IP Strategies for Entrepreneurs

By D. C. Toedt III, email: dc@toedt.com
Attorney & arbitrator — tech contracts & IP

1 Class plans

1.1 First day: Tues. Mar. 16

1.1.1 Experiment: Amazon-style meeting approach

Amazon famously runs meetings in a different way imposed by Jeff Bezos; for at least a couple of classes, we're going try a modified version modeled on a variation practiced by Twitter- and Square CEO Jack Dorsey:

To replace the PowerPoint presentations, Bezos created a new way to hold meetings: Meetings start with each attendee sitting and silently reading a “six-page, narratively-structured memo” for about the first 30 minutes of the meeting. [DCT comment: We will typically do just five minutes per class meeting.]

″[The memo is] supposed to create the context for what will then be a good discussion,” Bezos said. [DCT comment: Our discussions will be of specific questions, very often directed to hypothetical situations.]

Those participating are encouraged to take notes [about the document as they read it], and after the reading period is over, they discuss the memo.

Bezos says the reason for the group reading is that “executives will bluff their way through the meeting as if they’ve read the memo because we’re busy and so you’ve got to actually carve out the time for the memo to get read.”

Bezos is not the only CEO to believe in “silent meetings”: Twitter and Square CEO Jack Dorsey uses a similar method, which includes holding meetings that start with 10 minutes of silent reading from a Google Doc.

“Most of my meetings are now Google doc-based, starting with 10 minutes of reading and commenting directly in the doc,” Dorsey tweeted in 2018. “This practice makes time for everyone to get on same page, allows us to work from many locations, and gets to truth/critical thinking faster.”

As for Amazon, before the memo-based meetings were instituted, “we were doing the more traditional thing,” Bezos said. “A junior executive comes in, they put a huge amount of effort into developing a PowerPoint presentation, they put the third slide up, and the most senior executive in the room has already interrupted them, thrown them off their game, asking questions about what is going to be presented in slide six, if they would just stay quiet for a moment…”

He explained that PowerPoint slides often have “obscure information.” Bezos prefers memos, he says, because each have “verbs and sentences and topic sentences and complete paragraphs.” …

Taylor Locke, Jeff Bezos: This is the ‘smartest thing we ever did’ at Amazon (cnbc.com 2019, archived at https://perma.cc/4Z3Z-HGZV).

Quizzes

Final exam

1.1.2 Chat survey: What do you think of as "intellectual property"?

In the Zoom chat, give some examples of what you think

Baseline assumption in U.S.: Information is free for all to copy.

What IS "intellectual property"? Broadly, it's when a non-government party can haul you before a tribunal for doing one or more of the following without permission:

  • confidential information:
    • "misappropriating" it (Defend Trade Secrets Act),
    • violating contractual restrictions
  • patented inventions: making, using, selling, offering for sale, importing, rebuilding of claimed subject matter
  • original works of authorship:
  • trademarks, service marks: using confusingly-similar marks; "dilution"
  • "private" information: personal data; biometrics; health; financial

Who could haul you into court and seek damages?

  • Private parties
  • In the U.S.: federal government agencies, state goverment agencies
  • EU, UK, elsewhere
  • Internet stuff - Web restrictions, Consumer Review something Act

Reps and warranties in a financing — with the schedules

Right of publicity

False advertising

Constitutional underpinnings

1.1.3 IP law is about litigation

Sandy Sanford about corporate law

1.1.4 IP rights are the exception, not the rule

(This discussion applies to the United States; other countries might be different.)

• Good ideas are presumptively free for all to use.

• "Intellectual property" is largely a social construct, with the courts having rejected a "natural rights" theory of ownership.

In a landmark 1966 opinion, the Supreme Court quoted Thomas Jefferson (who as Secretary of State was in effect the first administrator of the U.S. patent system) as having laid the foundation for American jurisprudence in this area:

He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me.

That ideas should freely spread from one to another over the globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, without lessening their density in any point, and like the air in which we breathe, move, and have our physical being, incapable of confinement or exclusive appropriation.

Inventions then cannot, in nature, be a subject of property. Society may give an exclusive right to the profits arising from them, as an encouragement to men to pursue ideas which may produce utility, but this may or may not be done, according to the will and convenience of the society, without claim or complaint from any body.

VI Writings of Thomas Jefferson, at 180-181 (Washington ed.), quoted in Graham v. John Deere Co. of Kansas City, 383 U.S. 1, 9 n.2 (1966) (emphasis and extra paragraphing added).

BUT there's a big free-rider problem:

  • Alice invests big bucks in R&D to develop an innovation
  • Alice puts the innovation on the market
  • Assume: Bob, Carol, Dave, etc., can cheaply copy (and/or reverse-engineer) Allice's innovation
  • The market price quickly goes down to marginal cost of production & distribution
  • Alice can't recoup her investment
  • Upshot: Investors aren't likely to invest in innovation.

So: Patents and copyrights in the U.S. are limited exceptions to this presumption of free imitation, explicitly written into the Constitution — not as a guarantee to individuals, but as enumerated powers of Congress:

… the federal patent power stems from a specific constitutional provision which authorizes the Congress "To promote the Progress of . . . useful Arts, by securing for limited Times to . . . Inventors the exclusive Right to their . . . Discoveries." Art. I, § 8, cl. 8. The clause is both a grant of power and a limitation.

This qualified authority, unlike the power often exercised in the sixteenth and seventeenth centuries by the English Crown, is limited to the promotion of advances in the "useful arts." It was written against the backdrop of the practices—eventually curtailed by the Statute of Monopolies—of the Crown in granting monopolies to court favorites in goods or businesses which had long before been enjoyed by the public.

The Congress in the exercise of the patent power may not overreach the restraints imposed by the stated constitutional purpose.

Nor may it [Congress] enlarge the patent monopoly without regard to the innovation, advancement or social benefit gained thereby.

Moreover, Congress may not authorize the issuance of patents whose effects are[:]

  • to remove existent knowledge from the public domain, or
  • to restrict free access to materials already available.

Innovation, advancement, and things which add to the sum of useful knowledge are inherent requisites in a patent system which by constitutional command must "promote the Progress of . . . useful Arts." This is the standard expressed in the Constitution and it may not be ignored. And it is in this light that patent validity requires reference to a standard written into the Constitution.

1.2 Trade secrets: Day 2, Thur. Mar. 18

1.2.2 In-class reading

(This gouge covers U.S. law; other countries are likely to have similar rules.)

Sources of law

1.  The Defend Trade Secrets Act is a federal statute.

2.  The Uniform Trade Secrets Act has been enacted (sometimes with minor variations) in 48 states, D.C., Puerto Rico, and U.S. Virgin Islands.

Basic definition of "trade secret"

A party claiming that particular informatin is a trade secret must introduce legally-sufficient evidence — and persuade the judge or jury by a preponderance of the evidence — of the following:

  1. Reasonable efforts were made to maintain confidentiality.
  2. The information in question "derives independent economic value, actual or potential, from [i] not being generally known to, and [ii] not being readily ascertainable through proper means by, another person [iii] who can obtain economic value from the disclosure or use of the information" — from the Defend Trade Secrets Act definition, 18 U.S.C. § 1839(3).
Some information is disqualified from trade-secret status

Published information can't be a trade secret.

Patented information is (by definition) published.

Three Rules for protecting confidential information

Rule 1: Lock It Up — within reason.

Rule 2. Label It — ditto: Marking of confidential information is important: Courts help those who help themselves, when it comes to protecting confidential information.

Rule 3. "Safe Sex":

  • Be choosy about the "partners" to whom you disclose — or from whom you receive — confidential information;
  • Use "protection," in the form of a confidentiality agreement ("NDA") OR a no-confidentiality agreement.
Employees and their employers' trade secrets

Employees generally don't need to sign NDAs to be legally obligated to protect their employers' confidential information — the law automatically imposes such an obligation (referred to as an "implied-in-fact" obligation).

But it's a good idea for companies to have their employees sign at least a bare-bones confidentiality agreement (for use as a sound bite).

NDA gouge

1.  Two-way NDAs, protecting each party's (eligible) information, are usually better than one-way NDAs that protect only one party's information.

2.  Marking: Requiring marking of confidential information (e.g., in an NDA) can be problematic, because compliance isn't always 100%.

Remedies for trader-secret misappropriation

Upon proof of misappropriation, a court might:

  • award compensatory damages such as:
    • the trade secret owner's lost profits;
    • possibly the misappropriator's profits from the infringement ("disgorgement");
    • possibly a reasonable royalty;
  • award punitive damages;
  • injunctive relief, e.g., ordering the misappropriator to stop selling / using the misappropriated information.

(Optional further reading: Marylee Robinson and Neil Eisgruber, Trade Secret Damages: A Look at Available Remedies (2016).

1.2.3 Discussion questions

Baade Company BBQ

FACTS: Alice, an experienced BBQ cook, goes to work for the Baade Company BBQ restaurant and is taught how to make that restaurant's sauces and meat rubs. After working for Baade Company for three months, Alice leaves to take a better-paying job at Crusty Meats, another BBQ restaurant,

Optional reading (totally unrelated): Obituary of Hans Baade (pronounced "BAA-daa"), one of my favorite professors at UT Law.

  1. QUESTION: Could Baade Company sue Alice for misappropriation of trade secrets? Why or why not?
  2. QUESTION: Could Baade company sue Crusty Meats for misappropriation? Why or why not?
  3. QUESTION: What sorts of facts might Baade Company's trial counsel want to put in front of the jury as indirect evidence of misappropriation?
  4. QUESTION: At trial — with 20-20 hindsight — what sorts of actions might Baade Company wish it had taken earlier to provide more evidence for its trade-secret case?
  5. QUESTION: If Baade Company were to successfully sue Alice and/or Crusty Meats for misappropriation of trade secrets, what might the court order as "remedies" for the misappropriation?

DIFFERENT FACTS: The experienced BBQ cook leaves Baade Company and opens her own BBQ restaurant. She uses her own, different recipes but closely copies the architecture and kitchen-equipment layout of the Baade Company restaurant.

  1. QUESTION: Could Baade Company successfully sue for misappropriation of trade secrets?
    • Optional reading: Taco Cabana Int'l, Inc. v. Two Pesos, Inc., 932 F.2d 1113, 1123 (5th Cir. 1991), aff'd as to trade-dress issue, 505 U.S. 763 (1992). See especially the Fifth Circuit's discussion of the standard of review, i.e., how little latitude an appellate court has in reviewing a jury verdict.
Sports plays as trade secrets

Consider sports plays:

  1. QUESTION: In basketball, would a pick-and-roll play be considered a trade secret? Why or why not?
  2. Would the Houston Rockets' playbook be considered a trade secret? How about the Los Angeles Dodgers' pitcher-catcher hand "signs"? (Too soon?)

Optional reading: Rice Ferrelle, Combating the Lure of Impropriety in Professional Sports Industries: The Desirability of Treating a Playbook as a Legally Enforceable Trade Secret, 11. J. Intell. Prop. L. 149, parts III, IV (2003).

A locksmith case

FACTS:

  • For a popular line of keyed locks, duplicate keys can be made by "reverse engineering" the tumbler combinations (something locksmiths can do).
  • A locksmith reverse-engineers the tumbler combinations for that line of keyed locks and publishes a book of the combinations, allowing locksmiths to make duplicate keys for the locks.
  • The manufacturer of the line of locks sues for misappropriation of trade secrets.
  • QUESTION: What result?
  • Optional reading: Chicago Lock Co. v. Ely, 676 F.2d 400, 403-04 (9th Cir. 1982).

1.3 Patents (1): Day 3: Tues. Mar. 23

Hat tip: A number of the references below are from the syllabus for an undated course taught by Bryce Pilz, then a clinical assistant professor at Michigan Law and now director of licensing for the University of Michigan tech-transfer operation.

Overview of a patent (six-minute video)

How to read a patent in 60 seconds for a quick check whether you, or someone else, is infringing it.

USPTO flowchart: Obtaining a (utility) patent

Product testing as a possibly infringing use

Do a patent search

Claim-drafting exercise

Patents

U.S. Patent No. 8,281,245, “System and method of preparing presentations,” issued October 2, 2012, and assigned to Google, Inc.

How long did it take for this patent to be issued?

How many "independent" (standalone) claims does this patent have?

Is this patent still in force?

What is an obvious difference between claim 1 and claim 13?

Which would be easier for Google's lawyers to prove was infringed by an accused infringer: Claim 1, or claim 2?

Why do you think Google's lawyers included claim 24?

Jan & Dean want to hold back "secret sauce" from their patent application — can they?

If they do, but managed to get a patent, could their concealment result in their patent being invalidated?

Inequitable conduct.

  1. PATENT LAW
  2. Patent Protection for Inventions
  3. Introduction—28 U.S.C. §§ 1295 & 1338
  4. Patentable Subject Matter—35 U.S.C. §§ 100, 101, 161 & 171
  5. Utility Patents
  6. Products pp. 395 – 412 (inc. n.1)

ii. Processes pp. 436-41 (inc. n.3) iii. Utility Requirement pp. 444-50 (7)

  1. Design Patents pp. 453–62

(Week 7)

  1. Novelty Requirement—§ 102 (both pre- and post-AIA)
    1. Overview and Basic Structure pp. 465-472
    2. Section 102 Public Prior Art pp. 472–82
  2. “Known or Used” or in “Public Use”

ii. “Described in a Printed Publication” pp. 482–501 iii. “On Sale” iv. Patented

  1. First to File—post-AIA § 102 pp. 501–03
  2. Other Obstacles and Issues in § 102—pre-AIA § 102(e)-(f)

(Week 8)

  1. Novelty of Design Patents brief class disc’n
  2. Nonobviousness Requirement—§ 103 pp. 520-46
  3. The Written Specification § 112 pp. 548-54
  4. Inventorship, Ownership and Prosecution
  5. Inventorship and Ownership pp. 555-700
  6. Nature of Inventorship - § 116
  7. Rights of Joint Owners - §§ 261-62
  8. Invention by Employees
  9. Processes for Obtaining a Patent pp. 577-88
  10. Patent Term - § 154(a)

(Week 9)

  1. Patent Infringement
  2. Literal Infringement § 27(a) – (c) pp. 589-609
  3. Infringement by Equivalents

5

  1. Infringing Activities pp.621-35
  2. Direct Infringement
  3. Contributing or Inducing Infringement § 271(b)-(c)
  4. Cross-Border Infringement § 271(f)-(g) pp. 637, 645-48
  5. Infringement of Design Patents brief class discussion

(Week 10)

  1. Defenses & Remedies
  2. Defenses
  3. Invalidity § 282(a)-(b) pp. 658-60
  4. Exhaustion pp. 660-69
  5. Good Faith Prior Use § 273 pp. 679-82
  6. Estoppel and Laches
  7. Infringement Adjudication 28 U.S.C. § 1400(b) pp. 684-87
  8. Remedies
  9. Injunctions - § 283 pp. 692-97
  10. Monetary Relief - §§ 284-86 & 287(a) pp. 705-09

Who is the inventor? What, in your own words, does this invention do? How long did it take the Patent Office to issue this patent after it was filed? For whom does M. Jordan work and what role did he or she play with regard to this patent? For whom does Frank J. Dykas work, and what role did he play with regard to this patent? Is this patent still in effect? Which parts of this patent document are the specification? Which part are the claims? How many claims does this patent have? What is the difference between claims 1 and 2 on the one hand and claim 3 on the other? Don’t they end up describing the same thing? (Hint: no.) If Maine’s game laws prohibit the use of live earthworms as bait, what effect does this patent have on fishing in Maine? Which of the following items would infringe this patent, if manufactured and sold by the defendant during the patent’s term? Aluminum boxes that contain sharp-grained sand with a grain size of 1/25 of an inch? Aluminum boxes that contain sharp-grained sand with a grain size of 1/10 of an inch? Aluminum boxes that contain mud? Empty open-topped rectangular aluminum boxes, with a length slightly less than the width of a bait box, lips at ech end that are the right shape to attach to the top edges of a bait box, and a detatchable plastic cover? If Doug Defendant is fishing on a beach whose sand is sharp-grained with a grain size of less than 1/20 of an inch, and Doug rolls earthworms in the sand on the beach, would Doug infringe this patent?

1.4 Trademarks: Day X: Thur. Mar. 25

Registrations - use-based, ITU

Anti-dilution

Internet domain names

Not going generic: The Atlantic article (h/t: Prof. Eric Goldman).

"Hook and Loop"

  1. The Nature & Function of Trademarks
  2. Introduction pp. 35–41
  3. Validity of Marks–Spectrum of Distinctiveness pp. 41–54
  4. Descriptive Marks & Secondary Meaning pp. 55–61

15 U.S.C. § 1052

  1. Surnames pp. 61–66
  2. Trade Dress
  3. In general pp. 67–70

(Week 2)

  1. Some specific types of trade dress pp. 71–82
  2. Functionality pp. 82–98
  3. Establishing Trademark Rights
  4. Common Law Trademark Use pp. 99–117

2.Federal Trademark Registration §§ 1051(a)-(b), 1052(d), 1057(c), 1062(a)–(b), 1063, 1065, 1115(b) 3.Federal Registrations, cont’d pp. 149–54 §§ 1051(d), 1052, 1053, 1054, 1057(a)–(b), 1072 (Week 3)

  1. Causes of Action
  2. Infringement via Likelihood of Confusion pp. 155–82

§§ 1114(1), 1121(a), 1125(a)

  1. Dilution § 1125(c) pp. 215–23
  2. Cybersquatting § 1125(d) pp. 223–28

3 (Week 4)

  1. Defenses and Limitations—§ 1115
  2. Descriptive Fair Use—§ 1115(b)(4) pp. 229–38
  3. Nominative Fair Use
  4. Abandonment—§ 1115(b)(2); definition in § 1127 pp. 238 - 48
  5. Comparative Advertising pp. 248–62
  6. Used or Reconditioned Goods/First Sale
  7. First Amendment / Freedom of Speech
  8. Functionality—§ 1115(b)(8) [see II.A.5.c. above]
  9. Secondary Liability & Remedies
  10. Secondary Liability pp. 263–80
  11. Remedies—§§ 1116(a) & 1117 pp. 281–84

RIGHT OF PUBLICITY AND FALSE ENDORSEMENT

  1. Nature and Scope— Rest. (3d) of Unfair Comp. §§ 46–49 pp. 287–303
  2. Limitations pp. 303–17

1.5 Litigation: Day 5: Tues. Mar. 30

1.6 Copyrights (1): Day 6, Thur. Apr. 01

1.6.1 Gouge

What does copyright allow you to sue — or be sued — for doing?

Under copyright law, making copies; distributing copies; creating "derivative" works; public display or -performance

1.6.2 Reading

Fair use

Fair use: Eric Goldman cheat sheet. Two Live Crew

Originality
Fixation requirement

1.6.3 Discussion questions

Fixation requirement: Grimmelmann course notes - search for "Fixation questions"

Duration of copyright:

Wikipedia, Copyright Term Extension Act

Josh H. Escovedo, Disney’s Influence on United States Copyright Law

Stephen Fishman, When Do You Need a Copyright Notice on Software (Nolo.com)

VI. COPYRIGHT LAW

  1. Subject Matter of Copyright - 17 U.S.C. §§ 102-103 pp. 729-35
  2. Fixation Requirement pp. 751-52
  3. Original Works of Authorship pp. 736-50
  4. Originality pp. 762-75; 785-86
  5. Distinguishing Expression from Ideas & Facts pp. 801-08;

811-17

  1. Useful Articles pp. 848-61
  2. Subject Matter Excluded Due to Origin pp. 867-68
  3. Establishing Rights
  4. Ownership § 201, 202, 204 pp. 871 – 90
  5. Joint Works
  6. Works made for hire
  7. Formalities & Publication – § 401, 408(a), 411(a) read stats, class

discussion

  1. Copyright Term – § 302-305 (skim)

(Week 12)

  1. Exclusive Rights and Limitations
  2. Section 106
  3. Reproduction § 106(1) pp. 965-81
  4. Preparation of Derivative Works § 106(2) p. 981; 988-

93 6

  1. Public Distribution
  2. Scope of the Right § 106(3) pp. 993-99

ii. First Sale Limitation § 109(a)-(b)(1) pp. 1037-46 (Week 13)

  1. Public Performance pp. 999-1000
  2. Scope of the Right § 106(4) pp. 1004-05;

1009-23 ii. Limitations § 110 (skim); § 114(a)-(c) pp. 1064-65

  1. Public Display
  2. Scope of the Right § 106(5)

ii. Limitations §§ 109(c); 110

  1. Limited Rights for Sound Recordings - § 106(6)pp. 1028-30
  2. Section 106A Moral Rights [TBD if time permits] - § 106A [for expand

fair use time]

  1. Fair Use – § 107 pp.1095-

1128 [Helpful for practice analysis: pp. 1129-31, nn.8-12] (Week 14)

  1. Infringement
  2. Concept of Infringement §§ 501, 506(a), 602-603 pp. 1143-49

pp. 1158-50 (last paragraph) pp. 1159-93

  1. Prima Facie Case

Do you need a copyright notice?

When does it make sense to register your copyright?

How long does copyright protection last?

What kinds of things can be subject to copyright protection?

What does a proper copyright notice look like?

What date do you use for updated versions of software?

Can graphics be copyrighted?

Can slogans be copyrighted? (Trademark instead.)

What does it mean to "copyright" something? (Careful: Trick question.)

Employees

1.7 Contract basics: Day 7, Tues. Apr. 06

Contract basics

1.8 License agreements: Day 8, Thur. Apr. 08

License agreements

1.9 Valuation: Day 9: Tues. Apr. 13

Valuation

1.10 Day 10: Thur. Apr. 15

1.11 Day 11: Tues. Apr. 20

1.12 Day 12: Thur. Apr. 22

1.13 Course description

This course provides a practical, business-oriented overview of three important strategic considerations for a new enterprise: (1) identifying and monetizing the business's potential intellectual property ("IP"); (2) identifying and addressing with other people's IP-ownership claims, including data-privacy considerations; and (3) long-term planning for a liquidity event.

1.14 Book

1.15 Patent questions

  1. QUESTION: In U.S. law, what types of event will start the one-year clock running on the right to apply for a patent?
  2. FACTS: Dick and Jane, both Rice entrepreneurship students, have an idea for an inexpensive way to convert a breathalyzer so that it will detect, not alcohol, but SARS-CoV-2 (the virus that causes COVID-19). They consult a patent attorney about applying for a patent.
    • TRUE OR FALSE: Dick and Jane would need to obtain a patent before putting their new "Viralyzer™" on the market in the United States. Explain.
    • TRUE OR FALSE: Dick and Jane could set up an operation in Sugar Land to buy existing breathalyzers and the needed other materials; convert the breathalyzers to SARS-CoV-2 detectors; and sell them under the "Viralyzer" brand name; government approval won't be needed because the Viralyzer is simply a variation on existing breathalyzers. (Hint: See here; scroll down to "Step 1.")
  3. DIFFERENT FACTS: Suppose that Dick and Jane's Viralyzer was a software app, running on a smartphone, that took a picture of the user's eyes and used artificial intelligence ("AI") to make an educated guess whether the user had SARS-CoV-2.
    • TRUE OR FALSE: Because the Viralyzer is software and not hardware, it's not subject to FDA regulation as a medical device. (Hint: See here.)
  4. MORE FACTS:
    • Dick and Jane finish a working, proof-of-concept viralyzer and begin fundraising to finance clinical trials, manufacturing, and the legal work needed for patent protection.
    • At their first investor roadshow on March 31, 2021, Dick and Jane intend to demonstrate how their viralizer works (using simulated viruses) and explain the device's workings to the attenders. This will be their first disclosure of the viralyer to anyone.
    • QUESTION: To be on the safe side, by what date should Dick and Jane file a U.S. patent application in order to preserve any U.S. patent rights they might have? (Hint: See 35 U.S.C. § 102(a)(1) and (b)(1).)
  5. MORE FACTS: Dick and Jane do their first roadshow presentation. At the request of one of the prospective investors, on April 1, Dick and Jane post their slide deck as an attachment to a blog posting about the viralyzer; the slide deck contains detailed information about how to make and use the viralyzer.
    • QUESTION: To be on the safe side, by what date should Dick and Jane file a U.S. patent application in order to preserve any U.S. patent rights they might have?
    • QUESTION: To be on the safe side, by what date should Dick and Jane file a U.S. patent application in order to preserve any non-U.S. patent rights they might have?
  6. DIFFERENT FACTS: No investor roadshow, but to get FDA approval, Dick and Jane must run large-scale clinical trials — and they're unlikely to get all the participants to sign confidentiality agreements.
    • QUESTION: What could Dick and Jane do to reduce the chances that their clinical trials would be found to be a "public use" that started the one-year clock running on their U.S. patent-filing to preserve U.S. rights? (Hint: See this article.)

1.15.1 Exactly What Is a Patent?

A patent is a Government document that announces:

  • that the inventor has submitted a patent application, containing a written disclosure of what the inventor believes to be a new invention,
  • that a patent examiner has reviewed the patent application and made a determination that the application and the invention appear to meet certain legal criteria, and
  • in exchange for submitting the invention for publication in a patent, the Government has granted the inventor certain rights, for a limited period of time, in the invention as claimed.

What is a Patent?

  • Limited grant of right to exclude others
  • Bargain between inventor and government
  • Not a “permit” to use the invention
  • Rights defined by claims
  • Competitors have rights, too

A patent gives the owner the right to exclude others from making, using, offering for sale, and selling the invention described and claimed in the patent. The statute provides that:

Every patent shall contain . . . a grant to the patentee, his heirs or assigns, of the right to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States, and if the invention is a process, of the right to exclude others from using, offering for sale or selling throughout the United States, or importing into the United States, products made by that process . . . .

35 U.S.C. § 154(a)(1).

Some noteworthy points about patents:

(i) A patent gives the inventor the right to exclude, not the right to practice the invention. A patent is not like a fishing license or a building permit: an inventor does not need a patent to be able to practice his or her invention — although other authorizations might be required, and in fact the inventor might violate the law by practicing the invention.

Every patent contains a grant to the owner of the right, for a limited period of time, not to practice the invention him- or herself, but instead to exclude others from making, using, selling, offering to sell, or importing the specific sub-ject matter described by the claims of the patent in the United States.

(ii) An inventor’s competitors can freely copy and use an un-patented invention. If a new product has been made public (for ex-ample, by putting it on sale or by publishing information about it), then others have the right to freely copy and use the product (but not necessarily to copy any subject matter that is protected by other patents or by copyright), without any obligation to its inventor, unless and until a patent is issued that covers the product.

Why Competitors Have the Right to Copy Unpatented Inventions

  • Free competition is the rule in the U.S.
  • Competitors’ copying of unpatented, publicly-available technology benefits the public
  • Gives inventors an incentive to develop patentable inventions

There are several reasons for this rule. For example, free competition in the marketplace is the rule in the United States, and competitors are encouraged to copy unpatented, publicly available technology, because that benefits the public by disseminating new ideas.

See, e.g., Bonito Boats, Inc., v. Thunder Craft Boats, Inc., 489 U.S. 141, 151, 164-65, 160, 109 S. Ct. 971, 977-78, 984-85 (1989) (holding that state law prohibiting plug-molding methods of copying boat hulls was preempted by federal patent law; “[t]he novelty and nonobviousness requirements of patentability embody a congressional understanding, implicit in the Patent Clause itself, that free exploitation of ideas will be the rule, to which the protection of a federal patent is the exception. Moreover, the ultimate goal of the patent system is to bring new designs and technologies into the public domain through disclosure.”).

In addition, this rule gives inventors an incentive to develop inventions that meet the rigid criteria for patentability – if an inventor develops an invention that falls short of those criteria, or if he does do not go through the procedures for obtaining a patent, then he will not be able to stop competitors from copying the invention.

See id., 489 U.S. at 160, 109 S. Ct. at 982 (“the competitive reality of reverse engineering may act as a spur to the inventor, creating an incentive to develop inventions that meet the rigorous requirements of patentability”).

§ 3.3 Legal Basis for Software- and Internet Related Patents [a] The Patent Statute Allows Useful “Processes” to be Patented The Patent Act of 1952 provides that: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement there-of, may obtain a patent therefor, subject to the conditions and requirements of this title. 35 U.S.C. § 101 (emphasis added).

The term “process” means process, art or method, and includes a new use of a known process, machine, manufacture, composition of matter, or material. 35 U.S.C. § 100(b) (emphasis added). The Supreme Court has held that, with certain exceptions, the statutory language was in-tended to “include anything under the sun that is made by man.” Diamond v. Chakrabarty, 447 U.S. 303, 309 (1980) (affirming CCPA reversal of Patent and Trademark Office (PTO) refusal to grant patent for new genetically-engineered organism; citation to legislative history omitted).

§ 3.4 Substantive Requirements of Patentability While software- and e-commerce inventions can be patented more readily than before (at least in the United States), not all such inventions meet the substantive requirements for patentabil-ity. It is probably safe to say that the majority of patent applica-tions filed are rejected for failure to meet the patentability re-quirements set out in U.S. law. [a] The Enabling-Disclosure Requirement By statute, a patent application must include an “enabling” disclosure of how to make and use the invention, as well as a dis-closure of the “best mode” known to the inventor of practicing the invention. See 35 U.S.C. § 112, first paragraph.

An “enabling” disclosure in a patent application is one that will allow persons skilled in the art to make and use the invention without undue experimentation. See 35 U.S.C. § 112 (requiring enabling, best-mode disclosure of how to make and use invention); see generally, e.g., In re Hayes Microcomputer Products, Inc., Patent Litigation, 982 F.2d 1527 (Fed. Cir. 1992) (affirming jury verdict of infringement of patent relating to modem guardtime escape sequence and rejecting enablement- and best-mode challenge; “an inventor is not required to describe every de-tail of his invention”); Northern Telecom, Inc., v. Datapoint Corp., 908 F.2d 931, 940-43 (Fed. Cir. 1990) (reversing trial court finding of lack of enablement for failure to disclose source code of computer program, but affirming finding of failure to disclose best mode of magnetic tape cassette used for program and data storage).

[b] The Best-Mode Disclosure Requirement

A “best mode” disclosure in a patent application relates to the best way known to the inventor of practicing the claimed subject matter at the time of filing the patent application. For example, if one of the claims in the application is directed to implementing a new software technique on a specific platform, then a disclosure of all points of “cleverness” relating to that specific implementation may be required. See the enablement cases cited supra; cf. Consol-idated Aluminum Corp. v. Foseco Int’l, Ltd., 910 F.2d 804 (Fed. Cir. 1990) (affirming holding of inequitable conduct and resulting unenforceability of patent where patentee found to have concealed best mode intentionally).

On the other hand, if the claims are general in nature and applicable across a wide range of hardware — i.e., if they are not specific to any particular machine, operating system, etc. — then disclosure of specific implementation techniques may not be re-quired. In particular, there is no rule that the details of a specific commercial implementation be disclosed; “[t]he focus of a sec-tion 112 inquiry is not what a particular user decides to make and sell or even in what field the invention is most likely to find suc-cess. Rather, in keeping with the statutory mandate, our prece-dent is clear that the parameters of a section 112 inquiry are set by the CLAIMS.” Zygo Corp. v. Wyko Corp., 79 F.3d 1563, 1567 (Fed. Cir. 1996) (affirming judgment that patent was not invalid for failure to disclose best mode) (emphasis in original).

[c] No Requirement to Disclose Source Code Patent application drafters and their clients frequently must confront the question whether to include in an application the source code of a computer program used in the invention. While the case law was unclear at first, technically the answer now ap-pears to be “no”; the Federal Circuit has held several times that there is no hard and fast requirement for a source-code disclosure. “[W]hen disclosure of software is required, it is generally sufficient if the functions of the software are disclosed, it usually being the case that creation of the specific source code is within the skill of the art.” Robotic Vision Systems, Inc. v. View Eng’g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997) (reversing summary judgment of inva-lidity; holding that patent’s disclosure of functions was adequate and that disclosure of source code was not necessary for compliance with best mode requirement), citing Fonar Corp. v. General Electric Co., 107 F.3d 1543 (Fed. Cir. 1997) (same). Disclosure of source code can still be a good idea, however, as discussed in § 3.5[d][2]. [d] The Claims Define the Protectable Invention The last section of a patent contains the claims, which define the patented invention in words. There is no infringement of a patent unless the accused product (or process) is “covered” by at least one claim of the patent. Any similarities or dissimilarities between the description in the patent and the accused product are irrelevant, because “[t]he written description part of the specifica-tion itself does not delimit the right to exclude. That is the func-tion and purpose of claims.” Markman v. Westview Instruments, Inc., 52 F.3d 967, 980 (Fed. Cir. 1995) (in banc), aff’d, 517 U.S. 370, 116 S. Ct. 1384, 134 L.Ed.2d 577 (1996) (holding that Sev-enth Amendment does not require jury trial of disputes over proper interpretation of patent claim). Each claim sets forth a number of checklist-like elements. To prove infringement, a patent owner must show that every element of at least one claim is present in the accused product or process. (In a patent claim, less is more: A claim that has very few elements will be satisfied – i.e., infringed – by more things than will a claim that has more elements.) Three hypothetical examples of patent claims are set out in the inset below.

  1. [Independent claim] A chair compris-ing:

(a) a seat; and (b) at least three legs extending downward from the seat.

  1. [Dependent claim] The chair of claim 1, further comprising a fourth leg extending downwardly from the seat.
  2. [Dependent claim] The chair of claim 2, further comprising a back.

Hypothetical Examples of Patent Claims [e] The Novelty Requirement One of the most important checks and balances in the patent system is that a patent cannot be granted on an invention that had already been invented. Even an independent reinvention of something that was already known is unpatentable by law. See 35 U.S.C. § 102 (categories of “prior art” that can preclude patent-ability of an invention). The underlying policy is that technology that is already available to the public should not be taken away from it by the granting of exclusionary rights. See, e.g., Graham v. John Deere & Co., 383 U.S. 1, 6 (1966). If a patent claim — which was described above as a list of el-ements or method steps that serves to define the claimed invention in question — is satisfied or “met” by technology that was already known in the art, then the claim is unpatentable. In the parlance of the patent bar, the claimed subject matter is “anticipated.” • For example, if someone else invented the subject matter first, and did not abandon, suppress, or conceal it, then the second inventor is not entitled to a patent (whether or not the first inven-tor is or might have been so entitled). See 35 U.S.C. § 102(g). • If the claimed subject matter was patented or described in a printed publication anywhere in the world, or known or used by others in this country, before the inventor invented it, then it is unpatentable to that inventor. See 35 U.S.C. § 102(a). [f] “Obvious” Subject Matter is Unpatentable Even if a single prior-art reference does not completely satisfy a patent claim’s list of elements, the claim may still be unpatent-able. The patent statute provides that if the claimed subject mat-ter would have been “obvious” in view of what was already known, the claim is unpatentable. See 35 U.S.C. § 103 (statutory re-quirement of nonobviousness). A useful discussion of a variety of obviousness-related issues can be found in WMS Gaming, Inc. v. Int’l Game Technology, 184 F.3d 1339, 1355-60 (Fed. Cir. 1999) (affirming judgment that pa-tent on slot machine using computer-simulated spinning reels was not invalid for obviousness). [1] Measuring the Claimed Subject Matter Against the “Prior Art” In evaluating the nonobviousness of a claimed invention, the ultimate question is whether the prior activities and publications of others would have made the claimed invention obvious to a hy-pothetical person of ordinary skill at the time it was invented. The phrase “hypothetical person of ordinary skill” is an important one. What counts is not what would have been obvious to the inventor (who may be of far greater – or lesser – skill than those of ordinary skill), but instead what would have been obvious to those who were practicing the art or arts in question. See generally, e.g., Cus-tom Accessories, Inc., v. Jeffrey-Allan Industries, Inc., 807 F.2d 955, 962 63 (Fed. Cir. 1986) (factors involved in determining level of or-dinary skill); Bausch & Lomb, Inc., v. Barnes-Hind/Hydrocurve, Inc., 796 F.2d 443, 447 (Fed. Cir. 1986) (inventor’s subjective be-lief of obviousness not dispositive of the issue). A shorthand metaphor sometimes used by the courts is: Con-sider a worker of “ordinary” skill in his workshop. Hanging on the workshop walls are all the prior patents, publications, known de-vices, etc., that such a worker might consult and study if he were diligently researching a problem and how to solve it. Assume that this worker is familiar with all of these materials. The worker is assumed to be an ordinary worker and not someone who seeks to innovate. See Standard Oil Co. v. American Cynamid Co., 774 F.2d 448, 454 & n.3 (Fed. Cir. 1985), citing In re Winslow, 365 F.2d 1017 (CCPA 1966), and In re Antle, 444 F.2d 1168 (CCPA 1971). Generally speaking, the question is: would these materials have suggested or taught, to such a worker, the subject matter that is being claimed by the patent owner, as set forth in the claim’s checklist of elements? If so, the claimed subject matter would have been obvious and is unpatentable to the claimant; otherwise not. E.g., ACS Hospital Systems, Inc., v. Montefiore Hos-pital, 732 F.2d 1572, 1577 (Fed. Cir. 1984). The Supreme Court laid down the basic analytical require-ments for determining nonobviousness in Graham v. John Deere & Co., 383 U.S. 1 (1966). A decisionmaker inquiring into the nonob-viousness question must ascertain (1) the scope and content of the prior art; (2) the level of ordinary skill in the art; and (3) the differ-ences between the prior art and the claimed subject matter as a whole. Giving due weight to any circumstantial evidence, the deci-sionmaker must rule whether the claimed subject matter would have been obvious. See id. at 17 18; Panduit Corp. v. Dennison Mfg. Co., 810 F.2d 1561, 1567 (Fed. Cir. 1987). The ultimate question of obviousness is one of law. Panduit, 810 F.2d at 1566 67. [2] The Difficulty of Combining Multiple Prior Art References Allegations of obviousness are frequently based on combina-tions of prior-art references. The argument usually goes something like this: “Reference A says this, and Reference B says that. If we combine these two references, between them they disclose the complete patented invention, so the patent is invalid.” Legally that can be a tough argument to sell, because it relies on a hindsight reconstruction of the claimed invention. As the Federal Circuit summed up in WMS Gaming: When an obviousness determination relies on the combination of two or more references, there must be some suggestion or motivation to combine the references. The suggestion to combine may be found in explicit or implicit teachings within the references themselves, from the ordinary knowledge of those skilled in the art, or from the nature of the problem to be solved. “When determining the pa-tentability of a claimed invention which combines two known elements, ‘the question is whether there is something in the prior art as a whole to suggest the desirability, and thus the obviousness, of mak-ing the combination.’” WMS Gaming, 184 F.3d at 1355 (citations omitted). [3] The Importance of Circumstantial Evidence of Nonobviousness Evaluating the obviousness of an invention in retrospect can be difficult. As noted above, the courts have held that hindsight is not the proper perspective — hindsight reconstruction of the claimed invention, “using `the patent in suit as a guide through the maze of prior art references, combining the right references in the right way so as to achieve the results of the claims in suit,’“ is im-permissible. Grain Processing Corp. v. American Maize-Products Corp., 840 F.2d 902, 907 08 (Fed. Cir. 1988) (citation omitted). Once the invention is known, however, by definition a certain am-ount of hindsight is involved. Add to this difficulty the fact that judges and juries are frequently untrained in technological mat-ters. Consequently, the courts attempt to look at “objective” evi-dence, which can aid in deciding the obviousness question by view-ing it through the eyes of others. Nonobviousness can be (but is not necessarily) objectively indicated in a number of ways: • Commercial success that is linked with the specific sub-ject matter being claimed by the inventor; • accolades from others in the field; • initial skepticism on the part of those skilled in the art; • satisfying a long-felt need; • solving a problem that had stumped others; • licenses showing industry respect. See, e.g., WMS Gaming, 184 F.3d at 1359-60 (citing cases). Such evidence can rebut a prima facie showing that the prior art would have rendered the claimed invention obvious. See id.. Such evidence often can be the most probative evidence of the nonobvious-ness of the claimed subject matter. See Ashland Oil, Inc., v. Delta Resins & Refractories, Inc., 776 F.2d 281, 306 (Fed. Cir. 1985); Stratoflex, Inc., v. Aeroquip Corp., 713 F.2d 1530, 1538 39 (Fed. Cir. 1983). Commercial success can have particularly strong probative value as evidence of nonobviousness. See, e.g., Simmons Fastner, 739 F.2d at 1576. Commercial success implies that there was money to be made with the invention. If the invention in fact was obvious, the chances are that someone would have done it before. Since by hypothesis the invention is novel (otherwise for that rea-son alone it would be unpatentable), commercial success therefore indicates that the invention also was nonobvious. Objective evidence has no probative value, however, unless the patent owner shows a nexus between the secondary considera-tions offered and the merits of the claimed invention. See, e.g., WMS Gaming, 184 F.3d at 1359 (citing cases); Simmons Fastner, 739 F.2d at 1575. For example, commercial success is not shown merely by gross sales figures without proof of market share; fur-thermore, the commercial success must be shown “to have in some way been due to the nature of the claimed invention, as opposed to other economic and commercial factors unrelated to the technical quality of the patented subject matter.” Cable Electric Products v. Genmark, Inc., 770 F.2d 1015, 1026 27 (Fed. Cir. 1985). Com-mercial success may be due to other factors such as extensive ad-vertising or the patent owner’s preexisting leadership in the mar-ketplace. See Pentec, Inc. v. Graphic Controls Corp., 776 F.2d 309, 316 (Fed. Cir. 1985). As the Federal Circuit said in reversing a ju-ry verdict of nonobviousness:

Commercial success is relevant only if it flows from the merits of the claimed invention. . . . [A]ll the ev-idence was to the effect that its commercial popu-larity was due to . . . a feature not claimed. Thus, the jury was not entitled to draw the inference that the success of [the device] was due to the merits of the claimed invention. Sjolund v. Musland, 847 F.2d 1573, 1582 (Fed. Cir. 1988) (em-phasis in original).

Similarly, the fact that others have taken licenses under the patent will not be probative when there is no evidence relating that fact to “the inclusion of the claimed features” of the patented invention. Medtronic, Inc., v. Intermedics, Inc., 799 F.2d 734, 740 (Fed. Cir. 1986). Nonobviousness is not shown when licensees take licenses out of a desire to avoid the costs of litigation instead of in acknowledgement of the validity of the patent claims. Pentec, 776 F.2d at 316.

