Christian D Ehret John W McIlvaine Craig M Waller Table of Contents The Good SoftwareIP Assets a Innovation Identification b Vetting New Innovations c ID: 648799
Download Presentation The PPT/PDF document "Software IP: The Good, The Bad & The..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Software IP: The Good, The Bad & The Ugly
Christian D.
Ehret
John W.
McIlvaine
Craig M. WallerSlide2
Table of ContentsThe Good: Software/IP
Assetsa. Innovation Identificationb. Vetting New Innovationsc. Strategic Protections
d. Managing IP Assetse. Software IP IssuesThe Not So Good (sometimes): Software/IP Threatsa. Intake of IP Threatsb. Patent Assertion Entities (PAEs
) /
NPEs
c. Copyright Assertion Entitiesd. Identifying Relevant Resourcese. Responding to IP Threatsf. Litigating IP Threats g. Defend Trade Secrets Act (DTSA)Slide3
The Webb Law FirmSlide4
HIGH-LEVEL OVERVIEW IP ASSETS
We have heard from in-house counsel that many of their companies simply view legal department as cost-centers, although sometimes more of a cost-savings centerAcquiring Intellectual Property rights is one of the few areas where in-house counsel can direct their attention to generating assets
for their organization, and sometimes enforcing/licensing those Intellectual Property rights can help recoup lost revenuesIP strategy that aligns with business objectives is key to: 1) value extraction of innovations,
2) using relevant and targeted filing processes to accomplish, and
3) understanding key competitor innovation activities
IP ASSETSSlide5
INNOVATION IDENTIFICATION
Documenting Innovation and Aggregation of DisclosuresMust communicate goals of innovation and how it aligns with goals of the company for buy-inEncourage and assist in getting invention disclosures without unnecessary frictionTrack invention disclosures and organize by technology groupings/business
unitsPatent Investigations/Searching State of the art searches (external innovation)Comprehensive IP reviews/activities of competitors (external innovation)
Areas
of patent density and/or areas of open
space (external innovation)IP ASSETSSlide6
VETTING NEW INNOVATIONS
Innovation Assessment and Commercial Interestensure alignment between patent protections sought, and strategic commercialization goals for the business objectivesPatent Investigations/Searching
Patentabiltiy searches (internal innovations)Freedom-to-operate searches (external threats)
IP ASSETSSlide7
STRATEGIC PROTECTIONS
Assessment/DraftingMeet with inventor(s), IP counsel and business unit managerDiscuss the invention, claiming strategies, and filing strategiesDraft claim set Prepare and review with inventors
Scope/direction approvedApplication drafted for inventor review/comment in view of commercial interests of business
IP ASSETSSlide8
STRATEGIC PROTECTIONS
IP ASSETS
Defensive protection of technological advancements
Minimizing costs to obtain
desired protections
Using key patents/technological advancements for profit Integrating protection and proprietary awareness within organization to maximize monetization opportunitiesUsing all intellectual assets and industry knowledge and competitive intelligence to select and secure profit centers in industriesSlide9
STRATEGIC PROTECTIONS
IP ASSETS
Varied levels of awareness and perceived usefulness/value of IP (questions below may be used to help reorient the importance of
investing
in
IP as a company asset)When is innovation not required to maintain competitive advantage in meeting your customer’s unique needs and/or yet unrealized needs?How does your company encourage innovative activity and how is it transformed into meaningful value/processes for the financial benefit of the company?How do you make sophisticated and strategic decisions about intellectual property (IP) to secure and protect shareholder investment that are strategic assets to be owned?Slide10
STRATEGIC PROTECTIONS
IP ASSETS
Varied levels of awareness and perceived usefulness/value of IP (questions below may be used to help reorient the importance of investing in IP as a company asset)
If
selling mature products, are you thinking about what is going to replace your products
?If all your competitors paid to implement Six Sigma, Lean Manufacturing, Branding initiatives, etc., what fundamentally would separate you from your competition?How often does the management of your organization meet to strategically address competitor disruptive technology, strategic barriers and innovation initiatives to ensure longevity & market share for your organization?Slide11
STRATEGIC PROTECTIONS
IP ASSETS
Varied levels of awareness and perceived usefulness/value of IP (questions below may be used to help reorient the importance of investing in IP as a company asset)Do
you think anyone else is thinking about being the replacement for your products
?
