Upload
hunter-mccracken
View
217
Download
1
Tags:
Embed Size (px)
Citation preview
From Invention To Patent: From Invention To Patent: Protecting New and Innovative Protecting New and Innovative Business Ideas: The Importance Business Ideas: The Importance of Proper Management of Trade of Proper Management of Trade
Secrets and Patents Secrets and Patents
Guriqbal Singh JaiyaGuriqbal Singh JaiyaDirector, SMEs DivisionDirector, SMEs Division
WIPO WIPO ((www.wipo.int/smewww.wipo.int/sme))
Short Guides on IP for Business
• Published– Making a Mark (Trademarks)– Looking Good (Designs)– Inventing the Future (Patents) – Creative Expression (copyright)
• In the pipeline
– Trade Secrets
Flash Version
Useful Book
• Intellectual Property Management: A Guide for Scientists, Engineers, Financiers, and Managers
• By Claas Junghans and Adam Levy• © 2006 WILEY-VCH Verlag GmbH & Co. KGaA,
Weinheim, Germany• ISBN-13: 978-3-527-3186-3• ISBN-10: 3-527-31286-2• 170 pages
Key Message
By establishing a culture of identifying, cultivating and strategically using its IP assets, an enterprise can increase its revenue, have an edge over its competitors and position itself well in the market.
Ignoring IP altogether is in itself an IP strategy that may prove costly to the enterprise in the long-term.
Dr. Horst Fischer, Corporate Vice President, Siemens AG
“Any company wishing to prosper in the next millennium will also have to efficiently manage its IP portfolio”.“For this reason it has become essential that every manager in the enterprise - not just those working in the corporate legal department - appreciates and understands not only what IP is, but how it can be more effectively exploited."
What are IP Rights?• Industrial Property Rights
– Patents and Utility Models (or “short-term patents”)– Trademarks– Industrial Designs– Geographical Indications– Trade secrets– Topographies of integrated circuits
• Copyright and Related Rights
• New Varieties of Plants
• Non-original databases
Trade Secrets• Definition• Examples• Protection Strategies• Using; sharing (CA/NDA/NCA)• Licensing; strategic alliances;
partnerships• Audit• Competitive intelligence; espionage• Re-assess risk & value: Internal/external
Actual Vs Legal Trade Secrets
• Actual secrets: Trespass or theft
• Legal trade secrecy is not actual or absolute secrecy.
Definition: Identify Trade Secrets
Considerations in determining whether information is a trade secret:
• Whether known outside the company
• Whether widely known by employees and others involved with the company
• Have measures been taken to guard its secrecy/confidentiality
Identify Trade Secrets Contd...
• What is the value of the Information to your company?
• What is the potential value to your competitors?
• How much effort and/or money spent in collecting/developing it?
• How difficult would it be for others to acquire, collect or duplicate it?
Definition• Formula, pattern, device or compilation
of information, unknown to others, that gives competitive advantage
• Common law or statute
• Unlimited Duration / No registration
• Cost (of maintaining secrecy, security, ; surveillance, litigation)
• Reverse engineering; independent development
Examples
• Unpatented inventions
• Future product designs/models
• Valuable nonpublic company documents: Drawings, blueprints, laboratory notebooks, test data and training manuals
• Marketing, purchasing, planning and customer information
• Financial, accounting, recruiting and legal information
Examples Contd...
• Strategic plans
• Product concepts
• Financial reports
• Customer lists
• Employee files
• Engineering plans
• Production manuals
You may get a lot!
In a single misappropriation act a biotechnological trade secret may be obtained which represents:
• (1) the blueprint (DNA);
• (2) the machinery (expression system used)
• (3) the factory itself (host cell contining the recombinant DNA under control of the expression system)
Stealing may be Easy!
• Micro-organisms: vast numbers, microscopic size and self replicating!
• Italian subsidiary of a US pharmaceutical house dipped handkerchief into fermentation vat at his own retirement party!