Objective evidence of nonobviousness will not always serve to save a patent from invalidation. See, e.g., FMC Corp. v. Hennessy Industries, Inc., 836 F.2d 521, 527 (Fed. Cir. 1987); EWP Corp. v. Reliance Universal, Inc., 755 F.2d 898, 907 08 (Fed. Cir. 1985). The absence of such evidence, however, does not establish the obviousness of the invention and is only a “neutral” factor. E.g., Custom Accessories, 807 F.2d at 960; Medtronic, 799 F.2d at 739 n.13.

§ 3.5 Building a Company’s Software- or Internet Patent Portfolio [a] Why Build a Portfolio One school of thought that says that when it comes to patents in a portfolio, more is better. Jay Walker, of Priceline.com fame, apparently belongs to that school; his company, Walker Asset Management Limited Partnership, is listed as the assignee of doz-ens of issued patents purportedly covering various aspects of e-commerce. Priceline.com itself said in a January 2000 press re-lease (available on its Web site) that it had been notified of the al-lowance of its seventh patent and that it had filed some 25 patent applications dating back to 1996. Some of the potential benefits of a patent portfolio include: • A portfolio gives its owner something to bargain with if a competitor (or other company) comes knocking at the door, asserting its own patents. • An issued patent constitutes prior art as against any subsequent patent applicants, thus serving as a de-fensive publication for the issued patent’s owner. • A patent on a company’s key technology may help at-tract attention in the marketplace. [b] Consider Filing Lots of “Provisional” Patent Applications Software and e-commerce companies interested in building a patent portfolio should consider adopting a Darwinian approach to building a patent portfolio: File cheap and informal provisional patent applications for as many inventions as practicable. The comp

1.16 Topics

1.16.1 Defending against a patent-infringement suit

Find prior art

Show noninfringement

Attack on § 101 grounds - use Google patent as an example

1.16.2 Patent misuse

Reading: Princo Corp. v. Int'l Trade Com'n, part II-A, 616 F.3d 1318, beginning at 1326 (Fed. Cir. 2010) (en banc).

1.16.3 Antitrust

Intellectual property rights do not confer a privilege to violate the antitrust laws. However, antitrust laws also do not negate the patentee's right to exclude others from infringing its patent. A party is ordinarily excempt from antitrust liability for bringing a lawsuit against a competitor. That principle is known as Noerr-Pennington immunity.

For an antitrust claim to stand,

  • there must be a patent right that is coupled with violations of 15 U.S.C. § 2 [Sherman Act section 2, prohibiting monopolization], and
  • the elements of violation of § 2 must be met.

Indeed, a patent owner who brings suit to enforce the statutory right to exclude others from making, suing, or selling the claimed invention is exempt from the antitrust laws, even though such a suit may have an anticompetitive effect, unless the infringement defendant proves one of two conditions.

First, he may prove that the asserted patent was obtained through knowing and willful fraud within the meaning of Walker Process Equipment, Inc. v. Food Machinery & Chemical Corp., 382 U.S. 172, 177 (1965).

Or he may demonstrate that the infringement suit was a mere sham to cover what is actually no more than an attempt to interfere directly with the business relationships of a competitor

Esco Corp. v. Cashman Equipment Co., No. 2:12-cv-01545, part II.A.3 (D. Nev. Jan. 26, 2016).

From Fed. Cir.:

A party is ordinarily exempt from antitrust liability for bringing a lawsuit against a competitor. That principle is known as "Noerr-Pennington immunity" ….

There is a recognized exception to Noerr-Pennington immunity for "sham litigation," which the Supreme Court has defined as litigation that (1) is "objectively baseless in the sense that no reasonable litigant could realistically expect success on the merits" (the objective element), and (2) is motivated by a desire "to interfere directly with the business relationships of a competitor" (the subjective element).

Tyco Healthcare Group LP v. Mutual Pharma. Co., 762 F. 3d 1338, 1343 (Fed. Cir. 2014) (not verbatim).

1.16.4 Inequitable conduct

Inequitable conduct arises when a patent applicant, or its representative, engages the PTO with a lack of candor, good faith, or honesty. Molins PLC v. Textron, Inc., 48 F.3d 1172, 1178 (Fed. Cir. 1995); see also 37 C.F.R. § 1.56. It is considered the "atomic bomb" of patent law because "inequitable conduct regarding any single claim renders the entire patent unenforceable." Therasense, Inc. v. Becton, Dickinson & Co., 649 F.3d 1276, 1288 (Fed. Cir. 2011). Inequitable conduct cannot be cured by reissue or reexamination, and "the taint of a finding of inequitable conduct can spread from a single patent to render unenforceable other related patents and applications in the same technology family."[2] Id.

To successfully plead inequitable conduct, the accused infringer must allege facts showing the plausibility of "but-for materiality" and "specific intent to deceive the PTO." Id. at 1290; Exergen, 575 F.3d at 1327 n.3. As stated, the pleader must identify "the specific who, what, when, where, and how of the material misrepresentation or omission committed before the PTO." Exergen, 575 F.3d at 1327. "The relevant `conditions of mind' for inequitable conduct include: (1) knowledge of the withheld material information or of the falsity of the material misrepresentation, and (2) specific intent to deceive the PTO." Id. And while pleading on "information and belief" is permitted under Rule 9(b), the pleading must set forth "the specific facts upon which the belief is reasonably based." Id. at 1330. There must be some factual assertion that the individual decided to "deliberately withhold [a material reference] from the relevant examiner." Id. at 1331. Gross negligence will not suffice. Therasense, 649 F.3d at 1290.

ESCO CORPORATION v. CASHMAN EQUIPMENT COMPANY, Dist. Court, D. Nevada 2016

1.16.5 Notes from Evernote musing 3/6/21 late evening, w/ additions

  • Bankruptcy - licensor or licensee
Financing
  • Security interest in IP?
Copyright

What can be "copyrighted"

How long does copyright last

Who is the "author"

  • Recapture rights for copyright

Royalties

  • Royalty stream - record keeping, audit rights

Assignability

Hiring new talent
  • Export restrictions
  • Former employers
  • Invention assignment agreement
  • Joint development agreement
  • License  - out, in
  • FOCUS ON RESOURCES?
    • Talent
    • Secrets
    • Authorship
    • Inventions
    • Data
    • Non-rivalrous
    • How to stop others from using yours
      • Deadlines - patent, copyright
      • Monitoring
    • How to use others’ resources
      • Reverse-engineering
      • Invalidate their legal rights
      • Buy access - what price?
  • DIAGRAMS?

1.16.6 More notes

Liability for publishing information?

Infringement insurance

1.16.7 Phases

Hiring
  • From competitors
  • Invention assignment agreements
  • Noncompete covenant?
Firing
  • Final disclosures, turnover of stuff

Startup
  • Check out everyone's previous contracts
    • NDAs
    • Noncompetes
    • IP assignment agreements
    • Set to experimenting?
    • Corporate officer?
  • Look for trade secrets
    • Three Rules
    • NDAs
  • Look for copyrightable material
    • [LIST]
  • Patentable inventions
    • Deadlines for filing
    • Under the hood?
  • Look at things from the former employer's perspective

1.16.8 Origin of rights

Constitution

Jefferson - candle

1.16.9 Trademarks / trade dress

Victoria's Little Secret

U.S. vs. foreign

1.16.10 Noncompetes

California

Louisiana - choice of law, choice of forum in employment agreements (Delaware case)

1.16.11 Trade secrets

  • The only true self-help system: Keep it secret
    • Coca-Cola formula
    • KFC recipe
    • Reverse engineering

1.16.12 Scratch pad

Importing

Have everything made overseas

Stockpile components but never assemble

Inducement of infringement: Jones Day article § 271(b)

Manufacture here, ship overseas - contributory infringement: § 271(f)

Product-by-process: § 271(g)

Antitrust: § 271(d)(5)

Recombinant DNA, etc.: § 271(e)

New drug application - infringement: § 271(e)(2)

Workalike - duplicate API responses (Oracle v. Google)

Security interests

Assignments (Oracle v. Google)

Fair use (Oracle v. Google)

  • Grant applications
    • Nanoinnovations - Bayh-Dole Act
  • Export controls
  • Services: TIPS
    • Ownership
  • Copyright
    • Web page
    • Code
    • Documentation
    • APIs?

Best efforts

Exclusivity

Beach Boys sell their catalog - MJ, other examples

Motorola patent portfolio

FOSS

Stanford v. Roche

Ownership

IP ownership agreements

  • Getting a C&D letter
    • Save correspondence
    • Save ALL correspondence
  • Notetaking habits
  • Collaborators
    • Get it in writing - IP ownership
    • Kozynski comment: "one line"
  • Raising money
    • Reps and warranties
    • Employment agreements, etc.

1.16.13 Begin with the end in sight

What might you want to / have to do.

Reps and warranties

What would an acquirer want? An investment bank?

  1. IP is protected.
  2. IP is owned.
  3. No third-party IP threats.
What does "protected" mean?
  • Can go to court / arbitration to sue someone doing things.

1.16.14 The problem: Competitors copy things

Amazon copies products (WSJ)

Free-rider problem - no one will invest in innovation if copiers will run the price down to marginal cost and prevent the innovators from recouping their investments.

Investors might look under the hood, pass on the opportunity, and maybe later tell other prospects / portfolio companies

Lewandowski -

1.16.15 Problem: What contracts might you be bound by?

  • Prior employment agreement
  • TOS / EULA - signing up under a false name
  • NDA - Stanford v. Roche

1.16.16 Export controls

1.17 Resources

1.18 Clients - review for transactions

Attend Behavior Inc. Jeff Margolis

Baker Communications, Inc. Joe DiDonato

Cloud Chomp, Inc. David Pulaski

CoronaNews.FYI Brittany Scarff

Educator.FYI Brittany Scarff

General Electric

GetBusy USA Corporation (SmartVault) Kay Ryan

Greymatter Alliance Inc. John Hubbs

NanoInnovations LLC Huma Jafry

National Oilwell Varco

Rheidiant LLC Murat Ocalan

SeatsX LLC Erik Simpson

Set Solutions John Marler

This is Petroleum Systems LLC Andy Pepper

Trinity Cody Nicholson

1.19 Life cycle

  • Idea
    • Still employed? No-moonlighting clause?
    • Research - signing into a competitor's Web site? Acquiring product to study (shingle shrinkwrap)
    • FOSS?
    • Patent coverage by others?
      • Expired?
    • Patent / copyright insurance?
    • Implementation of a standard? (FRAND)
  • License from someone else
    • Ownership?
    • Other coverage

1.19.1 Types of transaction

  • Software license
  • AWS - SaaS
  • Employment agreement
  • M&A - acquirer, or target
  • Cease & desist letter
  • Learn about a patent
  • Hiring away an employee
  • New employee offers secrets (Uber / Waymo - Lewandowski)
  • Modify existing contract - unilateral?
  • Fire an employee
  • Government grant
  • Use "public domain" materials
  • Collaborate with another company
  • For-hire services
  • "Borrowing" language from another Web site
  • Signing into a competitor's service under a personal account
  • Hiring a software developer that doesn't deliver the code - California case: Integrated Dynamic Solutions, Inc. v. VitaVet Labs, Inc., 6 Cal. App. 5th 1178 - Cal: Court of Appeal, 2nd Appellate Dist., 2nd Div. 2016

1.19.2 Litigation overview

How it works
Roles; standards of review

Preliminary injunction: Jump through hoops: California software-development case: Integrated Dynamic Solutions, Inc. v. VitaVet Labs, Inc., 6 Cal. App. 5th 1178 - Cal: Court of Appeal, 2nd Appellate Dist., 2nd Div. 2016

How much second-guessing? Election results

Jury verdict

Bench trial

De novo

Discretion / arbitrary and capricious - see https://scholar.google.com/scholar_case?case=2399151225087672871&hl=en&as_sdt=6,44&as_vis=1 (Fed. Cir. discussion of Zurko, arb. & capr. vs. subst. evid.)

Administrative determination

1.19.3 Trademarks

Picking a trademark

Genericness - Booking.com SCOTUS case - genericness - from ABA IPL summary: The Court held that a “generic.com” term is only generic for a class of goods or services if consumers perceive the term as the name of the class of goods or services. The Court rejected the USPTO’s argument that, like “Generic Company,” every “generic.com” term is generic, regardless of consumer perception. Instead, the Court held that because “Booking.com” is not a generic name to consumers, it is not generic and therefore qualifies for trademark protection. The Court also rejected the USPTO’s argument that trademark protection for “generic.com” marks would hinder competitors, noting that the registration of “Booking.com” would not give Booking.com a monopoly on the term “booking,” preventing competitors from using the word “booking” to describe their own services.

Licensing - quality control

From ABA IPL summary: Sock It To Me, Inc. v. Aiping Fan, Opposition No. 91230554, 2020 U.S.P.Q.2d 10611 (T.T.A.B. June 3, 2020). Applicant Aiping Fan filed a trademark application for registration of SOCK IT UP in connection with socks in class 25. Opposer Sock It To Me opposed Aiping Fan’s application, alleging that SOCK IT UP was likely to cause confusion under section 2(d) with its registered mark SOCK IT TO ME for socks and stockings. The opposer also claimed that the applicant, an individual residing in China, did not own the mark when the application was filed, and therefore the application was void ab initio. The opposer alleged that a different entity (JY Instyle) used the mark in the U.S. and was the true owner of the mark. The applicant indicated that it had selected the mark for use in the U.S. and had granted JY Instyle an oral license to use the mark on socks. Thus, according to the applicant, use of the mark by JY Instyle was attributable to the applicant, as JY Instyle was a related company and such use inured to the benefit of the applicant. The Trademark Trial and Appeal Board (TTAB) considered whether the applicant (as licensor) exercised sufficient control over the quality of the goods produced under the SOCK IT UP mark by its licensee (JY Instyle). Based on the evidence, the TTAB found that the applicant had established quality control over the source of manufacturing and type of fabrics used to make the socks, and that JY Instyle had inspected the goods to ensure that they complied with the applicant’s standards. Thus, the TTAB concluded that the applicant owned the SOCK IT UP trademark when it was filed.

1.19.4 Patents

Patents of others
Patent filing deadlines
Inventorship

From ABA IPL update: Dana-Farber Cancer Institute, Inc. v. Ono Pharmaceutical Co., 964 F.3d 1365 (Fed. Cir. 2020). The Federal Circuit affirmed the district court’s inventorship conclusion, finding that the alleged joint inventors made numerous significant contributions to the claimed subject matter. The Federal Circuit noted that conception is the touchstone of the joint inventorship inquiry. The Federal Circuit also explained that reduction to practice does not need to occur at the moment of conception for purposes of identifying correct inventors and that joint inventorship does not depend on whether a claimed invention is novel or nonobvious over a particular researcher’s contribution.

Remedies

ITC exclusion order

Royalties

Lost profits

Injunction

IPRs
Marking requirement

From ABA IPL summary: Packet Intelligence LLC v. NetScout Systems Inc., 965 F.3d 1299, 2020 U.S.P.Q.2d 10776 (Fed. Cir. 2020). The Federal Circuit reversed and vacated the district court’s presuit damages award and enhancement thereof, finding that the district court’s jury instruction on the marking requirement conflicted with an intervening Federal Circuit case, Arctic Cat Inc. v. Bombardier Recreational Products Inc., 876 F.3d 1350, 1368 (Fed. Cir. 2017). Specifically, Arctic Cat held that the patentee must prove that the products practiced the patent; however, the jury instruction placed the burden on NetScout to show that certain products did not practice the asserted patent. After properly placing the burden on the patentee, the Federal Circuit found that Packet Intelligence failed to present substantial evidence to the jury that the unmarked MeterFlow product practiced any asserted patent claim. The Federal Circuit also rejected Packet Intelligence’s attempt to preserve the damages award through the direct infringement of the related, and also asserted, method patent. The Federal Circuit held that (1) there was no evidence supporting damages from NetScout’s presuit internal use and testing of the patented method; and (2) Packet Intelligence could not circumvent § 287 by arguing that NetScout’s infringement of the related method claims drove accused product sales. The Federal Circuit affirmed the district court’s judgment in all other respects.

1.19.5 Trade secrets

Examples

Slim Jims KFC Coke

If you patent a trade secret formula, will it still be entitled to protection as a trade secret?

Defend Trade Secrets Act
Three Rules
  • Confidentiality

    From ABA IPL update: Konica Minolta Business Solutions U.S.A., Inc. v. Lowery Corp., No. 15-11254, 2020 WL 3791601, 2020 U.S. Dist. LEXIS 120082 (E.D. Mich. July 7, 2020). Konica Minolta Business Solutions (KMBS) identified hundreds of specific documents and files that it claimed the defendants misappropriated. The defendants contended that KMBS failed to identify the specific alleged trade secrets with sufficient detail and therefore the defendants were entitled to summary judgment. The district court granted partial summary judgment. The district court found that KMBS’s pricing information was publicly available and not a secret. However, the district court found that the plaintiff’s internal price books contained information it did not disclose to customers and were not public. The price books contained multitiered pricing options for KMBS’s equipment and services that depended on several factors, including internal discounted prices that could be offered to customers based on particular circumstances. There were genuine issues of fact on whether the price books were protectable trade secrets.

    From ABA IPL update: Danaher Corp. v. Gardner Denver, Inc., No. 19-CV-1794-JPS, 2020 U.S. Dist. LEXIS 89674, 2020 U.S.P.Q.2d 10565 (E.D. Wis. May 20, 2020). Michael Weatherred worked at Danaher for 16 years and served as the vice president. Weatherred then joined Gardner Denver, and Danaher sued Gardener Denver and Weatherred, alleging trade secret misappropriation. Danaher moved for a preliminary injunction. Gardner Denver and Danaher are not commercial competitors. The alleged trade secret involved a slide and video presentation posted online for over nine months before the motion for a preliminary injunction was filed. The district court found that Danaher had not plausibly alleged any actual or imminent harm and thus denied the preliminary injunction.

Common violations
  • Emailing things to yourself

    From ABA IPL update: ExamWorks v. Baldini, No. 2:20-CV-00920, 2020 U.S. Dist. LEXIS 103366 (E.D. Cal. June 11, 2020). ExamWorks manages medical examinations, peer reviews, bill reviews, and Medicare compliance. Four former employees were sued collectively for misappropriating trade secrets. The results of a forensic investigation revealed that about a month before Baldini was terminated by ExamWorks, Baldini sent a computer file to his personal email containing information on over 53,000 cases over the past year and half with detailed contact information for both doctors and customers. Based on this evidence, the district court found that the compiled information identifying customers with particular needs and characteristics contained more than the mere identities and addresses easily identified through publicly available sources. This information would give a competitor a substantial business advantage in seeking to offer services to compete with ExamWorks. Therefore, the motion for the preliminary injunction was granted.

1.19.6 Confidentiality agreements — NDAs, employment agreements, consulting agreements

1.19.7 Employment agreements

1.19.8 Dispute management

1.19.9 Audits of royalty reports

Disney stiffing the Star Wars novelist - WSJ 2020-12-19

1.19.10 Incentives

1.19.11 M&A: Due diligence

1.19.12 Copyrights

Fair use

9th Cir. - Dr. Seuss v. Star Trek guys re "O the places you'll boldly go"

Implied license / de minimis use

ABA IPL article: In Solid Oak Sketches, LLC v. 2K Games, Inc., a Manhattan federal judge dismissed a tattoo licensing company’s copyright infringement claim against two video game companies that developed and published basketball simulation games depicting realistic renderings of NBA players and their tattoos.1 Across the bridge in Brooklyn, another federal judge, in LMNOPI v. XYZ Films, LLC, dismissed a copyright action against a film production company that had depicted a mural in the opening scene of a film without the artists’ permission.2 There are many more decisions of this ilk that tend to float under the radar but warrant a brighter spotlight, some of which are discussed below. * * *  On the defendants’ summary judgment motion, the court held that Solid Oak’s copyright infringement claim must fail for a number of reasons, including because the defendants established that the tattoo artists had previously granted the players nonexclusive licenses to use the tattoos as part of their likenesses. The court concluded that the facts before it, based on the declarations of two of the tattoo artists and one of the game developers, strictly satisfied the three-factor test: (1) the players each requested the tattoos, (2) the tattoo artists created the tattoos and inked them on the players’ bodies, and (3) the tattoo artists intended that the players would copy and distribute the tattoos as elements of their likenesses. In discussing the intent element, the court found that each tattoo artist knew that the players were likely to appear “in public, on television, in commercials, or in other forms of media.”21 Because no limitations on the display or depiction of the tattoos were discussed, the players therefore had implied licenses to use the tattoos as elements of their likenesses, and the artists even admitted as much in their sworn statements. And by the players giving the NBA the right to license their likeness to third parties, including for use in the video games, the license extended to the defendants.

Substantial similarity / summary judgment

From ABA IPL summary: Zindel v. Fox Searchlight Pictures, Inc., No. 18-56087, 2020 WL 3412252, 2020 U.S.P.Q.2d 10688 (9th Cir. June 22, 2020). Zindel sued for copyright infringement of his father’s play, Let Me Hear You Whisper, against the defendants for the film and book, The Shape of Water. The district court dismissed the complaint on the ground that the film and book were not substantially similar to the play as a matter of law. The Ninth Circuit found that the district court erred and reversed, concluding that reasonable minds could differ as to whether there could be substantial similarity between the works. The Ninth Circuit determined that while the works were properly presented to the district court, additional evidence, such as expert testimony, would aid in deciding whether there are similarities in the protectable elements of the works.

1.20 DONE Rice course: Description »

[2020-11-10 Tue 05:01]

MGMT 725 Intellectual Property Strategy for Entrepreneurs: Legal and Strategic Aspects

Intellectual property, or "IP," is about four things: (i) Building and maintaining legal fences around your company's business; (ii) spotting fences put up by other companies — which are sometimes hard to see; (iii) making deals for access to fenced-in yards; and (iv) preparing for battle in court about claims of trespass.

1.21 Opinions of counsel

1.22 TODO Price points for SaaS - credit card limits etc. - add to Startup Law »

2 Class plans

A gouge book 

Version 2021-B; rev. Feb. 24, 2021

NOT A SUBSTITUTE for legal advice – offered AS IS, WITH ALL FAULTS. A work in progress (very much so).

3 Preface

This is what's known in the Navy as a gouge book: What you need to know, without a lot of extra verbiage.

3.1 IP rights in covid-19 vaccines

Miriam Berger WHO head pushes for waiver of some intellectual property rights for coronavirus vaccines, in bid to broaden access (WashingtonPost.com March 5, 2021).

What are those rights?

3.1.1 Patents

From 35 U.S.C. § 101:

Whoever invents or discovers any new and useful —

  • process,
  • machine,
  • manufacture,
  • or composition of matter,

    or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.

(Not verbatim.)

3.1.2 Trademarks

Pharmaceutical companies go to a lot of trouble and expense to brand their products (often with distinctly unmemorable names).

4 Royalty payments

4.1 Recordkeeping

4.2 Audit rights

5 The judicial process

How appeals courts review decisions below: 11th Cir. blog-copyright case

ALWAYS expect a counterclaim and affirmative defenses - e.g., 11th Circuit blog copyright case

  • Discovery is a PITA.
  • Motions in limine

11th Cir. blog-copyright case - good use of "a reasonable jury could conclude …."

To determine whether a particular use is fair, a factfinder considers four nonexclusive factors: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.

17 U.S.C. § 107. The inquiry is a “flexible” one that requires weighing the four factors in the light of the facts of the case. Cambridge Univ. Press v. Patton, 769 F.3d 1232, 1259 (11th Cir. 2014). We consider each factor in turn.

Campbell v. AcuffRose Music, Inc., 510 U.S. 569, 575 (1994) ("Oh Pretty Woman")

  1. "Intellectual property" is mostly about court proceedings — if you can't keep it a secret, you'll have to go to court to stop someone else from using your ideas.

    How lawsuits start

  2. A  judge in an American court will never initiate a lawsuit against a "defendant"; the judge will take action against the defendant only in the context of a lawsuit brought by a "plaintiff."
  3. (A plaintiff could be a private party — an individual or a company, for example — or it could be a government entity. The same is true for defendants.)
  4. In nearly every American lawsuit, a corporation or other organization must be represented by one or more attorneys who are admitted to practice before the court in question. (Exception: In small-claims court, parties can generally proceed without lawyers.)
  5. Special case: Lawyers from "foreign" jurisdictions can ask a local court for permission to represent a particular client in that court for a particular lawsuit; this is referred to as being admitted pro hac vice in that court.
  6. Individuals may represent themselves in court (this is known as acting pro se) but generally retain legal counsel.

    Courts operate almost-entirely reactively, not proactively

  7. In the U.S. system, judges never (yes, that's a strong word) proactively take action about a controversy without someone having first filed a lawsuit or comparable proceeding.
  8. In any lawsuit, pretty much the only thing the judge will do is issue various kinds of orders in response to specific requests by the parties' lawyers.
  9. Apart from scheduling and admin, only rarely will a judge issue orders on her own initiative or otherwise be proactive in a case. (Such court-initiated orders generally involve obviously-bogus requests and/or obvious attorney misconduct — and usually, a judge will wait for a party to ask the court to take action even in those circumstances.)
  10. Apart from scheduling and admin: If a judge does want to issue an order about a case on her own initiative, the Constitution's due process provisions require the judge to give the parties notice and an opportunity to respond.

    "Facts" are sometimes found by juries, sometimes by judges

  11. A judge will not overturn a jury's verdict unless the losing party can persuade the judge of one or two things:
    • no reasonable jury could have reached that verdict on the evidence presented; in such a situation, the judge enters what's known as "judgment as a matter of law" — but if a reasonable jury could have reached the verdict on the evidence presented, then the judge must let the verdict stand; or
    • the trial was fundamentally unfair in some way, in which case the judge orders a new trial.
  12. When an appeals court reviews a trial-court judgment that's based on a jury's verdict, the appeals court reviews the facts in the light most favorable to the verdict.

    Court orders, Type 1: "Defendant, pay the plaintiff" (monetary award)

  13. After a full presentation of evidence — if the plaintiff persuades the fact-finder that it was harmed by the defendant's "actionable" conduct — then the court will order the defendant to pay the plaintiff for the "damages," i.e., the financial loss that the plaintiff "proves" by a preponderance of the evidence that the plaintiff suffered.
  14. Damages verdicts can be big: A federal jury in Waco recently reached a verdict that Intel Corporation must pay VLSI — a "non-practicing entity" — $2.18 billion for (allegedly) infringing two VLSI's patents.

    Court orders, Type 2: "Defendant, don't do X" (injunction)

  15. (If the law allows:) After a full presentation of evidence, a judge could permanently "enjoin," that is, order, a defendant to stop doing something (or, less-commonly, order the defendant to take affirmative action). Such orders are known as "injunctions."
  16. A party that violates an injunction can be held in contempt of court — this could result in monetary fines and even in spending time in jail.
  17. But judges institutionally prefer to simply order the defendant to pay money to the plaintiff (assuming that the plaintiff has made the required evidentiary showings).
  18. Judges prefer not to This is because courts don't want to have to get involved after the case is over that's something that can happen without the court having to get involved (much) after the fact. Such orders are generically referred to as "damages awards."
  1. (if defendant doesn't pay a judgment:) a "writ of execution" directing the sheriff to seize and sell the defendant's (non-exempt) assets and use the proceeds to pay the plaintiff what the defendant owes, and turn any remaining balance over to the defendant;
  2. (rarely:) an injunction prohibiting the defendant from doing specified things or (even more rarely:) directing the defendant to do specified things — this requires the court to weigh four factors, including the balance of equities and the public interest;
  3. an injunction directing the defendant to do something — that's an .

Courts don't do any of the above on their own initiative.

Judges don't know what you know, so — if you have the burden of proof — you have to demonstrate facts to them with admissible evidence.

"Hearsay" doesn't count because it's regarded as too-unreliable. (Think of the "telephone game.")

If either side timely demands a jury trial, then a jury will hear the case — and under the Seventh Amendment to the Constitution, whatever facts the jury finds will be essentially unchallengeable if a "reasonable" jury could have reached the same conclusion.

A grant of JMOL is appropriate "where a party has been fully heard on an issue during a jury trial and the court finds that a reasonable 1154*1154 jury would not have had a legally sufficient evidentiary basis to find for the party on that issue." Id. at 1342; see Fed. R. Civ. P. 50(a).

Lucent Technologies, Inc. v. Gateway, Inc., 543 F.3d 710 (Fed. Cir. 2008): affirmed overturning a $1.5 billion jury verdict because Lucent couldn't bring suit on its own — Fraunhoffer, a German company, was a co-owner of the patent.

… A grant of JMOL is appropriate when "the evidence, construed in the light most favorable to the non-moving party, permits only one reasonable conclusion, and that conclusion is contrary to the jury's."

… With respect to the '457 patent, the court held that the jury lacked substantial evidence and acted against the clear weight of the evidence in finding infringement of method claims 1 and 5 by Microsoft's Windows Media Player given that Lucent provided insufficient evidence to establish that the High Quality encoder actually ever ran and performed the claimed method. Id. at 925-27. For the same reasons, the court held that there was insufficient evidence of infringement of claim 10, which, although directed to a storage medium, used the phrase "manufactured in accordance with a process comprising," thus requiring evidence of practice of the claimed process. Id. at 927-28. Therefore, the court granted Lucent's motion for JMOL, or alternatively for a new trial, on infringement of the '457 patent.

6 Licensing

Territory

Payments

  • Up-front
  • Paid-up
  • Running royalty
    • Reports
    • Audit rights

6.1 Implied licenses

11th Cir. blog-copyright case - slip op. at 11-12

6.2 Good faith and fair dealing

SCODE in GSK v. DRIT:

… Under Delaware law, sophisticated parties are bound by the terms of their agreement. Even if the bargain they strike ends up a bad deal for one or both parties, the court’s role is to enforce the agreement as written. As we have explained, “[p]arties have a right to enter into good and bad contracts, the law enforces both.” Holding sophisticated contracting parties to their agreement promotes certainty and predictability in commercial transactions.

There are, however, instances when parties fail to foresee events not covered by their agreement or defer decisions to later. “No contract, regardless of how tightly or precisely drafted it may be, can wholly account for every possible contingency.” Subject to the express terms of the agreement, when gaps in an agreement lead to controversy, the court has in its toolbox the implied covenant of good faith and fair dealing to fill in the spaces between the written words. The implied covenant, inherent in all agreements, ensures that the parties deal honestly and fairly with each other when addressing gaps in their agreement. The court’s goal is to preserve the economic expectations of the parties.

The implied covenant, however, is a “cautious enterprise.” As we have reinforced on many occasions, it is “a limited and extraordinary legal remedy” and “not an equitable remedy for rebalancing economic interests that could have been anticipated.” It cannot be invoked “when the contract addresses the conduct at issue.”

The implied covenant should not have been deployed in this case. There was no gap to fill in the Agreement. …

Glaxo Group Ltd. v. DRIT LP, No. 25, 2020, slip op at 14-15 (Del. Mar. 3, 2021) (reversing, in part, trial-court judgment) (footnotes omitted).

6.3 Choice of law

7 Overview

7.1 Introduction

This paper summarizes some common issues that can arise in transactions involving a software company ("Company"), such as:

  • licensing of Company's software or other technology;
  • an outright sale of Company's rights in software or other technology, or of Company itself;
  • a loan, an equity investment, or similar transactions, where software or other technology is involved.

7.2 Outsiders Might Try to Claim Ownership Rights

Company will naturally want to ensure that it owns its software or other technology to the greatest extent possible. Challenges to Company's ownership can come from several directions.

7.2.1 Former Employers Might Try to Assert Rights

Former employers might try to assert outright ownership of Company's proprietary technology, either in its present form or in an earlier version. (See also the discussion of ownership below.) They might assert patent rights, copyrights, or trade secret rights. Some circumstances to watch out for:

  • An inventor came up with an idea for a product or service while working for a former employer.
  • An employee took documents or other materials from a former job.
  • Company will compete with a former employer of one or more of its employees.
  • Two or more employees worked for the same former employer — that might get the former employer upset and looking for a reason to sue.
  • An employee has an invention-assignment agreement with a former employer.

In any of the above cases, Company could be hit with a patent, copyright or trade-secret lawsuit by the former employer.

Example: In the Computer Associates case, Altai, Inc. hired a programmer to help work on a new software product. Unbeknownst to Altai, the programmer allegedly brought with him some source code from his days at Computer Associates. He supposedly incorporated that code into the new Altai software. CA sued for copyright infringement and misappropriation of trade secrets. Altai was forced (1) to rewrite that portion of its code, (2) to pay a substantial damage award, and (2) to spend years in litigation. See Computer Associates. Int'l, Inc., v. Altai, Inc., 982 F.2d 693 (2d Cir. 1992) (affirming holding of noninfringement of rewritten software) (discussed in Chapter 2).

Even if the former employer does not have ownership rights, it may still have provided funding or work time for development of the technology in question. If so, it may have shop rights, i.e., a nonexclusive, royalty-free right to use the technology, and might be able to compete with Company without restriction.

When hiring a contractor or employee, Company can ask the new hire about prior work experience. It might also be possible to ask the new hire to sign a written representation that s/he will not be bringing any work product from previous employment except as expressly approved in advance, preferably in writing, by Company.

7.2.2 Employees and Contractors Might Personally Own Their Patent Rights

In the patent arena, a nonemployee who does not have a written invention-assignment agreement — or an employee who does not have such an agreement and was not “hired to invent” or “set to experimenting” — might be the owner, or an independent joint owner, of part of Company's software or other technology. See Chapter 3.

If Company collaborated with another company in developing a patented invention, the other company could have the right to use or license the technology without Company's consent, and without accounting to Company. See Chapter 3.

7.2.3 Free-Lancers Might Personally Own Their Copyrights

In the copyright arena, an outside contractor who writes computer software without a work-for-hire or assignment agreement may own the copyright in the software. Such a contractor could have the right to limit Company's use of the software that Company paid to have developed. See Chapter 2.

Even an outside contractor is not the sole owner of a copyright, it could still be a “joint author” and thus a coowner of the copyright. Such a joint author/co-owner might be free to go into competition with Company. Joint authors of a copyrighted work must account to one another for their respective uses of the copyrighted work, i.e., share the proceeds of their uses. See Chapter 2.

Documentation for Company-developed computer software can be subject to the same copyright ownership issues as the software itself.

7.2.4 The Golden Rule: Funding Sources May Try to Claim Rights

Research and development joint venture agreements, or development contracts with other companies, can affect ownership of Company's software or other proprietary technology (either in its present form or in an earlier version).

R & D funding by state or federal agencies (e.g., universities, DOD, DOE) can have ownership strings attached. For example, the federal Bayh-Dole Act sets forth specific requirements that must be met by certain federally funded entities to be able to retain title to technology they develop with that funding. See 35 U.S.C. §§ 200-212; Rights to inventions made by nonprofit organizations and small business firms under government grants, contracts, and co-operative agreements, 37 C.F.R. Part 401.

WSGR FAQ on Bayh-Dole

7.2.5 Nailing down ownership rights in writing

When using outsiders for technology development, an important rule of thumb is to try to nail down ownership and/or licensing rights in writing with an assignment clause in a contract. Such a clause can be useful in an employment agreement with employees, too — keeping in mind that state law may regulate the extent to which an employer can require employees to assign their rights in inventions and the like. See Chapters 2, 3.

7.3 Patent Issues

Software patents are a fact of life, and are becoming more important than they were in years past. See Chapter 3. Software companies are paying increasing attention to obtaining their own patents and, of necessity, to defending against third-party patents.

7.3.1 The Clock May Be Ticking on the Right to Apply for a Patent

In the U.S., the nonextendable deadline for filing a patent application is one year after the first barring event, e.g., the first offer for sale, public use (including commercial use even if in secret) or publication of the invention.

No such “grace period” exists in most other industrialized countries, which have “absolute novelty” deadlines for filing patent applications. Most countries, however — not all — as members of the Paris Convention, will give credit for a U.S. filing date for up to one year after that date (i.e., foreign counterpart applications can be filed for up to one year after the U.S. filing date).

7.3.2 Ways of Checking for Infringement of Third‑Party Patents

Company may be using, or about to use, a product, method, or process that is covered by a patent belonging to a competitor or other third party. Likewise, a competitor of a customer or supplier may have patent coverage that could affect Company's business. If so, Company may be vulnerable to a patent-infringement lawsuit.

Infringement searches are one way Company can look for potential third-party patent problems, but searches are not foolproof. Other indications of potential problems:

  • Company's competitors' products may have patent-number markings, which can give some idea whether a problem might exist.
  • Another indication is if others in the industry are being sued (or threatened with suit) for patent infringement.
  • If Company receives an “invitation” to take a license under a patent, or just a plain “notification” of the existence of a patent, that could be a prelude to a charge of infringement — or perhaps to a lawsuit.

7.3.3 Possible Damages – Including Treble Damages – for Patent Infringement

If found to be an infringer, Company could be forced to pay patent infringement damages – potentially the patent owner's lost profits, and in any event not less than a reasonable royalty.

Top ten patent damages cases

Idenix Pharma. LLC v. Gilead Sciences Inc.: 941 F.3d 1149 (Fed. Cir. 2019) $2.5 billion (but patent invalidated for enablement).

Example: In the famous Polaroid Corp. v. Eastman Kodak Co., case, the total damage award against Kodak was in excess of $900 million. See Polaroid Corp. v. Eastman Kodak Co., 16 USPQ (BNA) 1481 (D. Mass 1990).

The courts have held that if a company is aware of another's patent rights, it has a duty to use due care to ensure that it is not infringing. If infringement is proved, then proof of the company's failure to use due care can lead to a finding of willful infringement, which in turn can lead to an increase in the damage award — up to treble damages in the discretion of the trial judge — and possibly an award of attorneys' fees.

If Company relies in good faith on what it reasonably believe to be a competent opinion of counsel that Company are not infringing any valid claim of a patent, that can help Company avoid being held a willful infringer. Even if Company loses on the infringement issue, its reasonable reliance on the opinion can still negate willfulness.

7.3.4 Injunctions Against Patent Infringement

If Company is held liable for patent infringement, it could be subjected to an injunction against further infringement. “It is the general rule that an injunction will issue when infringement has been adjudged, absent a sound reason for denying it.” Richardson v. Suzuki Motor Co., Ltd., 868 F.2d 1226 (Fed. Cir. 1989).

A preliminary injunction may be entered if the patent owner proves, among other things, that it is likely to succeed on the merits of an infringement lawsuit.

7.3.5 Personal Liability for Patent Infringement

Individuals who direct or actively take part in patent-infringing activities by a corporation could be personally liable for the infringement.

7.4 Someone Else's Copyrights in Softwareor Data Compilations Might Be Infringed

If Company will be distributing software intended to be a work-alike competitor to another product, a copyright lawsuit alleging infringement of the “look and feel” or the “structure, sequence, and organization” of the target software may be a possibility. See Chapter 2.

If Company's product/service involves the use of a proprietary data base of facts (e.g., names, addresses, catalog part numbers, and so forth), the source of the facts should be investigated. Facts per se are not copyrightable. However, copying of others' data bases (e.g., yellow-page telephone books, maps) can lead to liability for copyright infringement if the selection or arrangement of the data is sufficiently “original,” i.e., if it is the result of at least minimal creative effort.

7.5 Trademark Issues Might Exist

Trademark rights in the U.S. are based on use of the mark (although a federal registration application can be filed on the basis of bona fide intent to use the mark). See Chapter 4; 15 U.S.C. § 1051. Consider checking whether Company has filed any registration applications.

Infringement of another's trademark rights, through the use of a “confusingly similar” mark, can lead to a preliminary injunction, a permanent injunction, destruction of infringing articles, and up to treble damages in some circumstances. See 15 USC 1114.

A trademark search for similar marks (registered and unregistered) is usually advisable if a significant investment will be made in promoting a new mark. It is not enough to check corporate-name records, state trademark records, or county DBA filings. Consider looking into whether Company has had a search done.

If Company has chosen a highly “descriptive” trademark, the mark may be difficult or impossible to protect legally. See 15 USC 1052.

Assignments or other transfers of a mark cannot be accomplished independently of the goodwill symbolized by the mark. Any such transfer without goodwill could be deemed an “assignment in gross” that destroys the trademark rights. See, e.g., Berni v. Int'l Gourmet Restaurants of America, Inc., 838 F.2d 642 (2d Cir. 1988).

7.6 The Export-Control Laws Could Pose Problems

A U.S. export license is necessary for all exports of commodities and “technical data” (including software) unless a License Exception applies. See Chapter 11. Restriction of exports of encryption software is a particular bone of contention in the software industry. Failure to comply with export licensing requirements can result in criminal penalties.

7.7 Defamation and On-Line Providers

A not-untypical problem is that of the Internet user who posts defamatory material in an email, newsgroup message, or chat room message. One court held that the on-line service provider that made Internet access available to the defamatory poster could be liable for the defamation. See Stratton-Oakmont, Inc. v. Prodigy Services Co., 1995 WL 323710 (N.Y. Sup. 1995) (granting partial summary judgment for defamation plaintiff).

In response, Congress expressly overruled Stratton-Oakmont as part of the Communications Decency Act (CDA). That statute states that “[n]o provider or user of an interactive computer service [defined as including ISPs as well as internal corporate systems] shall be treated as the publisher or speaker of any information provided by another information content provider [defined as creators or developers or information provided through the Internet or other interactive computer system].” 47 U.S.C. § 230(c).

That portion of the CDA preempts contrary state law. Id. § 230(d)(2); see Blumenthal v. Drudge, 992 F. Supp. 44 (D.D.C. 1998) (dismissing America OnLine as defendant in defamation action relating to on-line commentator Matt Drudge's reporting of rumor that White House aide Sidney Blumenthal had a history of spousal abuse); Zeran v. America OnLine, Inc., 958 F. Supp. 1124, 1129-37 (E.D. Va.) (dismissing action against AOL by victim of hoax perpetrated via AOL), aff'd, 129 F.3d 327 (4th Cir. 1997)/./

8 Patents

Patent claims can be disclaimed, and Glaxo killed its own patent to get out of paying royalties to DRIT: Glaxo Group Ltd. v. DRIT LP, No. 25, 2020 (Del. Mar. 3, 2021) (reversing, in part, trial-court judgment).

