From Invention To Patent: Protecting New and Innovative Business Ideas: The Importance of Proper...

Preview:

Citation preview

From Invention To Patent: From Invention To Patent: Protecting New and Innovative Protecting New and Innovative Business Ideas: The Importance Business Ideas: The Importance of Proper Management of Trade of Proper Management of Trade

Secrets and Patents Secrets and Patents

Guriqbal Singh JaiyaGuriqbal Singh JaiyaDirector, SMEs DivisionDirector, SMEs Division

WIPO WIPO ((www.wipo.int/smewww.wipo.int/sme))

Short Guides on IP for Business

• Published– Making a Mark (Trademarks)– Looking Good (Designs)– Inventing the Future (Patents) – Creative Expression (copyright)

• In the pipeline

– Trade Secrets

Flash Version

Useful Book

• Intellectual Property Management: A Guide for Scientists, Engineers, Financiers, and Managers

• By Claas Junghans and Adam Levy• © 2006 WILEY-VCH Verlag GmbH & Co. KGaA,

Weinheim, Germany• ISBN-13: 978-3-527-3186-3• ISBN-10: 3-527-31286-2• 170 pages

Key Message

By establishing a culture of identifying, cultivating and strategically using its IP assets, an enterprise can increase its revenue, have an edge over its competitors and position itself well in the market.

Ignoring IP altogether is in itself an IP strategy that may prove costly to the enterprise in the long-term.

Dr. Horst Fischer, Corporate Vice President, Siemens AG

“Any company wishing to prosper in the next millennium will also have to efficiently manage its IP portfolio”.“For this reason it has become essential that every manager in the enterprise - not just those working in the corporate legal department - appreciates and understands not only what IP is, but how it can be more effectively exploited."

What are IP Rights?• Industrial Property Rights

– Patents and Utility Models (or “short-term patents”)– Trademarks– Industrial Designs– Geographical Indications– Trade secrets– Topographies of integrated circuits

• Copyright and Related Rights

• New Varieties of Plants

• Non-original databases

Trade Secrets• Definition• Examples• Protection Strategies• Using; sharing (CA/NDA/NCA)• Licensing; strategic alliances;

partnerships• Audit• Competitive intelligence; espionage• Re-assess risk & value: Internal/external

Actual Vs Legal Trade Secrets

• Actual secrets: Trespass or theft

• Legal trade secrecy is not actual or absolute secrecy.

Definition: Identify Trade Secrets

Considerations in determining whether information is a trade secret:

• Whether known outside the company

• Whether widely known by employees and others involved with the company

• Have measures been taken to guard its secrecy/confidentiality

Identify Trade Secrets Contd...

• What is the value of the Information to your company?

• What is the potential value to your competitors?

• How much effort and/or money spent in collecting/developing it?

• How difficult would it be for others to acquire, collect or duplicate it?

Definition• Formula, pattern, device or compilation

of information, unknown to others, that gives competitive advantage

• Common law or statute

• Unlimited Duration / No registration

• Cost (of maintaining secrecy, security, ; surveillance, litigation)

• Reverse engineering; independent development

Examples

• Unpatented inventions

• Future product designs/models

• Valuable nonpublic company documents: Drawings, blueprints, laboratory notebooks, test data and training manuals

• Marketing, purchasing, planning and customer information

• Financial, accounting, recruiting and legal information

Examples Contd...

• Strategic plans

• Product concepts

• Financial reports

• Customer lists

• Employee files

• Engineering plans

• Production manuals

You may get a lot!

In a single misappropriation act a biotechnological trade secret may be obtained which represents:

• (1) the blueprint (DNA);

• (2) the machinery (expression system used)

• (3) the factory itself (host cell contining the recombinant DNA under control of the expression system)

Stealing may be Easy!

• Micro-organisms: vast numbers, microscopic size and self replicating!

• Italian subsidiary of a US pharmaceutical house dipped handkerchief into fermentation vat at his own retirement party!

