Intellectual Property Bulletin - Summer 2013

SOPA Didn’t Die. It Just Became Soft SOPA.

Rader’s Olive Branch: Ultramercial II Resolves the Judicial Deadlock of CLS Bank

Quick Updates

Nash Bargaining Solution and Patent Damages: A 50 Percent “Rule of Thumb”

Federal Circuit Holds That Failure to Abide by NDA Confidentiality Designation Provisions Can Preclude Trade Secret Protection

ICANN Set to Launch New Generic Top-Level Domains: Understanding the Nuts and Bolts

Electronic Transfer of Copyright Approved by Fourth Circuit

SOPA Didn’t Die. It Just Became Soft SOPA.

BY ANDREW P. BRIDGES

January 2012 saw an explosion of controversy over two Internet-related bills that had been progressing through Congress: the Stop Online Piracy Act (SOPA) in the House, and the Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (PROTECT-IP, further shortened to PIPA) in the Senate. While these bills ultimately were not enacted, some of their disconcerting features appear to be arising once again via enforcement efforts of the executive branch.

The SOPA-PIPA combination was the culmination of several years’ worth of efforts by a coalition of intellectual property enforcers to beef up enforcement remedies against alleged Internet-based infringements. An earlier effort was the Combating Online Infringement and Counterfeits Act (COICA), which Senator Patrick Leahy introduced in 2010, but which died because of persistent opposition by Senator Ron Wyden. The new legislation, introduced in 2011, sought primarily to create new enforcement mechanisms and remedies against owners of websites accused of involvement in copyright and trademark infringement. Backers defined its targets as “foreign rogue websites,” supposedly beyond the reach of normal U.S. enforcement activities. (In fact, the definition of “foreign rogue websites” excluded sites such as Sweden’s Pirate Bay, which had never been brought to court in the U.S., while including foreign companies that had appeared in the U.S. to defend litigation.)

To reach these “rogue websites,” the legislation aimed as follows:

  1. To require Internet service providers to take measures to prevent their U.S. customers from reaching the websites by interfering with the domain name resolution process;
  2. To require advertising networks to cut off advertising revenue of the websites by excluding them from advertising networks; and
  3. To require payment processing companies to stop payment processing for merchants operating the websites.

In addition, the legislation added another, broader enforcement provision, namely, to raise to a felony the crime of unlawful public performance of copyrighted works.

The legislation had widespread, bipartisan support in Congress. PROTECT-IP had 42 sponsors (out of 100 senators); SOPA had 32 sponsors at its introduction, with more expressions of support. Moreover, the backers of the legislation published a very long list of organizations and companies that had expressed their support, including the Council of Better Business Bureaus, National League of Cities, U.S. Conference of Mayors, and American Bankers Association. The Motion Picture Association of America and the United States Chamber of Commerce were the most vocal champions of the legislation, often taking a lead role in arguing for its passage.

Public opposition to these bills from many quarters grew steadily at the end of 2011. In November 2011, on the date that the House Judiciary Committee held hearings on SOPA, a group of civil society groups, along with community-based Internet technology and service giants Mozilla and Wikipedia, proclaimed “American Censorship Day” as an event to launch broad public education and opposition to the bills. A group of prominent technology and Internet companies wrote Congress about their opposition to the legislation. A groundswell of opposition grew throughout November and December 2011.

In early January 2012 a wide variety of public interest groups and Internet-focused companies beat the drum loudly in protest of different aspects of the laws. Security technology officials delivered strong criticism of the domain-name measures of the legislation as undermining key security protocols. Others blasted overenforcement of intellectual property laws and the lack of due process in provisions. Yet others questioned the need for “foreign rogue website” legislation in light of many successful enforcement efforts against foreign websites under existing law. On January 14, 2012, the White House, in response to a petition, stated its objection to the legislation in its then-current form. It said: “We will not support legislation that reduces freedom of expression, increases cybersecurity risk, or undermines the dynamic, innovative global Internet.”

Even Justin Bieber had weighed in against related legislation (a bill by Senator Klobuchar, which SOPA picked up as a provision) that would elevate streaming violations to a felony. Pundits noted that Bieber’s career started with YouTube videos of him singing Michael Jackson songs. The proposed five-year felony punishment that Bieber have might received for streaming Michael Jackson songs was a year longer than the sentence Jackson’s doctor received when convicted of involuntary manslaughter in the singer’s death.