8.1 Introduction: Software- and Internet Patents are “For Real”

Many patents for software- and Internet-related technology are issuing each week, to the point where the Patent and Trademark Office (“PTO”) recently initiated a program to improve the quality of its searching and examination of business method patents. See U.S. Patent & Trademark Office, Business Methods Patent Initiative: An Action Plan, March 29, 2000, posted at http://www.uspto.gov/web/offices/com/sol/actionplan.html.) The official abstracts of some patents recently in the news are set forth below:

*Amazon.com: USP 5,960,411, “Method and system for placing a purchase order via a communications network.” A method and system for placing an order to purchase an item via the Internet. [1] The order is placed by a purchaser at a client system and received by a server system. [2] The server system receives purchaser information including identification of the purchaser, payment information, and shipment information from the client system. [3] The server system then assigns a client identifier to the client system and associates the assigned client identifier with the received purchaser information. [4] The server system sends to the client system the assigned client identifier and an HTML document identifying the item and including an order button. [5] The client system receives and stores the assigned client identifier and receives and displays the HTML document. [6] In response to the selection of the order button, the client system sends to the server system a request to purchase the identified item. /[7] /The server system receives the request and combines the purchaser information associated with the client identifier of the client system to generate an order to purchase the item in accordance with the billing and shipment information whereby the purchaser effects the ordering of the product by selection of the order button. (Bracketed numbering added.)

*Double Click, Inc.: USP 5,948,061, “Method of delivery, targeting, and measuring advertising over networks.” Methods and apparatuses for targeting the delivery of advertisements over a network such as the Internet are disclosed. Statistics are compiled on individual users and networks and the use of the advertisements is tracked to permit targeting of the advertisements of individual users. In response to requests from affiliated sites, an advertising server transmits to people accessing the page of a site an appropriate one of the advertisement based upon profiling of users and networks.

*Priceline.com: USP 5,897,620, “Method and apparatus for the sale of airline-specified flight tickets.” An unspecified-time airline ticket representing a purchased seat on a flight to be selected later, by the airlines, for a traveler-specified itinerary (e.g., NY to LA on March 3rd) is disclosed. Various methods and systems for matching an unspecified-time ticket with a flight are also disclosed. An exemplary method includes: (1) making available an unspecified-time ticket; (2) examining a plurality of flights which would fulfill the terms of the unspecified-time ticket to determine which flight to select; and (3) providing notification of the selected flight prior to departure. The disclosed embodiments provide travelers with reduced airfare in return for flight-time flexibility and, in turn, permits airlines to fill seats that would have otherwise gone unbooked. Because of the flexibilities required of the unspecified-time traveler, unspecified-time tickets are likely to attract leisure travelers unwilling to purchase tickets at the available published fares and, at the same time, are likely to "fence out" business travelers unwilling to risk losing a full day at either end of their trip. Moreover, the flexibilities required of the unspecified-time traveler need not be limited to a departure time; the flexibilities may also include the airline, the departing airport, the destination airport, or any other restriction that increases the flexibility afforded the airline in placing the traveler aboard a flight. The disclosed embodiments thus permit airlines to fill otherwise empty seats in a manner that stimulates latent and unfulfilled leisure travel demand while leaving their underlying fare structures intact.

In recent months such patents have gotten a great deal of ink; not just journalistic ink but increasingly, judicial ink. For example:

Xerox Corp. v. 3Com Corp., 2001 WL 1757247 (W.D.N.Y. Dec. 20, 2001), on remand from 267 F.3d 1361 (Fed. Cir. 2001): Technology: Palm Pilot “Graffiti” software. Xerox sued manufacturers of Palm Pilot personal digital assistants (PDAs), claming that Palm's “Graffiti” handwriting-recognition software infringed a Xerox patent. The district court initially granted summary judgment of noninfringement, but after being reversed on that point by the Federal Circuit, the court granted summary judgment that the patent was valid, infringed, and enforceable.

Amazon.com, Inc. v. Barnesandnoble.com, Inc., 73 F.Supp.2d 1228 (W.D. Wash. 1999) (granting preliminary injunction). Technology: “One-click” ordering system for e-commerce Web sites. Comment: This opinion is worthy of careful reading for insights into how evidence is marshaled by counsel – and assessed by the trier of fact – in a patent infringement case.

Wang Laboratories, Inc., v. America Online, Inc., 197 F.3d 1377, 1384 (Fed. Cir. 1999) (affirming summary judgment that AOL and Netscape Web browsers did not infringe)/. Technology:/ Videotex frame processing system.

WMS Gaming, Inc. v. Int'l Game Technology, 184 F.3d 1339, 1355-60 (Fed. Cir. 1999) (affirming judgment that patent was not invalid and was infringed under doctrine of equivalents)/. Technology:/ Microprocessor-based slot machine in which the spinning reels were electronically controlled to vary the odds of winning. Comment: This opinion provides an excellent summary of a variety of different patent-law doctrines.

Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261 (Fed. Cir. 1999) (vacating and remanding summary judgment of noninfringement). Technology: Garage door opener remote-control systems. Comment: The court held that a fact question existed as to whether a software-based system for selecting transmitter codes was “equivalent” (see § 3.7[e]) to the patented mechanically-based system.

Oacis Health Care Systems, Inc. v. Allcare Health Management Systems, Inc., 2000 WL 550040 (N.D. Cal. 2000) (granting patent owner-defendant's motion to dismiss declaratory-judgment action for lack of personal jurisdiction). Technology: Integrated health-care information management system.

Dymo Costar Corporation v. Seiko Instruments USA, Inc., 2000 WL 502616 (D. Conn., Mar 20, 2000) (granting preliminary injunction against accused infringer). Technology: Postage label that could be produced with an inexpensive thermal printer, which was described as useful in “Internet postage,” i.e., downloading postage credits to a personal computer over the internet:

Novadigm, Inc. v. Marimba, Inc., 2000 WL 228356 (N.D. Cal. Feb 15,

  1. (granting patent owner's motion to dismiss inequitable-conduct

defense). Technology: “Push”-type system for proactively delivering content over the Internet.

CIVIX-DDI, LLC v. Microsoft Corp., 84 F.Supp.2d 1132 (D. Colo. 2000) (granting defendants' motion for summary judgment of noninfringement). Technoloyg: Street-mapping software used on Web sites and Internet kiosks.

AT&T Corp. v. Excel Communications, Inc., 172 F.3d 1352, 1358-60 (Fed. Cir. 1999) (reversing and remanding summary judgment of invalidity of patent on statutory-subject-matter grounds); on remand, 1999 WL 1050064, 52 U.S.P.Q.2d 1865 (D. Del. 1999) (NO. (granting defendant's motion for summary judgment of invalidity on prior-art grounds). Technology: Method of recording primary interexchange carrier (PIC) of recipient of telephone call as data field in message record. Comment: The claims of this patent were found to be anticipated by MCI's Friends and Family program.

Charles E. Hill & Associates, Inc. v. CompuServe, Inc., 65 F.Supp.2d 924, 931 (S.D. Ind. 1999) (construing claim language). Technology: “Distributed” catalog system in which up-to-date information related to a selected product is transmitted from a main computer to a remote computer.

(Continued on next page)

8.2 Exactly What is a Patent?

A patent is a Government document that announces:

  • that the inventor has submitted a patent application, containing a written disclosure of what the inventor believes to be a new invention,
  • that a patent examiner has reviewed the patent application and made a determination that the application and the invention appear to meet certain legal criteria, and
  • in exchange for submitting the invention for publication in a patent, the Government has granted the inventor certain rights, for a limited period of time, in the invention as claimed.
What is a Patent?
 
- Limited grant of right to exclude others
 
- Bargain between inventor and government
 
- Not a “permit” to use the invention
 
- Rights defined by claims
 
- Competitors have rights, too

A patent gives the owner the right to exclude others from making, using, offering for sale, and selling the invention described and claimed in the patent. The statute provides that:

Every patent shall contain . . . a grant to the patentee, his heirs or assigns, of the right to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States, and if the invention is a process, of the right to exclude others from using, offering for sale or selling throughout the United States, or importing into the United States, products made by that process . . . .

35 U.S.C. § 154(a)(1).

Some noteworthy points about patents:

(i) A patent gives the inventor the right to exclude, not the right to practice the invention. A patent is not like a fishing license or a building permit; an inventor does not need a patent to be able to practice his or her invention. Every patent contains a grant to the owner of the right, for a limited period of time, not to practice the invention him- or herself, but instead to exclude others from making, using, selling, offering to sell, or importing the specific subject matter described by the claims of the patent in the United States.

(ii)*   */An inventor's competitors can freely copy and use an unpatented invention./ If a new product has been made public (for example, by putting it on sale or by publishing information about it), then others have the right to freely copy and use the product (but not necessarily to copy any subject matter that is protected by other patents or by copyright), without any obligation to its inventor, unless and until a patent is issued that covers the product.

*Why Competitors Have the Right\\
to Copy Unpatented Inventions*
 
- Free competition is the rule in the U.S.
 
- Competitors' copying of unpatented, publicly-available technology benefits the public
 
- Gives inventors an incentive\\
to develop patentable inventions

There are several reasons for this rule. For example, free competition in the marketplace is the rule in the United States, and competitors are encouraged to copy unpatented, publicly available technology, because that benefits the public by disseminating new ideas. See, e.g., Bonito Boats, Inc., v. Thunder Craft Boats, Inc., 489 U.S. 141, 151, 164-65, 160, 109 S. Ct. 971, 977-78, 984-85, (1989) (holding that state law prohibiting plug-molding methods of copying boat hulls was preempted by federal patent law; “[t]he novelty and nonobviousness requirements of patentability embody a congressional understanding, implicit in the Patent Clause itself, that free exploitation of ideas will be the rule, to which the protection of a federal patent is the exception. Moreover, the ultimate goal of the patent system is to bring new designs and technologies into the public domain through disclosure.”).

In addition, this rule gives inventors an incentive to develop inventions that meet the rigid criteria for patentability – if an inventor develops an invention that falls short of those criteria, or if he does do not go through the procedures for obtaining a patent, then he will not be able to stop competitors from copying the invention. See id., 489 U.S. at 160, 109 S. Ct. at 982 (“the competitive reality of reverse engineering may act as a spur to the inventor, creating an incentive to develop inventions that meet the rigorous requirements of patentability”).

8.4 Substantive Requirements of Patentability

While software- and e-commerce inventions can be patented more readily than before (at least in the United States), not all such inventions meet the substantive requirements for patentability. It is probably safe to say that the majority of patent applications filed are rejected for failure to meet the patentability requirements set out in U.S. law.

8.4.1 The Enabling-Disclosure Requirement

By statute, a patent application must include an “enabling” disclosure of how to make and use the invention, as well as a disclosure of the “best mode” known to the inventor of practicing the invention. See 35 U.S.C. § 112, first paragraph.

An “enabling” disclosure in a patent application is one that will allow persons skilled in the art to make and use the invention without undue experimentation. See 35 U.S.C. § 112 (requiring enabling, best-mode disclosure of how to make and use invention); see generally, e.g., In re Hayes Microcomputer Products, Inc., Patent Litigation, 982 F.2d 1527 (Fed. Cir. 1992) (affirming jury verdict of infringement of patent relating to modem guardtime escape sequence and rejecting enablement- and best-mode challenge; “an inventor is not required to describe every detail of his invention”); /Northern Telecom, Inc.,

  1. Datapoint Corp./, 908 F.2d 931, 940-43 (Fed. Cir. 1990) (reversing

trial court finding of lack of enablement for failure to disclose source code of computer program, but affirming finding of failure to disclose best mode of magnetic tape cassette used for program and data storage).

Idenix Pharma. LLC v. Gilead Sciences Inc.: 941 F.3d 1149 (Fed. Cir. 2019), cert. denied, No. 20-380 (U.S. Jan. 19, 2021) $2.5 billion - patent for hepatitis-C treatment (but patent invalidated for enablement and lack of written description). Newman dissented; Lemley criticized the decision in an amicus brief.

From Idenix:

Enablement requires that "the specification teach those in the art to make and use the invention without undue experimentation." In re Wands, 858 F.2d 731, 737 (Fed. Cir. 1988). A claim is not enabled when, "at the effective filing date of the patent, one of ordinary skill in the art could not practice their full scope without undue experimentation." Wyeth & Cordis Corp. v. Abbott Labs., 720 F.3d 1380, 1384 (Fed. Cir. 2013). Whether a claim satisfies the enablement requirement is a question of law that we review de novo. Tr. of Boston Univ., 896 F.3d at 1361. However, "in the context of a jury trial, we review the factual underpinnings of enablement for substantial evidence." Id.

*  * * The uncontested jury instructions in this case formulate the Wands factors as follows:

(1) the quantity of experimentation necessary; (2) how routine any necessary experimentation is in the relevant field; (3) whether the patent discloses specific working examples of the claimed invention; (4) the amount of guidance presented in the patent; (5) the nature and predictability of the field; (6) the level of ordinary skill; and (7) the scope of the claimed invention.

8.4.2 The Best-Mode Disclosure Requirement

A “best mode” disclosure in a patent application relates to the best way known to the inventor of practicing the claimed subject matter at the time of filing the patent application. For example, if one of the claims in the application is directed to implementing a new software technique on a specific platform, then a disclosure of all points of “cleverness” relating to that specific implementation may be required. See the enablement cases cited supra; cf. Consolidated Aluminum Corp. v. Foseco Int'l, Ltd., 910 F.2d 804 (Fed. Cir. 1990) (affirming holding of inequitable conduct and resulting unenforceability of patent where patentee found to have concealed best mode intentionally).

On the other hand, if the claims are general in nature and applicable across a wide range of hardware — i.e., if they are not specific to any particular machine, operating system, etc. — then disclosure of specific implementation techniques may not be required. In particular, there is no rule that the details of a specific commercial implementation be disclosed; “[t]he focus of a section 112 inquiry is not what a particular user decides to make and sell or even in what field the invention is most likely to find success. Rather, in keeping with the statutory mandate, our precedent is clear that the parameters of a section 112 inquiry are set by the CLAIMS.” Zygo Corp. v. Wyko Corp., 79 F.3d 1563, 1567 (Fed. Cir. 1996) (affirming judgment that patent was not invalid for failure to disclose best mode) (emphasis in original).

8.4.3 No Requirement to Disclose Source Code

Patent application drafters and their clients frequently must confront the question whether to include in an application the source code of a computer program used in the invention. While the case law was unclear at first, technically the answer now appears to be “no”; the Federal Circuit has held several times that there is no hard and fast requirement for a source-code disclosure. “[W]hen disclosure of software is required, it is generally sufficient if the functions of the software are disclosed, it usually being the case that creation of the specific source code is within the skill of the art.” Robotic Vision Systems, Inc. v. View Eng'g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997) (reversing summary judgment of invalidity; holding that patent's disclosure of functions was adequate and that disclosure of source code was not necessary for compliance with best mode requirement), citing Fonar Corp. v. General Electric Co., 107 F.3d 1543 (Fed. Cir. 1997) (same).

Disclosure of source code can still be a good idea, however, as discussed in § 3.5[d][2].

8.4.4 The Claims Define the Protectable Invention

The last section of a patent contains the claims, which define the patented invention in words. There is no infringement of a patent unless the accused product (or process) is “covered” by at least one claim of the patent. Any similarities or dissimilarities between the description in the patent and the accused product are irrelevant, because “[t]he written description part of the specification itself does not delimit the right to exclude. That is the function and purpose of claims.” Markman v. Westview Instruments, Inc., 52 F.3d 967, 980 (Fed. Cir. 1995) (in banc), aff'd, 517 U.S. 370, 116 S. Ct. 1384, 134 L.Ed.2d 577 (1996) (holding that Seventh Amendment does not require jury trial of disputes over proper interpretation of patent claim).

Each claim sets forth a number of checklist-like elements. To prove infringement, a patent owner must show that every element of at least one claim is present in the accused product or process. (In a patent claim, less is more: A claim that has very few elements will be satisfied – i.e., infringed – by more things than will a claim that has more elements.)

Three hypothetical examples of patent claims are set out in the inset below.

1. [Independent claim] A chair comprising:
 
(a) a seat; and
 
#+beginquote
(b) at least three legs extending downward from the seat.
#+endquote
 
2. [Dependent claim] The chair of claim 1, further comprising a fourth leg extending downwardly from the seat.
 
3. [Dependent claim] The chair of claim 2, further comprising a back.

Hypothetical Examples of Patent Claims

8.4.5 The Novelty Requirement

One of the most important checks and balances in the patent system is that a patent cannot be granted on an invention that had already been invented. Even an independent reinvention of something that was already known is unpatentable by law. See 35 U.S.C. § 102 (categories of “prior art” that can preclude patentability of an invention). The underlying policy is that technology that is already available to the public should not be taken away from it by the granting of exclusionary rights. See, e.g., Graham v. John Deere & Co., 383 U.S. 1, 6 (1966).

If a patent claim — which was described above as a list of elements or method steps that serves to define the claimed invention in question — is satisfied or “met” by technology that was already known in the art, then the claim is unpatentable. In the parlance of the patent bar, the claimed subject matter is “anticipated.”

• For example, if someone else invented the subject matter first, and did not abandon, suppress, or conceal it, then the second inventor is not entitled to a patent (whether or not the first inventor is or might have been so entitled). See 35 U.S.C. § 102(g).

• If the claimed subject matter was patented or described in a printed publication anywhere in the world, or known or used by others in this country, before the inventor invented it, then it is unpatentable to that inventor. See 35 U.S.C. § 102(a).

8.4.6 “Obvious” Subject Matter is Unpatentable

Even if a single prior-art reference does not completely satisfy a patent claim's list of elements, the claim may still be unpatentable. The patent statute provides that if the claimed subject matter would have been “obvious” in view of what was already known, the claim is unpatentable. See 35 U.S.C. § 103 (statutory requirement of nonobviousness).

A useful discussion of a variety of obviousness-related issues can be found in WMS Gaming, Inc. v. Int'l Game Technology, 184 F.3d 1339, 1355-60 (Fed. Cir. 1999) (affirming judgment that patent on slot machine using computer-simulated spinning reels was not invalid for obviousness).

Measuring the Claimed Subject Matter Against the “Prior Art”

In evaluating the nonobviousness of a claimed invention, the ultimate question is whether the prior activities and publications of others would have made the claimed invention obvious to a hypothetical person of ordinary skill at the time it was invented. The phrase “hypothetical person of ordinary skill” is an important one. What counts is not what would have been obvious to the inventor (who may be of far greater – or lesser – skill than those of ordinary skill), but instead what would have been obvious to those who were practicing the art or arts in question. See generally, e.g., Custom Accessories, Inc., v. Jeffrey-Allan Industries, Inc., 807 F.2d 955, 962‑63 (Fed. Cir. 1986) (factors involved in determining level of ordinary skill); Bausch & Lomb, Inc., v. Barnes-Hind/Hydrocurve, Inc., 796 F.2d 443, 447 (Fed. Cir. 1986) (inventor's subjective belief of obviousness not dispositive of the issue).

A shorthand metaphor sometimes used by the courts is: Consider a worker of “ordinary” skill in his workshop. Hanging on the workshop walls are all the prior patents, publications, known devices, etc., that such a worker might consult and study if he were diligently researching a problem and how to solve it. Assume that this worker is familiar with all of these materials. The worker is assumed to be an ordinary worker and not someone who seeks to innovate. See Standard Oil Co. v. American Cynamid Co., 774 F.2d 448, 454 & n.3 (Fed. Cir. 1985), citing In re Winslow, 365 F.2d 1017 (CCPA 1966), and In re Antle, 444 F.2d 1168 (CCPA 1971).

Generally speaking, the question is: would these materials have suggested or taught, to such a worker, the subject matter that is being claimed by the patent owner, as set forth in the claim's checklist of elements? If so, the claimed subject matter would have been obvious and is unpatentable to the claimant; otherwise not. E.g., ACS Hospital Systems, Inc., v. Montefiore Hospital, 732 F.2d 1572, 1577 (Fed. Cir. 1984).

The Supreme Court laid down the basic analytical requirements for determining nonobviousness in Graham v. John Deere & Co., 383 U.S. 1 (1966). A decisionmaker inquiring into the nonobviousness question must ascertain (1) the scope and content of the prior art; (2) the level of ordinary skill in the art; and (3) the differences between the prior art and the claimed subject matter as a whole. Giving due weight to any circumstantial evidence, the decisionmaker must rule whether the claimed subject matter would have been obvious. See id. at 17‑18; Panduit Corp. v. Dennison Mfg. Co., 810 F.2d 1561, 1567 (Fed. Cir. 1987). The ultimate question of obviousness is one of law. Panduit, 810 F.2d at 1566‑67.

The Importance of Circumstantial Evidence of Nonobviousness

Evaluating the obviousness of an invention in retrospect can be difficult. As noted above, the courts have held that hindsight is not the proper perspective — hindsight reconstruction of the claimed invention, “using `the patent in suit as a guide through the maze of prior art references, combining the right references in the right way so as to achieve the results of the claims in suit,'“ is impermissible. Grain Processing Corp. v. American Maize-Products Corp., 840 F.2d 902, 907‑08 (Fed. Cir. 1988) (citation omitted). Once the invention is known, however, by definition a certain amount of hindsight is involved. Add to this difficulty the fact that judges and juries are frequently untrained in technological matters.

Consequently, the courts attempt to look at “objective” evidence, which can aid in deciding the obviousness question by viewing it through the eyes of others. Nonobviousness can be (but is not necessarily) objectively indicated in a number of ways:

  • commercial success that is linked with the specific subject matter being claimed by the inventor;
  • unexpected results or -properties;
  • copying by others;
  • accolades from others in the field;
  • initial skepticism on the part of those skilled in the art;
  • satisfying a long-felt need;
  • solving a problem that had stumped others;
  • licenses showing industry respect.

"These objective considerations can protect against the prejudice of hindsight bias, which often overlooks that the genius of invention is often a combination of known elements which in hindsight seems preordained."

Objective evidence of this kind often can be the most probative evidence of the nonobviousness of the claimed subject matter. Commercial success in particular can provide strong evidence of nonobviousness, because:

  • Commercial success implies that there was money to be made with the invention;
  • If the invention had in fact been obvious, the chances are that someone would have done it before;
  • By hypothesis, the invention is novel (otherwise for that reason alone it would be unpatentable);
  • Therefore, the commercial success indicates that the invention also was nonobvious.

BUT: Courts won't give any weight to objective evidence of nonobiousness unless the patent owner shows a nexus (a connection) between, e.g., the commercial success and the merits of the claimed invention. For example, evidence of gross sales alone won't establish commercial success — market share is what counts. And in any case, the patent owner must show that the commercial success was due to the technical quality of the patented subject matter and not to other factors such as extensive advertising or the patent owner's preexisting leadership in the market.

Note that the absence of objective evidence of nonobviousness does not establish the obviousness of the invention and is only a “neutral” factor.

8.5 Building a Company's Software- or Internet Patent Portfolio

8.5.1 Why Build a Portfolio

One school of thought that says that when it comes to patents in a portfolio, more is better. Jay Walker, of Priceline.com fame, apparently belongs to that school; his company, Walker Asset Management Limited Partnership, is listed as the assignee of dozens of issued patents purportedly covering various aspects of e-commerce. Priceline.com itself said in a January 2000 press release (available on its Web site) that it had been notified of the allowance of its seventh patent and that it had filed some 25 patent applications dating back to 1996.

Some of the potential benefits of a patent portfolio include:

  • A portfolio gives its owner something to bargain with if a competitor (or other company) comes knocking at the door, asserting its own patents.
  • An issued patent constitutes prior art as against any subsequent patent applicants, thus serving as a defensive publication for the issued patent's owner.
  • A patent on a company's key technology may help attract attention in the marketplace.

8.5.2 Consider Filing Lots of “Provisional” Patent Applications

Software and e-commerce companies interested in building a patent portfolio should consider adopting a Darwinian approach to building a patent portfolio: File cheap and informal provisional patent applications for as many inventions as practicable. The company can then use the phrase “patent pending” for its products or services covered by the provisional applications; it can decide later on whether to incur the expense of a regular patent application for some or all of the provisional applications. Three aspects of provisional applications make this a potentially workable strategy:

(i) The hard-dollar cost of a provisional application can be minimal. The official filing fee is only $75 for “small entities” (companies that have fewer than 500 employees including all affiliates), individual inventors, and educational and nonprofit institutions, and $150 for other companies, less than 25% of the fee for a regular application. See National application filing fees, 37 C.F.R. § 1.16(b). The filing fee is low for provisional applications because such applications are not given an examination by the PTO; they merely serve as “placeholders” for one year from their filing dates. See 35 U.S.C. § 111(b).

(ii) The content of a provisional application can be just about anything that meets the enablement- and best-mode disclosure requirements, discussed below. In particular, an inventor's informal but substantive write-up of the invention, plus a cover page with identifying information, can be filed as a provisional patent application. See Application number, filing date, and completion of application, 37 C.F.R. § 1.53(b)(2).

(iii) A nonprovisional patent application can later be filed during that one-year period, claiming priority as of the filing date of the provisional application for everything that was disclosed in the provisional application. See id. § 119(e).

So, if a company believes that it has an even arguably patentable invention, a useful approach can be to collect whatever documentation is available about the invention, put a cover sheet on it, and file it as a provisional patent application with a $75 or $150 fee as applicable. The documentation filed might take the form of a corporate invention disclosure form, an academic manuscript, a detailed lab notebook entry, source code for a computer program, etc.

There are risks, of course. A too-hasty provisional application might not meet the enablement- or best-mode requirements, discussed in § 3.4[a] and in § 3.4[b]. The inventor would then be forced to rely on a later filing date – which could be too late if the later filing date were after an applicable filing deadline (discussed below).

8.5.3 Pay Attention to Filing Deadlines for Patent Applications

Every country imposes filing deadlines for patent applications. Most if not all of these deadlines are tied to (a) disclosure, or (b) commercial activity, involving the claimed subject matter.

The U.S.'s One-Year Grace Period

In the United States (but not in most other countries), inventors have one year – no extensions can be obtained – in which to get a patent application on file after any of a number of events occur. See 35 U.S.C. § 102(b) (list of events that start the one-year clock running). The rationale for the grace period arises from a balance of two competing factors. The law regards it as undesirable policy to allow an inventor to take a long time to build up the market for his or her invention, and to wait until then to apply for years of patent protection. On the other hand, not every invention will be commercially significant enough to justify the cost of immediately preparing a patent application. Accordingly, U.S. law makes a compromise: it allows inventors a limited, one-year grace period in which to file a patent application.

Offers for Sale Start the Clock Running

A single offer for sale (or license) of the claimed subject matter in the U.S. can start the clock running. The offer, however, must be “objectively manifested” and “definite.” E.g., Envirotech Corp. v. Westech Eng'g Inc., 904 F.2d 1571, 1574, 1575 (Fed. Cir. 1990) (party asserting the bar “must prove by clear and convincing evidence … that there was a definite sale or offer to sell more than one year before the application for the subject patent”).

In some circumstances, simply exploring the market might not be enough to start the one-year clock running. E.g., Seal‑Flex, Inc. v. Athletic Track & Court Constr., 98 F.3d 1318, 1321 (Fed. Cir. 1996) (noting that “summary disposition is negated” when there is a genuine question “whether the inventor was merely exploring the market or had made an unconditional offer to sell ….”). /See also Articulate Systems, Inc.

  1. Apple Computer, Inc./, No. 96-10345-RGS, 1999 WL 307928 (D. Mass. May

11, 1999) (denying summary judgment; fact issue existed as to whether voice-recognition software developer's meetings with prospective purchasers involved sufficiently definite offers to constitute “offers for sale”).

An invention can be the subject of an offer for sale, even though it has not actually been built yet. Pfaff v. Wells Electronics, Inc., 525 U.S. 55, 119 S. Ct. 304 (1998) (affirming Federal Circuit reversal of district court's holding that invention was invalid because it was on sale more than one year before the critical date, but rejecting Federal Circuit's test for determining whether an invention was on sale).

In Pfaff, the Supreme Court adopted a two-part test for determining whether an invention had been offered for sale:

  • First, the invention must be the subject of a “commercial offer for sale,” and second, the invention must be “ready for patenting.”

    • The second element, readiness for patenting, can be proved by proof of “reduction to practice before the critical date.” Id., 119 S. Ct. at 307 n.2 (citation omitted). Alternatively, readiness for patenting can be proved by showing that prior to the critical date, the inventor had prepared drawings or other descriptions of the invention that were sufficiently specific to enable a person skilled in the art to practice the invention. Id., 525 U.S. at __ & n.14, 119 S. Ct. at 312 & n.14.

Granting a license to a third party to commercialize an invention, without more, does not trigger the on-sale bar. In re Kollar, 286 F.3d 1326 (Fed. Cir. 2002) (reversing PTO rejection of patent application).

Sales or licenses to beta testers may come within an “experimental use” exception, but also might not qualify for such an exception. See § 3.5[c][5].

“Public” Use Can Bar a Patent

Any “public” use of the claimed subject matter in the U.S. can bar a patent if more than a year goes by. Use of invention is “public” if it is for gain, even if secret. Kinzenbaw v. Deere & Co., 741 F.2d 383 (Fed. Cir. 1984), citing Metallizing Engineering Co. v. Kenyon Bearing & Auto Parts Co., 153 F.2d 516 (2d Cir.) (L. Hand, J.).

Thus, an e-commerce company's internal use of a new computer program to control its own Web site is probably public use.

“Experimental” use devoted to proving the concept might not be public use, but use that is primarily commercial and only incidentally experimental may well be public use, as discussed above.

Other Barring Events

Any description of the claimed subject matter in a “printed publication” anywhere in the world, and in some circumstances a description in an issued patent anywhere in the world, will usually start the one-year clock running. See 35 U.S.C. § 102(b). The key to whether a given paper, master's thesis, on-line database item, etc., qualifies as a printed publication is usually whether the document is indexed so as to be locatable by a diligent researcher in the field of art in question.

And of course, if any of these events took place before the inventor's invention of his invention (that sounds awkward, but is basically how it is set forth in the patent statute), then the invention may be unpatentable anyway because the inventor was not the first. See 35 U.S.C. § 102(a).

In any given case, the date on which the clock starts running is often extremely fact-intensive (and hard-fought in litigation). In particular, the term “experimental,” as applied to public use or commercial use, is one that depends heavily on the facts of the case.

Beta Testing and the One-Year Deadline

Beta testing of software may or may not start the one-year clock running, depending on what the specific beta-testing arrangements are. In some circumstances, beta testing may be “experimental” use that does not begin the one-year grace period. In proving the experimental nature of the use, it helps if the beta testers are subject to a written obligation of confidence (but confidentiality alone will not necessarily establish experimental use). In other situations, use of software by beta testers might, or might not, be “public” or “commercial” use that starts the one-year clock running. The deadline for filing a patent application might be a year after the first such use, even though the general release of the software might have been months thereafter. The safest bet is ordinarily to assume the worst, and to file a patent application less than one year after the first beta shipment or beta use of any kind.

Selected cases:

City of Elizabeth v. American Nicholson Pavement Co., 97 U.S. 126 (1878): In this “granddaddy” of experimental-use cases, the Supreme Court held that a patent owner's use of a patented road paving material on privately owned toll road, for six years prior to filing of application for patent, was “experimental” and did not bar the patent.

Paragon Podiatry Laboratory, Inc. v. KLM Laboratories, Inc., 984 F.2d 1182, 1185-87, 1190-93 (Fed. Cir. 1993): The Federal Circuit affirmed a summary judgment that patent was invalid. The patented orthotic device had been sold prior to one year before the application filing date. The court held that such sales were not “experimental,” despite inventor's affidavit to that effect. The patent owner had published price lists and sales letters that did not mention testing but did refer to “exhaustive clinical testing” and “lifetime guarantee.” In addition, the patent owner had not retained control of the orthotic devices, nor restricted their use. In addition, the court affirmed a summary judgment of inequitable conduct (see § 3.5[g][2]) for knowing failure to disclose the barring sales to patent examiner.

Manville Sales Corp. v. Paramount Systems, Inc., 917 F.2d 544, 551 (Fed. Cir. 1990): The Federal Circuit described the distinctions between barring “public” use vs. nonbarring “experimental” use.

Kinzenbaw v. Deere & Co., 741 F.2d 383 (Fed. Cir. 1984): The Federal Circuit held that secret use of a patented process for gain prior to the critical date was a barring “public” use.

TP Laboratories, Inc., v. Professional Positioners, Inc., 724 F.2d 965 (Fed. Cir. 1984): The court held that pre-critical-date use of a patented dental appliance on orthodontal patients had been experimental use.

No Grace Period in Most Other Countries

Most foreign countries do not allow the one year grace period that is provided by the United States. Consequently, if protection is desired in other countries, publication and commercialization efforts, and even beta testing, usually should be held up until after the U.S. application is filed. And for some countries (notably Taiwan), such efforts should be delayed until the application is filed in that country.

However, most countries will recognize each others' patent application filing dates for up to one year. For example, filing a patent application in the U.S. gets the inventor a priority date for France, as long as a French application is filed within one year after the U.S. filing date.

Two additional points should be noted about applying for patent protection in other countries:

(i) A foreign-filing license from the U.S. Patent and Trademark Office, similar to an export license, is required before filing in foreign countries. See 35 U.S.C. §§ 184‑185 (foreign-filing licensing requirement).

(ii) Many foreign countries do not allow patent protection for software to begin with.

8.5.4 Create a Judge- and Jury-Friendly Patent Application

Too often, patent applications are written for scientists and engineers, when the ultimate real-world audience consists of judges and jurors. In an infringement lawsuit, the patent in suit will always be admissible in evidence (and thus, unlike most demonstrative exhibits, it will always go back into the jury room during the jurors' deliberations).

So, in drafting the patent application, there is no reason not to think ahead to the trial and to include jury-friendly technical explanations, drawings, and the like. In particular, including source code in the patent application could pay big benefits in fending off a challenge to the sufficiency of the patent's disclosure.

Flow Charts and Pseudocode for Possible Use as Trial Exhibits

A company filing a patent application can take advantage of at least two opportunities for creating useful trial exhibits in the body of the patent itself:

(i) Flow charts, included as part of the drawings of the patent application, can be used by a technical expert witness at trial in talking the jury through how the invention actually works. Because the patent itself will go back into the jury room during the jury's deliberations, the drawings can be a helpful aid to the jury.

(ii) Pseudocode, i.e., a quasi-English description of the functions performed by the software, can also be used as a teaching tool by an expert witness who talks through the pseudocode for the jury.

Benefits of Disclosing Source Code in a Patent Application

Because disclosure of source code in a patent application is not required, see § 3.4[c], many applicants elect not to disclose source code because of a real or imagined concern that competitors would learn more from the source code than is required to be disclosed by statute. But inclusion of source code in a patent application can have some distinct advantages.

(i) A patent application with source code is probably cheaper and quicker to write than the same application without source code. When source code is disclosed, the drafter of the patent application can focus on explaining the significance of the program steps and need not spend time elaborating on details already disclosed in the code.

(ii) If the prior art turns out to be closer than previously thought, inclusion of source code can permit the patent attorney to draft new claims directed to specific implementation details that are disclosed in the source code but not in the actual patent-application text.

(iii) Source code can be an insurance policy against substantive errors in explaining the invention in the patent application. The statute provides that “new matter” cannot be added to a patent application after it is filed. See 35 U.S.C. § 132(a). If the patent attorney who drafts the patent application makes a mistake in describing some aspect of the invention, and if the inventor does not catch the mistake until after the application is filed, a source-code appendix can be used to support a later post-filing amendment to correct the mistake despite the new-matter prohibition.

(iv) Disclosure of source code can help shield a patent application and any subsequent patent against challenges on best-mode or enablement grounds (see § 3.4[a] and § 3.4[b]). A jury is less likely to be convinced that the patent contains an insufficient disclosure if the source code is included.

Actual code (source or executable) can be disclosed in several different ways. An appendix can be submitted either in microfiche (if more than 10 printout pages) in accordance with specified standards, see Submission of computer program listings, 37 C.F.R. § 1.96(b), or in hard copy. Id. at § 1.96(a)(2). If hard copy is submitted, it should either come after the specification and before the claims and be numbered accordingly, see id. (some examiners take literally the requirement of 35 U.S.C. § 112 that the specification “conclude” with one or more claims), or it can be submitted as drawings if ten pages or less. See id.

The competitive dangers of including source code in a patent application will vary with the circumstances. Patent applications normally are kept secret by the Patent and Trademark Office (PTO) unless and until a patent issues (or unless a foreign counterpart patent application is filed, in which case the U.S. application will be published approximately 18 months after its filing date under recent amendments to 35 U.S.C. § 122(b)). See Patent applications preserved in secrecy, 37 C.F.R. § 1.14. Public disclosure of the source code therefore is probably some time off. Unless the source code's owner does nothing to improve the code during the intervening period, a competitor studying the code may well be studying old technology — and probably will have committed to its own design by that time anyway. (The potential influence on competitors of the not-invented-here syndrome also should not be underestimated.) Because disclosure of source code is not required, it can be considered on a case by case basis. Business risks are involved either way; the proprietor of the software can determine which risk it prefers to take.

8.5.5 Claim Things That Are Provable

A company that drafts claims to an e-commerce invention should give some thought to how infringement will be proved, either at trial or in a summary judgment motion. One straightforward approach is to claim the invention as a method performed by (preferably) a single processor or (if necessary) multiple processors. For example, consider the following claim from an Amazon.com patent (with bracketed paragraph numbering added); demonstrating infringement of such a claim likely would be straightforward:

1. A method of placing an order for an item comprising:
 
[a] under control of a client system,
 
#+beginquote
[1] displaying information identifying the item; and
 
[2] in response to only a single action being performed, sending a request to order the item along with an identifier of a purchaser of the item to a server system;
 
[b] under control of a single-action ordering component of the server system,
 
[1] receiving the request;
 
[2] retrieving additional information previously stored for the purchaser identified by the identifier in the received request; and
 
[3] generating an order to purchase the requested item for the purchaser identified by the identifier in the received request using the retrieved additional information; and
 
[c] fulfilling the generated order to complete purchase of the item.
#+endquote

8.5.6 Draft Claims With Future Provisional Royalty Rights in Mind

The Internet world moves at lightning speed, but the PTO does not always do likewise. Even in the best of all possible worlds, a U.S. patent will not issue until about a year after its filing date (and that assumes that the applicant successfully requests accelerated examination of the application). The normal time to issuance can be anywhere from two to four years.

Until recently, this meant that an infringer suffered no legal penalty for its pre-issuance activities. That will change on November 29, 2000. That is the effective date of a new provision of the Patent Act, to be codified as 35 U.S.C. § 154(d), contained in section 4505 of the Intellectual Property and Communications Omnibus Reform Act of 1999, S. 1948 (enacted as part of Public Law 106-113) (the “1999 Act”).

New section 154(d) provides for “provisional rights.” Under certain circumstances, the owner of a patent whose application was filed on or after that effective date will be able to recover damages for infringement that occurred even before the patent was issued. The new provisional rights will work basically like this:

(i) The patent application is filed on or after November 29, 2000.

(ii) The patent application is published promptly after the expiration of 18 months after its filing date – or, notably, on an earlier date if so requested by the applicant. See 1999 Act § 4502, to be codified as 35 U.S.C. § 122(b)(1)(A).

(iii) After the patent issues, the accused infringer is proved 1) to have had actual notice of the published patent application, and 2) to have infringed, after the publication date, at least one claim that is “substantially identical” to a claim in the published application.

(iv) The patent owner is then entitled, not only to proved damages for post-issuance infringement, but also to a reasonable royalty for the infringement occurring between the publication date of the patent application and the issue date of the patent itself.

So, a company that files a patent application on or after November 29, 2000, should consider doing the following:

  • Craft several claims that are as narrow as possible in scope while still covering what an infringer is likely to do;

    • Request early publication of the patent application;
    • Upon publication, give actual notice of the published application to competitors and other likely infringers.

8.5.7 Take Advantage of the Statutory Presumption of Validity

by Aggressively Disclosing “Prior Art” to the Patent Examiner

:CUSTOMID: take-advantage-of-the-statutory-presumption-of-validity-by-aggressively-disclosing-prior-art-to-the-patent-examiner

Strengthening a Patent Through Disclosure

A company that files a patent application can “strengthen” any resulting patent by aggressively disclosing prior art to the PTO. By statute, a patent is presumed to be valid, and each claim is presumed valid independently of the validity of any other claims. See 35 U.S.C. 283; see also § 3.8[d] . In addition, patent owners usually benefit from a real-world psychological bias, on the part of judges and especially jurors, in favor of believing that the PTO did a good job.

But the PTO's search library is far from perfect; the patent examiner might well have been unaware of important prior art. This is especially true in the software field, where much prior art is not documented in patents or printed publications.

With that in mind, now suppose that an accused infringer claims that a patent is invalid because of prior art. The court, and especially the jury, will naturally take into account whether or not the PTO considered the prior art in question during the patent-examination proceedings:

(i) If the accused infringer can point only to prior art that was already considered by the patent examiner, it will have a very tough time convincing the jury that the patent is invalid.

(ii) On the other hand, if an accused infringer is able to come up with significant prior art that was not considered by the patent examiner, then the accused infringer's trial counsel will surely beat the drum about the fact that the PTO did not know about it.

A company filing a patent application can therefore consider doing a prior-art search of its own, with an eye toward stealing a defendant's thunder at trial. Some possible places to search include:

Avoiding Trouble Through Disclosure of “Material Information”

Disclosing known material prior art and other known material information to the PTO is more than just a good idea; it's the law. A patent applicant (as well as certain others associated with the prosecution of the patent application) has an affirmative legal duty to disclose to the PTO all known “material” information. Failure to comply with that duty can render the patent unenforceable for “inequitable conduct” in the PTO. See 37 C.F.R. § 1.56; see generally, e.g., Paragon Podiatry Laboratory, Inc. v. KLM Laboratories, Inc., 984 F.2d 1182, 1190-93 (Fed. Cir. 1993) (affirming summary judgment of inequitable conduct and patent unenforceability for knowing failure to disclose barring sales to patent examiner).

Even if litigation never occurs, a company that obtains a questionable patent may find itself attracting undesired publicity. Consider the famous Compton's multimedia-encyclopedia patent, “Multimedia search system using a plurality of entry path means which indicate interrelatedness of information,” U.S. Patent No. 5,241,671. At Fall Comdex 1993, Compton's announced a licensing program in which it sought royalties from publishers of CD-ROM encyclopedias and similar products. The announcement touched off a firestorm in the computer industry. See, e.g., John Eckhouse, Key Patent To Shake Multimedia Industry, San Francisco Chronicle, Nov. 15, 1993, posted at http://www.base.com/software-patents/articles/compton.html. The patent was soon recalled for reexamination by the PTO; eventually it was invalidated in view of numerous prior-art references that had never been considered by the patent examiner.