Who do you have informing your organization that thinks differently than the organization, speaks outside your box, and isn’t worried about the corporate ladder when they speak up?If customers left your product and the business suffered, although it served a well documented market need, how would the owners of the company then view its handling of its IP with regards to how it was secured to substantiate what is left of the value for liquidating that primary asset remaining at the company?Slide12
MANAGING IP ASSETS
IP ASSETS
Setting up and facilitation of Technology Strategy Meetings, organized by business unit/function
Strong docket management system with adequate staff paying attention to key dates and budgets
Must have point person for each business unit/function to report internally and direct outside counselSlide13
MANAGING IP ASSETS
IP ASSETS
Create space semi-annually for Technology Advancements cross-pollenization among divisions and/or business units/functions
IP Policies and Awards
useful
to motivating innovatorsMonitoring costs / ROI / value globally and by business unitSlide14
Software IP ISSUES
Software patentsHow the law of patent-eligibility has developed over the last yearA shift back to patent holdersAkamaiEnfishTroll litigation
A decrease in patent troll filings in E.D. TexasBut more copyright trolls…Addressing a cease-and-desist letter
IP ASSETSSlide15
SOFTWARE PATENT ISSUES
IP ASSETS
Based upon many patents granted in the late 90s through early 2000’s, the courts have been reining-in what is and is not patentable
The courts have not killed software patents, although they have muddied the waters in narrowing the scope of what is patentable
Here is a quick lighthearted illustration of how we like to describe how we got here in the software IP space…
https
://
youtu.be/smU6mpS3jpkSlide16Slide17
Software PATENT ISSUES
Recent cases emphasize ever-changing role of software patentsFrom an in-house perspective, three main concerns:What is still patentable?What is still enforceable?How can we defend from cases brought against us?Issues:
Subject-matter eligibilityJoint infringement concernsFunctional claiming and indefiniteness
IP ASSETSSlide18
Software PATENT ISSUES
Considerations for New Patent Applications Is this the type of subject matter that is at least possible to obtain a patent on?Business processes that are simply implemented on a computer are the closest examples to a categorical exclusion, but even these should be analyzed to see if there is a possibility
Claiming strategy is more important than usualInclude numerous detailed dependent claimsIdentify the particular locations and relations between system componentsEmphasis the role of the computer in performing automatic functionsInclude specific algorithmsSpecifications should be drafted to contemplate rejections, challenges, and changes in the law
IP ASSETSSlide19
Software PATENT ISSUESConsiderations for
Existing Patent ApplicationsJust because it gets through the Patent Office does not mean it will withstand a post-issuance challengeConsider adding detailed dependent claims and/or filing a continuation with claims taking into accountConsiderations for Issued PatentsReviewing to determine how enforceable the claims are
Consider re-issue applications for any particularly important IP
IP ASSETSSlide20
Software PATENT ISSUESDefending Lawsuits with Section 101 Challenges
District CourtEarly Section 101 challenges based on Alice are becoming a powerful tool in disposing of cases at the 12(b) stageConsider adding factual support for a Section 101 challenge in an Answer, if a 12(b) is not filed, so that a 12(c) motion for judgment on the pleadings remains an option
IP ASSETSSlide21
Software PATENT ISSUESDefending Lawsuits with Section 101 Challenges
Patent OfficeCovered Business Method challenges are limited to financial-based patents, although the Board has been broadly interpreting this requirementPost-Grant Review is available for patents filed after the America Invents ActNo way to challenge Section 101 at the Patent Office for non-financial software patents that claim priority earlier than March 15, 2013.
