Tag Archives: intellectual property

Supreme Court Allows Congress to Take Works Out of the Public Domain

It is now necessary to check copyright status of foreign origin works in order to avoid copyright infringement. Many works that were free to use are now back in copyright. In a January 18, 2012 decision1, the Supreme Court upheld a law, the URAA2, that takes many foreign origin works out of the public domain. The law restores copyrights in the United States on all works that were still in copyright in their countries of origin as of January 1, 1996. The law is the United States’ implementation of a section of a treaty3 that seeks to equalize international recognition of copyrights among 162 countries.

Classic movies that were formerly in the public domain include Metropolis (1927), Things to Come (1936) from the H.G. Wells novel, and The Third Man (1949). They are now back in copyright. The music of Igor Stravinsky which had formerly been in the public domain is now in copyright in the United States.

The Court, in effect, said that the Constitution gave Congress the right to do pretty much as it pleases with respect to copyright law. The petitioners, people and entities, had been using works that were in the public domain. The decision has left them with a situation in which they must abandon investments in enterprises which were perfectly legitimate expressions of First Amendment speech. The lower court had found that, “Congress could have complied with the Convention without interfering with Plaintiffs’ protected speech.” Many in the legal community feel that the Supreme Court allowed Congress to exceed its Constitutional authority. Apparently, ideology played no part in the result. The opinion was written by Ginsburg and joined in by Scalia. The dissent was written by Breyer and joined in by Alito.

Exercise caution. We do not yet know how intense the avalanche of copyright infringement suits will be.

1. Golan v. Holder, Case No. 10–545, January 18, 2012, 565 U.S. ___ (2012)

2. Uruguay Round Agreements Act (URAA), 17 U.S.C. 104A (1994), URAA §514

3. Berne Convention for the Protection of Literary and Artistic Works, September 9, 1886, as last revised at Paris on July 24, 1971, 1161 U.N.T.S. 30

 

Advertisements

For Non-IP Attorneys: Intellectual Property Assets in Businesses and Estates – a program by Continuum Law on January 9, 2012 in the San Diego County Law Library series

Monday, January 9, 2012 from 12:00 PM to 1:00 PM  Downtown at Esquire Solutions 402 West Broadway 16th Floor, Emerald Plaza San Diego Register http://mcleunappreciated2011jan09-eorg.eventbrite.com/

About the Program

Recognition of IP is an often overlooked tool in business, estate, divorce, and accounting practices. IP goes well beyond the realm of patents, trademarks, and copyrights. Recognition of IP provides a new dimension for transactions, property division, and estate planning when the traditional valuation measures of cash flow, comparables, or replacement cost are not available. 1 hour General Participatory credit

About the Speaker

Robert Cogan is Principal Attorney at Continuum Law in San Diego. In the course of his extensive experience, he has had responsibility for the worldwide patent, trademark, and copyright portfolios of public companies and for protecting rights of software companies. He also works with individual artists in visual arts, web design, and music. Mr. Cogan received his law degree from the George Washington University National Law Center.

Copyright in the Arts – a program by Continuum Law on December 2, 2011 in the San Diego County Law Library series.

REGISTER

Friday, December 2, 2011 from 12:00 PM to 1:00 PM At Procopio Cory, 525 B Street, Suite 2200. San Diego, CA. Non-attorneys are welcome.

This course will enable the non-copyright specialist to better understand what copyrights are and what copyrights can do for clients in the arts. It will address the strategic advantage of copyright registration, exploiting different rights in one work, and how to make agreements so that both creators and buyers will know who will own what. 1 hour General Participatory MCLE credit.

About the Speaker: Robert Cogan is Principal Attorney at Continuum Law in San Diego. In the course of his extensive experience, he has had responsibility for the worldwide patent, trademark, and copyright portfolios of public companies and for protecting rights of software companies. He also works with individual artists in visual arts, web design, and music. Mr. Cogan received his law degree from the George Washington University National Law Center.

Stopping the Copy, Scram, and Compete Employee

(Protecting Your Digital Information Using the Federal Computer Fraud and Abuse Act)

The News

 Legal protection for sensitive computer files has been strengthened by a new decision from the Ninth Circuit Federal Court of Appeals.1

 The Risk

 Imagine this scenario: Your computer programmer remotely downloaded sensitive files before dawn. On arriving at the office, the programmer resigned without notice. The Navy awarded you a desirable contract because those sensitive files provided you with a unique capability. Now you find out that the programmer will be consulting for a competitor who wants to take the place of your company when the contract is up for renewal. What can you do? What could you have done to discourage or prevent this?

 Trade Secret Law Protections

 There are many deterrents and remedies available under trade secret law. A trade secret owner can seek money damages and can often seek an injunction to prevent use of the trade secret by others. Requirements for making out a case can include showing that the material taken was in fact confidential, it provided some business advantage, and that the owner took all proper steps to protect the information. Requirements are simpler if a company can seek recovery based on the elements of an employee’s unauthorized taking or damaging of sensitive data after gaining authorized entry into the computer. Federal law provides for recovery based on these elements.