More recently, the PTO recalled a much-noted patent on the so-called windowing approach to dealing with the Y2K problem of two-digit year dates. See U.S. Patent & Trademark Office, “Patent and Trademark Office Orders Reexamination of Y2K Fix Patent,” Dec. 21, 1999, at http://www.uspto.gov/web/offices/com/speeches/99-51.htm.

8.5.8 Start Collecting “Objective Evidence of Non‑Obviousness”

As discussed in § 3.4[f][3], evaluating the obviousness of an invention in retrospect can be difficult, and thus the courts use “objective evidence” of nonobviousness. Companies attempting to build a portfolio should be on the lookout for objective evidence of this kind.

8.6 Ownership of Inventions and Patent Rights

8.6.1 Ownership of Employee Inventions

U.S. patent rights belong initially to inventors. The patent statute's basic granting provision states that inventors may obtain patents on new, useful, and unobvious inventions. See 35 U.S.C. § 101. The statute further states that applications for patent may be filed only by inventors or persons authorized by them. Id. § 111. A third party may file an application on behalf and as agent of an inventor who has assigned the invention to the third party (or agreed in writing to assign it), but unlike in many other countries, where an employer or other assignee can file a patent application in its own name—even then the patent is issued to the inventor, not to the third party. Id. § 118. If a patent is granted to a person who was not the true inventor (e.g., to someone who filed a patent application on another's invention), then the true inventor can compel assignment of the patent to him. E.g., Richardson v. Suzuki Motor Co., 868 F.2d 1226, 1249‑50 (Fed. Cir. 1989).

No General Duty to Assign Invention Rights to the Employer

Patents and invention rights can be assigned by employees to their employers, see 35 U.S.C. § 262, and likewise can be the subject of contractual duties to assign.

Ordinarily, no duty to assign attaches to inventions made by non-fiduciary employees, absent a written assignment agreement or hired-to-invent status. This is in contrast to the rule about copyrights belonging to employers when the work is created within the scope of employment – even inventions made in fields relating to the employment are usually exempt from assignment to the employer:

[I]f the employment be general, albeit it covers a field of labor and effort in the performance of which the employee conceived the invention for which he obtained a patent, the contract is not so broadly construed as to require an assignment of the patent.

United States v. Dubilier Condenser Corp., 289 U.S. 178, 187 (1933).

(Most of the leading cases dealing with ownership of employee inventions are pre-Erie R.R. v. Tomkins, 304 U.S. 64 (1938), and thus are technically of doubtful authority as to state law; they nevertheless continue to be cited and followed by both federal and state courts.)

Exception: Employees Who Were “Hired to Invent” Usually Must Assign

Employees who are “hired to invent” normally will be required to assign their inventions and patent rights. E.g., /Standard Parts Co.

  1. Peck/, 264 U.S. 52 (1924); Solomon v. United States, 137 U.S. 342,

346 (1890). As the Supreme Court said in Solomon:

An employe[e], performing all the duties assigned to him in his department of service, may exercise his inventive faculties in any direction he chooses, with the assurance that whatever invention he may thus conceive and perfect is his individual property. . . .

But this general rule is subject to these limitations: If one is employed to devise or perfect an instrument, or a means for accomplishing a prescribed result, he cannot, after successfully accomplishing the work for which he was employed, plead title thereto as against his employer.

That which he has been employed and paid to accomplish becomes, when accomplished, the property of his employer. Whatever rights as an invididual he may have had in and to his inventive powers, and that which they are able to accomplish, he has sold in advance to his employer.

Solomon, 137 U.S. at 346 (paragraphing supplied).

Exception: Employees Who Were “Set to Experimenting” Probably Must

Assign

:CUSTOMID: exception-employees-who-were-set-to-experimenting-probably-must-assign

Likewise, employees who are “set to experimenting” to solve a specific problem will be required to assign their invention rights, even though they might not have been originally hired to invent. Teets v. Chromalloy Gas Turbine Corp., 83 F.3d 403 (Fed. Cir. 1996) (reversing declaratory judgment that employee owned invention; parties had implied-in-fact assignment agreement); Houghton v. United States, 23 F.2d 386 (4th Cir. 1928); Forberg v. Servel, Inc., 88 F. Supp. 503 (S.D.N.Y. 1949); cf. Moore v. American Barmag Corp., 693 F. Supp. 399, 401‑03 (W.D.N.C. 1988) (reviewing case law; material fact issue existed whether employee had been directed to work on solving problem), subsequent proceeding, 710 F. Supp. 1050 (W.D.N.C. 1989) (fact issue existed as to whether employer entitled to shop right). It may not be necessary for an employer to make a formal directive that an employee commence experimenting; an informal request may suffice. See Miller v. GTE Corp., 1989 WL 258184 (S.D. Tex. 1989) (granting defendants' motion for summary judgment dismissing former employee's claim for misappropriation of invention; former employee had a duty to assign invention rights to employer).

Exception: Officer / Director Fiduciary Obligation to Assign

(iv) In some circumstances, an inventor associated with a company as an officer (or director) may have an equitable duty to assign his or her patent rights to the company. Corporate officers and directors may have a fiduciary obligation to assign inventions to their corporation when the inventions relate to the business or occupation of the corporation. Kennedy v. Wright, 676 F. Supp. 888, 893 (C.D. Ill. 1988) (collecting cases; patent infringement suit by former president of corporation against successor to corporation dismissed; successor owned equitable title to patents because of plaintiff's fiduciary duty to assign to corporation); Great Lakes Press Corporation v. Froom, 695 F. Supp. 1440 (W.D.N.Y. 1987) (granting partial summary judgment requiring former president of company to assign two patents to company); Davis v. Alwac International, Inc., 369 S.W.2d 797, 802 (Tex. Civ. App.—Beaumont 1963, writ ref'd n.r.e.); /North Branch Products, Inc.

  1. Fisher/, 131 U.S.P.Q. (BNA) 135 (D.D.C. 1961) (corporation owned

equitable title to inventions made by inventor who was shareholder, officer, director, and general manager of corporation), aff'd, 312 F.2d 880 (D.C. Cir. 1962), cert. denied, 373 U.S. 913 (1963); compare with National Waste Co. v. Spring Packing Co., 200 F.2d 14, 15, 16 (7th Cir. 1952) (mechanic did not have confidential relationship to corporation and thus no legal duty existed), cert. denied, 395 U.S. 905 (1953).

One early Texas case seemingly indicates that no such fiduciary duty exists. See North v. Atlas Brick Co., 2 S.W.2d 980, 984 (Tex. Civ. App.—El Paso 1928), reversed on different grounds, 13 S.W.2d 59 (Tex. Comm'n App. 1929, opinion adopted); prior proceedings, 281 S.W.2d 608 (Tex. Civ. App.—El Paso), modified, 288 S.W.2d 146 (Tex. Comm'n App. 1926, opinion adopted). The holding in that case may be fact-dependent (the departed officer apparently was a troubleshooter who took over in conjunction with a planned acquisition of the company). Compare id., 281 S.W. at 609 (first court of appeals opinion) (company alleged it hired former president because it had needed new brickmaking methods to survive increasing competition); with id. at 610‑11 (former president alleged that he assumed that office only in conjunction with agreement to buy all stock in company). The case has never been expressly overruled, but has not noticeably been followed on that particular point. See Davis, 369 S.W.2d at 802 (citing but apparently ignoring rationale of Atlas Brick).

State Statutory Regulation of

Employees' Duty to Assign Invention Rights

:CUSTOMID: state-statutory-regulation-of-employees-duty-to-assign-invention-rights

Most companies that develop technology require all employees to execute written employment contracts that call for assignment of all inventions related to the company's business. Some forms of contract require assignment of even broader categories of invention.

A number of states, however, limit by statute the types of inventions which an employer can require an employee to assign. California's employee invention-ownership statute includes perhaps the most detailed provisions in some respects. Cal. Lab. Code §§ 2870‑2871. That statute provides that:

    (a) Any provision in an employment agreement which provides that an employee shall assign, or offer to assign, any of his or her rights in an invention to his or her employer shall not apply to an invention that the employee developed entirely on his or her own time without using the employer's equipment, supplies, facilities, or trade secret information except for those inventions that either:

   (1) Relate at the time of conception or reduction to practice of the invention to the employer's business, or actual or demonstrably anticipated research or development of the employer.

    (2) Result from any work performed by the employee for the employer.

(b) To the extent a provision in an employment agreement purports to require an employee to assign an invention otherwise excluded from being required to be assigned under subdivision (a), the provision is against the public policy of this state and is unenforceable.

Id. § 2870.

No employer shall require a provision made void and unenforceable by Section 2870 as a condition of employment or continued employment.

Nothing in this article shall be construed to forbid or restrict the right of an employer to provide in contracts of employment for disclosure, provided that any such disclosures be received in confidence, of all of the employee's inventions made solely or jointly with others during the term of his or her employment, a review process by the employer to determine such issues as may arise, and for full title to certain patents and inventions to be in the United States, as required by contracts between the employer and the United States or any of its agencies.

Id. § 2871 (paragraphing supplied).

Some other states have statutes that are similar in their line-drawing between permissible and impermissible assignment provisions, and in their prohibition against the imposition of such provisions by employers:

Delaware's law does not include California's safe-harbor provisions for employers, in the last quoted paragraph above. See Del. Code Ann. § 805.

· Illinois, Minnesota, and Washington go further in their restrictions: they impose an affirmative duty on employers who require invention-assignment covenants to notify their affected employees of the statutory limitations on those covenants. See Ill. Ann. Stat., ch. 140, para. 302; Minn. Stat. § 181.78; Wash. Rev. Code § 49.44.140.

· North Carolina's statute expressly places the burden of proof on employees who assert their individual ownership of their work-related inventions. See N.C. Gen. Stat. § 66‑57.1.

8.6.2 Shop Rights in Employees' Off‑Duty Inventions

Even if an employee is not obligated to assign an invention outright to his or her employer, he or she may still be deemed to have granted the employer the right to use the invention for the employer's own purposes (but not necessarily to authorize others to use it). If the inventor implicitly consented to the employer's use, the employee may be deemed to have granted an implied license; or, if the development of the invention was done on company time or using company resources, the employer may be equitably entitled to a “shop right” to use the invention. See, e.g., United States v. Dubilier Condenser Corp., 289 U.S. 178 (1933) (employees owned invention but government-employer had shop right); McElmurry v. Arkansas Power & Light Co., 995 F.2d 1576, 1580-82, (Fed. Cir. 1993) (courts should review “totality of the circumstances” to determine whether fairness dictates that employer get a shop right); California Eastern Laboratories, Inc. v. Gould, 896 F.2d 400 (9th Cir. 1990) (when employer sold all of its assets to a purchaser which subsequently distributed the assets to its subsidiaries, the employer's shop right was transferred along with the assets); Wommack v. Durham Pecan Co., 715 F.2d 962 (5th Cir. 1983); Francklyn v. Guilford Packing Co., 695 F.2d 1158 (9th Cir. 1983). Cf. Mechmetals Corp. v. Telex Computer Prods., Inc., 709 F.2d 1287 (9th Cir. 1982) (no shop right).

8.6.3 Be Careful About “Joint Ownership” of Inventions Co‑Developed

with Other Companies

:CUSTOMID: be-careful-about-joint-ownership-of-inventions-codeveloped-with-other-companies

Lucent Technologies, Inc. v. Gateway, Inc., 543 F.3d 710 (Fed. Cir. 2008): affirmed overturning a $1.5 billion jury verdict because Lucent couldn't bring suit on its own — Fraunhoffer, a German company, was a co-owner of the patent.

If employees from two or more companies collaborate in developing an invention, to the point where they are “joint inventors,” then each of their respective companies may have a claim, through the respective employees, to a joint ownership interest in any resulting patent, together with the right to practice and/or license the invention without accounting to any other joint owner. See 35 U.S.C. § 262 (joint inventors are joint owners of patent).

Not every invention developed in cooperation with another company will be a joint invention. “[A]t least some quantum of collaboration or connection” is needed for two individuals to be joint inventors. See Kimberly‑Clark Corp. v. Procter & Gamble Distributing Co., 973 F.2d 911, 915-17 (Fed. Cir. 1992) (affirming judgment that patent owner was not entitled to priority based on joint invention and patent was thus invalid).

A worker who simply follows instructions given by a person who conceives an invention does not thereby become a joint inventor. See Sewall v. Walters, 21 F.3d 411 (Fed. Cir. 1994) (affirming decision of Board of Patent Appeals and Interferences that sole inventor was entitled to a patent).

(If all inventors are not properly named in a patent application, an omitted inventor can file suit to add his or her name and thus become a joint owner. See 35 U.S.C. § 256 (correction of inventorship); cf., e.g., MCV, Inc., v. King-Seeley Thermos Co., 870 F.2d 1568 (Fed. Cir. 1989) (purported co-inventor equitably estopped by four-year delay in asserting claim of inventorship).)

Notably, the patent statute expressly provides that each joint owner is entitled to make, use, and sell the patented invention without the consent of and without accounting to the other owner(s). 35 U.S.C. § 262. In addition, a judicially developed patent-law doctrine holds that joint owners (e.g., joint inventors or joint assignees) can each license the patented invention independently of each other. Willingham v. Star Cutter Co., 555 F.2d 1340, 1344 (6th Cir. 1977); Talbot v. Quaker State Oil Refining Co., 104 F.2d 967, 967‑68 (3d Cir. 1939); Miller v. GTE Corp., 1991 WL 218509 (S.D. Tex. June 20, 1991); Bendix Aviation Corp. v. Kury, 88 F. Supp. 243 (E.D.N.Y. 1950) (citing cases).

(This is in contrast to joint authors of a copyrighted work, who must account to one another for their respective uses of the work. See, e.g., Oddo v. Ries, 743 F.2d 630, 632‑33 (9th Cir. 1984) (under California law, partners were co-owners of partnership copyright assets; copyright law thus required partners to account to each other for their uses of those assets).)

Claims of joint ownership of patent rights can have enormous economic significance. The Burroughs Wellcome case, for example, involved a dispute over ownership of major biotech patent rights. The Federal Circuit summarized the requirements that must be met by a would-be joint inventor seeking to establish an ownership interest:

Conception is the touchstone of inventorship, the completion of the mental part of invention. It is “the formation in the mind of the inventor, of a definite and permanent idea of the complete and operative invention, as it is hereafter to be applied in practice.” Conception is complete only when the idea is so clearly defined in the inventor's mind that only ordinary skill would be necessary to reduce the invention to practice, without extensive research or experimentation.

Burroughs Wellcome Co. v Barr Laboratories, Inc., 40 F.3d 1223, 1227-28 (citations omitted, emphasis and paragraphing edited). The court held that the claimant did not contribute to the conception of the claimed subject matter and thus was not a joint inventor. Id.

8.6.4 Common-Law Scrutiny of Invention Assignment Agreements

Invention assignment agreements can additionally be subject to common-law scrutiny for reasonableness, especially when they require employees to assign inventions after the termination of employment.

For example, in the 1988 case of Ingersoll-Rand Co. v. Ciavatta, the New Jersey Supreme Court held that, on the facts of the case, a company could not require its former employee to assign an invention conceived after he was terminated, notwithstanding that the invention related directly to the company's business and that the employment contract required such an assignment. The court set out an extensive scholarly discussion of the public policy factors affecting its decision, id. at 886‑92. and concluded that it would apply a reasonableness test similar to that used to analyze post-termination noncompetition clauses. Id. at 891‑92; see generally D. Aspelund & C. Eriksen, Employee Noncompetition Law.

On the other hand, in MAI Basic Four, Inc., v. Basis, Inc., 880 F.2d 286, 287‑88 (10th Cir. 1989), the court held that an employment contract provision, which required the employee to assign inventions made during employment or within 90 days thereafter, was not a restrictive covenant akin to a covenant not to compete.

8.6.5 Assignment Instruments

A written instrument is required to assign a patent right. See 35 U.S.C. § 261, second paragraph. If a written patent conveyance instrument is properly acknowledged, it serves as prima facie evidence of the transfer. See 35 U.S.C. § 261, third paragraph. If an assignment is to include the right to sue for past infringement, that fact should be expressly recited in the instrument. In addition, the instrument could set forth covenants concerning the assignor's duty to cooperate in protecting and perfecting the assigned rights. A sample form of assignment is included as an appendix at the end of this paper.

8.6.6 Recordation of Patent Assignments

As with most forms of property, assignments of patent rights must be recorded in order to be valid against subsequent good faith purchasers or mortgagees for value. An assignment of patent rights is void against a subsequent purchaser or mortgagee for valuable consideration, without notice, unless it is recorded in the PTO either (a) within three months after its date, or (b) prior to the date of the subsequent purchase or mortgage. See 35 U.S.C. § 261, fourth paragraph. The PTO regulations, see 37 C.F.R. Part 3, set forth a number of miscellaneous details about recordation:

• Any assignment to be recorded must identify the patent or patent application by serial number.

• All patent assignments to be recorded must be in English. If a U.S. patent is assigned in a non-English language document (or in a long English-language document such as a contract, for that matter), an English-language memorandum of assignment should be prepared, executed, acknowledged, and filed.

• No instrument will be recorded that does not amount to “an assignment, grant, mortgage, lien, encumbrance, or license, or that does not affect title of the patent to which it relates.” A memorandum of an assignment that is more fully documented in another paper can thus be filed as an instrument affecting title. Similarly, a memorandum of a security agreement or a UCC‑1 financing statement apparently can be recorded as a mortgage, lien, or encumbrance; such recordation alone, however, probably would not suffice to perfect a security interest. (See discussion below concerning recordation of security interests.)

• A specific cover sheet and a filing fee of $40.00 per instrument must be submitted along with any instrument being recorded; multiple counterparts (and/or assignments of multiple patents) are treated as separate instruments.

Documents submitted for recordation in the PTO assignment records are returned to the submitter with a computer printout showing the recordation information.

8.6.7 Perfection of Security Interests in Patents

Some patent assignments will involve the taking of security interests in the patent rights, e.g., to secure payment of earn-outs or royalties. Two cases are known to have addressed the question whether security interests in patents must be perfected by a filing in the PTO. Both have said no: such security interests are perfected in accordance with standard UCC filing procedures, and filing in the PTO is not required. City Bank and Trust Co. v. Otto Fabric, Inc., 83 B.R. 780, 7 U.S.P.Q. (BNA) 1719, 5 U.C.C. Rep. Serv. 2d 1459 (D. Kan.

  1. (federal filing not required to perfect security interest in

patents), reversing 55 B.R. 654 (Bankr. D. Kan. 1985); In re Transportation and Design Technology, Inc., 48 B.R. 635 (Bankr. S.D. Cal. 1985) (additionally noting in dicta that perfection of a security interest might still be superseded by a bona fide purchaser for value of the ownership interest if the security interest were unrecorded in the PTO).[1]

8.7 Patent Infringement Analysis

A patent is not self-enforcing; no “technology police” patrol the industrial countryside to monitor compliance with issued patents. The patent is no more than the owner's ticket to the courthouse, an opportunity to present a case to a federal judge. The case often turns on the details of the infringement analysis.

Infringement Analysis
 
-
 
#+beginquote
Only one claim need be infringed
#+endquote
 
-
 
#+beginquote
Two-step analysis:
#+endquote
 
1. Interpretation of the claim language
 
1. Application to the accused product / process
 
- The All-Elements Rule
 
- No independent claim infringed →\\
no infringement at all

8.7.1 Only One Claim Need Be Infringed

One claim in a patent can be infringed even if other claims in the same patent are not infringed. Liability comes with infringement of even one claim, as long as the infringed claim or claims are not proved to be invalid (see § 3.8[d]).

8.7.2 The Two-Step Analytical Approach and the All‑Elements Rule

In determining whether a patent claim is infringed, courts follow an approach prescribed by the U.S. Court of Appeals for the Federal Circuit:

An infringement analysis entails two steps. The first step is determining the meaning and scope of the patent claims asserted to be infringed. The second step is comparing the properly construed claims to the device accused of infringing.

Markman v. Westview Instruments, Inc., 52 F.3d 967, 976 (Fed. Cir.) (in banc; holding that construction of a patent claim is a matter of law for the judge, not the jury; citations omitted), aff'd, 517 U.S. 370, 116 S. Ct. 1384, 134 L.Ed.2d 577 (1996) (holding that Seventh Amendment does not require jury trial of disputes over proper interpretation of patent claim).

In the first step of the analysis, “the words of the claims are construed independent of the accused product, in light of the specification, the prosecution history, and the prior art.” Scripps Clinic & Research Foundation v. Genentech, Inc., 927 F.2d 1565, 1580 (Fed. Cir. 1991). The court noted, however, that “[o]f course the particular accused product (or process) is kept in mind, for it is efficient to focus on the construction of only the disputed elements or limitations of the claims.” Id. Claim construction is discussed in more detail in § 3.7[c].

The second step is referred to as the All Elements Rule: “If an express claim limitation is absent from the accused product, there can be no literal infringement as a matter of law,” Wolverine World Wide, Inc. v. Nike, Inc., 38 F.3d 1192, 1199 (Fed. Cir. 1994), because “[t]o establish infringement, every limitation set forth in a patent claim must be found in an accused product or process exactly or by a substantial equivalent … [and] the failure to meet a single limitation is sufficient to negate infringement of the claim…”. Laitram Corp. v. Rexnord, Inc., 939 F.2d 1533, 1535 (Fed. Cir. 1991) (reversing judgment of infringement); see, e.g., Sun Studs, Inc., v. ATA Equipment Leasing, Inc., 872 F.2d 978, 984‑86 (Fed. Cir. 1989) (computer-controlled method of processing log in sawmill, including computation step relating to log's profile, found to be infringed by method including “equivalent” computation step); see also, e.g., Pennwalt Corp. v. Durand-Wayland, Inc., 833 F.2d 931, 933‑39 (Fed. Cir. 1987) (patented apple sorting apparatus relying on “hardwired” logic circuitry not infringed by microprocessor-controlled sorter that performed different functions).

Thus, each claim in a patent is functionally like a checklist of elements. The literal-infringement prong of this analysis is illustrated in the following chart:

HYPOTHETICAL CLAIM ACCUSED CHAIR LITERAL\\
    INFRINGEMENT ?
#+beginquote #+beginquote #+beginquote
“4. A chair comprising Seat, four legs, back Yes
#+endquote #+endquote #+endquote
#+beginquote #+beginquote #+beginquote
“(a) a seat, Seat, three legs, back No
  #+endquote #+endquote
“(b) four legs,    
     
“and    
#+endquote    
#+beginquote #+beginquote #+beginquote
“(c) a back” Seat, four legs, no back No
#+endquote #+endquote #+endquote

Hypothetical Examples of Literal-Infringement Analysis

The absence of literal infringement does not necessarily end the inquiry. A claim that is not literally infringed may still be infringed under the doctrine of equivalents if every missing element of the claim has a “substantial equivalent” in the accused product or process. See Warner-Jenkinson Co. v. Hilton Davis Chemical Co., 520 U.S. 17, 117 S. Ct. 1040 (1997) (holding that equivalence must exist for each claim element and not for the invention as a whole).

Under what at least appears to be the current state of Federal Circuit law, with proper proof an accused method might be found to infringe if it combines two or more method steps into a single “equivalent” step. Sun Studs, 872 F.2d at 987‑90 (exact one to one correspondence between claim elements and accused device not necessary). If any of the steps in the claim is not satisfactorily demonstrated to be present in the accused method, however, the patent owner loses, at least as far as that claim is concerned.

(The U.S. Court of Appeals for the Federal Circuit hears all appeals from district courts in cases “arising under” the patent laws. See 28 U.S.C. § 1295(a)(1); Christianson v. Colt Industries, Inc., 486 U.S. 800, 108 S. Ct. 2166 (1988) (explaining meaning of “arising under the patent laws”).)

Note that the burden of proof of infringement is always on the patent owner. See, e.g., Under Sea Industries, Inc. v. Dacor Corp., 833 F.2d 1551, 1555 (Fed. Cir. 1987); Envirotech Corp. v. Al George, Inc., 730 F.2d 753, 758 (Fed. Cir. 1984). This is in contrast to the burden of proving invalidity, which is always on a challenger to validity. See § 3.8[d].

8.7.3 The Importance of Claim Construction

In many if not most patent infringement lawsuits, the most important single phase of the case is the determination of the exact legal meaning of the claim or claims being asserted by the patent owner. Often there is little or no dispute about what the accused product is or about what the accused method does. That means that “claim construction,” i.e., interpretation of the claim language, may essentially decide the lawsuit one way or another —the question of infringement is ordinarily a factual one for the jury, but if the relevant material facts are not genuinely in dispute, the question of literal infringement “collapses to one of claim construction and is thus amenable to summary judgment.” Athletic Alternatives, Inc. v. Prince Mfg., 73 F.3d 1573, 1578 (Fed. Cir. 1996) (affirming summary judgment of noninfringement).

The Ordinary Meaning of the Claim Language Normally Controls

The starting point of any patent claim construction is the ordinary meaning of the claim language itself, to those in the field of the invention. “The appropriate starting point … is always with the language of the asserted claim itself.” Phonometrics, Inc. v. Northern Telecom Inc., 133 F.3d 1459, 1464, 45 USPQ2d 1421 (Fed. Cir. 1998) (affirming summary judgment of noninfringement of patent for “[a]n electronic solid state long-distance telephone call cost computer apparatus for computing and recording the cost of each long-distance telephone call initiated from a given calling telephone”) (citations omitted). “It is the person of ordinary skill in the field of the invention through whose eyes the claims are construed. Such a person is deemed to read the words used in the patent documents with an understsanding of their meaning in the field, and to have knowledge of any special meaning and usage in the field.” /Multiform Desiccants, Inc.

  1. Medzam, Ltd./, 133 F.3d 1473, 1477, 45 USPQ2d 1429 (Fed. Cir. 1998)

(affirming judgment of noninfringement). “[T]he words of a claim ‘will be given their ordinary meaning, unless it appears that the inventor used them differently.'”

Departures from the Ordinary Meaning\\

Must Be Clearly Stated in the Patent.

:CUSTOMID: departures-from-the-ordinary-meaning-must-be-clearly-stated-in-the-patent.

An inventor is permitted to define his (or her) own meanings for words, as long as he does so clearly. As the courts sometimes put it, a patent applicant is free to be his or her own lexicographer, but “any special definition given to a word must be clearly defined in the specification.” Markman, 52 F.3d at 980 (citations omitted). Any such re-definition of a word or phrase “must be sufficiently clear in the specification that any departure from common usage would be so understood by a person of experience in the field of the invention.” Multiform Dessicants, Inc., 133 F.3d at 1476. “Without an express intent to impart a novel meaning to claim terms, an inventor's claim terms take on their ordinary meaning.” Sage Products, Inc. v. Devon Industries, Inc., 126 F.3d 1420, 1423, 44 USPQ2d 1103 (Fed. Cir. 1997) (affirming summary judgment of noninfringement) (citation and internal quotation marks omitted).

“Intrinsic” Evidence Takes Priority Over “Extrinsic” Evidence

In interpreting a patent claim, the first evidence to be considered is the “intrinsic” evidence, namely the words of the patent itself and its prosecution history (i.e., the written record of the examination proceedings in the Patent and Trademark Office). If a patent specification does not explain the meaning of a claim element, then dictionaries, technical treatises, competent expert testimony from those skilled in the art, and similar evidence can be used to clarify the meaning. Such “extrinsic” evidence, however – not even the testimony of experts in the field – cannot be used to contradict a meaning that is clearly revealed by the intrinsic evidence. Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1584 n.6, 39 USPQ2d 1573 (Fed. Cir.

  1. (reversing and remanding judgment of noninfringement).
Claims Are Not Necessarily Limited to the Disclosed Embodiments

The scope of an inventor's patent rights is not necessarily limited to the embodiments of the invention disclosed in the written-description portion of the patent. But those embodiments can be used in determining the inventor's intended meaning of the claim language. “Although claims are not necessarily restricted in scope to what is shown in a preferred embodiment, neither are the specifics of the preferred embodiment irrelevant to the correct meaning of claim limitations.” Phonometrics, Inc., 133 F.3d at 1466.

Patent Owners Draft the Claim Language — And So Must Live With It

Patent owners are free to use claim language of their choosing, but they must live with the language that they do choose. “If [the patent owner], who was responsible for drafting and prosecuting the patent, intended something different, it could have prevented this result through clearer drafting. . . . It would not be appropriate for us now to interpret the claim differently just to cure a drafting error made by [the patent owner]. That would unduly interfere with the function of claims in putting competitors on notice of the scope of the claimed invention.” Hoganas AB, 9 F.3d at 951.

Patent Owners Also Must Live With the Arguments and Amendments

They Make During Prosecution

:CUSTOMID: patent-owners-also-must-live-with-the-arguments-and-amendments-they-make-during-prosecution

A patent owner cannot have its cake and eat it too; if it argues to the patent examiner that the claims should be interpreted in a particular way so that they will not be invalidated by a prior-art reference, then it (the patent owner) is stuck with that particular interpretation later on and cannot change the interpretation just because it wants to. Warner-Jenkinson Co., 117 S. Ct. at 1049. As the Supreme Court said more than a century ago in a famous turn of phrase, a patent claim is not a “nose of wax, which may be turned and twisted in any direction.” White v. Dunbar, 119 U.S. 47 (1886).

“Arguments and amendments made during the prosecution of a patent application and other aspects of the prosecution history, as well as the specification and other claims, must be examined to determine the meaning of terms in the claims. The prosecution history limits the interpretation of claim terms so as to exclude any interpretation that was disclaimed during prosecution. Claims may not be construed one way in order to obtain their allowance and in a different way against accused infringers.” Southwall Technologies, Inc. v. Cardinal IG Co., 54 F.3d 1570, 1576 (Fed. Cir. 1995) (citations omitted)

The patent attorney's comparison of a prior-art reference to the claimed invention can result in a limiting interpretation of the claim language. For example, in the Wang v. AOL case, “[i]n an Information Disclosure Statement filed by Wang during the prosecution of the parent application, Wang distinguished a reference (Fleming) describing the NAPLPS system by stating that the reference ‘encodes pictorial information … on the pel [picture element] level, rather than on the character level.'” The Federal Circuit held that this language reinforced an interpretation of the Wang claims as being limited to character-based systems. Wang Laboratories, Inc., v. America Online, Inc., 197 F.3d 1377, 1383-84 (Fed. Cir. 1999) (affirming summary judgment that AOL and Netscape Web browsers did not infringe).

Any amendment could result in narrowing the claims, but that will not necessarily be the result. In Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., Ltd., _ U.S. _, 122 S.Ct. 1831 (2002), the Supreme Court unanimously held that:

the patentee should bear the burden of showing that the amendment does not surrender the particular equivalent in question…. The patentee, as the author of the claim language, may be expected to draft claims encompassing readily known equivalents.

A patentee's decision to narrow his claims through amendment may be presumed to be a general disclaimer of the territory between the original claim and the amended claim…. There are some cases, however, where the amendment cannot reasonably be viewed as surrendering a particular equivalent. The equivalent may have been unforeseeable at the time of the application; the rationale underlying the amendment may bear no more than a tangential relation to the equivalent in question; or there may be some other reason suggesting that the patentee could not reasonably be expected to have described the insubstantial substitute in question. In those cases the patentee can overcome the presumption that prosecution history estoppel bars a finding of equivalence.

This presumption is not, then, just the complete bar by another name. Rather, it reflects the fact that the interpretation of the patent must begin with its literal claims, and the prosecution history is relevant to construing those claims.

When the patentee has chosen to narrow a claim, courts may presume the amended text was composed with awareness of this rule and that the territory surrendered is not an equivalent of the territory claimed. In those instances, however, the patentee still might rebut the presumption that estoppel bars a claim of equivalence. /The patentee must show that at the time of the amendment one skilled in the art could not reasonably be expected to have drafted a claim that would have literally encompassed the alleged equivalent./

Festo, 122 S.Ct. at 1842 (paragraphing and emphasis added).

If Two Meanings of the Words in a Claim are Equally Reasonable,

the Narrower Meaning Might Have to Be Used

:CUSTOMID: if-two-meanings-of-the-words-in-a-claim-are-equally-reasonable-the-narrower-meaning-might-have-to-be-used

Sometimes a claim element could have two possible meanings, but the specification is not clear which meaning is the right one. When a word in a claim can equally well be given either of two meanings, the court might be required to use the narrower meaning, because that serves the purpose of requiring a claim to give fair notice to competitors. “Where there is an equal choice between a broader and a narrower meaning of a claim, … we consider the notice function of the claim to be best served by adopting the narrower meaning.” Athletic Alternatives, Inc., 73 F.3d at 1581.

Claims Are Construed to Sustain Their Validity ‑‑ If Possible

Where possible, courts try to construe claims so that it will not be necessary to hold them invalid. But a court cannot redraft a claim; the claim must stand or fall as written. “Although we construe claims, if possible, so as to sustain their validity, it is well settled that no matter how great the temptations of fairness or policy making, courts do not redraft claims.” Quantum Corp. v. Rodime, PLC, 65 F.3d 1577, 1584 (Fed. Cir. 1995) (affirming judgment of invalidity of patent claims that had been improperly broadened in reexamination).

Claim Differentiation: Differences in

Language are Presumed to be Significant

:CUSTOMID: claim-differentiation-differences-in-language-are-presumed-to-be-significant

“There is presumed to be a difference in meaning and scope when different words or phrases are used in separate claims. To the extent that the absence of such difference in meaning and scope would make a claim superfluous, the doctrine of claim differentiation states the presumption that the difference between claims is significant. Where some claims are broad and others narrow, the narrow claim limitations cannot be read into the broad whether to avoid invalidity or to escape infringement.” United States v. Telectronics, Inc., 857 F.2d 778, 783-84 (Fed. Cir. 1988); see also Wang Laboratories, Inc., v. America Online, Inc., 197 F.3d 1377, 1384 (Fed. Cir. 1999) (affirming summary judgment that AOL and Netscape Web browsers did not infringe Wang-owned patent for videotex frame processing system; claim differentiation did not support Wang's desired interpretation of claim language).

8.7.4 Special Topic: Means-Plus-Function Language in Claims

The patent statute permits an element in a claim to be drafted as “a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof.” 35 U.S.C. § 112, paragraph 6.

*Construction of “Means Plus\\
Function” Claim Language*
 
-
 
#+beginquote
Not always labeled with the word “means”
#+endquote
 
-
 
#+beginquote
Covers only identical function
#+endquote
 
-
 
#+beginquote
Covers only (i) corresponding structure clearly identified in patent specification and (ii) “equivalents” to that structure
#+endquote

Examples of means-plus-function claim elements are found in claim 1 of the patent involved in the State Street Bank case, reproduced below. The patent in question is Boes, U.S. Patent No. 5,193,056, issued March 9, 1993. In the claim language, italicized bracketed material was added by the Federal Circuit to indicate what structure was identified in the patent specification as performing the stated function:

  1. A data processing system for managing a financial services

configuration of a portfolio established as a partnership, each partner being one of a plurality of funds, comprising:

(a) computer processor means [a personal computer including a CPU] for processing data;

(b) storage means [a data disk] for storing data on a storage medium;

(c) first means [an arithmetic logic circuit configured to prepare the data disk to magnetically store selected data] for initializing the storage medium;

(d) second means /[an arithmetic logic circuit configured to retrieve information from a specific file, calculate incremental increases or decreases based on specific input, allocate the results on a percentage basis, and store the output in a separate file]/ for processing data regarding assets in the portfolio and each of the funds from a previous day and data regarding increases or decreases in each of the funds, [sic, funds'] assets and for allocating the percentage share that each fund holds in the portfolio . . . .

**•   */A means-plus-function claim element is not always signaled by the word “means.”/ A claim element that recites a function might — or might not — be treated as a means-plus-function element, and thus restricted in scope under section 112 of the patent statute, regardless whether it uses the actual word “means.” The courts decide this question on a case-by-case basis after looking at the patent and its prosecution history. See Cole v. Kimberly-Clark Corp., 102 F.3d 524, 531 (Fed. Cir. 1996) (citing cases).

**•   */Means-plus-function language requires identical function./ If a patent owner wishes to prove infringement of a claim containing means plus function elements, then for each such element, the patent owner must show that the accused data processing system performs the identical function recited in the claim limitation language (e.g., “processing data” from subparagraph (a) in the example above). If the accused apparatus does not perform that function, then “[a]s a matter of law, under the proper claim interpretation, there is no literal infringement.” Intellicall, Inc. v. Phonometrics, Inc., 952 F.2d 1384, 1389 (Fed. Cir. 1992) (affirming summary judgment of noninfringement); see also WMS Gaming, Inc. v. Int‘l Game Technology, 184 F.3d 1339, 1352-53 (Fed. Cir. 1999) (reversing trial court's holding of literal infringement because microprocessor in accused device did not perform identical function to that claimed in patent, but affirming holding of infringement under the doctrine of equivalents).

**•   */Means-plus-function claim language also requires identical or equivalent structure./ A means-plus-function element does not cover every possible means for carrying out the function in question. The Court of Appeals for the Federal Circuit has described section 112, paragraph 6 of the statute as having a “string attached.” The string is that the statute restricts the coverage of the means-plus-function claim language to a) the structure, material, or acts described in the specification and b) equivalents of that structure, material, or acts. See, e.g., Valmont Industries, Inc. v. Reinke Mfg. Co., Inc., 983 F.2d 1039, (Fed. Cir. 1993) (reversing judgment of infringement). Equivalence under section 112 paragraph 6 is similar to, but not identical to, equivalence under the doctrine of equivalents, discussed immediately below.

**•   */The/ court/, not the jury, examines the claimed function and the corresponding structure./ In its WMS Gaming opinion, the Federal Circuit held that “[d]etermining the claimed function and the corresponding structure for a claim limitation written in means-plus-function format are both matters of claim construction. They therefore present issues of law that we review de novo.” WMS Gaming, 184 F.3d at 1347 (reversing trial court's holding of literal infringement, but affirming holding of infringement under the doctrine of equivalents).

**•   */A programmed computer can constitute the “means” for performing a claimed function./ The WMS Gaming court also held that “[i]n a means-plus-function claim in which the disclosed structure is a computer, or microprocessor, programmed to carry out an algorithm, the disclosed structure is not the general purpose computer, but rather the special purpose computer programmed to perform the disclosed algorithm.” WMS Gaming, 184 F.3d at 1349 (emphasis added, citation omitted). Consequently, a computer programmed to perform an algorithm (the “accused algorithm”) that is different from the corresponding algorithm disclosed in the patent (the “patent's algorithm”) does not constitute identical structure to the structure disclosed in the patent. See id. at 1350; see also Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261, 1273 (Fed. Cir. 1999) (holding that patent owner was not entitled to summary judgment of literal infringement, but vacating and remanding summary judgment of noninfringement on other grounds; accused software-based device “constitutes a different ‘structure' than the software disclosed in the '364 patent because it uses a different algorithm to perform the recited function”).

If, however, the differences between the accused algorithm and the patent's algorithm are insubstantial, the accused structure may still literally infringe the patent claim in question, at least if it performs the identical function recited in the means-plus-function claim element. See WMS Gaming, 184 F.3d at 1350-52.

**•   */An “after-arising” structure might not be capable of being an “equivalent,” at least not in means-plus-function analysis./ The Federal Circuit has twice suggested, apparently in dicta, that a structural equivalent of a means-plus-function claim element must have been available at the time of the issuance of the patent containing the claim. In other words, a structure that did not exist at the time of issuance of the patent might not be able to be a section-112 equivalent, because public policy requires that the meaning of the means-plus-function claim language must be fixed as of the time that the patent was issued. Chiuminatta Concrete Concepts, Inc. v. Cardinal Indus., Inc., 145 F.3d 1303, 1309-11 (Fed. Cir. 1998) (reversing summary judgment of infringement and remanding with instructions to grant summary judgment of noninfringement); see also Al-Site Corp. v. VSI Int'l, Inc., 174 F.3d 1308, 1320-21 & n.2 (Fed. Cir. 1999).

(On the other hand, an after-arising structure can still be an equivalent under the doctrine of equivalents. See § 3.7[e].)

8.7.5 Infringement Under the Doctrine of Equivalents

Even if a patent claim is not literally infringed — because one or more claim elements is missing from the accused product or process — it may still be infringed if an “equivalent” of each missing claim element can be found in the accused product or process. Warner-Jenkinson Co. v. Hilton Davis Chemical Co., 520 U.S. 17, 117 S. Ct. 1040, 1049.

The Doctrine of Equivalents
 
-
 
#+beginquote
Each missing claim element requires an equivalent
#+endquote
 
-
 
#+beginquote
Interchangeability can indicate equivalence
#+endquote
 
-
 
#+beginquote
Substantial identity in function, way, and result can indicate equivalence
#+endquote
 
-
 
#+beginquote
A patented accused product might not be an equivalent
#+endquote
General Principles

The doctrine of equivalents was created by the courts, not by Congress, to prevent an infringer from escaping liability because of insubstantial differences with the literal claimed subject matter. The doctrine serves “to balance the purpose of fairness to inventors lest the patent be unjustly circumvented, against the purpose of patent claims to state clear boundaries of the patent grant, in fair notice of its scope.” Multiform Dessicants, Inc., 133 F.3d at 1480 (citation omitted).

*• An equivalent must be proved for each missing element in a claim. The Supreme Court has held that “the doctrine of equivalents, when applied broadly, conflicts with the definitional and public‑notice functions of the statutory claiming requirement.” The Court ruled that to resolve that conflict, “the doctrine of equivalents must be applied to individual elements of the claim, not to the invention as a whole.” Warner-Jenkinson, 117 S. Ct. at 1049.

*• Known interchangeability may be important in determining equivalence. “An important factor [in determining whether there is an equivalent to a claim element] is whether persons reasonably skilled in the art would have known of the interchangeability of an ingredient not contained in the patent with one that was.” Warner-Jenkinson, 117 S. Ct. at 1047 (citation omitted). The Court emphasized that, in applying this test, “a skilled practitioner's knowledge of the interchangeability between claimed and accused elements is not relevant for its own sake, but rather for what it tells the fact-finder about the similarities or differences between those elements.” Id. at

In the software area, the Federal Circuit has held on at least two occasions that hardware and software can be, but need not be, interchangeable. Compare Pennwalt Corp. v. Durand-Wayland, Inc., 833 F.2d 931, 933‑39 (Fed. Cir. 1987) (patented apple sorting apparatus relying on “hardwired” logic circuitry not infringed by microprocessor-controlled sorter that performed different functions) with Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261, 1270 (Fed. Cir. 1999) (vacating and remanding summary judgment of noninfringement; fact question existed as to whether software-based system component for selecting garage-door transmitter codes was equivalent to patented mechanically-based component).