Motions to stay in view of a pending CBM (or IPR) are frequently granted if the petition can be determinative of all patents-in-suit
IP ASSETSSlide22
Software PATENT ISSUES
A shift back to patenteesEnfish, LLC v. Microsoft Corp. (Fed. Cir. May 12, 2016)Only the second post-Alice
case to find a patent valid under Section 101 Concerns a method and system for storing data in a relational manner, without using separate logic tablesFederal Circuit held that the claims were directed to an improvement in computer technology, not an abstract ideaDistinguishing point is that the patent was clear that the “invention” was a new way of storing data in a relational way, which improved the functionality of the computerCompare to abstract ideas that are implemented with generic computers, but do not affect how the computer actually operates
IP ASSETSSlide23
Software PATENT ISSUES
Joint InfringementAffects many issued patentsFor patent holders, analyze method claims to determine any limitationsConsider reissue patents for valuable IPFile continuations if an application is still pending
This is purely an issue of claim drafting techniqueFor patent defendants, another powerful tool to challenge software patentsControl and direction cannot be met by simply instructing someone at arms-length to do something
Client/server claims can go either way—if client-side actions necessarily happen in response to a server-initiated trigger, not likely to be joint (
TQP
Dev. v. Intuit)Non-infringement position – no single entity is performing all the stepsClient/serverUser/userApplies to many early internet and networking patentsLaw was not clear for years, at least until Muniauction (local case) in 2008
IP ASSETSSlide24
Divided Infringement
Limelight Networks v. Akamai Techs. (2014)Methods of delivering content over internet
Limelight’s customers, not Limelight, perform certain “tagging” and “serving” stepsCustomers tag the content to be hosted and delivered, Limelight’s servers do the restSupreme Court examined the law of induced infringement when steps are not being performed by the same entity (joint infringement)Holding
: a single entity must perform each and every step of a method claim
SCOTUS cited Federal Circuit authority and implicitly invited the Circuit to overturn its prior decisions in
Muniauction and BMC if it wanted toInitially, on remand, a panel of the Federal Circuit declined to overrule its previous cases requiring a “single entity” to directly infringe, even if relying on inducementNo infringementSoftware PATENT ISSUES
IP ASSETSSlide25
Divided Infringement
Limelight Networks v. Akamai Techs. (Fed. Cir. 2015)
en banc Federal Circuit on remandReverses and finds infringement. Really?Opinion finds infringement under the facts of the case, but then goes on to define joint enterprise liability
“We conclude, on the facts of this case, that liability under § 271(a) can also be found when an alleged infringer
conditions participation in an activity or receipt of a benefit upon performance of a step or steps of a patented method
and establishes the manner or timing of that performance. Cf. Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 930 (2005)”Software PATENT ISSUES
IP ASSETSSlide26
Divided Infringement
Limelight Networks v. Akamai Techs. (Fed. Cir. 2015)
Terms of service agreements could be sufficient “control or direction” under new articulation of the testAvoid liability by limiting ToS?Only applies to direct infringement under Section 271(a)But indirect infringement is harder to
prove
when an alleged infringer conditions participation in an activity or receipt of a benefit upon performance of a step or steps of a patented method and establishes the manner or timing of that performance
“Limelight requires all of its customers to sign a standard contract. The contract delineates the steps customers must perform if they use the Limelight service. These steps include tagging and serving content.”Software PATENT ISSUES
IP ASSETSSlide27
Divided Infringement
Limelight Networks v. Akamai Techs. (Fed. Cir. 2015)
The Federal Circuit didnot stop there…A joint enterprise requires proof of four elements:(1) an agreement, express or implied, among the members of the group;(2) a common purpose to be carried out by the group;(3) a community of pecuniary interest in that purpose, among the members; and
(4) an equal right to a voice in the direction of the enterprise, which gives an equal right of control.
Software PATENT ISSUES
IP ASSETSSlide28
Software PATENT ISSUES
Consider other forms of protectionGraphical User Interface (GUI) design patents are becoming popularGUI designs protect the look and feel of an interface, and can even protect certain animated interfacesApple, Microsoft, Google, and Facebook are all filing GUI design patents in large volumesAbout 3 years to be examined due to popularity
Consider numerous embodiments
IP ASSETSSlide29
Patent Assertion
Entities / NPEs
IP THREATS
Non-competitive patent litigation
Targets end-users of technology
Seeking nuisance value settlements
Often in the form of:
Holding company that buys the patents from the open market
Spin-off of existing company involving the transfer of patent rights
Company that once practiced the patent but now focuses on licensing and monetization
Company that developed, but never practiced, the patentSlide30
Patent Assertion
Entities / NPEs
IP THREATS
Different types of entities
Practicing
Non-practicing “innovation” entities
Non-practicing, non-innovating entities
Non-practicing, but used to practice the patentSlide31
Patent Assertion
Entities / NPEs
IP THREATS
35
U.S.C
. § 271
whoever
without authority makes,
uses
, offers to sell, or sells any patented inventionSlide32
Patent Assertion
Entities / NPEs
IP THREATS
35
U.S.C
. § 274
Upon finding for the claimant the court shall award the claimant damages adequate to compensate for the infringement,
but in no event less than a reasonable royalty for the use
made of the invention by the infringerSlide33
Patent Assertion
Entities / NPEs
IP THREATS
Often software-based patents
Credit card processing – many encryption patents from 1990s
Web search functionality – database structure and traversal methods
Navigation menus
Store finder / map interfaces
Mobile apps – many PDA/GPS-based patents from era of
PalmPilots
and early feature phonesSlide34
Patent Assertion
Entities / NPEs
IP THREATS
Context-based advertising
Wi-Fi
Using
a scan-to-network
printer
Online shopping
cartSlide35
Copyright Assertion entities
IP THREATS
As patent troll filings decrease, many are seeing a rise in nuisance-value copyright assertion
Many brought by practicing companies
Feels like a “
gotcha
”
Strict liability and the availability of statutory damages makes this an attractive business model for plaintiffs
Often software-related, taking advantage of uncertainties in the law concerning infringement in the digital worldSlide36
Copyright Assertion entities
IP THREATS
Monotype
Font files
People usually associate fonts with trademarks
Fonts are typically not subject to copyright protection
BUT…font files are protectable as software
Leads to an absurd result – static images OK but not dynamic text?