Integrated Security Environment

• Identify key corporate assets/ “crown jewels”

• Integrate and Balance security components in interlocking layers to protect against perceived risk profile

• Communicate, train, and educate employees to distribute ownership of the security process throughout the employee (weakest Link)

• Monitor and Reassess to adapt to changing risk profile

Protection Strategies

• Identify Trade Secrets

• Develop Protection Policy; Document it

• Educate Employees; Monitor Compliance

• Restrict Access

• Mark Documents

• Physically Isolate and Protect

• Maintain Computer Secrecy

Protection Strategies Contd...• Restrict Public Access to Facilities• Deal Cautiously with Third Parties;

Confidentiality Agreements and Nondisclosure Agreements

• Be Careful and Consistent with Unsolicited Submissions

• Security/Trade Secret Audit; internal / external

• Coordination of integrated security enterprise-wide

Protection Policy

Advantages of a Written Policy

• Transparency

• Clarity (how to identify and protect)

• How to reveal (in house or to outsiders)

• Demonstrates commitment to protection; important in litigation

Educate Employees

• Prevents inadvertent disclosure; employment contract

• Unscrupulous employees (personal gain)

• Terminated employees (revenge)

• Former employee (inadvertent loss, hired by competitor, or becomes competitor)

• Educate and train (on hiring give copy of policy, periodic training and audit, exit interview, retirement); proactive role

Educate Employees Contd...

• Make known that disclosure of trade secret may result in termination and/or legal action

• Confidentiality agreements/non disclosure agreements/ Non compete agreements

• Transform every employee into a potential security officer; every employee must contribute to maintain the security environment

• Human and procedural security must be proactive; clear communication and repetition

Restrict Access

On a “Need to know basis”

Mark Documents

• Uniform system of marking documents

• Paper Based

• Electronic

Physically Isolate and Protect

• Separate locked depository; authorization

• Access control (third parties; unauthorized )

• Log of access; document reviewed or taken

• Surveillance of depository/company premises

• Shredding

• Oversight; audit trail

• Labs, green houses, test plots, etc

Maintain Computer Secrecy

• Authorization; access control• Mark confidential or secret; legend pop,

or before and after sensitive information• Physically isolate and lock: Computer

tapes, discs, other storage media• Remote access• E-mail; SMS messages• Oversight; audit rail

Restrict Public Access to Facilities

• Log and visitor’s pass to be worn all times• Accompany visitor; sometimes CA/NDA• Visible to anyone walking through a company’s

premises (type of machinery; layout; physical handing of work in progress or finished products)

• Overheard conversations• Documents left in plain view• Unattended waste baskets

Third Parties

• Sharing for exploitation

• Consultants, financial advisors, computer programmers/professionals, web site host, other independent professional, subcontractors, designers, partners, joint ventures

• Confidentiality agreement, Nondisclosure agreements

Unsolicited Submissions (US)

• Formulate procedures to handle US

• Notify (in writing) all persons submitting US disclosures that your company will not enter into a confidential relationship

• Requesting the submitter to sign an acknowledgement that your company is not obligated to use the US Information and owes no duty of confidentiality

IP Rights: Patents

• Definition: A patent is an exclusive legal right granted for an invention that is:– New (Novelty)

– Involves an inventive step (Non obvious)

– Capable of industrial application

• Duration: 20 years from filing/priority date• Territorial right• Requires disclosure/deposit of the invention/material• Can be licensed to third parties• Utility Models (or short-term patent): up to 10 years

IP Rights: Patents

• Patentable subject matter

• Exclusions

• Prior art/secret prior art

• Utility/best mode/trade secrets

• Depository institution

• Employee inventions

• Joint applicants/joint inventors/independent contractors/joint owners

Patents

• Why apply for patent protection? – Market exclusivity

– To recover R&D investments

– Facilitates licensing

– Advantageous negotiating tool

– Financing opportunities (venture capitalists, etc)

– Favorable image and credibility

– Freedom to operate

– Higher market value and publicity

– International expansion

Patents contd...

• First to file/first to invent: Laboratory books/Drawing

• Accelerated examination• Dependence and multi-patent products• Front page, description and drawings• Claims; technological density and claim

breadth/Route of filing/amendment of claims

Problem-Solution Approach

• Definition of closet prior art• Objective identification of technical problem• Examination, whether solution obvious from prior

artPatent Office may contrast closest prior art with technical effect of invention; definition of “objective problem to be solved” is different from problem defined in original applicationChoice of prior art affects whether obvious or not

Case study on patent protection

• Case study on the commercialization of a patented product– Croatian pharmaceutical company (Pliva) discovers new

antibiotic (azythromicin)– Pliva applies for patent protection in Croatia and in various

potential export markets– Large pharmaceutical multinational Pfizer searches patent

databases and discovers the Pliva patent– Pliva licenses Pfizer to produce the antibiotic in the US as

well as in some other countries in Western Europe while Pliva maintains the exclusive right to commercialize the antibiotic in Eastern Europe

Recommended