A group of major public interest groups and websites, including Mozilla, Reddit, and Wikipedia, coordinated an Internet “blackout” day to protest the legislation. On January 18, 2012, Wikipedia went “dark” and more than 100,000 other websites joined in, either by going dark or by featuring a protest on their front pages. Many websites used their front pages to instruct their users on how to contact their senators and members of Congress. Over 10 million voters contacted their members of Congress or signed petitions. I was on Capitol Hill that day and saw staffers throughout the Capitol looking shell-shocked at the extraordinary outpouring of protest calls and messages they received. They had not seen it coming.

Soon after the Internet blackout and the crush of public calls and emails to Congress, many members of Congress had a change of heart. Within one week of the blackout, nine senators and eight representatives formally withdrew their sponsorships of the respective bills; others who had expressed support started distancing themselves from the legislation. The defections appeared to come from both ends of the political spectrum, with the persistent residual support coming from the political establishment at the middle of both parties. The week after the protest, the Republican leadership in the House recognized the split in its own ranks over SOPA and sent word out that it would not bring the bill to a vote; the Senate cancelled a cloture vote on PROTECT-IP.

The public had risen up, a new political force appeared to have coalesced, and SOPA and PROTECT-IP reportedly became “toxic” issues for elected officials. Those who had opposed the legislation celebrated their “victory.” They resolved to be on the ready to rise up again on similar occasions in the future.

Or so it seemed. It turns out that most of SOPA is now in effect as a practical matter, and the Obama administration has called to resurrect another provision of it.

Back in 2008, previous legislation, the “Prioritizing Resources and Organization for Intellectual Property Act” (the “PRO-IP Act”) had established in the White House the Office of the U.S. Intellectual Property Enforcement Coordinator (IPEC), whose role was to be primarily responsible for developing and implementing a Joint Strategic Plan against counterfeiting and piracy and to serve as a principal advisor to the President on domestic and international intellectual property enforcement policy.

At the same time that the SOPA and PIPA legislation was emerging, IPEC had set in motion a “voluntary cooperation initiative” to call on a variety of stakeholders, including domain name registrars, Internet service providers, search engines, and payment processors—the very same “intermediary” targets of the SOPA and PIPA bills—to join together to combat infringement by denying service to sites accused of infringing activity.

After the failure of SOPA and PIPA, however, IPEC’s “voluntary cooperation initiative” became more important and rose in prominence. On May 9, 2012, at a Senate Judiciary Committee hearing to oversee the work of IPEC, sponsors of the failed legislation expressed frustration at the failure. IPEC responded by stressing the “voluntary” processes that had been coming into place. The Coordinator stated: “Since this strategy was issued, I have engaged with Internet service providers, credit card companies, domain name registrars, online advertisers, and others on a voluntary, non-regulatory approach to reduce infringement. We need to quarantine the bad actors and make the business of infringement as difficult as possible.” The industries she identified were the very ones at the center of the SOPA and PIPA debate.

One concern about such voluntary programs is that they urge enforcement and remedies without any judicial determinations, applying extra-legal standards. A “quarantine” is another word for a “boycott,” and the determination of who is a “bad actor” is more suited to a court than to an informal inter-industry understanding.

In the past two years, we have observed reports about a variety of aspects of the “voluntary” cooperation initiative. In particular:

  1. In July 2011 the White House announced a “memorandum of understanding” among major copyright companies and certain Internet service providers to create a “Copyright Alert System” that will target U.S.-based Internet users who are accused of copyright infringement, primarily through file sharing. Unlike SOPA and PIPA, this does not focus on making foreign websites unavailable to U.S. users. But part of the enforcement against those users is a series of “mitigation” measures that impair those users’ activities on the Internet. Mitigation measures may include slowing the users’ Internet access speeds to as low as 256 kbps, forced redirection of users to special pages before they can access other resources on the Internet, and even suspension of Internet access. There is a review arbitration process, in which the user must pay a fee and meet a 14-day deadline to seek the arbitration on certain specified grounds.
  2. In June 2011, a group of major credit card and payment processing companies reached an agreement to stop processing payments for owners of websites whom rights holders had accused of engaging in infringements. We have received a number of reports that payment processors are targeting certain categories of business for cutoff—for example, cyberlockers, virtual private network service providers, and Usenet access providers. We have observed a number of instances in which companies received threats of termination based on accusations by rights holders and had to argue for their continued participation in the payment networks.
  3. On July 15, 2013, the White House announced an initiative in which major Internet advertising companies had agreed to cut off advertising on websites that copyright or trademark holders have accused of infringement. The “best practices” document associated with the initiative attempts to strike a balance. It: (1) Seeks to carve out from enforcement websites that have substantial non-infringing activities; (2) Makes clear that the networks are not generally in a position to make judgments about intellectual property rights or infringement; and (3) Provides for a notice and counter-notice process that allows the websites to respond to accusations. Nevertheless, the policy calls for possible suspension of a website upon an accusation until verification that a site is non-infringing. That appears to place a burden of proof on the website owner, not the accuser.