Webpages and mobile appsSlide37
Copyright Assertion entities
IP THREATS
Freeplay
Music licensing company that advertises “royalty free” music
Free is not always free, even from a company with “Free” in its name…
Skip notice-and-takedown procedures, not shy of litigating
Easy to use robots to find musicSlide38
Copyright Assertion entities
IP THREATS
Live Face on Web
Dealing with past actions of vendors
Does in-line linking constitute “distribution” of a file?
Vicarious infringement for actions taken by independent contractors?
Focusing on small businesses with advertising liability coverage Slide39
Copyright ASSERTION ENTITIES
IP THREATS
Getty Images
The classic – Getty is everywhere
Typically a vendor issue
Searches go so deep as to find images used in
powerpoint
presentations linked to from a minor webpage
Takeaway – if you’re not sure about something, strip images from
powerpoints
before making them publicly availableSlide40
IDENTIFYING RELEVANT RESOURCES
IP THREATS
Off-the-shelf products
Cleanest indemnity claim
Uniform Commercial Code
Licensed products
No sale of goods – UCC implied warranties do not apply
Typically software and/or hardware provided as part of a service by the manufacturer
Custom developed products
Most difficult indemnity issue
Typically must determine if accused functionality was requested (part of the customization) or a routine underlying function that would be present in many different customized products from that providerSlide41
IDENTIFYING RELEVANT RESOURCES
IP THREATS
Licensed products
Must examine indemnity provisions in license
These provisions are becoming more and more limited as PAE/NPE litigation increases
Must examine indemnity provision in view of the patent claims
Many indemnity provisions exclude situations in which the licensed technology is
combined
with other technology
They often appear innocuous, but are typically a vehicle for denying indemnity claimsSlide42
IDENTIFYING RELEVANT RESOURCES
IP THREATS
Examining indemnity provisions
Does the provision limit liability to functionality that is “out of the box”?
Does the provision exclude claims that involve the licensed technology being “combined” with third-party systems and/or devices?
Examine the patent claim:
Does it recite limitations for internal infrastructure? E.g., a local area network, a database, etc.
Does it recite limitations for hardware components? E.g., a server computer, a mobile device, memory, etc.Slide43
IDENTIFYING RELEVANT RESOURCES
IP THREATS
Examining indemnity provisions
Examine the patent claim:
Does
a spreadsheet program require that you use it with financial data?
Does
the software vendor provide a database, or does that already exist?
Does
the software vendor provide a processor
?
NOTE: Indemnity claim could be denied by
vendors
that
make
and
sell
spreadsheet softwareSlide44
IDENTIFYING RELEVANT RESOURCES
IP THREATS
Claims brought by copyright assertion entities
More likely to be covered by insurance than patent claims
Often in the context of an independent contractor rendering services
May have common law claim absent a written indemnity provision
May already be licensed by a previous ownerSlide45
RESPONDING TO IP THREATS
IP THREATS
Licensing Demand Letters
Often vague, ambiguous
Sometimes detailed, with infringement charts
Direct filing of complaint
Notice pleading allows for vague and ambiguous averments – not difficult to survive 12(b)(6)
Plaintiff-friendly or “rocket docket” venues – E.D. Texas, C.D. Cal., D. Del.Slide46
RESPONDING TO IP THREATS
IP THREATS
Licensing Demand Letters
Allows
entity to establish knowledge of the patent
Can later file a complaint and aver willful infringement and indirect infringement
Often asking for nuisance value license demands that are often less expensive than a thorough investigation
Many letters are vague to avoid declaratory
judgments
Some entities have more bark than bite – see if they are likely to follow throughSlide47
RESPONDING TO IP THREATS
IP THREATS
Reviewing a License Demand
What technology is implicated?