According to the Supreme Court, the proper time for evaluating equivalency – and thus the proper time for assessing knowledge of interchangeability between elements – is at the time of infringement, not at the time the patent was issued; the substitution of a later-developed element does not insulate the accused product or process from a finding of equivalence. See Warner-Jenkinson, 117 S.Ct. at 1052-53.

*• Identity of function, way, and result can indicate equivalence. “[T]he substantial equivalent of a thing, in the sense of the patent law, is the same as the thing itself; so that if two devices do the same work in substantially the same way, and accomplish substantially the same result, they are the same, even though they differ in name, form, or shape.” Warner-Jenkinson, 117 S. Ct. at 1052 (citation omitted). According to one Federal Circuit panel, courts must take care not to merge “function” and “way.” Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261, 1271 (Fed. Cir. 1999) (vacating and remanding summary judgment of noninfringement). One judge's “way,” however, might be another judge's “function.”

*• “Pioneering” inventions and the doctrine of equivalents. Patent claims for “pioneering” subject matter may be entitled to a broad range of equivalents. At the other end of the spectrum, however, claims representing only narrow improvements in an already crowded art will be entitled to a correspondingly narrow range of equivalents. See generally, e.g., Perkin-Elmer Corp. v. Westinghouse Electric Corp., 822 F.2d 1528, 1532 (Fed. Cir. 1987) (affirming judgment of noninfringement), and cases cited therein.

“Pioneering” Inventions
 
-
 
#+beginquote
“a distinct step in the progress of the art, distinguished from a mere improvement or perfection of what had gone before”
#+endquote
 
-
 
#+beginquote
great interest among others in the field
#+endquote
 
-
 
#+beginquote
accolades, awards, honors
#+endquote
 
-
 
#+beginquote
commercial success
#+endquote
 
-
 
#+beginquote
entitled to broad scope of equivalents
#+endquote

The pioneering status of an invention was not mentioned as a relevant factor in the Warner-Jenkinson majority opinion by the Federal Circuit. Judge Lourie's dissenting opinion, however, pointed out that pioneering status “was mentioned by the [Supreme] Court in Graver [Tank] and must be considered when relevant.” Warner-Jenkinson, 62 F.3d at 1549 (Lourie, J., dissenting). The subsequent Supreme Court opinion in Warner-Jenkinson indicated that the Court's 1950 Graver Tank opinion is still good law. See Warner-Jenkinson, 117 S. Ct. at 1052 (citing Graver Tank). So it is distinctly possible that a court would look at whether an invention was “pioneering” in determining infringement under the doctrine of equivalents.

Just what is a pioneering invention? A century ago the Supreme Court characterized a pioneering invention as one that represented “a distinct step in the progress of the art, distinguished from a mere improvement or perfection of what had gone before.” Texas Instruments, Inc. v. Unitd States Int'l Trade Com'n, 846 F.2d 1369, 1370 (Fed. Cir. 1988), quoting Westinghouse v. Boyden Power Brake Co., 170 U.S. 537, 562, 18 S. Ct. 707, 718, 42 L. Ed. 1136 (1898). The Court of Appeals for the Federal Circuit gave an example of what makes a “pioneering” invention in a case involving fiber optic technology and a patent owned by Corning Glass Works:

Dr. Maurer first publicly reported the achievement of a 20 db/km optical waveguide fiber at the Conference on Trunk Telecommunications by Guided Waves held in London, England. That announcement created enormous interest and was the subject of many articles in both technical and general publications. The inventors' advancement in technology won them accolades from various societies and institutes, for which they were presented with many prestigious awards and honors. In addition, the invention of the '915 patent has achieved impressive commercial success on a worldwide basis. The district court determined that “[t]he 915 patent clearly covers a basic, pioneering invention.”

Corning Glass Works v. Sumitomo Elec. U.S.A., Inc., 868 F.2d 1251, 1255 (Fed. Cir. 1989).

*• If the accused device is itself patented, that can (but need not) indicate non-equivalence. The fact that a device accused of infringing a patent is itself patented might – but does not necessarily – mean that the device does not infringe the first patent. If the patent examiner determined that the accused device was patentable after reviewing the first patent, that can indicate that the accused device is substantially different from the claimed subject matter of the first patent. Zygo Corp. 79 F.3d at 1570 (reversing finding of infringement under the doctrine of equivalents).

Limitations on the Doctrine of Equivalents

The law imposes certain restrictions on a patent owner's ability to assert infringement under the doctrine of equivalents. Some of the principal limitations are discussed in this section.

Limitations on the Doctrine of Equivalents
 
-
 
#+beginquote
Patent owner cannot have it both ways
#+endquote
 
-
 
#+beginquote
The doctrine of equivalents cannot entirely eliminate a claim element
#+endquote
 
-
 
#+beginquote
Foreseeable variations of the claimed subject matter are not “equivalent”
#+endquote
 
-
 
#+beginquote
Embodiments disclosed but not claimed are dedicated to the public and cannot be “equivalents”
#+endquote
 
-
 
#+beginquote
The prior art limits the permissible scope of equivalents
#+endquote

The doctrine of equivalents cannot undo a claim amendment. Because of the public-notice function of patent claims, if a patent applicant amended a claim during the examination of the patent application, the law “place[s] the burden on the patent‑holder to establish the reason for an amendment required during patent prosecution. … Where no explanation is established, however, …. prosecution history estoppel would bar the application of the doctrine equivalents as to that element.” Warner-Jenkinson, 117 S. Ct. at 1051.

*• The doctrine of equivalents cannot undo an argument the inventor made to the patent examiner. A patent owner cannot assert that something is equivalent to a claim element if the inventor previously argued otherwise to the patent examiner. See, e.g., Southwall Technologies, Inc., 54 F.3d at 1583-84.

*• The doctrine of equivalents cannot be used to eliminate a claim element. “It is important to ensure that the application of the doctrine [of equivalents], even as to an individual element, is not allowed such broad play as to effectively eliminate that element in its entirety.” Warner-Jenkinson, 117 S. Ct at 1049. “[T]he doctrine of equivalents is not a license to ignore or erase … structural and functional limitations of the claim limitations on which the public is entitled to rely in avoiding infringement.” Athletic Alternatives, 73 F.3d at 1582 (internal quotation marks and citation omitted).

*• Foreseeable but unclaimed variations might be ineligible to be considered “equivalents” of the claimed subject matter. If variations on a claim element are foreseeable, a patent owner and its patent attorney are responsible for drafting the claim language to encompass those variations. “[A]s between the patentee who had a clear opportunity to negotiate [with the patent examiner to obtain] broader claims but did not do so, and the public at large, it is the patentee who must bear the cost of its failure to seek protection for this foreseeable alternative of its claimed structure.” Sage Products, Inc., 126 F.3d at 1425.

(Other Federal Circuit panels have distinguished Sage Products on this point, however, so the efficacy of this doctrine may be questionable. For example, one panel held that “the proposed application of the doctrine in Sage Products would have utterly written out of the claim not one, but at least two (maybe more) express limitations of the claim.” Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261, 1271 (Fed. Cir. 1999) (vacating and remanding summary judgment of noninfringement).)

*• Embodiments disclosed but not claimed are dedicated to the public and cannot be “equivalents.” In 2002, the en banc Federal Circuit resolved a seeming split between two prior panel decisions. In essence, the court held that, if a patent application discloses variations A, B, and C of an invention, but only claims variations A and B, then variation C is dedicated to the public and cannot be covered by the doctrine of equivalents. “[W]hen a patent drafter discloses but declines to claim subject matter, as in this case, this action dedicates that unclaimed subject matter to the public. Application of the doctrine of equivalents to recapture subject matter deliberately left unclaimed would conflict with the primacy of the claims in defining the scope of the patentee's exclusive right.” Johnson & Johnston Associates Inc. v. R.E. Service Co., Inc., 285 F.3d 1046, 1054 (Fed. Cir. 2002) (en banc) (citations and internal quotation marks omitted).

*• The prior art limits the permissible scope of equivalents. The prior art restricts the scope of equivalency that a patent owner can assert in alleging infringement under the doctrine of equivalents. One way of determining the extent of such restriction is to draft a hypothetical patent claim, sufficient in scope to literally cover the accused product. Such a hypothetical claim is sometimes referred to as a “/Wilson Sporting Goods/ claim,” after the name of the case in which the Court of Appeals for the Federal Circuit first used that term. “The pertinent question then becomes whether that hypothetical claim could have been allowed by the PTO over the prior art. If not, then it would be improper to permit the patentee to obtain that coverage in an infringement suit under the doctrine of equivalents.” Conroy v. Reebok Int'l Ltd., 14 F.3d 1570, 1576 (Fed. Cir. 1994).

The Doctrine of Equivalents and Means‑Plus‑Function Claims

In some circumstances, but not in others, a means-plus-function claim that is not literally infringed can still be infringed under the doctrine of equivalents:

  • The patent owner is likely to be precluded from asserting infringement under the doctrine of equivalents if the lack of literal infringement is due to the accused device's use of a structure that is more than insubstantially different from the structure described in the patent; Chiuminatta Concrete Concepts, Inc. v. Cardinal Indus., Inc., 145 F.3d 1303, 1309-11 (Fed. Cir.

    1. (reversing summary judgment of infringement and remanding with

    instructions to grant summary judgment of noninfringement).

    • On the other hand, if the lack of literal infringement is due to the accused device using identical or equivalent structure to perform a different function than is recited in the means-plus-function claim, then infringement can still exist under the doctrine of equivalents if the different function is nevertheless an equivalent of the function recited in the claim. WMS Gaming, Inc. v. Int‘l Game Technology, 184 F.3d 1339, 1352-54 (Fed. Cir. 1999) (reversing trial court's holding of literal infringement, but affirming holding of infringement under the doctrine of equivalents).

8.8 Dealing With Potential Infringement Issues

8.8.1 Your Company's Patented Invention

May Still Infringe Another Company's Patent

:CUSTOMID: your-companys-patented-invention-may-still-infringe-another-companys-patent

An invention can be patentable in itself, yet still infringe on someone else's patent. This could result in a marketplace stalemate; frequently, patent owners in this situation will grant each other some kind of cross-license.

8.8.2 Avoid “Willful” Infringement – Check Out Potential Problem Patents

A company that learns that it might be affected by a third-party patent should promptly investigate the situation, very possibly using outside patent counsel to maintain the attorney-client privilege as much as possible. Studied ignorance is generally not a good idea, because a company can be a “willful” infringer without even knowing it: The Federal Circuit has held repeatedly that one who becomes aware of a patent has an affirmative duty to use due care to avoid infringing a valid claim (e.g., by obtaining a competent opinion of counsel); failure to comply with that duty can constitute “willful” infringement, leading to an award of as much as treble damages. See 35 U.S.C. § 284 (court may increase damages up to three times amount found or assessed); cf. Modine Mfg. Co. v. Allen Group, Inc., 917 F.2d 538, 543 (Fed. Cir.

  1. (affirming denial of enhanced damages notwithstanding jury

finding of willful infringement, and holding that statute authorizes but does not mandate increased damages).

Suppose that a company makes a good-faith attempt to “design around” a third-party patent. Later, the company wins on the issue of literal infringement, i.e., its accused product or service is held not to literally infringe the patent (see § 3.7[b]). The accused product or service, however, also is held to infringe under the doctrine of equivalents (see § 3.7[e]).

Is this company a willful infringer because it intentionally designed around the third-party patent? Perhaps not. In WMS Gaming, the Federal Circuit reversed a finding of literal infringement and affirmed a finding of infringement under the doctrine of equivalents. The appellate court, vacating and remanding a holding of willful infringement, reminding the district court that “[w]hile ‘it is not a rule of law that infringement that is not literal can never be sufficiently culpable to warrant enhanced damages[,]… avoidance of literal infringement is a fact to be considered' in determining whether there has been willful infringement.” WMS Gaming, Inc. v. Int'l Game Technology, 184 F.3d 1339, 1354-55 (Fed. Cir. 1999) (citation omitted). The Federal Circuit also noted pointedly that “[w]hen the district court reconsiders its finding of willful infringement, it should bear in mind that the patent law encourages competitors to design or invent around existing patents.” Id. at 1355 (citations omitted).

8.8.3 Watch Out for Internal Emails About Third‑Party Patents

Too often, a company's senior management first learns about a third party's patent from an engineer, software developer, or other “techie” who read about it in a newsfeed, saw it on a Web site, etc. Thinking that s/he is being helpful, the techie sends an email to his manager describing the third-party patent and stating firmly that “we clearly infringe this patent.” Four points will be of keen interest to the company's counsel:

(i) In sending the email, the techie probably did not read the claims of the patent, and therefore is not really in a position to know whether the company is infringing the patent.

(ii) Nevertheless, the email very well might not be subject to the attorney-client privilege. Depending on whether it was sent as part of a request for legal advice, it might be discoverable in litigation.

(iii) The email also could well be admissible against the company as a party admission against interest. If so, it probably would be Exhibit B for the third-party patent owner (Exhibit A, of course, being the patent itself).

(iv) The patent owner's trial counsel would almost certainly “billboard” the email to the jury at every conceivable opportunity.

8.8.4 The Difficulty of Challenging the

Validity of a Claim in an Issued Patent 

:CUSTOMID: the-difficulty-of-challenging-the-validity-of-a-claim-in-an-issued-patent

A company concerned about another party's patent will usually want to challenge the validity of the patent. This section outlines some of the main legal principles governing such challenges.

A Patent is Presumed Valid (Because It Was Issued by the Government)

In infringement litigation, a patent owner need not prove that the patent is valid, because by statute it is presumed to be valid, and each claim is presumed valid independently of the validity of any other claims. See 35 U.S.C. 283, first paragraph. Moreover, the burden of establishing the invalidity of a patent claim is expressly placed, not on the patent owner as plaintiff, but on the party asserting such invalidity. See id.

The Court of Appeals for the Federal Circuit has held that a party seeking to establish that a claim is invalid must prove facts by clear and convincing evidence – not merely by a preponderance of the evidence – to support a conclusion that the claim is invalid. See, e.g., American Hoist & Derrick Co. v. Sowa & Sons, Inc., 725 F.2d 1350, 1359-60 (Fed. Cir. 1984) .

The same court has noted that, where the PTO has considered a piece of prior art, and has issued a patent notwithstanding that prior art, the courts owe some deference to the PTO's decision. See Minnesota Mining & Mfg. Co. v. Johnson & Johnson Orthopaedics, Inc., 976 F.2d 1559, 1572 (Fed. Cir. 1992).

But, the Courts Have the Final Say About Patentability

It is the courts, however, that are the final arbiters of patent validity. Although courts may take note of, and benefit from, the examination proceedings before the patent examiner, the question of patentability is ultimately for the courts to decide, without deference to the rulings of the patent examiner. See Quad Environmental Technologies Corp. v. Union Sanitary District, 946 F.2d 870, 876 (Fed. Cir. 1991).

The PTO's search library is far from perfect; the patent examiner might well have been unaware of important prior art. This is especially true in the software field, where much prior art is not documented in patents or printed publications. Consequently, infringement defendants will usually spend a great deal of time and money to scour every available source of prior art.

If a challenger to the validity of a patent produces prior art or other evidence not considered in the PTO, there is no reason to defer to the PTO so far as that prior art or other evidence is concerned. In fact, new prior art not considered by the patent examiner may so clearly invalidate a patent that the challenger's burden is fully sustained merely by proving the existence of the prior art. See American Hoist & Derrick Co., 725 F.2d at 1359-60 (Fed. Cir. 1984); see also WMS Gaming, Inc. v. Int'l Game Technology, 184 F.3d 1339 (Fed. Cir. 1999) (affirming judgment that patent was not invalid; two of three prior-art references cited at trial had not been considered by the patent examiner)..

A patent claim can be found to be invalid even if the prior art produced by the challenger is not more significant than the prior art considered by the PTO, see Surface Technology, Inc. v. U.S. Int'l Trade Comm'n, 801 F.2d 1336, 1339-40 (Fed. Cir. 1986), or for that matter even if the exact prior art in question was actually considered by the patent examiner. See, e.g., Celeritas Technologies, Inc. v. Rockwell Int'l Corporation, 150 F.3d 1354, 1360-61 (Fed. Cir. 1998) (reversing in pertinent part denial of JMOL; holding that no reasonable jury could have found that patent claims were not anticipated by prior-art reference, even though reference had been considered by patent examiner). In part, this is because it is not the examiner's technical expertise (which may or may not be considerable) that gives his (or her) decisions a presumption of correctness; it is the authority duly vested in him by his appointment as a patent examiner. See Western Electric Co. v. Piezo Technology, Inc., 860 F.2d 428, 433 (Fed. Cir. 1988).

Invalidation of a patent is a one-way trap door: once a patent claim is held invalid in a final judgment, the patent owner is estopped from ever denying its invalidity against anyone else (unless he shows that he did not have a full and fair opportunity to litigate). See Blonder-Tongue Laboratories, Inc., v. University of Illinois Foundation, 402 U.S. 318, 333‑34 (1971). As noted above, different claims in the same patent live or die independently, however, so the loss of one claim in a patent would not necessarily be fatal to all claims. See 35 U.S.C. § 282.

Infringers are under no such handicap. True, if one infringer fails to prove invalidity, he may be estopped from rearguing the matter unless new evidence is produced, under conventional principles of res judicata. Other infringers are not estopped, however, and can raise the same or new challenges to the patent. (As a practical matter, however, a patent claim that has survived litigation against an adequately-defended opponent is likely to be treated with more respect by courts than an untested claim.)

8.8.5 Be Aware of the Strong Remedies for Patent Infringement

The end results of a successful patent lawsuit can be gratifying to the patent owner and disastrous for the defendant. If held liable for patent infringement, the defendant can be subjected to some or all of the following remedies:

Injunction Against Further Infringement

An infringer may be subject to an injunction against further infringement – possibly putting the infringer out of business. See 35 U.S.C. § 283. As Barnes & Noble found out the hard way, courts can grant preliminary injunctive relief in patent cases. /See Amazon.com, Inc.

  1. Barnesandnoble.com, Inc./, 73 F.Supp.2d 1228 (W.D. Wash. 1999)

(granting preliminary injunction); cf. Chrysler Motors Corp. v. Auto Body Panels of Ohio, Inc., 908 F.2d 951, 953-54 (Fed. Cir. 1990) (affirming denial of preliminary injunction where trial court found patented invention obvious); Illinois Tool Works, Inc., v. Grip-Pak, Inc., 906 F.2d 679, 682 (Fed. Cir. 1990) (affirming denial of preliminary injunction; stressing that irreparable harm is presumed, but only rebuttably).

Damages – Possibly Including Treble Damages

The infringer may be ordered to pay damages. The damages are potentially equal to the patent owner's lost profits (if proved). See generally Rite-Hite Corp. v. Kelley Co., 56 F.3d 1538 (Fed. Cir. 1995) (in banc); see also, e.g., Kalman v. Berlyn Corp., 914 F.2d 1473, 1484 (Fed. Cir. 1990) (enumerating factors to be proved by patentee to be entitled to lost profits).

By statute, damages are not less than a reasonable royalty. See 35 U.S.C. § 284; see generally, e.g., Trell v. Marlee Electronics Corp., 912 F.2d 1443, 1445 (Fed. Cir. 1990); Polaroid Corp. v. Eastman Kodak Co., 16 USPQ (BNA) 1481 (D. Mass 1990) (total award, based on lost profits and reasonable royalty plus prejudgment interest, in excess of $900 million).

As noted in § 3.8[b], the damage award may be increased up to treble damages in the case of “willful” infringement or in other exceptional circumstances. Individuals involved in the infringement can be subject to personal liability in some circumstances, as discussed in § 3.8[f].

8.8.6 Consider the Potential for Personal Liability

Individuals who direct or actively take part in the infringing activities could be jointly and severally liable for the infringement. At this writing the law is not entirely settled on this point. The Federal Circuit has considered various theories of personal liability, including piercing the corporate veil, inducement of infringement under 35 U.S.C. § 271(b), and the doctrine that joint tortfeasors are jointly and severally liable.

Selected cases:

Al-Site Corp. v. VSI Intern., Inc., 174 F.3d 1308, 1331-32 (Fed. Cir. 1999): The Federal Circuit reversed a judgment holding a corporate officer personally liable for patent-infringement damage award. The court stated that for personal liability to attach, there must be evidence to justify piercing the corporate veil.

Sensonics, Inc. v. Aerosonic Corp., 81 F.3d 1566, 1575-75 (Fed. Cir. 1996): The court affirmed a judgment holding the founder / CEO / chief engineering officer of an infringing corporation personally liable for inducing corporation's infringement.

Manville Sales Corp. v. Paramount Systems, Inc., 917 F.2d 544, 552 (Fed. Cir. 1990): The court reversed a judgment holding a corporate officer personally liable for patent-infringement damage, on grounds that there was insufficient evidence to justify piercing the corporate veil.

Fromson v. Citiplate, Inc., 886 F.2d 1300, 1304: The court affirmed allowing amendment of pleadings to add individuals as defendants on an inducement-of-infringement theory.

9 Copyright

9.1 Fair use

11th Cir. blog-copyright case - slip op. at 25 et seq.:

To determine whether a particular use is fair, a factfinder considers four nonexclusive factors: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.

17 U.S.C. § 107. The inquiry is a “flexible” one that requires weighing the four factors in the light of the facts of the case. Cambridge Univ. Press v. Patton, 769 F.3d 1232, 1259 (11th Cir. 2014). We consider each factor in turn.

Campbell v. AcuffRose Music, Inc., 510 U.S. 569, 575 (1994) ("Oh Pretty Woman")

9.4 Based on the evidence in this case, the jury could have reasonably

concluded that the copyright registrations were invalid because Modlin was not an author ….

MedForms, Inc. v. Healthcare Management Solutions, Inc.,  F.3d , 2002 WL 966251 (2d Cir. May 7, 2002) (affirming denial of motion for new trial). See also § 2.1[b] (how much incremental creativity is required for protection for new versions); § 2.6[h][2] (requirements for joint authorship).

9.4.1 Copyright Protection for New Versions: How Much /Incremental/

Creativity is Required?

:CUSTOMID: copyright-protection-for-new-versions-how-much-incremental-creativity-is-required

Especially in the software industry, copyrightable works often take the form of incremental creative advances built on a pre-existing foundation. For example, a new release of a computer program will often be an improved version of an old program. As another example, this and other chapters of this book have been repeated revised over the years.

If a new work reflects sufficient new creative effort to rise to the level of a “derivative work,” then by statute the new work is protectable, whether or not the preexisting material is protectable. The statute provides that

(a) The subject matter of copyright as specified by section 102 [17 U.S.C. § 102] includes compilations and derivative works, but protection for a work employing preexisting material in which copyright subsists does not extend to any part of the work in which such material has been used unlawfully.

(b) The copyright in a compilation or derivative work extends only to the material contributed by the author of such work, as distinguished from the preexisting material employed in the work, and does not imply any exclusive right in the preexisting material. The copyright in such work is independent of, and does not affect or enlarge the scope, duration, ownership, or subsistence of, any copyright protection in the preexisting material.

17 U.S.C. § 103.

A derivative work is defined in the statute as

a work based upon one or more preexisting works, such as a translation, … abridgement, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship ….

17 U.S.C. § 101.

The question then becomes, When is the amount of incremental creativity sufficient for copyright protection of such works? In its Feist decision discussed in § 2.2[b], the Supreme Court held that a copyrightable work (in that case a compilation) need only possess “some minimal degree of creativity.” Feist Publications, Inc., v. Rural Telephone Service Co., 499 U.S. 340, 345, 111 S. Ct. 1282, 1287 (1991) (citation omitted). The Court described that minimal degree as “some creative spark, ‘no matter how crude, humble or obvious' it might be.” Id. (citation omitted).

So, how much creativity will suffice to meet the Feist test? One benchmark is provided in Montgomery v. Noga, 168 F.3d 1282 (11th Cir.

  1. (affirming judgment of infringement). The plaintiff, Montgomery,

was the author of a “shareware” graphics-viewer program that enabled users to view pictures on a computer screen. The defendants were the producers of CD-ROMs that, according to the court, were “largely pornographic in nature,” id. at 1287; they reproduced Montgomery's graphics-viewer software on their CD-ROMs without permission.

The Montgomery defendants argued that version 2.9a of the software — the only registered version at the time the lawsuit was brought — was not protectable by copyright. They pointed out that before March 1, 1989, Montgomery had distributed version 1.3 without a copyright notice, thus forfeiting his copyright and putting the software into the public domain. They argued that versions 1.4 through 2.9a were not sufficiently different enough from version 1.3 to be independently protectable.

The Eleventh Circuit disagreed. The court assumed for the sake of argument that Montgomery had forfeited his copyright in version 1.3 of his software because of his distribution of copies without a copyright notice. Id. at 1289-90 & n.11. But, the court held, registered version 2.9a was indeed different enough from the now-public-domain version 1.3 to be entitled to protection of its own. The court noted that Montgomery had modified his software to correct problems, add functionality, and improve the performance of the software. See id. at 1290 (describing modifications). The court concluded that the modifications were sufficiently original to support a valid copyright in version 2.9a as a derivative work, and affirmed judgment including $80,000 in damages and over $142,000 in attorneys' fees. See id. (citation omitted).

See also the discussion of the MedForms case in § 2.1[a][1], concerning how much creative contribution is required to make a programmer an “author” of a computer program.

9.4.3 The “First Sale” Doctrine; Software Rentals and Redistribution

The copyright owner's right of exclusive distribution of copies (or phonorecords) is limited by the “first sale” doctrine. That doctrine provides that the owner of a particular copy or phonorecord lawfully made is entitled, without permission of the copyright owner, to sell or otherwise dispose of possession of that copy or phonorecord. See 17 U.S.C. § 109(a).

Many and perhaps the majority of software transactions, however, are licenses, not sales, and so the first-sale doctrine may not apply. And even if the first-sale doctrine applies, it is limited by statute where software is concerned: the anti-rental provisions of the statute give the owner of the copyright in a computer program the exclusive right (subject to certain exceptions) to dispose of, or authorize the disposal of, possession of any copy by rental, lease, or lending. See 17 U.S.C. § 109(b).

Selected cases:

Adobe Systems Inc. v. One Stop Micro, Inc., 84 F. Supp.2d 1086 (N.D. Cal. 2000): The court granted partial summary judgment in favor of copyright owner Adobe. The court held that Adobe's software distribution agreement with an educational distributor was a licensing agreement, not a sales agreement, despite usage of sales terminology such as “purchase” and “own.” Consequently, the first sale doctrine did not apply, and the defendant did not have the right to redistribute copies of the software. The court held that One Stop Micro had thus infringed Adobe's copyright by purchasing Adobe software packages from the educational distributor, peeling off “academic use only” stickers, re-shrink-wrapping the packages, and distributing the adulterated packages in violation of distribution agreement).

Softman Products Co., LLC v. Adobe Systems Inc., 171 F. Supp. 2d 1075 (C.D. Cal. 2001) (vacating preliminary injunction): The U.S. district court for the Central District of California refused to adopt the Northern District's One Stop Micro analysis. The Softman court found that “the circumstances surrounding the transaction strongly suggests that the [shrinkwrap or click-wrap license] transaction is in fact a sale rather than a license. For example, the purchaser commonly obtains a single copy of the software, with documentation, for a single price, which the purchaser pays at the time of the transaction, and which constitutes the entire payment for the ‘license.' The license runs for an indefinite term without provisions for renewal. In light of these indicia, many courts and commentators conclude that a ‘shrinkwrap license' transaction is a sale of goods rather than a license.” Id. at

  1. And because the distributor-plaintiff did not agree to the terms

of the click-wrap or shrinkwrap end-user license agreement (EULA), the court held that the distributor was entitled under the first-sale doctrine to

Microsoft Corp. v. Harmony Computers & Electronics, Inc., 846 F. Supp. 208 (E.D.N.Y. 1994): The court granted a preliminary injunction after an ex parte seizure of software. It held that Microsoft's distribution of its software under license was not a “first sale,” and so the defendant infringed Microsoft's copyright by its unauthorized distribution of copies..

Central Point Software Inc. v. Global Software & Accessories, Inc., 880 F. Supp. 957 (E.D.N.Y. 1995): The court held that the defendant's “deferred billing plan,” which permitted the defendant's customers to return software for up to five days subject to a “restocking fee,” was a prohibited software rental arrangement.

Adobe Systems, Inc. v. Brenengen, 928 F. Supp. 616 (E.D.N.C. 1996): The court granted a preliminary injunction against the defendant's software-rental business.

9.4.4 Copyrights Last a Long Time

Ordinarily, the term of a copyright is the life of the author of the work plus 70 years (or, in the case of joint authors, the life of the last-surviving author plus 70 years). See 17 U.S.C. § 302(a), (b). Different rules apply to works that were created prior to January 1,

  1. See id. §§ 303, 304. Unless the Copyright Office's records

indicate otherwise, an author is presumed to be dead 95 years after the year of the first publication of a work or 120 years after the year of creation of the work. Id. § 302(e).

If, however, the work is (i) an anonymous work that remains anonymous in the Copyright Office's records, (ii)/ a pseudonymous work that remains pseudonymous in the Copyright Office's records, or /(iii) a work made for hire, then the copyright term is 95 years from the date of first publication or 120 years from the date of creation, whichever expires first. Id. § 302(c).

9.8 Mandatory Deposit of Copies for the Library of Congress Collection

The copyright statute apparently requires software publishers to deposit copies of at least their published documentation, and in some cases copies of their software itself, with the Library of Congress for the purpose of building the Library's collection. Section 407 of the statute requires that “the owner of copyright or of the exclusive right of publication in a work published in the United States shall deposit, within three months after the date of such publication, — (1) two complete copies of the best edition . . . .” 17 U.S.C. § 407(a) (emphasis supplied); see also Appendix B to [37 C.F.R.] Part 202—”Best Edition” of Published Copyrighted Works for the Collection of the Library of Congress, part VIII (defining “best edition” for machine-readable copies). While compliance is not a condition of copyright protection, 17 U.S.C. § 407(a). anyone not complying with a written demand by the Register of Copyrights for such a deposit is subject to fines. 17 U.S.C. § 407(d).

The statute gives the Register authority to exempt categories of material from the mandatory deposit requirement. See 17 U.S.C. § 407(c). Pursuant to that section, the Register has exempted “computer programs and automated data bases published in the United States only in the form of machine-readable copies (such as magnetic tape or disk, punched cards, or the like) from which the work cannot ordinarily be visually perceived except with the aid of a machine or device.” See Deposit of Published Copies or Phonorecords for the Library of Congress, 37 C.F.R. § 202.19(c)(5). (Note that program documentation is not exempt even from the existing mandatory deposit requirement.) The exemption regulations also state that the Register may grant “special relief” and exempt published works not otherwise exempt. See 37 C.F.R. § 202.19(e).

9.9 Ownership of Copyrights

9.9.1 The Basic Rules

Ownership of copyright is governed by federal law, with a dollop of the general common law of agency sometimes mixed in as discussed below. Some of the principal features of that law can be summarized as follows:@BEGINCopyright, ownership@END@BEGINCopyright, work made for hire@END@BEGINCopyright, employer rights in@END@BEGINWork made for hire@END

 Under the 1976 Copyright Act, copyright in any original work of authorship initially vests in the “author” or authors of the work. See 17 U.S.C. § 201(a).

 The bundle of rights comprising a copyright are severable in that (i) an undivided interest in the copyright may be assigned; furthermore, (ii) any of the exclusive rights themselves (or an undivided interest in any of them) can be assigned and owned separately from the other rights. See 17 U.S.C. § 201(d); see also the sample copyright assignment form at the end of this chapter.

 The “author” of some works, and thus the initial owner, may be the employer or hiring party of the actual human creator(s). See infra § 2.6[b] (ownership of works created within the scope of employment), § 2.6[e] (ownership of specially commissioned works).

 A joint work is co-owned by its authors; each joint author or other co-owner has the right to do as he wishes with the work, subject to a duty to account to other co-owners. Id. § 201(a); see also infra § 2.6[h].

(This paper assumes that all works were created on or after January 1, 1978, at which time the 1976 Copyright Act took effect. The Copyright Act does not expressly state in so many words that computer programs are considered to be works of authorship, nor that they are subject to copyright protection. The legislative history of and subsequent amendments to the Act, however, including specific computer program-related provisions, indicate clearly that Congress believed that software should be eligible for at least some protection under copyright; moreover, the courts have uniformly held that software is protectable by copyright at least to some extent.)

9.9.3 Scope of Employment: The Problem of Copyright Ownership

in Works Created “Off  Duty”

:CUSTOMID: scope-of-employment-the-problem-of-copyright-ownership-in-works-created-off-duty

@BEGINOwnership, off-duty creation of works@ENDA great deal of software is probably written by programmers who have other employment that may or may not be related to the software. If an employee-created work was prepared “within the scope of his or her employment,” it is deemed a work made for hire, 17 U.S.C. § 101. and the employer owns the copyright unless a written agreement signed by the parties expressly states that the employee owns all the rights comprised in the copyright. 17 U.S.C. § 201(b).

A key question is therefore: When is a work created “within the scope of [an employee's] employment”? The cases offer little bright-line guidance. If an employee used his or her own time and his own computer for at least part of the work, he or she may be the owner. The courts seem to focus as much on perceived equities as on anything else.

Selected cases:

Cole v. Control Data Corp., 947 F.2d 313 (8th Cir. 1991): The court affirmed judgment on a jury verdict awarding a former employee $2,215,000 in actual damages for a company's breach of contract to market software. The software had been developed by the employee on his own time with his own computer. The company had ordered the employee to destroy the only remaining copies of the program, located on company's premises. (The court vacated and remanded a punitive-damages award.)

Miller v. CP Chemicals, Inc. Miller v. CP Chemicals, Inc., 808 F. Supp. 1238, (D.S.C. 1992): The court granted an infringement defendant's motion for summary judgment of noninfringement and for a declaration that it owned the copyright in question as a work for hire. The plaintiff, a former employee of the defendant who was paid by the hour, was the supervisor responsible for the operation of the defendant company's quality control laboratory. The plaintiff had written one computer program for making mathematical computations needed for in‑process adjustments to one of company's commercial products, then wrote additional similar programs at behest of his supervisors, on his own time and without overtime pay. The court held that “development of the computer programs was at least incidental to his job responsibilities because it was ‘within the ultimate objective of the principal and an act which it is not unlikely that such a servant might do'” and that “the ultimate purpose of the development of the computer programs was to benefit CP by maximizing the efficiency of the operation of the quality control lab.” Id. at 1239-43.

Avtec Systems, Inc. v. Peiffer, 805 F. Supp. 1312 (E.D. Va. 1992), vacated and remanded, 21 F.3d 568 (4th Cir.), on remand 1994 U.S. Dist. LEXIS 16946 (E.D. Va. Sept. 12, 1994): The district court held that a computer program, created off-duty by the defendant former employee, had not been created within the scope of employment, was not a work made for hire, and thus was not owned by the plaintiff company. The computer program in question managed and presented satellite data. The former employee's job description “included ‘implement[ing] computer simulation' and specifically, simulating ‘satellite orbits.'” 21 F.3d at

  1. The Avtec court looked to the three-factor test of the

Restatement (Second) of Agency, which states that a servant's conduct is within the scope of employment:

only if (a) it is of the kind he is employed to perform; (b) it occurs substantially within the authorized time and space limits; [and] (c) it is actuated, at least in part, by a purpose to serve the master.

See Restatement of Agency (Second) § 228 (1985), quoted in Avtec, 21 F.3d at 571, and cited in CCNV. v. Reid, 490 U.S. at 739-40, 109 S. Ct. at 2172-73.

Marshall v. Miles Laboratories, Inc., Marshall v. Miles Laboratories, Inc., 647 F. Supp. 1326 (N.D. Ind. 1986): In this pre-Reid case, the court held that a journal article co-authored in his spare time by the plaintiff, a scientist employed by the defendant company, describing research conducted by the company, was a work made for hire owned by company. The court noted that the plaintiff's job responsibilities had included developing, summarizing, and reporting of technological information in the field in question; moreover, the plaintiff admitted having complied with the company's policy requiring prepublication clearance of all outside writing by employees, meaning that the defendant “had and did exercise the right to control and supervise the preparation” of the work.

9.9.4 The Uncertain Work-for-Hire Status of Works Created by University

Scholars

:CUSTOMID: the-uncertain-work-for-hire-status-of-works-created-by-university-scholars

@BEGINUniversities, ownership of Copyrights@ENDA special instance of the work made for hire doctrine arises in the case of software created by university faculty or graduate students. Such software could fall in a gray area between academic works traditionally owned by the faculty members themselves, and other works to which the university might have a strong claim.

Faculty members apparently own the copyrights in their academic writings, even though they usually are required as part of their employment duties to “publish or perish.” According to the Seventh Circuit's Weinstein case, this was a well-established custom, a recognized exception to the work made for hire rule, which the 1976 Copyright Act did not repeal or alter. See Weinstein v. University of Illinois, 811 F.2d 1091, 1094 (7th Cir. 1987) (Easterbrook, J., affirming dismissal on other grounds); cf. Hays v. Sony Corp. of America, 847 F.2d 412, 416 (7th Cir. 1988) (Posner, J.; word processing manual written by teachers for use in school was not work made for hire); but see University of Colorado Foundation Inc. v. American Cyanamid, 880 F. Supp. 1387 (D. Colo. 1995) (granting summary judgment of copyright infringement; scholarly article by university faculty, copied into company's patent application, was work made for hire owned by university).

Works created in the course of carrying out assigned university duties, such as serving on a university administrative committee, might belong to the university, however. See Weinstein, 811 F.2d at 1094 (dictum). In Weinstein, Judge Easterbrook speculated that if a university “form[ed] a committee to study the appropriate use of small computers and conscripts professors as members,” and if “[t]he committee [publishes] a report,” then the university might claim a copyright in the report. Id.

The status of proprietary rights in software developed in the course of research by university professors is unclear. Several different scenarios can be imagined in which both copyrights and patent rights could be the subject of controversy. The situation would be made more confusing by ambiguities in the written intellectual property policies that have been adopted by many universities. Many such policies state that the universities own any patent rights that may arise from inventions by faculty members and graduate students. Typically, however, many of those policies also specify that individual faculty members will own copyrights in their works where such works do not arise from assigned university duties. See, e.g., Weinstein, 811 F.2d at 1094 (quoting portions of University of Illinois policy); but cf. Applied Innovations, Inc., v. Regents of the University of Minnesota, 876 F.2d 626, 630‑31 (8th Cir. 1989), affirming 685 F. Supp. 698, 703 (D. Minn. 1987) (university owned copyrights in various versions of Minnesota Multiphasic Personality Inventory, apparently by assignment from faculty-member authors).

9.9.5 Establishing Work-for-Hire Status in Specially Commissioned Works

Created by Outsiders

:CUSTOMID: establishing-work-for-hire-status-in-specially-commissioned-works-created-by-outsiders

@BEGINCopyright, Commissioned works ownership@ENDA hiring party need not always be an “employer” to qualify as the “author” and thus the initial owner of a work made for hire. The other way in which a hiring party can acquire author status is 1) for the work to come within the Copyright Act's definition of a specially ordered or commissioned work, and 2) for the parties to comply with the “statute of frauds” provision for such works.

The Statutory Compromise for Outside ”Works for Hire”

Section 101 of the Copyright Act provides that the definition of “work made for hire” includes a work specially ordered or commissioned for use as any of the following, if the parties expressly agree in a written instrument signed by them that the work shall be considered a work made for hire:

 a contribution to a collective work,

 a part of a motion picture or other audiovisual work,

 a translation,

 a supplementary work,

 a compilation,

 an instructional text,

 a test,

 answer material for a test, or

 an atlas.

These statutory categories represent a conscious compromise by Congress as to when the rights of non-employee authors can be permanently appropriated in advance by hiring parties. See Community for Creative Non-Violence v. Reid, 490 U.S. 730, 745-46, 109 S. Ct. 2166, 2175 (1989); see also infra § 2.6[g] (rights assigned to a hiring party, as opposed to rights owned ab initio by virtue of hiring party's “authorship,” can be reclaimed by author or heirs 35 years after assignment).

Section 101 of the statute further provides that a “supplementary work,” as used in the above laundry list, is a work prepared for publication as a secondary adjunct to a work by another author for the purpose of introducing, concluding, illustrating, explaining, revising, commenting upon, or assisting in the use of the other work, such as forewords, afterwords, pictorial illustrations, maps, charts, tables, editorial notes, musical arrangements, answer material for tests, bibliographies, appendixes, and indexes, and an “instructional text” is a literary, pictorial, or graphic work prepared for publication and with the purpose of use in systematic instructional activities. See 17 U.S.C. § 101 (definition of “work made for hire”).

The statute does not say when the written instrument must be executed. The Seventh Circuit expressly held that execution must take place in advance, but the Second Circuit held that execution could occur after the work is created if the parties intended a work-for-hire relationship before the work was created. Compare Schiller & Schmidt, Inc., v. Nordisco Corp., 969 F.2d 410, 412-13, 23 USPQ2d (BNA) 1762 (1992) (holding that a signed statement that hiring party owned copyrights in previously taken photographs was ineffective to confer work-made-for-hire status on photographs) with Playboy Enterprises, Inc. v. Dumas, 53 F.3d 549 (2d. Cir. 1995) (holding that author's endorsement of a series of checks, each having a legend stating that payment was for a work made for hire, could be sufficient to establish intent), vacating and remanding 831 F. Supp. 295 (S.D.N.Y. 1993), on remand, 960 F. Supp. 710 (S.D.N.Y. 1997) (holding that illustrations paid for by checks containing work-for-hire language were works made for hire if checks were endorsed by illustrator, but not if checks were endorsed by painter's agent).

