Tag Archives: business

Supreme Court Allows Congress to Take Works Out of the Public Domain

It is now necessary to check copyright status of foreign origin works in order to avoid copyright infringement. Many works that were free to use are now back in copyright. In a January 18, 2012 decision1, the Supreme Court upheld a law, the URAA2, that takes many foreign origin works out of the public domain. The law restores copyrights in the United States on all works that were still in copyright in their countries of origin as of January 1, 1996. The law is the United States’ implementation of a section of a treaty3 that seeks to equalize international recognition of copyrights among 162 countries.

Classic movies that were formerly in the public domain include Metropolis (1927), Things to Come (1936) from the H.G. Wells novel, and The Third Man (1949). They are now back in copyright. The music of Igor Stravinsky which had formerly been in the public domain is now in copyright in the United States.

The Court, in effect, said that the Constitution gave Congress the right to do pretty much as it pleases with respect to copyright law. The petitioners, people and entities, had been using works that were in the public domain. The decision has left them with a situation in which they must abandon investments in enterprises which were perfectly legitimate expressions of First Amendment speech. The lower court had found that, “Congress could have complied with the Convention without interfering with Plaintiffs’ protected speech.” Many in the legal community feel that the Supreme Court allowed Congress to exceed its Constitutional authority. Apparently, ideology played no part in the result. The opinion was written by Ginsburg and joined in by Scalia. The dissent was written by Breyer and joined in by Alito.

Exercise caution. We do not yet know how intense the avalanche of copyright infringement suits will be.

1. Golan v. Holder, Case No. 10–545, January 18, 2012, 565 U.S. ___ (2012)

2. Uruguay Round Agreements Act (URAA), 17 U.S.C. 104A (1994), URAA §514

3. Berne Convention for the Protection of Literary and Artistic Works, September 9, 1886, as last revised at Paris on July 24, 1971, 1161 U.N.T.S. 30

 

Advertisements

For Non-IP Attorneys: Intellectual Property Assets in Businesses and Estates – a program by Continuum Law on January 9, 2012 in the San Diego County Law Library series

Monday, January 9, 2012 from 12:00 PM to 1:00 PM  Downtown at Esquire Solutions 402 West Broadway 16th Floor, Emerald Plaza San Diego Register http://mcleunappreciated2011jan09-eorg.eventbrite.com/

About the Program

Recognition of IP is an often overlooked tool in business, estate, divorce, and accounting practices. IP goes well beyond the realm of patents, trademarks, and copyrights. Recognition of IP provides a new dimension for transactions, property division, and estate planning when the traditional valuation measures of cash flow, comparables, or replacement cost are not available. 1 hour General Participatory credit

About the Speaker

Robert Cogan is Principal Attorney at Continuum Law in San Diego. In the course of his extensive experience, he has had responsibility for the worldwide patent, trademark, and copyright portfolios of public companies and for protecting rights of software companies. He also works with individual artists in visual arts, web design, and music. Mr. Cogan received his law degree from the George Washington University National Law Center.

SBIR Reauthorization Agreement Finally Reached by Congressional Committees

The Small Business Innovation Research (SBIR) program has been reauthorized for six years.  The program had been hanging on through several short term continuing resolutions.  The Senate and the House Armed Services Committees announced that they have agreed on a long-term reauthorization of the SBIR program during conference negotiations on the Fiscal Year 2012 National Defense Authorization Act (NDAA).  President Obama is prepared to sign the bill when it reaches his desk.

Award amounts will be increased.  Small businesses will face less uncertainty because the reauthorization requires most agencies to complete their review process for applicants within 90 days.

Funding increases from 2.5% to 3.2% of each agency’s extramural research budget for the SBIR program and from 0.3% to 0.45% over the course of reauthorization for the Small Business Technology Transfer (STTR) program. Contract amounts are increased from $100,000 to $150,000 for Phase I awards and from $750,000 to $1 million for Phase II awards.  Performance-based standards are introduced to encourage companies to focus on commercialization through Phase III.

A compromise has been reached which allows venture backed companies to participate in 25% of awards for NIH, DOE, and NSF and 15% of awards for other federal agencies.

A number of our high tech and life sciences clients have been able to launch new product lines through SBIR grants.  The reauthorization should maintain the vitality of the program.