What vendors (if any) provide the technology?
Hardware and/or software vendors
Service providers (developers)
Manufacturers (off-the-shelf products like routers)
How litigious is the entity?Slide48
RESPONDING TO IP THREATS
IP THREATS
Reviewing a License Demand
For patents:
Have the claims been challenged in court or in front of the Patent Office?
When do the patents expire (or are they expired)?
Have related patents been challenged or litigated?
For copyrights:
Are statutory damages available?
Ownership issues?Slide49
RESPONDING TO IP THREATS
IP THREATS
Reviewing a License Demand
Action items
:
(1) Make formal indemnity request to vendor/service provider implicated by claims
Beware: many agreements may have time limits and specified procedures for instituting notice
(2) Check insurance coverage
(3) Investigate entity and litigation history
(4) Investigate merits/scope of asserted claims in demand
(5) Choose response
Counteroffer
Request for more specific information
Present reasons of license / non-infringement
File Declaratory Judgment
Nothing???Slide50
RESPONDING TO IP THREATS
IP THREATS
One recent real-world example of a (non-lawyer) response*
*
as reported in:
http://arstechnica.com/tech-policy/2015/03/how-life360-won-its-patent-war
/Slide51
LITIGATING IP THREATS
Litigate to Trial/Litigate to License/Litigate to SettleSelecting the “test case”Building a reputationEconomies of joint defense groupsOpinions (negate willfulness, inducement issues, etc.)Motion to dismiss (101)PTAB
Petitions (IPR, CBM, PGR)ADR
IP THREATSSlide52
LITIGATING IP THREATS
IP THREATS
Direct to litigationNotice pleading allows for vague and ambiguous averments – not difficult for plaintiffs to survive 12(b)(6)
Other defendants can be a useful resource – get in touch with a joint defense group
Weigh cost of litigation against cost of settlement
If there is a good non-infringement position, may be beneficial to stay in the case and keep negotiatingConsider risk of becoming a target Joint defense group shares workloadSlide53
LITIGATING IP THREATS
IP THREATS
Direct to litigationMove to dismiss
For patents, 101 or indirect
For copyrights, if alleged acts do not amount to infringement
PTAB petitionsSlide54
CHANGING IP Litigation LANDSCAPE
Many different bills have been drafted and proposedMain issue: very difficult to draft a bill that is evenhanded and does not hinder incentives for technological development
Concerns:Fee shiftingSpecific pleading requirements
Protecting end-users
Excluding licensing entities from ITC litigation
Transparency in patent ownershipProviding FTC with ability to stop bad faith demand lettersTrade Secrets
IP THREATSSlide55
DTSA of 2016
IP THREATS
“(1) In General.—An owner of a trade secret that is misappropriated may bring a civil action under this subsection if the trade secret is related to a product or service used in, or intended for use in, interstate or foreign commerce.”