These initiatives seek to carry out a soft form of SOPA and PIPA. But they have established frameworks that provide fewer legal protections for accused parties than SOPA and PIPA, which required judicial determinations before certain remedies occurred.

Moreover, even without SOPA and PIPA, the U.S. government has taken radical action against owners of foreign websites under existing law, including a raid on the New Zealand home of the owner of the Megaupload cyberlocker service, his arrest and attempted extradition, seizure of all of his assets, the shuttering of his company, and the loss by its customers of all access to their stored materials, regardless of lawfulness of their activities.

Even the fourth principal component of SOPA has returned. In July 2013, an Internet Policy Task Force of the Commerce Department repeated the call for criminal streaming (public performance) violations of the Copyright Act to be elevated from a misdemeanor to a felony.

So far the public outrage over SOPA and PIPA has not returned. Perhaps it has not happened because all eyes have been on Congress while the real action has taken place elsewhere, in the White House and in private meetings with certain industries.

The lesson of SOPA and PIPA may be this: The American public may rise up when it sees Congress act. But when the debate moves to other forums, especially where privacy and secrecy, informal private actions, and “soft law” are the rule, the public may not notice.

Rader’s Olive Branch: Ultramercial II Resolves the Judicial Deadlock of CLS Bank

By ROBERT R. SACHS

The Federal Circuit’s en banc decision in CLS Bank Int’l v. Alice Corp., 717 F.3d 1269, (Fed. Cir. 2013) has been roundly criticized as a “nightmare,” further cementing the impression that the court was confused and in conflict over the requirements of patent eligibility under 35 U.S.C. § 101. The six non-precedential opinions are seen as leaving patent applicants and owners alike without guidance, let alone predictability, as to whether their patents are valid.

Alice Corp.’s patents covered computer-implemented methods and systems for a third-party intermediary to ensure real-time settlement of currency exchange transactions between counterparties. Judges Lourie, Dyk, Wallach, Reyna, and Prost appeared to take a hard stand against such software-based financial inventions, finding that neither the method nor system claims were patent-eligible. Under Lourie’s “integrated approach,” the patent claims lacked any “meaningful limitations” and thereby preempted all “practical applications” of the abstract idea of third-party settlement. Taking a middle position, Judges Rader, Moore, Linn, and O’Malley agreed that the method claims were not patent-eligible, but argued that the system claims were patent-eligible because they contained limitations that were not necessary and inherent in the abstract idea. At the other end of the bench, Judges Linn and O’Malley argued that the method claims were indeed patent-eligible because they included limitations that prevented the claims from being “unduly preemptive.”

Not long after CLS issued, the Federal Circuit issued its second opinion on patent eligibility in the case of Ultramercial v. Hulu, No. 2010-1544, 2013 U.S. App. LEXIS 12715 (Fed. Cir. June 21, 2013) (Ultramercial II). The Ultramercial patent had been before the Federal Circuit back in 2011,Ultramercial, LLC v. Hulu, LLC, 657 F.3rd 1323 (Fed. Cir. 2011) (Ultramercial I). Then, Rader, Lourie, and O’Malley agreed that the method claims were patent-eligible—but they had no guiding theory, just a bundle of notions regarding the expansive scope of § 101, its role as a “coarse eligibility filter,” and an “I-know-it-when-I see-it” test that the abstractness of the claim “should exhibit itself so manifestly as to override the broad statutory categories of eligible subject matter”. Id at *1327. There was no discussion of preemption or meaningful limitations, or whether limitations were inherent or necessary. After its decision in Mayo v. Prometheus, 132 S.Ct. 1289 (2012), the Supreme Court vacated the panel’s decision and remanded.

