cybersecurity team should be informed of the results of these processes.

Good IP flight risk management practice complements cybersecurity in the following ways:

-       Identifying valuable trade secrets as a precursor to being secured: Good identification results in better tracking and securing of relevant trade secrets, resulting in more complete coverage.

-       Prioritizing trade secrets based on the importance to the organization: Once trade secrets have been identified and the value to the organization has been determined, the cybersecurity team can set the required level of protection accordingly.

-       Better regulation of access: As part of the prioritization process, the cybersecurity team can determine who has access and provide temporary access on an “as-needed” basis to trusted employees. This makes management and securing of trade secrets easier.

-      Deterrent to misuse and misappropriation: If an action involves misuse or misappropriation of a trade secret, then the party carrying out the action may be punished. The determination of misuse/misappropriation and corresponding punishment depend heavily on factors such as:

o   measures taken to maintain confidentiality;
o   the degree to which the owner regards and treats the information as confidential;
o   the degree to which the recipient regards and treats the information as confidential; and
o   whether the recipient ought to have known that the information was confidential;

Therefore the combination of a strong IP flight risk reduction strategy and cybersecurity policy makes it likely that misuse or misappropriation is likely to result in harsh punishment. It also signals message that the organization takes trade secret protection seriously. Together these act as deterrents to misuse and misappropriation.