Extension of the
Economic Espionage Act of 1996Slide56
DTSA of 2016
IP THREATS
DTSA
definition of a trade secret:
Information
Reasonable measures taken to protect the information
Derives independent economic value from not being generally known
Information
includes: formula, pattern, compilation, program, device, method, technique, or process
Examples
: Plans, designs, negatives, computer software, customer lists, non-public financial information, cost and pricing information, manufacturing information, business opportunities, certain personnel info, etc.Slide57
DTSA of 2016
IP THREATS
Acquisition by a person with knowledge (or who should know) that it was acquired by
improper means
OR
Disclosure / use by a person without consent who:
Used
improper means
to acquire the trade secret
Knew or had reason to know that it was:
Derived from / through
improper means
Acquired under circumstance of secrecy or limited scope
Acquired from a person who had a duty of secrecy or limited scope
Before a change in position, knew or had reason to know it was
A trade secret, and
Knew it had been acquired by accident / mistakeSlide58
DTSA of 2016
IP THREATS
Includes
: theft, bribery, misrepresentation, breach or inducement of breach of a duty to maintain secrecy, or espionage
Doesn’t include
: reverse engineering, independent derivation, or any other lawful means of acquisitionSlide59
DTSA of 2016
IP THREATS
Only state law authorized trade secret lawsuits
Uniform Trade Secrets Act
Adopted on a state-by-state basis
Except New York and Massachusetts (common law)
1996 Economic Espionage Act
Criminal – economic espionage, trade secret theft
Civil – limited to injunctive relief for the Attorney GeneralSlide60
DTSA of 2016
IP THREATS
Big picture:
Provides federal civil cause of action
Detailed provisions:
Injunctive relief
Monetary damages
Remedies for misappropriation
Whistleblower immunity
Employer incentive to inform employees
Ex parte
seizure provision
More on this later
Administrative promises / plansSlide61
DTSA of 2016
IP THREATS
DTSA does not:
Unify
existing trade secret laws
Preempt existing state trade secret laws
Import into other intellectual property statutes
Interfere with Freedom of Information ActSlide62
DTSA of 2016
IP THREATS
No liability (criminal or civil) if:
Disclosure is made to government official, and solely for purpose of reporting / investigating suspected violation of law
Disclosure made in complaint / other legal proceeding document under seal
Anti-retaliation:
Employee who sues employer for retaliating against whistleblowing may disclose trade secret under seal
Employer cannot get special damages against employee if they did not notify employee of immunity rightsSlide63
DTSA of 2016
IP THREATS
Applicant submits affidavit / verified complaint
Only in “extraordinary circumstances”
Court order to seize property
That is necessary to prevent propagation / dissemination
No notice is provided to subject party
Subject party can fight it after the factSlide64
DTSA of 2016
IP THREATS
Injunctions / other equitable relief are inadequate
Immediate and irreparable injury
Harm to applicant > harm to party or third party
Applicant is likely to succeed in showing:
Info is trade secret, and
Party misappropriated it, or conspired to misappropriate
Party possesses trade secret, property to be seized
Specify manner and location of seizure
Party would destroy, move, hide, etc. if notified
Applicant has not publicized requested seizureSlide65
DTSA of 2016
IP THREATS
That seems like a high bar…
…how often will it happen?
…how often will applicants try for it?Slide66
DTSA of 2016
IP THREATS
Set forth findings of fact + conclusions of law
To be proved at subsequent hearing
Narrowest seizure, minimal interruption
“Special handling”
No access by applicant
No access by party
No copies
Guidance, scope of authority to law enforcement
Hours of execution
Whether force may be used to access locked areas
Set a date for hearing (no later than 7 days)
Require security from applicantSlide67
DTSA of 2016
IP THREATS
Applicant has burden of proof
To support findings of fact, conclusions of law
If fails, seizure dissolved / modified
Party may move court to dissolve / modify
First practical opportunity to fight seizure
Action for damage caused by wrongful seizure
Posted security does not limit recoverySlide68
DTSA of 2016
IP THREATS
Clearly Congress recognizes risks…
Section 6 of DTSA:
Within 2 years, Federal Judicial Center must develop
best practice for:
Seizure of information
Securing seized information and mediaSlide69
DTSA of 2016
IP THREATS
Injunctive relief
To prevent actual or threatened misappropriation
Cannot prevent a person from entering employment relationship
e.g., can’t stop former employee from working for “the other guy”
Damages
Actual loss, and
Unjust enrichment, or
Reasonable royalty for unauthorized disclosure
“Willful and malicious” misappropriation
Exemplary damages up to 2 times damages
Attorney’s fees (for bad faith at any stage)Slide70
DTSA of 2016
IP THREATS
Clock starts 3 years from discovery
Or when it should have been discovered
Continuing misappropriation = 1 misappropriation
Contrast with: copyright or patentSlide71
DTSA of 2016
IP THREATS
Now a predicate offense under RICO
USPTO Director must give bi-annual report
On trade secret thefts abroad, with recommendationsSlide72
DTSA of 2016
IP THREATS
Ubiquity
Employee hiring/firing
Business negotiations (NDAs)
Discussions of company business
Increase in
L
egal actions
Corporate conformance checks
Rewriting of employee contracts
Additional avenues of litigationSlide73
Thank you!
One Gateway Center
420 Ft. Duquesne Blvd, Suite
1200
(412) 471-8815Pittsburgh, PA 15222 www.webblaw.com