One way to resolve an argumentative deadlock is for one party to show that its own approach is consistent with that of its putative opponent. Thus, while the Ultramercial II decision was ostensibly for the purpose of conforming with the Supreme Court’s guidance in Mayo, Rader took the opportunity to extend a judicial olive branch by more explicitly adopting Lourie’s “integrated approach” to § 101. The most striking feature of Rader’s opinion is how it synthesizes Lourie’s views with his own. Rader’s opinion cited Lourie’s CLS opinion for the framework of his § 101 analysis but then followed it with text taken almost entirely from Rader’s own CLS opinion.

Rader adopted the primary facets of Lourie’s “integrated approach”: 1) That preemption is the core concern; 2) That one must identify limitations in the claim that meaningfully limit the claim to a “practical application” of the abstract idea; and 3) That what counts as a meaningful limitation is a question of fact, including determining whether claimed limitations are in fact conventional, routine, or well understood.

In short, Rader was saying that he agrees with Lourie, and the details of his analysis were entirely consistent with Lourie’s overall framework. Rader was not offering up an alternative or contrary theory of patent eligibility, but simply a “formulation” of a “precise test” that implemented Lourie’s theory.

Lourie either did not see, or rejected, this attempt at judicial détente. His concurrence practically chides Rader: “I concur in the result reached by the majority, but I write separately because I believe that we should concisely and faithfully follow” the Supreme Court and “should track the plurality opinion of five judges from this court in CLS Bank.” Ultramercial II, 2013 U.S. App. LEXIS 12715, at *46-47.

Perhaps the problem is that Rader did not explicitly implement the first two steps of Lourie’s approach: “First, a court must identify whether the claimed invention fits within one of the four statutory classes set out in § 101” and “[s]econd, one must assess whether any of the judicial exceptions to subject-matter eligibility apply, including whether the claims are to patent-ineligible abstract ideas.” Id. at *48. But Rader did in fact touch these bases. In Section III.A, he provided a detailed analysis of § 101’s use of the term “process,” and in Section III.B he reviewed the exceptions to § 101, including the abstract idea exception, followed by a detailed discussion of “abstractness” in Section IV.A. In Section VI, Rader applied his analysis and stated: “The claimed invention is a method for monetizing and distributing copyrighted products over the Internet. As a method, it easily satisfies § 100’s definition of ‘process’ and thus falls within a § 101 category of patent-eligible subject matter.” Id. at *38. Addressing the “abstractness” question, Rader set forth the 10 steps of the claim in a concise prose form and stated:

Even at this general level, it wrenches meaning from the word to label the claimed invention “abstract.” The claim does not cover the use of advertising as currency disassociated with any specific application of that activity. It was an error for the district court to strip away these limitations and instead imagine some “core” of the invention. Id. at *40.

At least textually, it seems that at worst Rader’s opinion was not “concise” enough for Lourie: It took Rader 19 pages to set forth his § 101 analysis before applying the claims; by contrast, Lourie did it in two paragraphs on a single page.

But the textual explanation is not sufficient. Rather, the explanation lies in the profound difference in stances Lourie and Rader take toward technology in general and computer technology in particular. Judge Lourie (along with Judges Dyk, Prost, and Mayer) are “Normativists,” who see § 101 as defining what inventions “ought” to be patent-eligible. The Normative approach imposes an extrinsic value judgment—from an unspecified source—as to what kinds of innovations count as “inventive” and what kinds do not. In particular, the Normativists believe that the use of computers to deliver useful functionality has no inherent inventive value per se, that there is no “human ingenuity” in designing computerized solutions. This view is based in part on the view that computers are so common, so woven into modern life, that using them to do something useful is not inventive:

Because of the efficiency and ubiquity of computers, essentially all practical, real-world applications of the abstract idea implicated here would rely, at some level, on basic computer functions—for example, to quickly and reliably calculate balances or exchange data among financial institutions. At its most basic, a computer is just a calculator capable of performing mental steps faster than a human could. CLS Bank, 717 F.3d at 1286.

Because of this view, Lourie and other Normativists approach the patent eligibility question by stripping computer-implemented claims of the “jargon” to create “plain English” renderings. To the Normativists, using computers to perform functional tasks is merely “generic computer automation,” evincing no “human contribution.” This is odd because without the “human contribution” of programming, a computer is simply an expensive brick.