Stopping the Copy, Scram, and Compete Employee

(Protecting Your Digital Information Using the Federal Computer Fraud and Abuse Act)

The News

 Legal protection for sensitive computer files has been strengthened by a new decision from the Ninth Circuit Federal Court of Appeals.1

 The Risk

 Imagine this scenario: Your computer programmer remotely downloaded sensitive files before dawn. On arriving at the office, the programmer resigned without notice. The Navy awarded you a desirable contract because those sensitive files provided you with a unique capability. Now you find out that the programmer will be consulting for a competitor who wants to take the place of your company when the contract is up for renewal. What can you do? What could you have done to discourage or prevent this?

 Trade Secret Law Protections

 There are many deterrents and remedies available under trade secret law. A trade secret owner can seek money damages and can often seek an injunction to prevent use of the trade secret by others. Requirements for making out a case can include showing that the material taken was in fact confidential, it provided some business advantage, and that the owner took all proper steps to protect the information. Requirements are simpler if a company can seek recovery based on the elements of an employee’s unauthorized taking or damaging of sensitive data after gaining authorized entry into the computer. Federal law provides for recovery based on these elements.

 The Computer Fraud and Abuse Act

 One of the most effective tools in dealing with the risk described above is the Computer Fraud and Abuse Act2 (CFAA). The CFAA permits civil suits for access to a computer followed by an unauthorized damaging action. The CFAA is also a criminal statute that defines a number of different computer crimes.

 Even if a valid password is used to gain access to a computer, taking damaging action in excess of a user’s authorization is forbidden. Unauthorized actions include obtaining information “fraudulently” or damaging a computer or computer data. Taking data for the employee’s own purposes and to the detriment of the computer owner is “fraudulent.”

 Until this year there had been some doubt as to whether a violation could be made out if a user entered a computer with a valid password. This year, the Ninth Circuit Court of Appeals, which covers California and a number of other states, interpreted the CFAA to put this doubt to rest. A password provides authorization for a user to enter a computer. However, it does not allow a user to do anything he or she wishes once access has been gained. An employee “exceeds authorized access” by violating the employer’s rules governing conduct after gaining access to the computer by, e.g., stealing or damaging files.

 Setting the Limits of Authorization

 Authorization must be defined. Otherwise, it cannot be exceeded.

 To be protected, an employer must have published a computer access policy, e.g., in the employee manual, which defines conditions for entry into a computer and which limits actions that may be taken once conditions for entry have been met. Employees must be aware of the policy.

 An employer can provide copies to employees, and have employees acknowledge in writing that they have received and understand the policy. Some employees may feel like they are being treated like suspicious characters. However, a policy need not create an adverse relationship. The policy can be presented as a tool for working with employees as trusted team members who are being provided with clear computer use standards. The rules protect the company’s business and the employees’ jobs.

 The policy should be tailored to the company’s business. Some companies will need to allow remote access by many employees and perhaps by many customers. Other companies may need to have servers with very rigorous controls. One example of a computer use standard is, “Employees are not authorized to download any Company data onto any computer or memory media not owned by the company.”

 Establishing clear boundaries on authorization simplifies understanding the boundaries of authorized access.

 Conclusion

 Many cases of unauthorized access have been detected. Ignoring this issue could be costly. However, the cost of working with counsel to establish an internal system for establishing protection under the CFAA is small, especially compared to the value of programs and data which may form the entire basis for a company’s revenue. It is up to an employer to take appropriate steps to ensure protection under the CFAA.

1. United States v. Nosal, 642 F.3d 781 (9th Cir. 2011)

2. 18 U.S.C. § 1030

Faster Payment for Small Prime Contractors Under New White House Policy

The White House has announced a new policy to improve the business climate for contractors that are small businesses. Agency heads are directed to begin paying invoices of prime contractors that are small businesses within 15 days. 

An Office of Management and Budget (OMB) Memo of September 14, 2011 informs heads of government agencies that accelerated payment is necessary to provide small businesses with a more predictable stream of resources. This will work to preserve and increase small business participation in Federal contracting, benefitting both the Federal agencies and taxpayers.

Agencies must inform OMB by November 1, 2011 of their implementation schedules. Asking when the respective agency will begin accelerating payment may be a diplomatic way to make sure your contracting officer is aware of the new policy.