Integrated Security Environment
• Identify key corporate assets/ “crown jewels”
• Integrate and Balance security components in interlocking layers to protect against perceived risk profile
• Communicate, train, and educate employees to distribute ownership of the security process throughout the employee (weakest Link)
• Monitor and Reassess to adapt to changing risk profile
Protection Strategies
• Identify Trade Secrets
• Develop Protection Policy; Document it
• Educate Employees; Monitor Compliance
• Restrict Access
• Mark Documents
• Physically Isolate and Protect
• Maintain Computer Secrecy
Protection Strategies Contd...• Restrict Public Access to Facilities• Deal Cautiously with Third Parties;
Confidentiality Agreements and Nondisclosure Agreements
• Be Careful and Consistent with Unsolicited Submissions
• Security/Trade Secret Audit; internal / external
• Coordination of integrated security enterprise-wide
Protection Policy
Advantages of a Written Policy
• Transparency
• Clarity (how to identify and protect)
• How to reveal (in house or to outsiders)
• Demonstrates commitment to protection; important in litigation
Educate Employees
• Prevents inadvertent disclosure; employment contract
• Unscrupulous employees (personal gain)
• Terminated employees (revenge)
• Former employee (inadvertent loss, hired by competitor, or becomes competitor)
• Educate and train (on hiring give copy of policy, periodic training and audit, exit interview, retirement); proactive role
Educate Employees Contd...
• Make known that disclosure of trade secret may result in termination and/or legal action
• Confidentiality agreements/non disclosure agreements/ Non compete agreements
• Transform every employee into a potential security officer; every employee must contribute to maintain the security environment
• Human and procedural security must be proactive; clear communication and repetition
Restrict Access
On a “Need to know basis”
Mark Documents
• Uniform system of marking documents
• Paper Based
• Electronic
Physically Isolate and Protect
• Separate locked depository; authorization
• Access control (third parties; unauthorized )
• Log of access; document reviewed or taken
• Surveillance of depository/company premises
• Shredding
• Oversight; audit trail
• Labs, green houses, test plots, etc
Maintain Computer Secrecy
• Authorization; access control• Mark confidential or secret; legend pop,
or before and after sensitive information• Physically isolate and lock: Computer
tapes, discs, other storage media• Remote access• E-mail; SMS messages• Oversight; audit rail
Restrict Public Access to Facilities
• Log and visitor’s pass to be worn all times• Accompany visitor; sometimes CA/NDA• Visible to anyone walking through a company’s
premises (type of machinery; layout; physical handing of work in progress or finished products)
• Overheard conversations• Documents left in plain view• Unattended waste baskets
Third Parties
• Sharing for exploitation
• Consultants, financial advisors, computer programmers/professionals, web site host, other independent professional, subcontractors, designers, partners, joint ventures
• Confidentiality agreement, Nondisclosure agreements
Unsolicited Submissions (US)
• Formulate procedures to handle US
• Notify (in writing) all persons submitting US disclosures that your company will not enter into a confidential relationship
• Requesting the submitter to sign an acknowledgement that your company is not obligated to use the US Information and owes no duty of confidentiality
IP Rights: Patents
• Definition: A patent is an exclusive legal right granted for an invention that is:– New (Novelty)
– Involves an inventive step (Non obvious)
– Capable of industrial application
• Duration: 20 years from filing/priority date• Territorial right• Requires disclosure/deposit of the invention/material• Can be licensed to third parties• Utility Models (or short-term patent): up to 10 years
IP Rights: Patents
• Patentable subject matter
• Exclusions
• Prior art/secret prior art
• Utility/best mode/trade secrets
• Depository institution
• Employee inventions
• Joint applicants/joint inventors/independent contractors/joint owners
Patents
• Why apply for patent protection? – Market exclusivity
– To recover R&D investments
– Facilitates licensing
– Advantageous negotiating tool
– Financing opportunities (venture capitalists, etc)
– Favorable image and credibility
– Freedom to operate
– Higher market value and publicity
– International expansion
Patents contd...
• First to file/first to invent: Laboratory books/Drawing
• Accelerated examination• Dependence and multi-patent products• Front page, description and drawings• Claims; technological density and claim
breadth/Route of filing/amendment of claims
Problem-Solution Approach
• Definition of closet prior art• Objective identification of technical problem• Examination, whether solution obvious from prior
artPatent Office may contrast closest prior art with technical effect of invention; definition of “objective problem to be solved” is different from problem defined in original applicationChoice of prior art affects whether obvious or not
Case study on patent protection
• Case study on the commercialization of a patented product– Croatian pharmaceutical company (Pliva) discovers new
antibiotic (azythromicin)– Pliva applies for patent protection in Croatia and in various
potential export markets– Large pharmaceutical multinational Pfizer searches patent
databases and discovers the Pliva patent– Pliva licenses Pfizer to produce the antibiotic in the US as
well as in some other countries in Western Europe while Pliva maintains the exclusive right to commercialize the antibiotic in Eastern Europe