Computer Software as Specially Ordered or Commissioned Works

Most computer programs normally do not fit within any of the nine statutory work-made-for-hire categories. Thus, they cannot qualify as works made for hire even if they're specially ordered or commissioned from an outside software developer. (Many software development contracts and similar documents inappropriately state that the software in question, being developed by an independent programmer or firm, is to be deemed a work made for hire. Except in the circumstances set out in the statute, however, merely saying so will not make it so, no matter what the parties recite in their agreement.) Some exceptions may exist, however:

  • A section of computer code, commissioned to form part of a larger program might qualify as a contribution to a collective work. But see § 2.6[h], concerning whether such a larger program might be a joint work jointly owned by the authors.
  • A routine commissioned for a computer program that involves pictorial images might constitute a part of an audiovisual work.
  • Software documentation written by outside technical writers (e.g., on-line help screens or printed user manuals) may qualify as a supplementary work or instructional text.
  • A “porting” of an existing program (roughly, a translation), to another language or for use on a different computer, might arguably qualify as a specially commissioned translation.
  • Contributions to a data compilation, e.g., one used by a computer program, could qualify for copyright protection as a compilation under the statute. See 17 U.S.C. § 101 (definition of “compilation”), § 102 (extent of copyright in compilations). See also § 2.2 for a discussion of the scope of copyright protection in data bases; cf. Digital Communications Assocs., Inc., v. Softklone Distr. Corp., 659 F. Supp. 449, 457‑62 (N.D. Ga. 1987) (concluding that status screen of plaintiff's Crosstalk program was a protectable compilation of commands and status information).

9.9.6 Establishing Ownership by Assignment

An assignment is another way for a hiring party to acquire title; software development agreements often require the (outside-contractor) developer to assign all right, title, and interest in the software copyright to the hiring party.

Conveyancing Basics

A written instrument is required to assign a copyright. 17 U.S.C. § 204(a). If the instrument is properly acknowledged, it serves as prima facie evidence of the transfer. 17 U.S.C. § 204(b). If an assignment is to include the right to sue for past infringement, that fact should be expressly recited in the instrument. A sample copyright assignment is set out below in 0.

Selected cases:

Tiffany Design, Inc. v. Reno‑Tahoe Specialty, Inc., 55 F. Supp.2d 1113, 1117-18 (D. Nev. 1999): The court held that a signed letter which stated that a photographer “release[d] all copyrights attached to the Las Vegas poster to Grant Gresser of Tiffany Design” was sufficient to convey the copyright.

Effects Assocs., Inc. v. Cohen, 908 F.2d 555, 557 (9th Cir.1990), discussed in § 2.6[j]: Judge Kozinski's opinion noted in passing that “[i]f the copyright holder agrees to transfer ownership to another party, that party must get the copyright holder to sign a piece of paper saying so. It doesn't have to be the Magna Charta; a one‑line pro forma statement will do.”

Konigsberg Int'l, Inc. v. Rice, 16 F.3d 355, 356-57 (9th Cir. 1994): The court affirmed a judgment that a letter by the defendant licensor, confirming the existence of a two-year oral exclusive license agreement, written after the two-year term, was ineffective as transfer of rights to the plaintiff licensee.

Eden Toys, Inc. v. Florelee Undergarment Co., 697 F.2d 27, 36 (2d Cir.1982): The court held that a memorandum of transfer made within a year of an oral agreement and during the term of an exclusive license validated the agreement ab initio.

Arthur Rutenberg Homes Inc. v. Drew Homes Inc., 29 F.3d 1521, 1533 (11th Cir. 1994): The court reversed a holding that the plaintiff did not own valid copyright at time of alleged infringement and that the registration was invalid because it incorrectly recited that registered work was a work made for hire. A third-party author's oral agreement that the plaintiff would own title to the work, subsequently followed up by written assignments, gave the plaintiff sufficient ownership interest to obtain a registration and to sue the defendant for infringement.

Friedman v. Stacey Data Processing Services, Inc., 17 USPQ2d (BNA) 1858 (N.D. Ill. 1990): The court held that extrinsic evidence may be considered in determining whether ambiguous particular language in software development agreement constituted assignment of copyright.

In an interesting but seemingly isolated ruling, a Louisiana federal court held that transfers of copyrights must comply with the formalities requirements of state contract law, possibly including the Louisiana law governing “donations of incorporeal movables.” According to the court, “[t]he material question is whether the transfer [of the copyrights] was a donation or a transfer for consideration”; in the former case, notarization and witnessing would be required. In response to the defendants' motion for summary judgment, the court held that a genuine issue of material fact existed whether the plaintiff had a valid chain of title to the copyrighted posters in question. N & D E Co. Inc. v. Gustings, 23 USPQ2d (BNA) 1049, 1051-52 (E.D. La. 1992) (denying, in pertinent part, defendant's motion for summary judgment).

9.9.7 Consequences of Ownership by Assignment vs. Authorship

Some consequences occur when a hiring party obtains ownership of a copyright by assignment, instead of owning it from the outset as the “author” of a specially commissioned work:

If the software is created by an individual or individuals who are not in a work-made-for-hire relationship (and who assign their rights to the hiring party), then the copyright term lasts for the life of the last-surviving author plus 50 years. The term is not affected by whether the copyright is assigned to the hiring party. Furthermore, all assignments and licenses of non-”work for hire” copyrights are terminable during a five-year period beginning 35 years after the date of the assignment or license (and the termination right cannot be waived in advance). Id. § 203.; cf. Stewart v. Abend, 110 S. Ct. 1750 (1990) (the “Rear Window” case) (holding that under 1909 Copyright Act, license to distribute derivative work must be renegotiated if the owner of the underlying work elects to terminate the license during the 35-year window).

If the software is created as a work made for hire, then as noted above the hiring party is the “author” ab initio. The copyright term lasts for 75 years from the year of first publication or 100 years from the year of creation, whichever comes first. 17 U.S.C. § 302.

As a practical matter, however, these consequences may not have much commercial significance. Most if not all computer software can be expected to be obsolete long before the expiration of the copyright or the opening of the termination window.

9.9.10 Implied License Notwithstanding Lack of Ownership

A hiring party may not be in a hopeless position simply because its software is not a work made for hire or a joint work and it cannot obtain an assignment. The hiring party can probably assert at least a use right in the software, and possibly even more than that.

Selected cases:

Graham v. James, 144 F.3d 229, 235, 238 (2d Cir.1998): The appellate court vacated and remanded a copyright infringement award, on grounds that the infringement defendant was an implied licensee.

Effects Associates, Inc., v. Cohen, 908 F.2d 555, 558‑59 (9th Cir. 1990): A movie producer commissioned special-effects footage for a horror movie but did not pay for it. In an opinion by Judge Kozinski, the court rejected a claim that the producer was a copyright infringer, holding that the movie producer had orally been granted an implied non-exclusive license (and thus the copyright owner's action would have to be in contract, not copyright). The court noted pointedly that the dispute over copyright would not have arisen had the parties reduced their agreement even to a one-line writing.

Oddo v. Ries, 743 F.2d 630, 634 (9th Cir. 1984): An author prepared a manuscript as part of his partnership duties. The court held that the author had implicitly given the partnership a license to use the articles, “for without a license, [the author's] contribution to the partnership venture would have been of minimal value.”

Holtzbrinck Publishing Holdings, L.P. v. Vyne Communications, Inc., No. 97 CIV. 1082 (KTD), 2000 WL 502860 at *10 (S.D.N.Y., Apr 26, 2000): The parent company of Scientific American magazine commissioned a consultant to develop programming for the magazine's Web site. The court granted partial summary judgment that the company had an irrevocable non-exclusive license to the programming.

Yojna, Inc., v. American Medical Data Systems, Inc., 667 F. Supp. 446 (E.D. Mich. 1987): An outside software contractor, at the request of a hospital corporation and its subsidiary, developed a computer program for hospital information management. The court held that the outside contractor was the owner of the software, but the subsidiary had a perpetual, royalty-free license to use and sublicense the program, including the right to unrestricted access to source code for purposes of developing new versions and enhancements. The court also held that the license was an exclusive license within the health-care industry. See id. at 446.

Some courts, however, have declined to hold that employers have such rights in works created by their employees. Selected cases:

Avtec Systems, Inc. v. Peiffer, 21 F.3d 568 (4th Cir. 1994), vacating and remanding 805 F. Supp. 1312 (E.D. Va. 1992), on remand 1994 U.S. Dist. LEXIS 16946 (E.D. Va. Sept. 12, 1994): Peiffer, a former employee of Avtec, had written a computer program in part on company time and in part on his own time. The Fourth Circuit held that if Peiffer was the owner of the copyright in the computer program, then Avtec would have had only a nonexclusive license to use the program, which would be revocable absent consideration. The court disapproved a holding below that Avtec had a “shop right” in the software; it noted that Congress had expressly declined to import the shop right doctrine from patent law into copyright law. See id. at 575 n.16 (citation omitted).

Kovar v. Southeastern Michigan Transportation Authority, slip op., No. 101761 (Mich. App. Oct. 4, 1989), reprinted in Comp. Industry Lit. Rptr. 10,317 (Oct. 23, 1989): A former employee of the transit authority, who worked as a schedule writer, had developed scheduling software “in his spare time on the job and at home” [emphasis supplied] but had kept the source code and passwords as secrets from his employer. The employee resigned to take another job and offered the transit authority a use license for an annual fee; his supervisor “fired” him, unsuccessfully demanded that he turn over his source code and passwords, called in the district attorney to have him arrested for “extortion” and “destruction of computer programs,” and advised his new employer that the former employee was under investigation for extortion. Id., slip op. at 2. The court implicitly held that the transit authority did not have a license to use the scheduling software.

9.10 Infringement of Software Copyrights

Theoretically, analysis of software copyright-infringement claims is straightforward. In the abstract, claims of computer program copyright infringement are judged by the same principles as are applied to other copyrighted works: any “‘“copying” of protectable expression' beyond the scope of a license” constitutes copyright infringement. E.g., MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 26 USPQ2d (BNA) 1458 (9th Cir. 1993) (affirming summary judgment and injunction against third party maintenance provider's unauthorized use of plaintiff's software on customer's computer system for maintenance and diagnostic purposes), quoting S.O.S., Inc. v. Payday, Inc., 886 F.2d 1081, 1085 (9th Cir. 1989) (reversing summary judgment granted in favor of customer/copyright infringement defendant).

9.10.1 Basic Infringement Analysis

As explained in the famous Computer Associates v. Altai case, Computer Assocs. Int'l, Inc., v. Altai, Inc., 982 F.2d 693 (2d Cir.

  1. (affirming holding of noninfringement). the basic analytical

approach is well-established and entails proof of “substantial similarity” between the copyrighted work and the accused work:

[The copyright] plaintiff must establish its ownership of a valid copyright, and that the defendant copied the copyrighted work. The plaintiff may prove defendant's copying either

  • by direct evidence or,
  • as is most often the case, by showing that
  • the defendant had access to the plaintiff's copyrighted work and
  • that defendant's work is substantially similar to the plaintiff's copyrightable material.”

Altai, 982 F.2d at 701 (emphasis and bulleted paragraphing added, citations omitted). The Altai court noted that “‘[s]ubstantial similarity,' in the copyright context, refers to appropriation by the putative infringer of the ‘fundamental essence or structure' of a protected work.” Id. (citation omitted).

Proof of substantial similarity to protectable aspects of a work is required because copying alone, in and of itself, does not necessarily lead to liability. “Not all copying, however is copyright infringement …. copying as a factual matter is insufficient, if improper appropriation is lacking.” Melville Nimmer & David Nimmer, 4 Nimmer on Copyright, § 13.01[B] at 13‑9, 13‑10, quoted in Berkla v. Corel Corp., 66 F.Supp.2d 1129 (E.D. Cal. 1999) (granting in part and denying in part Corel's motion for summary judgment of noninfringement) (internal quotation marks omitted).

Substantial similarity can be proved by showing similarity in a variety of factors. For example, in one case, the copyright owner convinced the court to grant a preliminary injunction on the basis of

  • “several sections of the programs where code similarities are uncanny, including the color code map for plaintiff's screens, which is identical in both programs;

    • “identical coding of the so‑called “intensity” function, which governs intensity of colors and is used to make objects on the screen distinguishable from one another;
    • “the appearance of empty source code modules or files in exactly the same location in both programs;
    • “the same or similar bug fixes in both programs. * * *
    • “remarkable instances of similarities to plaintiff's software in the programmer's comments, which are non‑executable appendages to lines of executable code. …
    • “comments identical to the point of repeated spelling errors. In one notable instance, the line “Dont do anyting” appears as a programmer's comment in both Tradescape and Bulldog, with identical misspellings in both.”

Tradescape.com v. Shivaram, 77 F. Supp.2d 408, 417, 418 (S.D.N.Y.

  1. (granting preliminary injunction) (bulleted paragraphing added,

footnotes omitted).

Several different “flavors” of copyright infringement in the context of computer software are discussed below.

9.10.2 Unauthorized Copying or Distribution as Infringement

Perhaps the most straightforward variety of copyright infringement is that of naked piracy, e.g., unauthorized copying and/or distribution of executable program code. Such action has been held in numerous cases to constitute copyright infringement.

Selected cases:

Microsoft Corp. v. Grey Computer, Inc., 910 F. Supp. 1077 (D. Md. 1995): The court “threw the book” at corporate and individual defendants who were accused of counterfeiting Microsoft software. It granted summary judgment in favor of Microsoft, awarding maximum statutory damages for copyright infringement and treble the defendants' profits for trademark infringement. It also held the individual defendants jointly and severally liable with the corporate defendants.

Microsoft Corp. v. Harmony Computers & Electronics, Inc., 846 F. Supp. 208 (E.D.N.Y. 1994): The court granted a preliminary injunction after ex parte seizure of software.

Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240 (3d Cir. 1983): The court affirmed a infringement, holding that the defendant had copied Apple's operating system software for use in its “clone” computers.

Micro-Sparc, Inc. v. Amtype Corp., 592 F. Supp. 33, 34-35 (D. Mass.

  1. (rejecting section-117 defense): A hobbyist magazine published

computer programs in source-code form. It sued a “keyboarding service” which had input programs onto disk and sold the disks to purchasers of the magazine. The court held that this infringed the copyright in programs.

9.10.3 Use by an “Unauthorized” Person (e.g., a Third-Party Maintenance

Provider) as “Infringement”

:CUSTOMID: use-by-an-unauthorized-person-e.g.-a-third-party-maintenance-provider-as-infringement

Use of software by an unauthorized person can constitute infringement. This is shown by a number of now-outdated cases involving third-party maintenance providers (commonly referred to as independent service organizations or ISOs) who use their customers' licensed copies of software, e.g., for running diagnostic tests on a customer's computer. Prior to a 1998 statutory change, such unauthorized use typically became an issue where the ISO competes with the computer manufacturer in post-sale servicing of the computer. At least some of the cases seemed to turn on the precise language used in the customer's license agreement.

Pre-Amendment Cases

Data General Corp. v. Grumman Systems Support Corp., 825 F. Supp. 340 (D. Mass. 1993), affirmed in pertinent part but remanded for redetermination of possibly-duplicative damage award, 36 F.3d 1147 (1st Cir. 1994): The First Circuit affirmed a holding that an ISO's use of Data General's diagnostic software constituted copyright infringement. It upheld judgment on a verdict for $27.4 for copyright infringement and an equal amount for trade-secret misappropriation, which the trial judge increased by $9 million because of willful misappropriation.

Service & Training Inc. v. Data General Corp., 963 F.2d 680, 688-89 (4th Cir. 1992) (affirming holding of copyright infringement), affirming 737 F. Supp. 334 (D. Md. 1990): Data General was likewise successful in obtaining a nearly $64 million judgment against an ISO that apparently was using over 200 unlicensed copies of Data General's software.

MAI Systems Corp. v. Peak Computer Inc., 991 F.2d 511 (9th Cir. 1993): The Ninth Circuit similarly held that use by a nonlicensee ISO of a copy of diagnostic computer software, licensed to a customer on terms excluding third-party use, on the customer's computer in the course of maintaining the computer for the customer, constituted copyright infringement. The court affirmed summary judgment and an injunction against the third-party maintenance provider's unauthorized use of the software. The court's holding included the point that the ISO's copying of the program into the computer's working memory (RAM) to run the program created an embodiment that could be “perceived, reproduced, or otherwise communicated” under section 101 of the Copyright Act, 17 U.S.C. § 101, and consequently was sufficiently “fixed” to qualify as a “copy,” giving rise to infringement liability. 991 F.2d at 518-19; see also Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260 (5th Cir. 1988) (“the act of loading a program from a medium of storage into a computer's memory creates a copy of the program”), cited in MAI Systems Corp.

Advanced Computer Systems v. MAI Systems Corp., 845 F. Supp. 356 (E.D. Va. 1994) (granting MAI's motion for summary judgment of copyright infringement; rejecting fair use defense): MAI was likewise successful in a Virginia district court against another ISO. That court also rejected the ISO's argument that its use of MAI's software constituted fair use. See

Triad Systems Corp. v. Southeastern Express Co., 64 F.3d 1330 (9th Cir. 1995): The Ninth Circuit rejected a contention that similar use of a customer's software by an ISO constituted fair use..

NLFC Inc. v. Devcom Mid-America Inc., 45 F.3d 231 (7th Cir. 1995): In this somewhat peculiar case, the Seventh Circuit affirmed summary judgment of noninfringement in favor of a defendant third-party maintenance provider. The court based its decision on the ground that there was no evidence the defendant had done more than operate licensed copies of the software in question on the licensees' computers. The NLFC plaintiff's copyrighted software had “contained many bugs (among other assorted problems).” Id., 45 F.3d at 233. The defendant had originally been hired by one licensee, with the plaintiff's agreement, to fix the problems, which it did. Another licensee subsequently hired the defendant to do the same. Apparently recognizing a market opportunity, the defendant sent out solicitation letters to other licensees. The plaintiff sued for copyright infringement. It evidently based its case on the defendant's alleged copying of the software to the defendant's own computers. The Seventh Circuit agreed with the district court that the plaintiff had failed to put forth evidence of such copying (and observed in a footnote that even if such copying had occurred it might have been authorized by the plaintiff's license agreements with its licensees). Id., 45 F.3d at 235 & n.5. The NLFC court cursorily cited MAI Systems for the proposition that loading software into memory to execute it constitutes “copying.” 45 F.3d at 235. Strangely, the Seventh Circuit apparently did not consider that under MAI Systems, a nonlicensee is liable for infringement if it runs licensed software on a licensee's computer, even though the defendant had apparently admitted doing just that. Id., 45 F.3d at 233. Nor did the appellate court seem to regard as significant the fact that the defendant conceded printing out a copy of the source code of the software for reference purposes. Id.

Hogan Systems, Inc. v. Cybresource Int'l, Inc., 158 F.3d 319 (5th Cir. 1998), affirming 1997 WL 311526 at *3 (N.D. Tex. June 2, 1997): The language of the license agreement made all the difference in the Fifth Circuit's Hogan Systems case. The language in question prohibited the licensee from making the licensed software available to anyone “except to [Norwest's] employees or [the licensor's] employees or to other persons during the period such other persons are on [Norwest's] premises for purposes specifically relating to [Norwest's] authorized use of the licensed program.” (granting defendant's motion for summary judgment). The district court concluded that the license agreement “authorizes third‑party contractors to provide consulting services to Norwest on Hogan‑produced software, including use, copying, and modification. What Norwest could itself do under the License, Norwest may use a contractor to do. In other words, while they are engaged in consulting services on behalf of Norwest, Defendants' activities are ‘sheltered under' Norwest's license rights.” 1997 WL 311526 at *4. The Fifth Circuit agreed; the court even endorsed the proposition that the third-party contractor's remote access to the software by remote-control software had not been shown to constitute infringement. See 158 F.3d at 322-24.

The 1998 Amendment to Section 117

In 1998, Congress effectively overruled the MAI Systems line of cases by adding a new paragraph (c) to section 117 of the Copyright Act. The new paragraph provides as follows:

(c) Machine maintenance or repair.–Notwithstanding the provisions of section 106, it is not an infringement for the owner or lessee of a machine to make or authorize the making of a copy of a computer program if such copy is made solely by virtue of the activation of a machine that lawfully contains an authorized copy of the computer program, for purposes only of maintenance or repair of that machine, if–

(1) such new copy is used in no other manner and is destroyed immediately after the maintenance or repair is completed; and

(2) with respect to any computer program or part thereof that is not necessary for that machine to be activated, such program or part thereof is not accessed or used other than to make such new copy by virtue of the activation of the machine.

(d) Definitions.–For purposes of this section—

(1) the “maintenance” of a machine is the servicing of the machine in order to make it work in accordance with its original specifications and any changes to those specifications authorized for that machine; and

(2) the “repair” of a machine is the restoring of the machine to the state of working in accordance with its original specifications and any changes to those specifications authorized for that machine.

9.10.4 Unauthorized Use of Software

Infringement by Unauthorized Loading of Software into RAM

Absent a license, unauthorized use of computer software constitutes copyright infringement, because the act of copying the software into the computer's working memory (RAM) to run the software itself constitutes infringement. See MAI Systems Corp. v. Peak Computer Inc., 991 F.2d 511 (9th Cir. 1993), summarized on page 2: The Ninth Circuit held that the defendant's copying of the plaintiff's computer program into a computer's working memory (RAM) to run the program created an embodiment that could be “perceived, reproduced, or otherwise communicated” under section 101 of the Copyright Act, 17 U.S.C. § 101, and consequently was sufficiently “fixed” to qualify as a “copy,” giving rise to infringement liability. 991 F.2d at 518-19; see also Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260 (5th Cir.

  1. (“the act of loading a program from a medium of storage into a

computer's memory creates a copy of the program”), cited in MAI Systems Corp.

But, Use Beyond the Scope of a License

May Be Simply a Breach of Contract

:CUSTOMID: but-use-beyond-the-scope-of-a-license-may-be-simply-a-breach-of-contract

What if the putative infringer has a license but is using the software beyond the scope of the license? The Second Circuit has promulgated a test for determining whether the copyright owner's claim is for copyright infringement (which creates federal-question jurisdiction) or simply for breach of contract (which does not):

  1. the copyright owner's putative copyright claim against the licensee must not be “merely incidental” to what would otherwise be characterized as a contract claim for breach of the license agreement, nor purely a consequence of resolving the contract dispute; and

  2. the alleged breach that gives rise to the claim must be:

  3. for breach of a condition precedent, in which case the license recited in the license agreement was never effectively granted in the first place, or
  4. for breach of a covenant in the license agreement that would justify rescission of the agreement, in which case again the license is deemed not effective.

If the above conditions are met, then the licensor's claim sounds in copyright, and a federal court would have federal-question jurisdiction. See Shoenberg v. Shapolsky Publishers, Inc., 971 F.2d 926, 932 (2d Cir. 1992), subsequent proceeding, 916 F. Supp. 333, 335-36 (S.D.N.Y. 1996).

Selected cases:

National Car Rental System, Inc. v. Computer Assoc. Int'l, Inc., 991 F.2d 426 (8th Cir. 1993): The court held that a licensee's use of a licensed computer program beyond the scope of the license did not involve unauthorized “copying” of program, and that the licensor's claim of breach of license agreement was not equivalent to claim under exclusive rights arising under Copyright Act, and thus was not preempted.

Computer Assocs. Int'l, Inc. v. State St. Bank & Trust, 789 F. Supp. 469, 475 (D. Mass. 1992). The court held that “[a] use of an authorized copy of copyrighted subject matter ordinarily is not infringing. . . . Therefore, applicable limitations on State Street's use of the programs, if any, must be derived initially from the license agreements, not copyright law.”

USAR Systems Inc. v. Brain Works Inc., 887 F. Supp. 84 (S.D.N.Y. 1995): The court dismissed a copyright-infringement action for lack of subject matter jurisdiction. It held that the putative copyright infringement claim was “merely incidental” to a contract-law claim for breach of license agreement.

9.10.5 Disassembly and Reverse Engineering

Disassembly of a copy of machine-readable “object” code, unreadable by humans in itself, as an intermediate-copying step in reverse engineering for creation of another work, can constitute “fair use” if the copy is legitimately in the possession of the reverse engineer.

Selected Cases Involving Reverse Engineering

Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510 (9th Cir. 1992): Disassembly was held by the Ninth Circuit technically to constitute infringement, but to be fair use when “disassembly is the only way to gain access to the ideas and functional elements embodied in a computer program and where there is a legitimate reason for seeking such access,” e.g., to facilitate entry into the marketplace by a competitor creating similar but noninfringing programs. Id. at 1527.

Atari Games Corp. v. Nintendo of America Inc., 975 F.2d 832 (Fed. Cir. 1992), affirming 8 USPQ2d (BNA) 1935 (N.D. Cal. 1991): Atari, the declaratory plaintiff, evidently went too far for the court's comfort in disassembling a copyrighted Nintendo program embedded in a computer chip. When Atari was only partially successful in physically peeling away the layers of its rival Nintendo's computer chip to study the embedded programming, Atari obtained a copy of the program from the Copyright Office, stating that it needed the copy for use in defending against a pending infringement suit (see discussion of requirements for obtaining access to copyright registration deposits in § 2.4[b][1]). In fact, no such suit had then been brought. Id., 975 F.2d at 836. The Federal Circuit noted that scope of nonliteral copyright protection for software was limited. Id. at 838-40 (citing Treatise). It held that it would have been fair use for Atari to disassemble an object-code copy of the Nintendo program “to understand [that] program and to distinguish the protected from the unprotected elements of [the] program,” if the copy had been lawfully acquired. The court held that under the circumstances, Atari's unclean hands precluded it from asserting a fair-use defense. Id. at 843-44 (affirming preliminary injunction).

Sony Computer Entertainment, Inc. v. Connectix Corp., 203 F.3d 596 (9th Cir. 2000), reversing 48 F.Supp.2d 1212, 1214 (N.D. Cal. 1999) (granting preliminary injunction): This was a case similar in some respects to Sega v. Accolade, discussed supra on page 2, and ultimately with a similar outcome. Plaintiff Sony was the manufacturer of the Sony PlayStation and PlayStation games. Defendant Connectix developed an “emulator,” a software program which could be installed on a computer and used to run PlayStation games. Id., 48 F. Supp. at

In developing its emulator, Connectix bought a PlayStation, broke it apart, and copied its BIOS (the basic input-output software) from an internal ROM chip to a disk. Connectix's engineers then used this disk to continue their development of the Connectix emulator. It was undisputed that an early version of the emulator contained the complete, unchanged Sony BIOS. Eventually, Connectix replaced the Sony BIOS code with its own BIOS code. 48 F. Supp. at 1216. Connectix engineers admitted in deposition that they used copies of the Sony BIOS code to gradually convert Sony's code to their own code. 48 F. Supp. at 1218.

Sony conceded that the finished emulator did not contain any part of Sony's code. 48 F. Supp. at 1214. Its copyright infringement claim was based on a theory of intermediate infringement — it asserted that Connectix “repeatedly duplicated Sony's BIOS code in its entirety and used those copies while it developed a computer program that emulates the hardware components of the PlayStation console,” and that it “disassembled Sony's BIOS in order to develop its own VGS BIOS by gradually replacing elements of Sony's code with its own.” Id. at

  1. The district court granted a preliminary injunction against

Connectix's distribution of the emulator, even though there was no infringing code left in it, on the theory that “the only effective remedy for such intermediate infringement is to enjoin the end product. If not, an intermediate infringer could always avoid the consequences of illegal copying and use by editing the protected code out of its final product.” 48 F. Supp. at 1224 (paragraphing edited).

The Ninth Circuit reversed the preliminary injunction. It held that “[t]he intermediate copies made and used by Connectix during the course of its reverse engineering of the Sony BIOS were protected fair use, necessary to permit Connectix to make its non‑infringing Virtual Game Station function with PlayStation games. Any other intermediate copies made by Connectix do not support injunctive relief, even if those copies were infringing.” 203 F.3d at 599. The appellate court focused on the evidence showing that the making of intermediate copies was in fact necessary under the specific circumstances; it rejected Sony's argument that the reverse engineering could have been accomplished with less intermediate copying, because such a rule “would require that a software engineer, faced with two engineering solutions that each require intermediate copying of protected and unprotected material, often follow the least efficient solution.” Id. at 605.

DSC Communications Corp. v. DGI Technologies, Inc., 898 F. Supp. 1183, 1189-92 (N.D. Tex. 1995) (partially vacating ex parte seizure order), aff'd on other grounds, 81 F.3d 597 (5th Cir. 1996): In this case, disassembly and reverse-engineering of software was not, in and of itself, the cause of the defendant's difficulty — apparently it was the defendant's surreptitious copying of other software owned by the plaintiff that got the defendant into trouble. The defendant did not use a “clean room” approach; that is, the individuals who disassembled the plaintiff's firmware were not walled off from the individuals who developed the defendant's firmware. In an early proceeding partially vacating its own ex parte seizure order, the district court noted that while failure to use a clean room meant that the defendant could not negate access, that failure did not rule out a fair-use defense. Id. at 1189 n.3.

What sank the DGI defendant's fair-use defense was its surreptitious copying of other software. Plaintiff DSC had developed operating-system software that it provided to its customers under a license agreement that prohibiting giving access to the software to third parties. The software was not otherwise available for purchase or licensing. DSC v. DGI, 898 F. Supp. at 1192. An agent of the defendant visited a customer that owned circuit boards of both the plaintiff and the defendant, and which possessed a licensed copy of the plaintiff's operating-system software. Without asking permission, the defendant's agent surreptitiously made a copy of the plaintiff's operating-system software and brought it back to the defendant, allegedly for study and reverse-engineering. Id. The DSC trial court came down hard on the defendant. It refused to believe the defendant's testimony that it was unaware of the licensing agreement for the plaintiff's operating system software. Id. at 1194. Analogizing to Atari, the court held that it was not fair use for the defendant to disassemble and reverse-engineer a copy of the operating-system software because it was not authorized to possess the copy. Id.

(The subsequent trial and appeal apparently focused on the defendant's liability for contributor infringement, for inducing customers to infringe plaintiff DSC's copyright by using DSC's software with defendant DGI's circuit boards, and not on the reverse-engineering fair-use defense. The later proceedings, after DSC's acquisition by the French telecommunications company Alcatel, are reported in Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772 (5th Cir. 1999).)

DSC Communications Corp. v. Pulse Communications Inc., 976 F. Supp. 359, 363-64, 43 USPQ2d 1589 (E.D. Va. 1997) (granting judgment as a matter of law), aff'd in part, rev'd in part, vacated in part, and remanded, 170 F.3d 1354 (Fed. Cir. 1999): DSC's competitor Pulse Communications (“Pulsecom”) had reverse engineered certain digital switching software in a DSC “Litespan” switching product to develop a competing product. The district court cited Sega and Atari in granting judgment as a matter of law (JMOL), at the close of plaintiff DSC's case, that “[s]uch copying for reverse engineering of a lawfully acquired system is permissible fair use.” But the Federal Circuit vacated that part of the judgment on grounds that, at least as shown by plaintiff DSC's evidence, defendant Pulsecom's activity in question did not constitute fair use, and as a result the grant of a judgment as a matter of law was impermissible:

On the basis of DSC's evidence at trial, Pulsecom's activities in creating copies of the POTS‑DI software on its POTS cards by using the RBOCs' Litespan systems does not qualify as “fair use” under the Sega analysis. DSC's evidence showed that Pulsecom representatives made copies of the POTS‑DI software on Pulsecom POTS cards as part of the ordinary operation of those cards, not as part of an effort to determine how the Litespan system worked. Rather than being part of an attempt at reverse engineering, the copying appears to have been done after Pulsecom had determined how the system functioned and merely to demonstrate the interchangeability of the Pulsecom POTS cards with those made and sold by DSC. 170 F.3d at 1363.

The Federal Circuit noted, however, that defendant Pulsecom had not put on its own evidence (because the trial court granted judgment as a matter of law at the close of DSC's case). The appeals court remanded the case for a new trial. Id.

NEC Corp. v. Intel Corp., 10 USPQ2d (BNA) 1177, 1186 (N.D. Cal. 1989): The court found that NEC's engineer did not infringe the copyright in Intel's microcode by disassembling the microcode for study, when the ultimate NEC end product was not infringing.

Bateman v. Mnemonics, Inc., 79 F.3d 1532, 1548 (11th Cir. 1996): The defendant had been found liable for copyright infringement and misappropriation of trade secrets in reverse engineering a circuit board, including disassembling its associated software. The district court had instructed the jury that only nonliteral copying could be the subject of an Altai filtration defense (see § 2.7[g]). The appeals court reversed, holding that that even literal copying might be permissible under Altai; the court also hinted strongly that the defendant's disassembly had been a fair use. Id., 79 F.3d at 1539 nn. 17-18.

Cadence Design Systems, Inc. v. Avant! Corp., 125 F.3d 824, 830-31 (9th Cir. 1997): The appeals court reversed and remanded the lower court's refusal to enjoin the defendant's distribution of its software. It held that the district court was required to determine whether the software produced by the defendant's clean-room process infringed the copyright in the plaintiff's software.

E. F. Johnson Co. v. Uniden Corp., 623 F. Supp. 1485 (D. Minn. 1985): The court found that the defendant had infringed the copyright in the plaintiff's computer software. It noted that “[the] fact that defendant's engineers dumped, flow charted, and analyzed plaintiff's codes does not of itself establish pirating”; it observed that if the defendant had “contented itself with surveying the general outline of the program, thereafter converting the scheme into detailed code through its own imagination, creativity and independent thought, a claim of infringement would not have arisen.” Id. at 1501‑02 n.17.

The Reverse-Engineering Exception in the

Digital Millennium Copyright Act

:CUSTOMID: the-reverse-engineering-exception-in-the-digital-millennium-copyright-act

As discussed in § 2.7[h], the Digital Millennium Copyright Act (DMCA) added new section 1201 to Title 17, prohibiting circumvention of technological measures that control access to copyrighted works. Section 1201(f) contains a specific exception to liability for some, but not all, reverse engineering activities:

a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program /for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs/ … to the extent that any such acts of identification and analysis do not constitute infringement under this title.

17 U.S.C. § 1201(f)(1) (emphasis added).

9.10.6 Marketing of Aftermarket or Add-On Software

to Create Similar Audio‑Visual Effects

:CUSTOMID: marketing-of-aftermarket-or-add-on-software-to-create-similar-audiovisual-effects

Lewis Galoob Toys, Inc. v. Nintendo of America, Inc., 964 F.2d 965, (9th Cir. 1992) (affirming judgment of noninfringement): The Ninth Circuit held that the sale or use by Galoob of “aftermarket” software (or programmed hardware), designed to enhance the use of Nintendo's copyrighted software and not to replace it, was did not infringe Nintendo's copyrights. Galoob's “Game Genie” was designed so that it could be plugged into a Nintendo Game Boy video console instead of a game cartridge; then the game cartridge would be plugged into the Game Genie. The programming of the Game Genie permitted the user to alter several of the parameters of the game program by overwriting a particular data byte in the signals exchanged between the game cartridge and the Game Boy (the programming of the game cartridge was not altered). Id., 964 F.2d at 967. The Ninth Circuit noted in dicta that spell-checkers designed to work with word processing programs “could not be produced and marketed if courts were to conclude that the audiovisual display of a word processor and spell-checker combination is a derivative work based on the display of the word processor alone.” Galoob, 964 F.2d at 969. Subsequently, Galoob was awarded the entire amount of Nintendo's $15 million bond as damages for wrongful injunction. See 16 F.3d 1032, 29 USPQ2d 1857 (9th Cir. 1994) (affirming damage award).

Microstar v. Formgen: In the Microstar case, a district court confronting a similar situation denied copyright protection to add-on data sequences that could be used in the Duke Nukem 3D computer game, but the Ninth Circuit later reversed that denial. Microstar v. Formgen, Inc., 942 F. Supp. 1312 (S.D. Cal. 1996) (denying preliminary injunction against distribution of CD-ROM containing data sequences, but granting preliminary injunction against use of packaging and screen-saver containing copies of copyrighted images from game), rev'd in part, aff'd in part, 154 F.3d 1107 (9th Cir. 1998). The Duke Nukem game had “29 levels through which players advance, killing monsters and other evil creatures.” Id., 942 F. Supp. at 1314. To keep players interested, the copyright owner included a utility program for developing new levels by creating .MAP data files; users were encouraged to pass these files on to other players, e.g., over the Internet. Id.

The accused infringer in Microstar commercially distributed a CD-ROM (compact disk read-only memory) that included 300 of these new user-created levels in the form of its own .MAP files. The copyright owner alleged that this commercial distribution constituted infringement of the game copyright. Citing Galoob in passing, the district court denied the copyright owner's motion for preliminary injunction, holding that:

[T]he court is not convinced that the movants have shown that the data sequence in the [accused infringer's CD-ROM] files is subject to copyright protection.

Furthermore, the court finds that [accused infringer and declaratory plaintiff] Microstar has shown that the audiovisual elements which appear on the screen [when playing the additional levels] originate from [the copyright owner's] Duke 3D, and not from [the accused infringer's] Nuke It. Id. at 1316 (paragraphing supplied).

The Ninth Circuit reversed the denial of a preliminary injunction. In an opinion by the always-interesting Judge Kozinski, the court first explained its understanding of the technology at issue:

In order to understand FormGen's claims, one must first understand the way D/N‑3D [Duke Nukem 3D] works. The game consists of three separate components: the game engine, the source art library and the MAP files.

The game engine is the heart of the computer program; in some sense, it is the program. It tells the computer when to read data, save and load games, play sounds and project images onto the screen.

In order to create the audiovisual display for a particular level, the game engine invokes the MAP file that corresponds to that level. Each MAP file contains a series of instructions that tell the game engine (and, through it, the computer) what to put where. For instance, the MAP file might say scuba gear goes at the bottom of the screen. The game engine then goes to the source art library, finds the image of the scuba gear, and puts it in just the right place on the screen.

The MAP file describes the level in painstaking detail, but it does not actually contain any of the copyrighted art itself; everything that appears on the screen actually comes from the art library.

Think of the game's audiovisual display as a paint‑by‑numbers kit. The MAP file might tell you to put blue paint in section number 565, but it doesn't contain any blue paint itself; the blue paint comes from your palette, which is the low‑tech analog of the art library, while you play the role of the game engine.

When the player selects one of the N/I levels, the game engine references the N/I MAP files, but still uses the D/N‑3D art library to generate the images that make up that level. Id., 154 F.3d at 1110 (footnotes omitted, paragraphing added).

Judge Kozinski's opinion then analogized the MAP files of the Duke Nukem game to more-familiar art forms:

In the present case the audiovisual display that appears on the computer monitor when a N/I level is played is described—in exact detail—by a N/I MAP file.

This raises the interesting question whether an exact, down to the last detail, description of an audiovisual display (and–by definition–we know that MAP files do describe audiovisual displays down to the last detail) counts as a permanent or concrete form for purposes of Galoob.

We see no reason it shouldn't. What, after all, does sheet music do but describe in precise detail the way a copyrighted melody sounds? To be copyrighted, pantomimes and dances may be “described in sufficient detail to enable the work to be performed from that description.”

Similarly, the N/I MAP files describe the audiovisual display that is to be generated when the player chooses to play D/N‑3D using the N/I levels. Because the audiovisual displays assume a concrete or permanent form in the MAP files, Galoob stands as no bar to finding that they are derivative works.

Id. at 1111-12 (citations omitted, paragraphing edited). The Ninth Circuit court concluded that, as to the question of substantial similarity of ideas and expression, “FormGen will doubtless succeed in making these showings since the audiovisual displays generated when the player chooses the N/I levels come entirely out of D/N‑3D's source art library.” Id. at 1112. It explained that:

The work that Micro Star infringes is the D/N‑3D story itself–a beefy commando type named Duke who wanders around post‑Apocalypse Los Angeles, shooting Pig Cops with a gun, lobbing hand grenades, searching for medkits and steroids, using a jetpack to leap over obstacles, blowing up gas tanks, avoiding radioactive slime.

A copyright owner holds the right to create sequels, and the stories told in the N/I MAP files are surely sequels, telling new (though somewhat repetitive) tales of Duke's fabulous adventures.

A book about Duke Nukem would infringe for the same reason, even if it contained no pictures.

Id. (footnote and citations omitted).

9.10.7 Copying the “Structure, Sequence, and Organization” of Software: The 

Successive-Filtration Test

:CUSTOMID: copying-the-structure-sequence-and-organization-of-software-the-successive-filtration-test

As the Second Circuit noted in its famous Altai decision, under classical copyright principles it is well-settled that “[a]s a general matter, and to varying degrees, copyright protection extends beyond a literary work's strictly textual form to its non‑literal components.” The court pointed out that

As we have said, “[i]t is of course essential to any protection of literary property [sic] … that the right cannot be limited literally to the text, else a plagiarist would escape by immaterial variations.”

Thus, where “/the fundamental essence or structure/ of one work is duplicated” … courts have found copyright infringement.

Computer Associates International, Inc., v. Altai, Inc., 982 F.2d 693, 701 (2d Cir. 1992) (emphasis and paragraphing added, extensive citations omitted).

Where software is concerned, deciding actual cases on that basis has often proved to be difficult because of a countervailing policy: “It is a fundamental principle of copyright law that a copyright does not protect an idea, but only the expression of the idea.  This axiom of common law has been incorporated into the governing statute,” which provides that “[i]n no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.” Altai, 982 F.2d at 703, citing Baker v. Selden, 101 U.S. 99, 25 L.Ed. 841 (1879) (holding that plaintiff who developed accounting system and published a book explaining it could not prevent others from using system); 17 U.S.C. § 102(b).

The struggle to define a workable analysis of software copyright claims is fueled by two competing policy currents underlying American intellectual property law generally and copyright law. The law restricts copying of innovations in certain circumstances, to provide innovators with incentives to come forward with their work. On the other hand, the law also limits the protection afforded to innovation because it favors vigorous competition in the marketplace—including copying of unprotected innovation so that the benefits thereof will quickly be disseminated to the public. See, e.g., 35 U.S.C. §§ 102, 103 (prohibiting patent protection for inventions that are not new or that would have been obvious to a person of ordinary skill); 17 U.S.C. § 102(b) (prohibiting copyright protection for “any idea, procedure, process, system, method of operation, concept, principle or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work”). See also, e.g., Feist Publications, Inc., v. Rural Telephone Service Co., 499 U.S. 340, 111 S. Ct. 1282, 1286 (1991) (O'Connor, J.; holding that white pages of telephone directory are not copyrightable as a compilation of facts and that factual information therein can be freely copied; competitors may not be forced to incur costs that would result from being forced to generate a new compilation from scratch), discussed supra § 2.1[b]; Bonito Boats, Inc., v. Thunder Craft Boats, Inc., 489 U.S. 141, 109 S. Ct. 971, 981, 984-85 (1989) (O'Connor, J.; holding that state law prohibiting plug-molding methods of copying boat hulls was preempted by federal patent law, which implicitly establishes a federal right to copy unpatented articles; state law may not interfere with public's right to economic benefits of most efficient method of manufacturing unpatented articles).