 The Computer Fraud and Abuse Act

 One of the most effective tools in dealing with the risk described above is the Computer Fraud and Abuse Act2 (CFAA). The CFAA permits civil suits for access to a computer followed by an unauthorized damaging action. The CFAA is also a criminal statute that defines a number of different computer crimes.

 Even if a valid password is used to gain access to a computer, taking damaging action in excess of a user’s authorization is forbidden. Unauthorized actions include obtaining information “fraudulently” or damaging a computer or computer data. Taking data for the employee’s own purposes and to the detriment of the computer owner is “fraudulent.”

 Until this year there had been some doubt as to whether a violation could be made out if a user entered a computer with a valid password. This year, the Ninth Circuit Court of Appeals, which covers California and a number of other states, interpreted the CFAA to put this doubt to rest. A password provides authorization for a user to enter a computer. However, it does not allow a user to do anything he or she wishes once access has been gained. An employee “exceeds authorized access” by violating the employer’s rules governing conduct after gaining access to the computer by, e.g., stealing or damaging files.

 Setting the Limits of Authorization

 Authorization must be defined. Otherwise, it cannot be exceeded.

 To be protected, an employer must have published a computer access policy, e.g., in the employee manual, which defines conditions for entry into a computer and which limits actions that may be taken once conditions for entry have been met. Employees must be aware of the policy.

 An employer can provide copies to employees, and have employees acknowledge in writing that they have received and understand the policy. Some employees may feel like they are being treated like suspicious characters. However, a policy need not create an adverse relationship. The policy can be presented as a tool for working with employees as trusted team members who are being provided with clear computer use standards. The rules protect the company’s business and the employees’ jobs.

 The policy should be tailored to the company’s business. Some companies will need to allow remote access by many employees and perhaps by many customers. Other companies may need to have servers with very rigorous controls. One example of a computer use standard is, “Employees are not authorized to download any Company data onto any computer or memory media not owned by the company.”

 Establishing clear boundaries on authorization simplifies understanding the boundaries of authorized access.

 Conclusion

 Many cases of unauthorized access have been detected. Ignoring this issue could be costly. However, the cost of working with counsel to establish an internal system for establishing protection under the CFAA is small, especially compared to the value of programs and data which may form the entire basis for a company’s revenue. It is up to an employer to take appropriate steps to ensure protection under the CFAA.

1. United States v. Nosal, 642 F.3d 781 (9th Cir. 2011)

2. 18 U.S.C. § 1030

A Practical Response to the New Patent Law for Small to Mid-Sized Companies

Companies and inventors will have to develop new systems for tracking their newly developed products and methods and for documenting them to the Patent Office. On September 16, 2011, the “America Invents Act” became our patent law. The system that, since the Patent Act of 1839, had allowed U.S. inventors great flexibility in publishing technical data and selling products before they had to file a patent application was swept away.

Small to mid-sized companies can respond to the change in the patent regime to maintain their intellectual property rights competitive position by using new strategies in preparing and filing provisional patent applications.

Novelty of an invention is a requirement for patentability under both the old and new laws. However, the definition of novelty is now quite different. Under the old law, an invention did not cease to be novel until one year after the invention was offered for sale, published by the inventor, published by someone else independently, or publicly used. This one year term was referred to as the “grace period.”

The grace period has been largely eliminated by the new law. An invention may still be novel if an inventor makes a public disclosure before filing a patent application. Rules relating to the effect on novelty of publications by others or of sales by the inventor prior to filing a patent application are not crystal clear. It will probably take the courts several years to formulate clear, consistent rules. However, if an inventor files a patent application first, the publication or the sale does not affect patentability.

It is prohibitively expensive and impractical to file a non-provisional patent application on each invention before its potential is known. Fortunately, it is not necessary. The patent law permits filing of provisional patent applications. These documents do not have formal requirements. The filing fee is low. It will be about $125.00 for a small company or individual after the Patent Office adds its new surcharge to current fees.

Provisional applications must disclose the subject matter for which the inventor desires to establish a filing date. This can usually achieved by preparing the provisional patent application as a technical paper. The inventor can write this paper in order to minimize costs. However, it is very important to consult technically qualified counsel. Inventors are often so knowledgeable that they will skip steps in the description. They can also make assumptions that need to be spelled out in a description. If details are left out, the entire purpose of the provisional patent application can be defeated.

Many strategies for cost-effective use of provisional patent applications can be developed. For example, more than one invention may be included in one provisional application. A whole system may be described, and it will not be necessary to separate descriptions of interrelated inventions in the system. Updated versions of provisional applications may be filed periodically.

While the ability to file freely may remain a dream for those who are not IBM or Microsoft, wise use of provisional patent applications will keep small to mid-sized companies in the game.