As the Supreme Court has noted on a number of occasions, “[t]he primary objective of copyright is not to reward the labor of authors, but ‘[t]o promote the Progress of Science and useful Arts.'” Feist, 499 U.S. at 349, 111 S. Ct. at 1290, quoting U.S. Const. art. I, § 8, cl. 8.

As a result, to establish a claim of copyright infringement, a plaintiff must show both (a) ownership of a valid copyright and (b) that the defendant copied protectable elements of the copyrighted work. See Feist, 499 U.S. at 361, 111 S. Ct. at 1295-96; Altai, 982 F.2d at

For a while, the courts definitely seemed to favor copyright owners, who frequently were able to obtain expansive protection of “nonliteral” elements of their software. In recent years, however, the courts appear to have been markedly more conservative in the scope of protection afforded to such nonliteral elements.

At least for the moment, the most popular non-literal copyright infringement analysis for computer software seems to be the three-pronged “successive filtration” test articulated in Altai, with variations by other courts, notably Gates Rubber.

(That test may also be appropriate in cases where literal copying is alleged as well. Bateman, 79 F.3d at 1543-46 (reversing judgment on jury verdict of copyright infringement and remanding for new trial; holding that district court erred in instructing jury that Altai analysis was applicable only to nonliteral copying).)

In Altai, the Second Circuit gently rejected the Third Circuit's much-criticized “structure, sequence, and organization” approach in Whelan v. Jaslow. Whelan Assocs., Inc. v. Jaslow Dental Laboratories, 797 F.2d 1222, 1236-43 (3d Cir. 1986) (affirming judgment of infringement on basis of similarity in “structure, sequence, and organization”).

Instead, the Altai court adapted Learned Hand's “levels of abstraction” analysis from Nichols v. Universal Pictures Co. Nichols v. Universal Picture Co., 45 F.2d 119, 121 (2d Cir. 1930). It suggested that a three-part approach should be used to test whether an accused computer program is “substantially similar” to, and thus might infringe the exclusive rights in, a copyrighted program:

In ascertaining substantial similarity under this approach, a court would/[:]/

[1] [F]irst break down the allegedly infringed program into its constituent structural parts.

[2] Then, by examining each of these parts for such things as [a] incorporated ideas, [b] expression that is necessarily incidental to those ideas, and [c] elements that are taken from the public domain, a court would then be able to sift out all non-protectable material.

[3] Left with a kernel, or possible kernels, of creative expression after following this process of elimination, the court's last step would be to compare this material with the structure of an allegedly infringing program. The result of this comparison will determine whether the protectable elements of the programs at issue are substantially similar so as to warrant a finding of infringement.

Altai, 982 F.2d at 706 (paragraphing and bracketed numbering supplied). The Second Circuit affirmed as not clearly erroneous the judgment below that, on the evidence presented, the accused software was not substantially similar to the copyrighted software in any protectable respect. Id. at 715.

The Tenth Circuit's Gates Rubber opinion approved the use of a variation of the Altai analysis: Abstraction is still to be performed first, but filtration could come after comparison because that sequence of analysis is likely to present a clearer picture whether impermissible copying has occurred. Gates Rubber Co., 9 F.3d at 833 n.7; see also Mitel, 124 F.3d at 1372 (“the appropriate test to be applied and the order in which its various components are to be applied … may vary depending upon the claims involved, the procedural posture of the suit, and the nature of the [works] at issue”), quoting Gates Rubber Co., 9 F.3d at 834 n. 12.

The Fifth Circuit followed the Gates Rubber order of analysis in Engineering Dynamics, 26 F.3d at 1342-43, and in CMAC Computer Management Assistance Co. v. Robert F. DeCastro, Inc., 220 F.3d 396 (5th Cir. 2000) (affirming bench-trial judgment of no infringement; features of software for picture-framing industry for which copyright protection was claimed were dictated by standard industry practices and by specific needs of business).

Six Levels of Declining Abstraction

In any given case, the abstraction step is likely to be heavily dependent on the imaginativeness of the plaintiff's trial counsel and expert witness in discerning “creative” elements of the computer program. The Gates Rubber court set out a series of factors that could be regarded as creative elements, which it referred to as “at least six levels of generally declining abstraction: (i) the main purpose, (ii) the program structure, (iii) modules, (iv) algorithms and data structures, (v) source code, and (vi) object code.” Gates Rubber Co., 9 F.3d at 835, quoted in Baystate Technologies, 946 F. Supp. at 1089. Other courts appear to be using these six levels at least as a starting point. See, e.g., Baystate Technologies, 946 F. Supp. at 1089; Harbor Software, Inc. v. Applied Systems, Inc., 925 F. Supp. 1042, 1046-47, subsequent proceeding, 936 F. Supp. 167 (S.D.N.Y. 1996) (granting in part and denying in part defendant's motion for summary judgment).

The abstraction step is likely to be unnecessary if the copyright owner specifically identifies the non-literal program elements that allegedly are infringe (perhaps in response to contention interrogatories propounded by the defendant). The MiTek court noted that “the district court took at face value MiTek's representations as to what elements of the ACES program MiTek considered to be protectable expression. In accepting MiTek's representations, the district court committed no error.” MiTek, 89 F.3d at 1555; see also Mitel, 124 F.3d at 1372 (“[n]ot every case requires an extensive abstraction‑filtration-comparison analysis”).

Filtration of Unprotectable Subject Matter

The filtration step in the Altai analysis is perhaps the most critical one, and arguably the most problematic. Perhaps for that reason, in the 1996 Harbor Software opinion, a district court ruled that the filtration process is a matter for the court, not for the jury, reasoning by analogy to the Supreme Court's Markman decision in the patent arena. See Harbor Software, 925  F. Supp. at 1046-47.

Filtration of externally-dictated factors: The Altai court noted that aspects of a program might be unprotectable if they are constrained by efficiency considerations, by factors external to the program itself (e.g., features required by specifications of the computer and supporting software, or by industry standards and customary programming practices), or by the existence of a limited number of ways to design the program in relevant respect. See Altai, 982 F.2d at 707-10. Other courts have followed Altai's lead on that point. See, e.g., MiTek, 89 F.3d at 1557 n.20 (alternative holding; even if ACES program's menu structure were not unprotectable as a method of operation, it was unprotectable because it tracked the way in which human workers did job in question); Engineering Dynamics, 46 F.3d at 410 (directing district court to determine on remand whether data formats were so influenced by industry practice as to be unprotectable); Baystate Technologies, 946 F. Supp. at 1088-89 (holding that selection of data-structure names was driven by industry-standard practice and by efficiency considerations and therefore was unprotectable); Harbor Software, 925 F. Supp. at 1049-52 (some aspects of program were protectable, others not because dictated by externalities). But see Control Data Systems, Inc. v. Infoware, Inc., 903 F. Supp. at 1323 (rejecting defendant's contention that externalities limited the range of choices available to programmers).

Filtration of mathematical constants: The Gates Rubber court likewise ruled that a number of the factors considered by the trial court in that case were not permissible evidence of substantial similarity, at least not without further analysis and explanation. “Mathematical constants” in particular were disapproved by the appellate court as an impermissible factor bearing on substantial similarity. The court held outright that the mathematical constants in question were unprotectable facts and the district court therefore should not have treated similarity in constants as evidence of infringement. Gates Rubber Co., 9 F.3d at 844; see also § 2.2 (cases discussing copyrightability of data).

Filtration applied to functional characteristics: The Gates Rubber appellate court also called for further explanation, “in light of the process-expression dichotomy, merger and scenes à faire doctrines,” of other similarity factors that the lower court had used, e.g.:

• menus and sorting criteria,

• control and data flow,

• engineering calculation and design modules,

• common errors,

• fundamental tasks, and

• install[ation] files.

Gates Rubber Co., 9 F.3d at 844-47/; see also/ e.g., Ashton-Tate Corp. v. Ross, 916 F.2d 516, 521-22 (9th Cir. 1990) (affirming holding that list of typical spreadsheet commands to be implemented in spreadsheet program did not rise to the level of copyrightable subject matter; plaintiff therefore was not a joint author); Healthcare Affiliated Services, Inc. v. Lippany, 701 F. Supp. 1142, 1151-52 (W.D. Pa. 1988) (refusing to enter preliminary injunction; evidence of similarities in gross-level methodology choices was insufficient to warrant finding of substantial similarity of protectable elements); NEC Corp. v. Intel Corp., 10 USPQ2d (BNA) 1177, 1183 (N.D. Cal. 1989) (crediting testimony of expert witness that many similarities were functional in nature and in some instances inevitable; finding that similarities between accused microcode and defendant's copyrighted microcode were not a result of copying of protectable elements); Q-Co Industries, Inc. v. Hoffman, 625 F. Supp. 608, 615 (S.D.N.Y. 1985) (refusing to enter preliminary injunction on copyright infringement claim on grounds that similarities between teleprompter programs were limited to elements that would have been part of any program of that kind).

Filtration as applied to screen displays: Whether screen-display similarity should be filtered out is an often-disputed point. This was one of the principal issues in Apple v. Microsoft as well as in /Lotus

  1. Borland/, and has arisen in other cases as well. See, e.g., MiTek,

89 F.3d at 1557-58 (program menus merely followed the same general steps that would be taken by a draftsman designing a roof truss by hand and were therefore unprotectable); Harbor Software, 925 F. Supp. at 1052 (holding that “sufficient expressive choices were made in the selection and arrangement of [screen-display elements] to satisfy the minimal requirement of originality and warrant protection”); Productivity Software Int'l Inc. v. Healthcare Technologies, Inc., 1995 WL 437526, 37 USPQ2d 1036 (S.D.N.Y. 1995) (granting summary judgment of noninfringement; “[a]ny similarity between the two menu bars is due only to the fact that industry standards dictate the limited number of command labels available”); Manufacturers Technologies, Inc. v. CAMS, Inc., 706 F. Supp. 984 (D. Conn. 1989) (holding that some screen displays and sequences of displays were protectable but others were dictated by external or functional concerns and were not protectable; Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F. Supp. 449, 455‑56 (N.D. Ga. 1987) (holding that defendant's arrangement of command prompts and status displays on computer screen infringed copyright in plaintiff's program).

Protectability of combinations of otherwise-unprotectable elements: A copyright defendant will not necessarily win just because individual “elements” of a copyrighted program are unprotectable. The court is still required to determine “whether the manner in which [the copyright owner] combined the various design elements in its software was protectible expression, and, if it was, whether [the defendant] infringed that expression.” Softel, Inc. v. Dragon Medical and Scientific Communications, Inc., 118 F.3d 955, 966-67, 43 USPQ2d 1385 (2d Cir. 1997) (vacating and remanding judgment of noninfringement).

Comparison: Close Similarity May Be Required

Conventional copyright analysis requires a showing a substantial similarity between a copyrighted work and an accused infringing work. As a practical matter, a software copyright owner asserting nonliteral infringement may be required to demonstrate that the similarities are significant in the context of the content, purpose, use, or operation of the copyrighted program and accused program as a whole. Baystate, 946 F. Supp. at 1090.

An even more stringent standard may be imposed if a Feist copyright is claimed in an original selection or arrangement of otherwise-unprotectable elements. In that case, the copyright owner is likely to be required to demonstrate that in that respect the accused software is “virtually identical” to the copyrighted software. MiTek, 89 F.3d at 1558-59 (holding that where copyright is claimed in a compilation of otherwise-unprotectable elements, accused program must meet “virtual identicality” standard), citing with approval Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1446 (9th Cir.1994) (noting that, in the case of alleged infringement of a work as a whole (i.e., a compilation), “there can be no infringement unless the works are virtually identical”). MiTek, 89 F.3d at 1558-59 (holding that where copyright is claimed in a compilation of otherwise-unprotectable elements, accused program must meet “virtual identicality” standard).

9.10.8 “Cracking” of Copyright Protection as Violation of Digital Millennium

Copyright Act

:CUSTOMID: cracking-of-copyright-protection-as-violation-of-digital-millennium-copyright-act

[Portions of this section are adapted from Universal City Studios, Inc. v. Reimerdes, /82 F.Supp.2d 211 (S.D.N.Y. 2000) (granting preliminary injunction against distribution of “DeCSS” software, used for cracking code protecting movies recorded on digital versatile disks or “DVDs”),/ subsequent proceeding, 111 F. Supp. 294 (S.D.N.Y. 2000) (granting permanent injunction), affirmed sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001); /and from a U.S. Copyright Office summary of the DMCA available on the World Wide Web at www.loc.gov; no copyright claimed in works of the U.S. Government.]/

The Prohibition Against Circumvention of

Access‑Control or Copy‑Protection Measures

:CUSTOMID: the-prohibition-against-circumvention-of-accesscontrol-or-copyprotection-measures

The Digital Millennium Copyright Act (DMCA) added a new chapter 12 to Title 17 of the U.S. Code, in which the Copyright Act is codified. In the new chapter, section 1201 implements an obligation to provide adequate and effective protection against circumvention of technological measures used by copyright owners to protect their works.

Section 1201 divides technological measures into two categories: (i) /measures that prevent unauthorized /access to a copyrighted work, and (ii) /measures that prevent unauthorized /copying of a copyrighted work. Making or selling devices or services that are used to circumvent either category of technological measure is prohibited in certain circumstances, described below. As to the act of circumvention in itself, the provision prohibits circumventing the first category of technological measures, but not the second. This distinction was employed to assure that the public will have the continued ability to make fair use of copyrighted works.

Since copying of a work may be a fair use under appropriate circumstances, section 1201 does not prohibit the act of circumventing a technological measure that prevents copying. By contrast, since the fair use doctrine is not a defense to the act of gaining unauthorized access to a work, the act of circumventing a technological measure in order to gain access is prohibited.

In particular, section 1201(a)(2) provides that:

No person shall … offer to the public, provide or otherwise traffic in any technology … that–

(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under [the Copyright Act];

(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under [the Copyright Act]; or

(C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under [the Copyright Act].

17 U.S.C. § 1201(a)(2).

The statute defines “circumvent a technological measure” to mean descrambling a scrambled work, decrypting an encrypted work, or “otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A).

The statute explains further that “a technological measure ‘effectively controls access to a work' if the measure, in the ordinary course of its operation, requires the application of information or a process or a treatment, with the authority of the copyright owner, to gain access to a work.” Id. § 1201(a)(3)(B).

Selected cases:

RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311 (W.D. Wash. Jan. 18, 2000) (granting order for preliminary injunction) [summary adapted from opinion]: RealNetworks offered “RealPlayer” software that enable consumers to access audio and video content, in “RealMedia” format, over the Internet through a process known as “streaming.” When an audio or video clip is “streamed” to a consumer, no trace of the clip is left on the consumer's computer, unless the content owner has permitted the consumer to download the file. Streaming is contrasted with “downloading,” a process by which a complete copy of an audio or video clip is delivered to and stored on a consumer's computer. Once a consumer has downloaded a file, he or she can access the file at will, and can generally redistribute copies of that file to others. The court noted that to guard against the unauthorized copying and redistribution of their content, many copyright owners do not make their content available for downloading, and instead distribute the content using streaming technology in a manner that does not permit downloading.

The Streambox VCR software enabled end‑users to access and download copies of RealMedia files that are streamed over the Internet. In order to gain access to RealMedia content located on a server running RealNetworks' server software (“RealServer”), the VCR software mimicked RealPlayer software and circumvented the authentication procedure, or Secret Handshake, that a RealServer required before it would stream content. In other words, the Streambox VCR was able to convince the RealServer into thinking that the VCR was, in fact, a RealPlayer. Having convinced a RealServer to begin streaming content, the Streambox VCR, like the RealPlayer, acted as a receiver. However, unlike the RealPlayer, the VCR ignored the Copy Switch instruction that told a RealPlayer whether an end‑user was allowed to make a copy of (i.e., download) the RealMedia file as it is being streamed. The VCR thus allowed the end‑user to download RealMedia files even if the content owner had used the Copy Switch instruction to prohibit end‑users from downloading the files. The Streambox VCR thus circumvented both the access control and copy protection measures.

The court held that the Streambox VCR software met two of the three alternative tests for liability under the DMCA, because (i) at least a part of the Streambox VCR software was primarily, if not exclusively, designed to circumvent the access control and copy protection measures that RealNetworks afforded to copyright owners, and (ii) the portion of the VCR software that circumvented the Secret Handshake so as to avoid the Copy Switch instruction had no significant commercial purpose other than to enable users to access and record protected content and did not appear to have any other commercial value. Id., 2000 WL 127311 at *7.

Exceptions to the Anti-Circumvention Prohibition

The anti-circumvention prohibitions contained in section 1201 are subject to a number of exceptions. One is an exception to the operation of the entire section, for law enforcement, intelligence and other governmental activities. (Section 1201(e)). The others relate to section 1201(a), the provision dealing with the category of technological measures that control access to works.

The broadest of these exceptions, section 1201(a)(1)(B)-(E), establishes an ongoing administrative rule-making proceeding to evaluate the impact of the prohibition against the act of circumventing such access-control measures This conduct prohibition does not take effect for two years. Once it does, it is subject to an exception for users of a work which is in a particular class of works if they are or are likely to be adversely affected by virtue of the prohibition in making noninfringing uses.

The applicability of the exemption is determined through a periodic rulemaking by the Librarian of Congress, on the recommendation of the Register of Copyrights, who is to consult with the Assistant Secretary of Commerce for Communications and Information.

The six additional exceptions are as follows:

1. Nonprofit library, archive and educational institution exception (section 1201(d)). The prohibition on the act of circumvention of access control measures is subject to an exception that permits nonprofit libraries, archives and educational institutions to circumvent solely for the purpose of making a good faith determination as to whether they wish to obtain authorized access to the work.

2. Reverse engineering (section 1201(f)). This exception permits circumvention, and the development of technological means for such circumvention, by a person who has lawfully obtained a right to use a copy of a computer program for the sole purpose of identifying and analyzing elements of the program necessary to achieve interoperability with other programs, to the extent that such acts are permitted under copyright law.

3. Encryption research (section 1201(g)). An exception for encryption research permits circumvention of access control measures, and the development of the technological means to do so, in order to identify flaws and vulnerabilities of encryption technologies.

4. Protection of minors (section 1201(h)). This exception allows a court applying the prohibition to a component or part to consider the necessity for its incorporation in technology that prevents access of minors to material on the Internet.

5. Personal privacy (section 1201(i)). This exception permits circumvention when the technological measure, or the work it protects, is capable of collecting or disseminating personally identifying information about the online activities of a natural person.

6. Security testing (section 1201(j)). This exception permits circumvention of access control measures, and the development of technological means for such circumvention, for the purpose of testing the security of a computer, computer system or computer network, with the authorization of its owner or operator.

Selected cases:

Universal City Studios, Inc. v. Reimerdes, 82 F. Supp.2d 211 (S.D.N.Y.

  1. (granting preliminary injunction), subsequent proceeding,

111 F. Supp. 294 (S.D.N.Y. 2000) (granting permanent injunction), affirmed sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001): In this early case brought under the DMCA, several of the foregoing exceptions to liability were held not to shield “content crackers” from liability. The Reimerdes case was another episode in the continuing battle of the movie industry against unauthorized copies; cf. Sony Corp. of America v. Universal City Studios, 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984) (holding that home use of video cassette recorders (VCRs) for “time-shifting” recording of movies and other programming broadcast on television did not infringe copyrights in the programming).

The Reimerdes defendants had posted, on the Web, software known as DeCSS. That software could crack the Content Scramble System (“CSS_”) encryption that provides anti-copying protection for movies distributed on DVD (digital versatile discs). Several movie studios filed suit against them. The defendants claimed that they were entitled to the benefit of the reverse-engineering, encryption-research, and security-testing exceptions to liability. The court had no trouble rejecting the defendants' claims, see 82 F. Supp.2d at 217-20; it granted a preliminary injunction and later a permanent injunction. The permanent injunction prohibited even linking to other Web sites containing the DeCSS code; the Second Circuit had no trouble affirming that prohibition against a free-speech challenge. See 273. F3d art 455-58.

DVD Copy Control Ass'n v. Bunner, 2001 WL 1340619 (Cal. App. 6 Dist. Nov. 1, 2001): In a trade-secret case under state law, a California appellate court looked to the First Amendment in reversing a preliminary injunction that had prohibited the defendant from posting DeCSS source code on his Web site. The appellate court held that “DeCSS is a written expression of the author's ideas and information about decryption of DVDs without CSS.” Id. at __. The court then held that “the trial court's preliminary injunction barring Bunner from disclosing DeCSS can fairly be characterized as a prohibition of ‘pure' speech.” Id. at __.

Without deciding whether the defendant had engaged in misappropriation of trade secrets, the Bunner court held that the plaintiffs' trade-secret interests were trumped by the defendant's First Amendment free-speech rights. Whereas the DMCA's copyright-based prohibitions were constitutionally grounded in the Copyright Clause, trade-secret law “lacks any constitutional foundation. Consequently, a clash between the trade secrets law and the First Amendment does not involve a balancing between two constitutional interests.” Id. at __. Moreover, “injunctions in copyright infringement cases have been upheld on the ground that First Amendment concerns are protected by and coextensive with the [Copyright Act's] fair use doctrine.” Id. at __ (citation and internal quotation marks omitted). Finally, “the statutory prohibition on disclosures of trade secrets is of infinite duration rather than ‘for limited Times.' While the limited period of copyright protection authorized by the United States Constitution ensures that copyrighted material will eventually pass into the public domain, thereby serving the public interest by increasing its availability to the general public, the [Uniform Trade Secrets Act] bars disclosure of a trade secret for a potentially infinite period of time, thereby ensuring that the trade secret will never be disclosed to the general public.” Id. at __.

The Bunner court distinguished cases where injunctions were granted to enforce nondisclosure agreements: “The enforcement of a contractual nondisclosure obligation does not offend the First Amendment. A voluntary agreement not to disclose a trade secret ordinarily waives any First Amendment protection for an ensuing disclosure.” Id. at __.

No “Betamax” Fair-Use Defense Under the DMCA

As discussed in the RealNetworks opinion summarized in § 2.7[h][1], the DMCA does not provide a “time-shifting” fair-use defense under the Sony “Betamax” doctrine in traditional copyright law (see § 2.9[a]). See RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311 at *7-9 (W.D. Wash. Jan. 18, 2000) (granting order for preliminary injunction) (reviewing statutory language).

9.13 * *

   This case involves more than merely a retransmission of Kelly's images in a different medium. Arriba's use of the images serves a different function than Kelly's use-improving access to information on the internet versus artistic expression. Furthermore, it would be unlikely that anyone would use Arriba's thumbnails for illustrative or esthetic purposes because enlarging them sacrifices their clarity. Because Arriba's use is not superseding Kelly's use but, rather, has created a different purpose for the images, Arriba's use is transformative.

Id. at 941-42.

UMG Recordings, Inc. v. MP3.com, Inc., 92 F. Supp.2d 349 (S.D.N.Y.

  1. (granting motion for partial summary judgment of copyright

infringement) [portions of this summary are adapted from 92 F. Supp.2d at 351]: MP3.com made the contents of selected music CDs available to its Web-site customers who could demonstrate that they owned a copy of the selected CDs (see § 2.8[a]). It did not succeed in establishing a fair-use defense to the plaintiffs' copyright-infringement claims. MP3.com did not dispute that the purpose of its use of the copyrighted works was commercial, for while subscribers to My.MP3.com were not charged a fee, MP3.com sought to attract a sufficiently large subscription base to draw advertising and otherwise make a profit. The court rejected MP3.com's argument that its use provided “a transformative ‘space shift' by which subscribers can enjoy the sound recordings contained on their CDs without lugging around the physical discs themselves”; the court held that “this is simply another way of saying that the unauthorized copies are being retransmitted in another medium – an insufficient basis for any legitimate claim of transformation.” 92 F. Supp.2d at 351 (extensive citations omitted).

A & M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (N.D. Cal.

  1. (granting preliminary injunction against Napster), /aff'd in

pertinent part, rev'd in part and remanded/, 239 F.3d 1004 (9th Cir.

  1. [this summary adapted from district-court opinion]: In

opposition to the plaintiffs' motion for preliminary injunction, Napster sought unsuccessfully to expand the “fair use” doctrine articulated in Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984), to encompass the massive downloading of MP3 files by Napster users. The court rejected the fair-use defense because “any potential non‑infringing use of the Napster service is minimal or connected to the infringing activity, or both. The substantial or commercially significant use of the service was, and continues to be, the unauthorized downloading and uploading of popular music, most of which is copyrighted.” The court observed that “[a]lthough downloading and uploading MP3 music files is not paradigmatic commercial activity, it is also not personal use in the traditional sense. … At the very least, a host user sending a file cannot be said to engage in a personal use when distributing that file to an anonymous requester. Moreover, the fact that Napster users get for free something they would ordinarily have to buy suggests that they reap economic advantages from Napster use.”

Compaq Computer Corp. v. Procom Technology, Inc., 908 F. Supp. 1409 (S.D. Tex. 1995): The court held that the defendant's copying of the plaintiff's selection of a specific set of hard-disk operational parameter values, used to trigger display of on-screen message suggesting replacement of the disk, was not fair use. See id. at 1419-21.

9.13.1 Section 117 Immunizes Certain Actions by

“Owners” of Copies of Computer Programs

:CUSTOMID: section-117-immunizes-certain-actions-by-owners-of-copies-of-computer-programs

Section 117 of the Copyright Act expressly authorizes the “owner” of a copy of a computer program to create another copy (or adaptation) of the computer program — provided that the copy or adaptation is created (a) “as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner,” or for archival or back-up purposes, and (b) so long as copies or adaptations so made are not transferred except in accordance with conditions set out in the statute. See 17 U.S.C. § 117.

In the early years of software-copyright litigation, a number of accused infringers attempted to use section 117 as a shield against liability. By and large, the courts were not especially sympathetic, and the accused infringers were not notably successful. See Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510, 1520 & n.6 (9th Cir. 1992) (holding that disassembly of plaintiff's executable program code to study its underlying concepts and methods, as intermediate step in creating program that was compatible with plaintiff's video-game computer system, was not permitted under section 117 [but reversing preliminary injunction on fair-use grounds as discussed in § 2.7[e]]); citing but not addressing Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260-61 (5th Cir. 1988) (affirming dismissal of copyright infringement claim by proprietor of copy-protected software against vendor of software to defeat copy-protection schemes; holding that authorization of section 117(1) not limited to use of program intended by copyright owner);/CMAX/Cleveland, Inc., v. UCR, Inc./, 804 F. Supp. 337, 356 (M.D. Ga. 1992) (holding that defendants' use of copies of computer program beyond the scope of § 117 and failure to comply with destruction requirements of that section precluded resort to that section as defense to infringement claim; granting judgment for plaintiff); Micro-Sparc, Inc. v. Amtype Corp., 592 F. Supp. 33, 34-35, 223 USPQ (BNA) 1210 (D. Mass. 1984) (holding that “keyboarding service” which input programs, published in source-code form in hobbyist magazine, onto disk and sold disks to purchasers of magazine, infringed copyright in programs; rejecting section‑117 defense); Apple Computer, Inc. v. Formula Int'l, Inc., 594 F. Supp. 617, 621 (C.D. Cal. 1984) (holding that copying of copyrighted software onto silicon chips is not an “essential step” in the utilization of the software, because the software could be used through RAM, therefore copying and subsequent sale of chips not protected by section 117).

More recently, one of the main issues relating to section 117 has been whether a licensee of software can be deemed an “owner” of a copy of the software. The Copyright Act does not define the term “owner.” Nor is the legislative history particularly enlightening. Section 117 was originally proposed by the National Commission on New Technological Uses of Copyrighted Works (“CONTU”). CONTU's original proposal for section 117 provided that “it is not an infringement for the rightful possessor of a copy of a computer program to make or authorize the making of another copy or adaptation of that program….” National Commission on New Technological Uses of Copyrighted Works, Final Report at 30 (1978) (emphasis added). National Commission on New Technological Uses of Copyrighted Works, Final Report at 30 (1978) (emphasis added). The statute as enacted, however, contains the words “owner of a copy” in place of the words “rightful possessor of a copy.” See Pub. L. No. 96‑517, 96th Cong., 2d Sess. (1980). See Pub. L. No. 96‑517, 96th Cong., 2d Sess. (1980). The legislative history does not explain the reason for the change. See Cf. H.R. Rep. No. 1307, 96th Cong. 2d Sess. 23, reprinted in 1980 U.S.C.C.A.N. 6460, 6492 (indicating that 1980 amendments were intended to embody CONTU recommendations). See Cf. H.R. Rep. No. 1307, 96th Cong. 2d Sess. 23, reprinted in 1980 U.S.C.C.A.N. 6460, 6492 (indicating that 1980 amendments were intended to embody CONTU recommendations).

As discussed below, the courts have been generally unwilling to find that a licensee of software was an “owner” under section 117 when the issue was whether the licensee had the right to use the software in a way that both violated the license agreement and injured the copyright owner's business. On the other hand, the courts have been more inclined to allow a licensee to make use of section 117 if the licensee is simply modifying the software, e.g., to get the software to work correctly.

Can a Software Licensee Claim to Be an “Owner” When Dealing With

the Licensor's Competitor?

:CUSTOMID: can-a-software-licensee-claim-to-be-an-owner-when-dealing-with-the-licensors-competitor

When the issue is one of duplication of a plaintiff's software by a licensee, e.g., for use with hardware not provided by the plaintiff, the courts have generally declined to find that the licensee was an “owner” of a copy of the software.

Selected cases:

MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511 (9th Cir. 1995)./:/ The plaintiff was a computer manufacturer and also provided after-the-sale service for its computers. It owned a copyright in software that performed diagnostic functions for the computers. A non-licensee service provider, which competed with the plaintiff for after-the-sale service business, used a customer's licensed copy of the diagnostic software when doing maintenance on a customer's computer. The customer's license agreement for the software prohibited the customer from permitting third parties to use of the software. The Ninth Circuit held that the non-licensee service provider's use of the software constituted copyright infringement (see § 2.7[c][2] re legislation overturning this specific holding). The court held that the customer was not an “owner” of the copies of the software for purposes of section 117 and thus did not enjoy the right to copy conferred on owners by the statute. See id. at 518 n.5 (9th Cir. 1995). The court stated that it reached the conclusion that the customer was not an owner because the customer had licensed the software from MAI. See id.; see also Advanced Computer Services of Michigan v. MAI Systems Corp., 845

  1. Supp. 356, 367 (E.D. Va. 1994) (“MAI customers are not ‘owners' of

the copyrighted software; they possess only the limited rights set forth in their licensing agreements”). That rationale, however, was later rejected as too broad in DSC v. Pulsecom, discussed below.

DSC Communications Corp. v. Pulse Communications, Inc., 170 F.3d 1354 (Fed. Cir. 1999): DSC was a manufacturer of digital loop carrier equipment for telephone systems, including interface cards that were plugged into the equipment. It sold its equipment to the regional Bell operating companies or “RBOCs.” DSC provided software for controlling the interface cards; the software was “downloaded,” i.e., copied, from the equipment to the interface cards each time the equipment was powered up. The defendant, Pulse Communications (Pulsecom), also sold interface cards, which were designed to be compatible with DSC's equipment and to be controlled by DSC's software. See 170 F.3d at 1357-58. (The reverse-engineering aspects of the Pulsecom case are discussed in § 2.7[e].)

Each time a Pulsecom customer powered up its DSC equipment with a Pulsecom interface card installed in it, the DSC equipment automatically downloaded a copy of DSC's controller software to the Pulsecom interface card, in violation of the license agreement. See 170 F.3d at 1359. This was a violation of DSC's license agreement, which prohibited the customers from using the controller software except with DSC-provided hardware. See 170 F.3d at 1361. According to DSC, Pulsecom's customers were thereby infringing DSC's copyright in its controller software, and Pulsecom was thus a contributory infringer.

Initially, Pulsecom prevailed at trial on a section-117 theory. The district court noted that DSC's customers obtained a right to possession of DSC's controller software for an unlimited period by making a single payment. According to the district court, this made the transaction a “sale” and made DSC's customers the owners of copies of the software; that in turn gave the customers the right to make copies of the software in connection with using Pulsecom's competing interface cards. See 170 F.3d at 1360-61.

The Federal Circuit, however, rejected the district court's ownership analysis. Looking to the legislative history, the appellate court held that “it is clear from the fact of the substitution of the term ‘owner' for ‘rightful possessor' that Congress must have meant to require more than ‘rightful possession' to trigger the section 117 defense.” Although the Federal Circuit disagreed with MAI Systems's view that the mere existence of a license agreement implied a lack of ownership, see 170 F.3d at 1360, the court did hold that the specific license agreements in question “characterize the [customers] as non‑owners of copies of the software, [and] the restrictions imposed on the RBOCs' rights with respect to the software are consistent with that characterization,” and that the license agreements “severely limit the rights of the [customers] with respect to the [software] in ways that are inconsistent with the rights normally enjoyed by owners of copies of software.” Pulsecom, 170 F.3d at 1361. Pulsecom was thus unsuccessful in attempting to assert its section-117 defense.

Adaptation: Modification of Owned Copies of Software

Some opinions have addressed the extent to which customers have the right to modify their copies of software. At least some courts have been inclined to be sympathetic to customers who modified software that they had paid for.

Aymes v. Bonelli, 47 F.3d 23 (2d. Cir. 1995): According to the Second Circuit, the owner of a copy of a computer program can modify the program for its own use, even though the modification amounts to creation of a derivative work. In Aymes, an independent-contractor programmer sued his former customer for copyright infringement after the customer modified the software. The Second Circuit had no trouble agreeing with the district court that the programmer, who had been paid $70,000 to design a computer program specifically for the customer, had sold the customer a copy of the program. The court then relied on 17 U.S.C. § 117 to hold that the customer, as rightful owner of a copy of the program, “did not infringe upon Aymes's copyright, because the changes made to [the program] were necessary measures in their continuing use of the software in operating their business.” Id., 47 F.3d at 26. Id., 47 F.3d at 26. The court said that an owner's right of adaptation “includes ‘the right to add features to the program that were not present at the time of rightful acquisition,' and was intended to apply to modifications for internal use, as long as the adapted program is not distributed in an unauthorized manner.” Id. (citations omitted). (The Aymes case's holding concerning ownership and the work-made-for-hire doctrine is discussed supra at § 2.6[b][2].)

Synergistic Technologies, Inc. v. IDB Mobile Communications, Inc., 871 F. Supp. 24 (D.D.C. 1994) (granting defendant's motion for summary judgment of no copyright infringement): In this case a similar result to that in Aymes was reached, although on different grounds. The plaintiff had sold the defendant computer hardware, with software installed, for use in a satellite communications earth station. The system malfunctioned; the defendant discovered that the source code had been deleted and hired a third party to fix the software problems. The plaintiff thereupon sued for copyright infringement. The court first held that under section 2-401 of the Uniform Commercial Code, “[t]he parties not having explicitly agreed otherwise, title to the hardware and to a copy of the software passed to IDB at the time of delivery of the goods. Accordingly, IDB is the owner of a copy of the computer program and is entitled to copy and adapt the program in the limited manner described in § 117.” Id. at 29 (emphasis supplied). (The court granted summary judgment for the defendants on other grounds, namely that the plaintiff had failed, in response to the defendants' summary judgment motion, to establish a prima facie case that any potentially impermissible copying had occurred. Id. at 29-30.)

9.15 * *

In Frank Music I, we held that the plaintiffs were entitled to recover, in addition to direct profits, a proportion of ascertainable indirect profits from defendants' hotel and gaming operations attributable to the promotional value of Hallelujah Hollywood. The district court considered the relative contributions of Hallelujah Hollywood and other factors contributing to the hotel's profits …. The district court concluded that two percent of MGM Grand's indirect profit was attributable to Hallelujah Hollywood. … [T]his conclusion is not clearly erroneous.

Frank Music Corp. v. Metro-Goldwyn-Mayer, Inc., 886 F.2d 1545, 1547-48, 1550 (9th Cir. 1989) (footnotes omitted, emphasis added).

9.15.1 Statutory Damages

If the copyright owner so chooses, and provided that it timely registered its copyright(s) (see § 2.4[a]), it can elect, instead of recovering actual damages and profits, to receive an award of “statutory damages,” essentially a civil fine paid to the copyright owner. The amount of statutory damages is set by the judge; it can range from not less than $750 to not more than $30,000 for all infringements involved in the lawsuit in respect of any one copyrighted “work.” The court can increase the statutory damages to $150,000 if the copyright owner proves, and the court finds, that the infringement was willful. See 17 U.S.C. § 504(c).

Selected cases:

UMG Recordings, Inc. v. MP3.com, Inc., NO. 00 CIV. 472 (JSR), _ F. Supp.2d _ (S.D.N.Y. Sept. 6, 2000): The court had previously granted summary judgment that MP3.com had infringed the copyright in thousands of music CDs (see § 2.8[a]). The court awarded statutory damages of $25,000 per CD, with MP3.com claiming that 4,700 CDs were copied but UMG claiming the correct number was in the neighborhood of 10,000. The resulting damage award would thus be between $118 million and $250 million. The court reserved for a separate phase of the trial the issue of the specific number of CDs copied.

9.15.2 Personal Liability for Controlling Persons

Infringement can also lead to vicarious liability for “controlling persons” (possibly including personal liability for corporate officers who have the authority and ability to control the infringing acts. The reported cases tend to be fairly fact-intensive; it appears that notions of equity may inform the courts' decisions in particular cases.

Selected cases:

Softel, Inc. v. Dragon Medical and Scientific Communications, Inc., 118 F.3d 955 (2d Cir. 1997): The Second Circuit affirmed dismissal of copyright-infringement and trade-secret claims against the president of company with five employees. The president was not shown to have “a right and ability to supervise [that] coalesce[d] with an obvious and direct financial interest in the exploitation of copyrighted materials ….” 118 F.3d at 966-67 (internal quotation marks and citation omitted; brackets by the court).

Engineering Dynamics, Inc. v. Structural Software, Inc., 26 F.3d 1335 (5th Cir.1994): The plaintiff, a software manufacturer, filed an infringement suit against both a corporate defendant and the defendant's principal officer. The district court dismissed the suit as against the officer, who according to the court had personally engaged in infringing acts. The Fifth Circuit reversed, holding that the officer was individually liable in his personal capacity. See 26 F.3d at 1349-50.

Ez- Tixz, Inc. v. Hit-Tix, Inc., 919 F. Supp. 728 (S.D.N.Y.1996): The court denied a defense motion for summary judgment. It held that individual defendants could be vicariously liable for infringement, because they had at least some control over primary corporate defendant as well as a financial interest in the alleged acts of infringement. See 919 F. Supp. at 732-35.

Data General Corp. v. Grumman Data Sys. Corp., 886 F. Supp. 927 (D. Mass. 1994): The court granted partial summary judgment against a company of which a corporate infringement defendant was a wholly-owned subsidiary. The court held that the parent company was vicariously liable for judgment of $52 million in respect of the subsidiary's copyright infringement infringement. See 886 F. Supp. at 931-32 (citing cases).

9.15.3 Injunctions; Seizures

The copyright owner's remedies may also include an injunction against further infringement, see 17 U.S.C. § 502, as well as ex parte seizure and/or post-judgment confiscation of the defendant's computer equipment used to make unauthorized copies. See 17 U.S.C. § 503.

Selected cases:

Central Point Software Inc. v. Nugent, 903 F. Supp. 1057 (E.D. Tex. 1995): The court granted the copyright owner's motion for summary judgment. It ruled that requiring defendant to deliver to plaintiff the computer equipment used to make infringing copies was a “reasonable disposition” under 17 U.S.C. § 503(b).

DSC Communications Corp. v. DGI Technologies, Inc., 898 F. Supp. 1183 (N.D. Tex. 1995), aff'd, 81 F.3d 597 (5th Cir. 1996): The district court upheld its own ex parte seizure order in pertinent part and granted a preliminary injunction against infringement.

9.15.4 Product Recalls

An injunction can include an order to recall all copies of the infringing product. Selected cases:

In the Montgomery case discussed in § 2.2, the court issued a preliminary injunction that, among other things, required the defendants to recall and surrender to the plaintiff all infringing products in their possession, and to advertise via bulletin board that the infringing products were produced without a license and thus were subject to payment of a licensing fee to the plaintiff. See Montgomery, 168 F.3d at 1287 n.5.

CyberMedia, Inc. v. Symantec Corp., 19 F.Supp.2d 1070 (N.D. Cal. 1998) (granting preliminary injunction): The plaintiff was the manufacturer of a computer cleanup program called UnInstaller, which allowed users to remove unwanted applications and files from their computers. The court was persuaded, by expert testimony showing “line after line” of identical or nearly-identical code, that the defendant had simply lifted blocks of source code from the plaintiff's software. See id. at 1077. The court entered a preliminary injunction requiring the defendants to issue a notice of recall to all of its distributors, with the notice to state that distribution of any infringing version of the software “may expose the distributor to liability as a contributory infringer.” Id. at 1081-82.

10 Export controls

11 Trademarks

11.1 Trademark Basics

At the moment, trademark law is the one intellectual property law issue that may be most likely to ensnare companies seeking to establish an Internet presence. Problems can arise, and a company can find itself embroiled in a controversy, even without the company's knowledge that it is doing anything that might be controversial.

For example, in July 1998, Microsoft reportedly paid $5 million to settle a case involving its right to use the trademark “Internet Explorer.” According to news accounts, a software developer sued Microsoft for trademark infringement, claiming prior use of the mark for another Internet browser. Microsoft attempted to defend on grounds that the mark was generic, but the court rejected the defense. Microsoft ended the case by purchasing the pending application to register the mark. See http://www.news.com/News/Item/0,4,23797,00.html.

11.1.1 What is a Trademark? A Service Mark?

Generally speaking, a trademark can be any word, phrase, slogan, graphic image (two- or three-dimensional), musical phrase (e.g., a tune), or other symbol used in the offer and sale of goods.

Examples of trademarks:

  • the words "Coca-Cola" and "Coke"

    • the script version of the words "Coca-Cola"
    • the red-ball Coke graphic
    • the wasp-waist Coca-Cola bottle
    • various slogans such as "Things Go Better with Coke," "It's the Real Thing," and "Just for the Taste of It"
    • the various tunes played in Coke commercials

A service mark is a symbol that is used in offering or selling services; the applicable law is essentially the same as for trademarks. (For convenience, the term "trademark" is used in this document to refer to both trademark and service marks.)

11.1.2 What Kind of Marks are Protectable?

Not just any symbol can be protected as a trademark. A trademark must be capable of symbolizing, in the minds of the public, the goods or services that are offered, sponsored, or endorsed by the trademark owner, as distinct from the goods or services offered by others.

Categories of protectable marks include:

  • coined or fanciful marks that have no other meaning (in any language). Some well-known examples are Xerox, Kodak, and Exxon;
  • arbitrary marks that have a prior meaning but no association with the goods or services – e.g., Amazon for on-line retail services;
  • suggestive marks that hint at some characteristic of the goods or services – e.g., Sprint for telecommunications services;
  • descriptive marks that have acquired a “secondary meaning” (and thus are not “merely descriptive”) – e.g., Intensive Care Lotion

A “generic” term cannot function as a trademark, because by definition it is the common descriptive name of the goods or services in question, and therefore it cannot symbolize the goods or services offered, sponsored, or endorsed by any particular vendor.

Example: In the United States, "aspirin" was formerly a trademark of the Bayer company, but decades ago a U.S. court held that it had become a generic term (a long story involving World War I) and therefore was no longer protectable as a trademark. "Aspirin" still has trademark status in much of the rest of the world.

11.1.3 Who Has Priority of Rights in Trademarks?

Priority of trademark rights in the U.S. is based on use of the mark (although a federal registration application can be filed to establish a constructive priority on the basis of bona fide intent to use the mark). See 15 U.S.C. § 1051.

Under federal law, a trademark infringement suit requires the plaintiff to prove that it has priority and that the defendant's offering or sale of goods or services, using the offending domain name, is likely to cause confusion as to the origin, sponsorship, or endorsement of the goods or services. See 15 U.S.C. § 1114.

11.1.4 Infringement of Others' Trademark Rights

Under U.S. law, infringement of trademark rights consists of using the mark where a likelihood of confusion exists with a mark used by someone having priority. In most U.S. jurisdictions, the factors relevant to a determination of whether there is a likelihood of confusion are generally as follows:

  1. the strength or distinctiveness of the plaintiff's mark;
  2. the similarity of the two marks;
  3. the similarity of the goods or services identified by the marks in question;
  4. the similarity of the facilities the two parties use in their businesses;
  5. the similarity of the advertising used by the two parties;
  6. if the goods or services of the two parties are sold in different markets, the likelihood that the plaintiff will bridge the gap between those markets (sometimes referred to as the plaintiff's “natural zone of expansion”);
  7. the quality of the defendant's product;
  8. the sophistication of the purchasers and the amount of resources used in making a purchase decision — a $50,000 computer system will be purchased with more attention, by purchasers with greater training, than a $5 knick-knack;
  9. whether the defendant acted in good faith — because intent to copy another's trademark is often taken as circumstantial evidence that confusion is likely;
  10. any instances of actual confusion — because actual confusion, while possibly arising from non-trademark factors, can be compelling evidence that confusion is indeed likely.

See, e.g., Cardservice Intl'l, Inc. v. McGee, 950 F. Supp. 737, 740 (E.D. Va. 1997) (granting permanent injunction against pro se defendant's use of cardservice.com as domain name for company providing credit and debit card processing services in competition with established company of that name, and ordering defendant to pay $59,691.25 in attorneys' fees and expenses for bad-faith litigation)/; see also Polaroid Corp. v. Polarad Elecs. Corp./, 287 F.2d 492, 495 (2d Cir. 1961) (oft-cited list of factors bearing on likelihood of confusion). Not all of these factors are relevant to any given set of facts, nor must all factors be in the registrant's favor for a finding of confusion. Cardservice, 950 F. Supp. at 740/./

Upon proof of infringement of a federally-registered trademark, the registrant is entitled to recover the defendant's profits arising from infringement (and, as in copyright law, need prove only the defendant's gross revenues), plus any damages sustained by the registrant. 15 U.S.C. § 1117(a). The court has the discretion to award up to treble the actual damages; if the court determines that an award based on profits alone is either inadequate or excessive, “the court may in its discretion enter judgment for such sum as the court shall find to be just . . . .” Id.

11.2 Domain-Name Registration

11.2.1 Registration Mechanics

Registering a domain name is one of the first steps a business usually takes to establish an Internet presence. Domain names are registered through a process that is overseen by the Internet Corporation for Assigned Names and Numbers (“ICANN”), but with registrations actually processed by one of a variety of registrars (see http://www.icann.org/registrars/accredited-list.html for a list). One of the largest registrars for the United States is Network Solutions, Inc. (NSI).

11.2.2 Trademark Searches in Selecting a Domain Name

A trademark search by a professional search firm, possibly coupled with an opinion from trademark counsel about the availability of a proposed domain name, is often advisable before beginning widespread use of the name. One of the best-known search firms is Thomson & Thomson (http://www.thomson-thomson.com).

A favorable opinion of counsel can provide at least some comfort that a company's proposed investment in a domain name would not be wasted. In and of itself, however, an opinion will not shield the company from liability if it turns out that someone else's trademark rights are infringed or diluted by the domain name. (On the other hand, a competent favorable opinion can demonstrate the company's good faith in adopting the domain name and thus reduce the chance that infringement would be found to be willful, thereby reducing the risk of an award of enhanced damages and/or attorney's fees.)

11.3 The Problem of “Cybersquatting”

11.3.1 Some Examples

Domain names were formerly registered on a first-come first-served basis. That led to problems when owners of brand names in the real world (sometimes referred to as “meatspace”) discovered that others had registered domain names identical to their trademarks. For example:

  • A so-called “cyber-squatter” registered approximately 240 domain names and then offered to sell the domain names to companies that he thought might be interested. The marks in question included, e.g., britishairways.com, deltaairlines.com, eddiebauer.com, crateandbarrel.com, neiman‑marcus.com, northwestairlines.com, ramadainn.com, unionpacific.com, and ussteel.com. See Intermatic Inc. v. Toeppen, 947 F. Supp. 1227, 1230, 1233 (N.D. Ill. 1996) (adopting magistrate judge's recommendation of summary judgment and permanent injunction in favor of plaintiff; holding that “cyber-squatter” defendant's registration of federally-registered trademark as domain name violated federal and state anti-dilution statutes); see also Panavision Int'l, L.P. v. Toeppen, 141 F.3d 1316, 1324-26 (9th Cir. 1997) (affirming summary judgment that defendant's registration of plaintiff's trademark as Internet domain name violated federal and state anti-dilution statutes).
  • Injunctions were obtained in the cases of adultsrus.com and candyland.com for sexually-explicit Web sites. See Toys “R” Us, Inc. v. Akkaoui, 1996 WL 772709, 40 USPQ2d 1836 (N.D. Cal. 1996) (granting preliminary injunction, on anti-dilution grounds); Hasbro, Inc. v. Internet Entertainment Group, Ltd., 1996 WL 84853, 40 USPQ2d (BNA) 1479 (W.D. Wash. 1996) (granting preliminary injunction requiring defendant to remove all content from sexually explicit Internet site candyland.com).
  • An injunction was also obtained in the case of plannedparenthood.com for a Catholic-oriented site featuring pro-life messages, /see Planned Parenthood Federation of America, Inc.

    1. Bucci/, No. 97 Civ. 0629 (KMW) (S.D.N.Y. Mar. 19, 1997) (granting

    preliminary injunction, on both trademark-infringement and anti-dilution grounds).

  • In the early days of the Web, McDonald's restaurants were informed by a writer for Wired magazine that, to prove it could be done, he had registered “mcdonalds.com” as a domain name, and established an email address “ronald@mcdonalds.com.” See Joshua Quittner, /Billions Registered: Right Now, There are No Rules to Keep You From owning a Bitchin' Corporate Name As Your own Internet Address,/ Wired, Oct. 1994 at 54.

11.3.2 Action Under the Anticybersquatting Law

A trademark owner that finds itself beset by a cybersquatter can now sue the cybersquatter under the "Anticybersquatting Consumer Protection Act," enacted by Congress in 1999 to add a new subsection (d) to 15 USC 1125:

(d)(1)(A) A person shall be liable in a civil action by the owner of a mark, including a personal name which is protected as a mark under this section, if, without regard to the goods or services of the parties, that person–

(i) has a bad faith intent to profit from that mark, including a personal name which is protected as a mark under this section; and

(ii) registers, traffics in, or uses a domain name that–

(I) in the case of a mark that is distinctive at the time of registration of the domain name, is identical or confusingly similar to that mark; * * *

15 U.S.C. § 1125(d). The new legislation also provides for an award against cybersquatters of up to $100,000 in statutory damages as well as attorneys' fees.

If the trademark owner cannot find, or obtain personal jurisdiction over, the cybersquatter, then the owner can bring an “in rem” action against the registrar of the offending domain name to cancel the domain registration. See 15 U.S.C. § 1125(d)(2).

11.3.3 Action Under ICANN's Dispute-Resolution Policy

ICANN promulgated a dispute-resolution policy under which most types of trademark-based domain-name disputes must be resolved by agreement, court action, or arbitration before a registrar will cancel, suspend, or transfer a domain name. However, a trademark owner who wishes to take action against a cybersquatter can initiate expedited administrative proceedings by filing a complaint with an approved dispute-resolution service provider. See ICANN, Uniform Domain-Name Dispute-Resolution Policy, at www.icann.org/udrp/udrp.htm.

11.3.4 Action Under the Federal Anti‑Dilution Statute

Under a 1996 amendment to the federal trademark statute, the owner of a mark can also sue to enjoin use of a domain name that “dilutes” the distinctive quality of the trademark. See Panavision Int'l, L.P. v. Toeppen, 141 F.3d 1316, 1324-26 (9th Cir. 1997) (affirming summary judgment that defendant's registration of plaintiff's trademark as Internet domain name violated federal and state anti-dilution statutes); Jews For Jesus v. Brodsky, 993 F. Supp. 282, 46 USPQ2d 1652 (D.N.J.

  1. (granting motion for preliminary injunction); Intermatic, 947 F.

Supp. at 1235-36 (denying plaintiff's motion for summary judgment that “cyber-squatter” had engaged in trademark infringement (although granting motion as to violation of anti-dilution statute); fact issues about likelihood of confusion precluded summary judgment). Cf. Sega Enterprises Ltd. v. Sabella, 1996 WL 780560 (N.D. Cal. 1996) (denying plaintiff's motion for summary judgment of trademark infringement because of fact issues as to whether plaintiff had adopted the mark, but granting summary judgment of violation of plaintiff's state-law trade name rights).

The 1996 amendment provides that, subject to the principles of equity, the owner of a famous mark is entitled to an injunction “against another person's commercial use in commerce of a mark or trade name, if [1] such use begins after the mark has become famous and [2] causes dilution of the distinctive quality of the mark.” 15 U.S.C. § 1125(c)(1). [The text of this section is adapted from the opinion of the court in Akkaoui/.]/

The first question is whether a mark is famous and distinctive. Under the statute, a court making this determination may consider factors such as, but not limited to:

(A) the degree of inherent or acquired distinctiveness of the mark;

(B) the duration and extent of use of the mark in connection with the goods or services with which the mark is used;

(C) the duration and extent of advertising and publicity of the mark;

(D) the geographical extent of the trading area in which the mark is used;

(E) the channels of trade for the goods or services with which the mark is used;

(F) the degree of recognition of the mark in the trading areas and channels of trade use by the marks' owner and the person against whom the injunction is sought;

(G) the nature and extent of use of the same or similar marks by third parties; and

(H) whether the mark was registered . . . .

Id.

The second question is whether the defendant's use of the mark results in “dilution.” That is defined in the statute as “lessening of the capacity of a famous mark to identify and distinguish goods or services, regardless of the presence or absence of‑‑(1) competition between the owner of the famous mark and other parties, or (2) likelihood of confusion, mistake, or deception.” 15 U.S.C. § 1127. “In authorizing courts to enjoin dilution, Congress intended ‘to protect famous marks from subsequent uses that blur the distinctiveness of the mark or tarnish or disparage it.'” H.R. Rep. No. 374, 104th Cong., 1st Sess. 3 (1995).

12 Rice course

USE AN AMAZON-MEETING APPROACH? Houston Chronicle - Sarah Green Carmichael

13 Basic information

13.1 Course materials

Course materials: Notes on Contract Drafting (a work-in-progress of mine). (PDF) Update 2021-01-22: I've uploaded the first part only (due to size limitations) to Amazon for print-on-demand; I'll keep you posted.

For supplementary reading, some students like Professor Tina Stark's highly-regarded book, Drafting Contracts: Why Lawyers Do What They Do (2d ed. 2013), but whether to buy or rent it is entirely up to you; the online course materials contain everything on which you'll be tested. (The recently-published Kindle version is much less expensive than the trade paperback.) Disclosure: Tina is a longtime professional friend and mentor.

13.2 Zoom ground rules

This semester (spring 2021), the course will be done entirely by Zoom (and other online services) because of the global COVID-19 pandemic. Here are some ground rules you will be expected to follow.

  1. Be somewhere that your colleagues (and you) won't be overly distracted by noise and/or guest appearances by dogs, children, etc. (I'm pretty easygoing about these things, but be considerate of your classmates.)
  2. Your computer must have a working video camera and quality audio capability. (You might need an external microphone and/or a headset for decent audio quality.)
  3. You must join by video, not just by an audio-only phone connection.
  4. Leave your camera on, but it's fine if you need to step out for a minute, just as if we were meeting in person at the Law Center.
  5. Please be sure to speak up so that others can hear you. (Also, watch your mute button.)
  6. Be sure your name is shown in your Zoom profile, so that I'll know who's speaking.

13.3 Course objective: Exposure to the tools of the trade

Our primary course objectives and learning outcomes are to give each student an initial, survey-type exposure to the following tools of the contract drafter's and reviewer's trade:

  1. Techniques for drafting simple, understandable sentences and paragraphs to cover complex topics;
  2. Important legal doctrines, e.g., laws governing interest charges, indemnities, implied warranties, etc.;
  3. Crucial business issues that are commonly addressed in contracts;
  4. Practicing spotting and fixing language ambiguities that could cause problems down the road;
  5. The psychology of likely future readers such as business people, judges, and jurors;
  6. Finding and harvesting useful "precedents" (past contracts);
  7. Recognizing when to ask the partner or the client — and getting in the habit of documenting that you did so.

13.4 What this course won't do

First: Do NOT assume that we will "cover the material" in class.

We have a total of some 35 hours together in class. That's not nearly enough time to do justice to all the material you'll need to be aware of in order to be a competent contract drafter or reviewer. Possibly more than in your other courses, you'll need to be sure to do the reading if you want to get maximum benefit from the course.

As discussed below, the sage-on-a-stage lecture approach has been shown to be significantly less effective when it comes to comprehension and retention. For that reason, we will focus much of our class time on trying to make sure you understand and retain as many crucial points as possible.

Second: This course isn't like a driver's ed class, where completing the course will make you at least minimally competent to "go out on the road" by yourself. Becoming a competent contract drafter will take more time and practice than can be provided in a single three-semester-hour course.

Even after you finish this course, you likely will — and should — worry that you don't know what you don't know.

You could think of this course as being akin to a surgical-tools class in which medical students learn the basics of using scalpels, clamps, suture needles, and other surgical tools, and practice using those tools by doing a few simple procedures on an anatomical mannequin. Completing such a class, without more, should not make a student feel "comfortable" doing any kind of surgery on a live person. That's why newly-graduated doctors must still spend years in residencies to learn their trade. Much the same would be true if you were to try drafting a contract for a real client with no other training than this course.

13.5 Contract revising as well as drafting

In this course, we will practice good drafting skills — in part — by revising the work of others. This reflects what you're almost certain to see in practice: Contract drafters spend far less time drafting contracts than they do in reviewing and revising others' drafts, whether a given existing draft was prepared by "the other side" or was used in a previous deal.

Even when you're the one who must prepare the first draft, your supervising attorney will almost always tell you to find a previous form of agreement and modify it (and perhaps will suggest one), instead of starting from scratch with a blank screen.

13.6 Spaced repetition, with (some) jumping around

Some of the short exercises and quizzes that we do will seem repetitive; they also will seem to jump around from topic to topic. This is a feature, not a bug, because:

  • It mirrors what you'll almost certainly see in practice.
  • Pedagogically, spaced repetation been shown to be more effective at promoting long-term memory than lecture and repetitive reading; see generally the Wikipedia article at https://goo.gl/4PRZTy.

This approach will strike some students as disorganized. Over the years, though, most students seem to have come to appreciate the value of the approach, as mentioned in some of the student comments below.

13.7 Social proof: Past student comments (good and bad)

Following the sales-and-marketing principles of (i) using social proof, and (ii) "setting the hook," here are some student comments from UH Law Center course evaluations; from virtual-whiteboard feedback at the end of various past semesters; and from the occasional email from former students:

• "I saw what I learned in class be used at my job, so that was great to be able to use what I learned already as a student practicing."

• “I had the opportunity to redline a software agreement for the company I intern with and the Contracts Lawyer told me I did a very fine job. … The lawyer asked me how I was so well attuned to the various ways in which the software providers tried to undermine our company’s bargaining power. … I was amazed at how easily I could identify problematic language. …”

• "His course is different from the norm and his methods are refreshing. … Professor Toedt's approach allows students to figure out the issue on their own but provides students with the tools necessary to reach an answer (which he then explains/corrects)."

• "I like the in class exercises. Very helpful to lock in the concepts. I would recommend more of these types of exercises throughout the class. Amount of reading was reasonable."

• "One of the best classes of my time in law school. Great progressive approach to teaching. I can only hope that UH will adopt Toedt's methodology for other classes."

• "I liked the practical approach of the course – very effective teaching technique by using repetition and in class exercises."

• "You learn piece by piece the process throughout the semester to be able to effectively draft/redline contracts."

• "I really enjoyed your class. At every class, I felt like I were a summer associate studying under a law partner and the partner (you) would take us to nice, low-key lunches and shared with us a bunch of practice tips through the Tango Terms. I really appreciated all the guidance. I like the formal drafting assignment (employment letter) a lot."

• "The [Zoom] breakout rooms work very well."

• "The course was a good survey of practical issues, both business and legal, that arise during contract drafting and negotiations. The textbook was easily accessible online, with class time focused on discussing the reading. The discussion-based class format combined with spaced repitition and the homework quizzes helped make the material more concrete. I thought the short-answer questions were a good addition to the quizzes, but I think more practice drafting exercises such as the offer letter would be more effective in providing hands-on learning. Compared to other courses, the reading and homework were relatively light, so Prof. Toedt could cover more material if he wanted to without overloading students."

• "I love the breakout rooms, the Google white board, and Canvas for quizzes." (Capitalization corrected.)

• "The course translated well to a virtual format, with breakout rooms substituting for in-class group activities. Using Canvas for online homework/quizzes also worked well."

• "I love this course. I learned a lot of real-life contract drafting experiences."

• “Professor Toedt's class was fantastic. I thoroughly enjoyed the content/delivery, and I learned more real world applicable information in this class than I have in most others. Having this class over Zoom was not ideal, but he made the most of it and kept the collaborative elements of the course intact. He clearly has a wealth of knowledge and experience.”

• “The course is very practical and a good refresher for drafting rules and key negotiations tactics, applicable in any area of practice of law. Prof. Toedt’s approach in utilizing his own written terms form (Tango Terms) makes the learning easier as we learn practically ‘from the horse’s mouth.’ I enjoyed his repetition style that allowed internalizing concepts, and the periodic quizzes that helped foster needed reviews and flashback to further the learning process. Great class, remarkable style, and awesome instructor!”

• “I've taken many courses at UH Law School, and I must say that this course was taught in the most ‘real-world application’ style in comparison to my previous courses. My experience with courses in the past was shaded by the bombardment of textbook pages and black and white material. What this class did phenomenally was apply the concepts of contract drafting in such a way that if I was to go into practice tomorrow, the tools that I have acquired in this class have made me more than adequately prepared. In light of these comments, I stress that Professor Toedt's emphasis on group collaboration and constant engagement in ensuring that students were learning through mediums of real-world practically made this class an absolute pleasure. He had set up the class in such a way where students were learning through their engagement with each other and with the help of brainstorming and the professors guided assistance learning these concepts didn't simply become ‘study and dump’ but meaningful and engaging learning. So again, I must say thank you. Thank you for not only taking time to develop the extensive course material but to also genuinely care in the process of teaching and learning that each of the students go through. This has been truly an unforgettable learning experience.”

• "Great job! Loved the quizzes. Very helpful class."

• "… really enjoyed the approach to class and quizzes."

• "Love the quizzes! They are really helpful to learn things, and the spaced repetition was excellent. Also they were a good way to test what we knew and where we were in class so we had an idea of how things were going."

• "I liked both the class and instructor and would recommend this course."

• “This was a great class, Professor Toedt's approach to teaching is clear and concise.”

• “Professor Toedt is the ‘original gangster’ (hereafter ‘OG’) of contract drafting. I'm fortunate to have taken his class. He is incredible. Thanks for your public service.”

• “Professor Toedt is remarkable at contract drafting. It is a privilege to take this class with him. He does his job exceptionally well. Very respectful man.”

• “Professor Toedt is great at what he does! He really knows his stuff and makes sure you know it too. I really like the approach of having different sections of a contract due as homework every week. This helped me really learn about the different sections and helped me stay on track to writing an entire contract by the end of the semester. All in all, wonderful professor!”

• “Very insightful and practical class. The professor is very effective in conveying the information in a rememberable and engaging fashion. I truly enjoyed this course and will be using what I learned in practice next year. Thank you, Professor Toedt!”

* * * 

Not everyone was so enthused; here are some less-positive comments, along with my responses.

• "The classes felt a little haphazard on a weekly basis." (From a different student's review:) "[T]he course is extremely unorganized …." DCT RESPONSE: The topics covered in the course are arranged in very rough order of importance (in my experience). And, as noted above, spaced repetition can indeed feel like jumping around, but it's key to the approach of this course.

• "I thought some of the reading assignments were a little long. It just looks daunting and I am not motivated when one section has 20-50 subsections." DCT RESPONSE: Noted — I've redone the reading assignments to indicate more what must be read closely, versus what can be merely looked over or skimmed (so that you'll likely remember that it's there and can look it up if you ever need it in the future).

• "I felt like we spent a ton of time revising contracts and simplifying them, but I'm still not sure that I have a great grasp of all the sections of a contract." (From a different student's review:) "I liked that the class stressed practical knowledge and what to look out for when reviewing contracts but I do not feel like that this has translated into me feeling confident (or even semiconfident) writing or reviewing a contract in real life." DCT RESPONSE: It's normal not to feel confident until you've had a fair amount of real-world experience that didn't blow up on you. Think back to when you first drove a car by yourself: You probably were just a bit nervous, which was entirely appropriate.

• "To me, I think the stress of a contract for a law student is the idea of, if you're assigned to write up a contract from scratch, your thought is, where do I even begin?" DCT RESPONSE: Noted; I'm thinking about how to remedy this with some kind of step-by-step procedure — although as pointed out above, contract drafters almost never start with a clean sheet of paper or a blank computer screen.

• "I would appreciate a little bit more traditional lecturing as opposed to asking us to discuss what we thought was helpful or surprising about the reading. I always left class unsure of whether I learned material properly. I enjoyed the break out rooms and working with the other students in the class the most." DCT RESPONSE: Noted, but the desire for traditional lecturing seems to be a minority view — and pedagogical research has shown that lecturing is one of the least-effective ways of information transfer.

14 Administrative details

14.1 Email addresses

On the first day of class I will be asking for your email addresses so that I can include it in a class Google Group. Please provide an email address that you check regularly.

14.2 Computer use

Computer use in class is not just encouraged but required; you will need in-class Web access for many of the in-class exercises. If this will be a problem, be sure to contact me well in advance.

(You might, however, want to rethink the extent to which you use laptops in your other classes; see, e.g., this article by a professor at the University of Michigan about how classroom laptop users not only do worse than those who take notes by hand, they also interfere with the learning of non-laptop users around them.)

14.3 Extra class time each day (to avoid a Friday-night makeup class)

I'm a practicing attorney and arbitrator; I normally don't have to miss class, but it has been known to happen, e.g., when I've had out-of-town commitments. There have also been times when we’ve had to cancel class due to weather. (And on the evenings of Game 7 of the 2017 and 2019 World Series, we canceled the evening class.) [DCT NOTE for spring 2021: Given that just about everything is being done by Zoom nowadays, it seems unlikely that we'll have to cancel class either for weather or for my travel.]

The ABA requires 700 minutes of instruction for each credit hour; that means we need 2,100 minutes of instruction for our three-hour course. We will achieve the needed minutes of instruction by:

  1. meeting for 80 minutes per class for 26 class meetings, vice the normal 27 scheduled class meetings, to get 2,060 instruction minutes;
  2. making up the remaining 40 instruction minutes via “online” instruction in the form of emails and other discussions, as permitted by ABA rules;
  3. using the resulting “spare” class #27 as a makeup day if necessary, otherwise ending the course at #26;
  4. as a last resort, meeting on one of our scheduled Friday-evening makeup days (not the situation of choice).

14.4 Recording my lectures: Go ahead if you want

I don't make audio recordings of my in-class lectures, but I have no objection to students doing so and sharing the recordings with other UHLC students. [NEW for spring 2021: I'm exploring possibilities for prerecording audiobook-style narration of the readings, so that people can listen to them; I'll announce it if that happens.]

The following is a UH-required element for the syllabus as provided by the Associate Dean's office:

Students may not record all or part of class, livestream all or part of class, or make/distribute screen captures, without advanced written consent of the instructor. [DCT note: See above for my consent.]

If you have or think you may have a disability such that you need to record class-related activities, please contact the Center for Students with DisABILITIES.

If you have an accommodation to record class-related activities, those recordings may not be shared with any other student, whether in this course or not, or with any other person or on any other platform.

Classes may be recorded by the instructor.

  • Students may use instructor’s recordings for their own studying and notetaking.
  • Instructor’s recordings are not authorized to be shared with anyone without the prior written approval of the instructor.

Failure to comply with requirements regarding recordings will result in a disciplinary referral to the Dean of Students Office and may result in disciplinary action.

(Extra paragraphing and bullets added.)

And a strongly-recommended syllabus element from the Associate Dean's office:

Any recordings created will be deleted and destroyed shortly after the final exam for the class. [DCT revision: I will usually delete recordings around one week after the class — I use my own Zoom account, which has limited cloud recording space.]

There is a chance that your contributions to class discussion, whether voluntary or while on call, may be included in the recording. Your continued registration in this class indicates your acquiescence to any such incidental recording for the purposes described above.

14.5 Synchronous online course

The following paragraph is recommended by the Associate Dean's office:

This course is being offered in the Synchronous Online format. Synchronous online class meetings will take place according to the class schedule. There is no face‐to‐face component to this course.

In between synchronous class meetings, there may also be asynchronous activities to complete (e.g., discussion forums and assignments).

This course may have a final exam per the University schedule. [DCT COMMENT: Make that "WILL have a final exam."] The exam will be delivered in the synchronous online format, and the specified date and time will be announced during the course. /[DCT COMMENT: See

Prior to the exam, descriptive information, such as the number and types of exam questions, resources and collaborations that are allowed and disallowed in the process of completing the exam, and procedures to follow if connectivity or other resource obstacles are encountered during the exam period, may be provided.

14.6 Syllabus changes?

The following is a UH-required element for the syllabus as provided by the Associate Dean's office:

Due to the changing nature of the COVID-19 pandemic, please note that the instructor may need to make modifications to the course syllabus and may do so at any time. Such modifications may could include changes to the mode(s) of assessment for the course. Notice of such changes will be announced as quickly as possible through email.

14.7 Last-day agenda: Reviews, Jeopardy, pizza?

In the Tango Terms manual, see the model syllabus for the last class day.

15 General information

My contact information: I can be reached at email dc@toedt.com or (713) 364-6545 (which also forwards to my cell); see also my About page. I respond pretty quickly to email questions. If I think that a question might be of interest to other students, I’m likely to copy and paste it (possibly edited, and with identifying information redacted) into an email to one or both sections.

My office hours: As an adjunct professor, I generally don’t physically come to the school except to teach class (and not at all during the pandemic). I’m happy to meet with students (on Zoom) by appointment as follows:

HOW WHEN APPT. NEEDED?
In person (when class meets in person) M or W 5:30 p.m. Yes
In person (when class meets in person) M or W 7:20 p.m. (ten minutes) No
Skype or Zoom video; phone M-F 3:00 p.m. Yes

I strongly encourage each student to make at least one appointment during the semester to discuss any questions that they or I might have.

16 Counseling available

Counseling and Psychological Services (CAPS) can help students who are having difficulties managing stress, adjusting to the demands of a professional program, or feeling sad and hopeless. You can reach CAPS (http://www.uh.edu/caps) by calling 713-743-5454 during and after business hours for routine appointments or if you or someone you know is in crisis. No appointment is necessary for the “Let’s Talk” program, a drop-in consultation service at convenient locations and hours around campus. See http://www.uh.edu/caps/outreach/lets_talk.html for more information.

17 Sexual harassment policy

The University is committed to maintaining and strengthening an educational, working and living environment where students, faculty, staff, and visitors are free from discrimination and sexual misconduct. If you have experienced an incident of discrimination or sexual misconduct, there is a confidential reporting process available to you. For more information, please refer to the University system’s Anti-Discrimination Policy SAM 01.D.07 and Sexual Misconduct Policy SAM 01.D.08, available here:

Please be aware that under the sexual misconduct policy, SAM 01.D.08, faculty are required to report to the University any information received regarding sexual misconduct as defined in the policy.

Please note that the reporting obligations under the sexual misconduct policy reach to employees and students.

Also, as a required reporting party, Law Center employees and faculty members are not a confidential resource.

18 Grading: 750 points

The school’s required average: 3.20 to 3.40: As required by law school policy, raw grades will be adjusted proportionally to the extent necessary to make the average of the final class grades fall within that range.

(My usual practice — but not a guaranteed one — is to “move the curve” up or down as necessary so that the average is at or near the high end of the required range.)

Your final grade is based on the total possible points stated above: Your course grade will be based on how many of these points you earn AND ALSO how well others in your section do, as explained below. (Note how the total points is /not repeated here, to be sure they stay consistent.)/

Important note: You might get very-high raw scores on the homework assignments and final exam, but keep in mind that the average for each section MUST be no higher than a B-plus. This means that the Canvas system might show you as having an "A" grade based on your raw scores, but what matters is how you do relative to the other students in your section.

(Each section is curved separately.)

18.1 Attendance “signing bonus”: 100 points — with a claw-back

Every student starts out with the above “freebie” points for class attendance, but can lose points for missing class, as follows:

   
TOTAL CLASSES MISSED TOTAL POINTS LOST
1 0
2 10
3 30
4 60
5 or more all 100

This means, of course, that students who miss more than one class will have to do that much better on the final, the quizzes, and homework in order to keep up with their classmates on the school-required average.

Some absences won’t lose points, however:

• I don't count absences during the first week for newcomer students who join the class during adds and drops.

• I don’t count absences for “official” law school travel, e.g., for moot-court competitions, etc., as long as I’m informed in advance. (This seems of marginal relevance during the pandemic.)

• I also don’t count up to two absences for illness (yours or someone for whom you need to care, e.g., a child). If you’re ill and we’re meeting in person, please don’t come to class and infect the rest of us. Please email me if you’ll be absent for illness; I’ll take your word for it without a doctor’s note.

• Other absences, e.g., for job interviews, office visits, work trips, etc., will be counted as missed classes and will lose points as set forth above; please schedule accordingly.

• During times that we meet online via Zoom, I will track absences using the Zoom participant list or using other online tools.

Why attendance is especially important: The class attendance policy arises from the fact that we will be doing:

  • a significant amount of in-class discussion; and
  • a significant number of in-class exercises in small groups.

Consequently, it’s important for all students to attend each class, not just for their own benefit, but so that their teams won’t be shorthanded.

School policy requires attendance at 80% of the class meetings for each course. We will meet a total of 26 times; rounding to the nearest whole number of classes, a student therefore must attend at least 21 class periods to comply with the 80% rule.

18.2 Mid-term take-home quizzes: 350 pts

Take each quiz below — on Canvas — at any time starting at 9:00 p.m. on the Wednesday immediately preceding the due date.

Each quiz is open-everything (book, Internet, other reference materials). BUT: No collaboration with anyone else; there might be an Honor Code compliance question.

Each quiz will be timed; the duration is TBA but probably quite long The quizzes will be untimed. One of the principal purposes of each quiz is to provide students with an "opportunity" to review and work with the material.

The later quizzes will include material covered in previous quizzes (there's that spaced-repetition concept again).

Each quiz is due at 12:00 noon Houston time on the specified date. Late submissions will be docked points; the exact number of points is TBA.

  • Quiz #1: Due Mon. Feb. 08 — 20 pts
  • Quiz #2: Due Mon. Mar. 01 08 — 50 pts
  • Quiz #3: Due Mon. Mar. 22 29 — 60 pts
  • Quiz #4: Due Mon. Apr. 12 19 — 120 pts
  • Quiz #5: Due Mon. Apr. 26 — 100 pts (this is a more-or-less comprehensive review quiz).

These quizzes will include progressively-more review material.

Each quiz will include a mix of true-false, multiple-choice, fill-in-the-blank, and/or “micro-essay” (short answer) questions.

Each quiz will cover only the following:

  • the readings assigned up through and including the homework due date, whether or not we discuss any particular topic in class;
  • any review questions relating to the reading;
  • anything in the in-class and homework exercises that we have done to date — that way, the homeworks themselves will thus serve as a "spaced repetition" reinforcing review that takes advantage of the testing effect;

Each quiz will be graded partly anonymously — the Canvas software shows me students’ names; I can’t do anything about that, but:

  • Canvas automatically grades the true-false, multiple-choice, and fill-in-the-blank (“FITB”) questions.
  • I review any “incorrect” fill-in-the-blank answers so that I can give credit for simple misspellings, which Canvas can’t always pick up. (I program the quizzes on Canvas to accept as many misspellings as I can think of, but you’d be surprised how "creative" students can be in their spelling ….).
  • If a quiz includes any micro-essay questions, your answers to those questions will not be anonymous at all.

In past semesters, a few students have gotten the right answer to every question on a quiz; in response, one student suggested that I should “[d]esign quizzes to have a wider score distribution.” I’m less interested in a wide score distribution than in helping all students to understand and retain the material.

WARNING: If you just copy and paste answers from this document or from the model answers from previous quizzes you'll get zero points for that question, because:

  1. I need to see how you think;
  2. When you have to rephrase a concept in your own words, it helps you better grasp and retain the concepts.

18.3 Contract-drafting assignments: 100 points total

Students will draft a couple of simple agreements for "MathWhiz," a hypothetical client.

Successive drafts will be due at various dates

Students are free to work collaboratively, but if you partner up with anyone, be sure to note that on your submission.

WARNING: The warning just above about quizzes applies equally to drafting assignments.

18.4 Final exam: 200 points

The final exam:

  • will be one hour in length, at the time scheduled for the final exam;
  • will consist in large part of what amounts to a quiz on steroids;
  • will take place on Canvas (and can be done from anywhere); and
  • will be open-book, open-notes, open-browser — but no communication with anyone else, whether by text, email, IM, or anything else.

The Honor Code will apply; there will be a one-point question asking you to certify compliance.

What’s fair game for the final exam? Anything:

  • in the assigned reading materials, especially the "Pro tips" and "Cautions";
  • in the homework, quizzes, and in-class exercises.

Note: For the micro-essay questions, calling for one- or two-paragraph answers, just copying and pasting from the Tango Terms or other course materials won’t cut it becase I'll be looking for your thinking.

18.5 Class participation bump

As permitted by law-school policy, I reserve the right:

  • to award discretionary increases in student grades by one-third of a grade level for excellent class participation, e.g., from a B to a B-plus, assuming that this doesn’t cause the class average to exceed the maximum permitted; and
  • to reduce grades for sub-standard class participation. (I’ve almost never done that, except some years ago for a couple of students for whom it was like pulling teeth to get them to participate even minimally.)

19 Setup & macros

Trade secrets: Day 2, Thur. Mar. 18

20 In-class reading

(This gouge covers U.S. law; other countries are likely to have similar rules.)

20.1 Sources of law

1.  The Defend Trade Secrets Act is a federal statute.

2.  The Uniform Trade Secrets Act has been enacted (sometimes with minor variations) in 48 states, D.C., Puerto Rico, and U.S. Virgin Islands.

20.2 Basic definition of "trade secret"

A party claiming that particular informatin is a trade secret must introduce legally-sufficient evidence — and persuade the judge or jury by a preponderance of the evidence — of the following:

  1. Reasonable efforts were made to maintain confidentiality.
  2. The information in question "derives independent economic value, actual or potential, from [i] not being generally known to, and [ii] not being readily ascertainable through proper means by, another person [iii] who can obtain economic value from the disclosure or use of the information" — from the Defend Trade Secrets Act definition, 18 U.S.C. § 1839(3).

20.3 Some information is disqualified from trade-secret status

Published information can't be a trade secret.

Patented information is (by definition) published.

20.4 Three Rules for protecting confidential information

Rule 1: Lock It Up — within reason.

Rule 2. Label It — ditto: Marking of confidential information is important: Courts help those who help themselves, when it comes to protecting confidential information.

Rule 3. "Safe Sex":

  • Be choosy about the "partners" to whom you disclose — or from whom you receive — confidential information;
  • Use "protection," in the form of a confidentiality agreement ("NDA") OR a no-confidentiality agreement.

20.5 Employees and their employers' trade secrets

Employees generally don't need to sign NDAs to be legally obligated to protect their employers' confidential information — the law automatically imposes such an obligation (referred to as an "implied-in-fact" obligation).

But it's a good idea for companies to have their employees sign at least a bare-bones confidentiality agreement (for use as a sound bite).

20.6 NDA gouge

1.  Two-way NDAs, protecting each party's (eligible) information, are usually better than one-way NDAs that protect only one party's information.

2.  Marking: Requiring marking of confidential information (e.g., in an NDA) can be problematic, because compliance isn't always 100%.

20.7 Remedies for trader-secret misappropriation

Upon proof of misappropriation, a court might:

  • award compensatory damages such as:
    • the trade secret owner's lost profits;
    • possibly the misappropriator's profits from the infringement ("disgorgement");
    • possibly a reasonable royalty;
  • award punitive damages;
  • injunctive relief, e.g., ordering the misappropriator to stop selling / using the misappropriated information.

(Optional further reading: Marylee Robinson and Neil Eisgruber, Trade Secret Damages: A Look at Available Remedies (2016).

21 Discussion questions

21.1 Baade Company BBQ

FACTS: Alice, an experienced BBQ cook, goes to work for the Baade Company BBQ restaurant and is taught how to make that restaurant's sauces and meat rubs. After working for Baade Company for three months, Alice leaves to take a better-paying job at Crusty Meats, another BBQ restaurant,

Optional reading (totally unrelated): Obituary of Hans Baade (pronounced "BAA-daa"), one of my favorite professors at UT Law.

  1. QUESTION: Could Baade Company sue Alice for misappropriation of trade secrets? Why or why not?
  2. QUESTION: Could Baade company sue Crusty Meats for misappropriation? Why or why not?
  3. QUESTION: What sorts of facts might Baade Company's trial counsel want to put in front of the jury as indirect evidence of misappropriation?
  4. QUESTION: At trial — with 20-20 hindsight — what sorts of actions might Baade Company wish it had taken earlier to provide more evidence for its trade-secret case?
  5. QUESTION: If Baade Company were to successfully sue Alice and/or Crusty Meats for misappropriation of trade secrets, what might the court order as "remedies" for the misappropriation?

DIFFERENT FACTS: The experienced BBQ cook leaves Baade Company and opens her own BBQ restaurant. She uses her own, different recipes but closely copies the architecture and kitchen-equipment layout of the Baade Company restaurant.

  1. QUESTION: Could Baade Company successfully sue for misappropriation of trade secrets?
    • Optional reading: Taco Cabana Int'l, Inc. v. Two Pesos, Inc., 932 F.2d 1113, 1123 (5th Cir. 1991), aff'd as to trade-dress issue, 505 U.S. 763 (1992). See especially the Fifth Circuit's discussion of the standard of review, i.e., how little latitude an appellate court has in reviewing a jury verdict.

21.2 Sports plays as trade secrets

Consider sports plays:

  1. QUESTION: In basketball, would a pick-and-roll play be considered a trade secret? Why or why not?
  2. Would the Houston Rockets' playbook be considered a trade secret? How about the Los Angeles Dodgers' pitcher-catcher hand "signs"? (Too soon?)

Optional reading: Rice Ferrelle, Combating the Lure of Impropriety in Professional Sports Industries: The Desirability of Treating a Playbook as a Legally Enforceable Trade Secret, 11. J. Intell. Prop. L. 149, parts III, IV (2003).

21.3 A locksmith case

FACTS:

  • For a popular line of keyed locks, duplicate keys can be made by "reverse engineering" the tumbler combinations (something locksmiths can do).
  • A locksmith reverse-engineers the tumbler combinations for that line of keyed locks and publishes a book of the combinations, allowing locksmiths to make duplicate keys for the locks.
  • The manufacturer of the line of locks sues for misappropriation of trade secrets.
  • QUESTION: What result?
  • Optional reading: Chicago Lock Co. v. Ely, 676 F.2d 400, 403-04 (9th Cir. 1982).

22 Additional reading

Footnotes:

[1]

Editor's note: The specificity of the required notice was considered in ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619 (4th Cir. 2001) (reversing and remanding summary judgment in favor of accused ISP). The court held that the notice requirement was substantially met when “ALS Scan provided RemarQ with information that (1) identified two sites created for the sole purpose of publishing ALS Scan's copyrighted works, (2) asserted that virtually all the images at the two sites were its copyrighted material, and (3) referred RemarQ to two web addresses where RemarQ could find pictures of ALS Scan's models and obtain ALS Scan's copyright information. In addition, it noted that material at the site could be identified as ALS Scan's material because the material included ALS Scan's ‘name and/or copyright symbol next to it.'” Id. at 625.