Rader, O’Malley, Linn, Moore, and Newman are Positivists: They view § 101 as asking whether invention as claimed is of a particular kind—a process, a machine, composition of matter, etc. Thus, they strongly respect the claim language, and criticized Lourie’s approach of stripping down the claims and identifying “abstract ideas” as “hunting for abstractions by ignoring the concrete, palpable, tangible limitations of the invention the patentee actually claims.” Ultramercial II, 2013 U.S. App. LEXIS 12715, at *22.

The Normativist view also reflects an “industrial” view of innovation and invention. In the Industrial Age, innovation was primarily achieved through structural transformation of raw materials in order to achieve the desired function. Hence the statement in Cochrane v. Deener, 94 U.S. 780 (1877): “A process is a mode of treatment of certain materials to produce a given result. It is an act, or a series of acts, performed upon the subject matter to be transformed and reduced to a different state or thing.” In this framework, invention is essentially the creation of new things rather than new functions.

By contrast, for the Positivists there is invention in the manipulation of a computer toward a functional goal. This is significant because in the Information Age, there was value in the creation of new functions, new ways of doing things, as well as in the creation of information itself. More specifically, the ability to create functional transformation apart from structural transformation by the configuring (programming) of a computer is itself an innovation and can be an invention.

But Lourie’s superficial view of computer technology led him to reject this point of view. In In re Alappat, 33 F.3d 1526 (Fed. Cir. 1994) (en banc), the Federal Circuit, Lourie concluded, held that “programming creates a new machine, because a general purpose computer in effect becomes a special purpose computer once it is programmed to perform particular functions pursuant to instructions from program software.” Id. at 1545. Now, 19 years later, Lourie rejected this view, stating that Rader’s reliance on Alappat is a “fallacy,” because “not only has the world of technology changed, but the legal world has changed. The Supreme Court has spoken since Alappat on the question of patent eligibility, and we must take note of that change.” CLS Bank, 717 F.3d at 1292. The problem with Lourie’s reasoning is that the technology has not changed. It is universally accepted by computer scientists that anything that can be done in hardware by a special-purpose computer can be equivalently performed by a general-purpose computer running software. Indeed, the overwhelming majority of complex hardware devices—computers, cameras, smartphones, Blu-ray players, etc.—are designed first in software, and then implemented by hardware circuits. Nothing the Supreme Court has ruled—or could ever rule—can alter these technological facts.

Professor Mark Lemley has commented said that there are “two Federal Circuits.” I think this is too simple a view. As Rader has attempted to show, the majority of the court agrees on the fundamental legal theory and implementation of § 101. In my view, the furor in the patent bar over the CLS opinion results from a myopic focus on the non-precedential status of the individual opinions and the verbal battle engaged in by the justices. However, if we view the overall complex of CLS opinions and Ultramercial II as a window into the working theories of the Federal Circuit judges, then out of discord can arise harmony. First, 10 members of the court agree that the presumption of validity applies to § 101 and that a challenge to the eligibility of the subject matter must be proven by clear and convincing evidence. Second, these judges agree that, contrary to the Supreme Court’s suggestion, patent eligibility is not a “gateway” issue that must be addressed in patent litigation; instead, a district court can decide to focus on the issue of infringement, for example, and if the jury finds no infringement, dispense with the question of § 101 entirely. Finally, the judges also agree that § 101 ultimately requires resolution of questions of facts, not merely attorney arguments about the claims being simply abstract ideas, laws of nature, or other legal fictions. Where they differ is in their value judgments of what constitutes invention generally and their appreciation (or lack thereof) for the nature of computers and software in particular.

Quick Updates

Nash Bargaining Solution and Patent Damages: A 50 Percent “Rule of Thumb”?

The Federal Circuit rejected the use of the 25 percent “rule of thumb” as a basis for establishing a reasonable royalty in the Uniloc case in 2011. Uniloc USA, Inc. v. Microsoft Corp., 632 F.3d 1292 (Fed. Cir. 2011). Since that time, several defendants have challenged the use of a new method for determining a baseline royalty rate: the Nash bargaining solution.

The Nash bargaining solution—named for John Nash, the Nobel Prize–winning mathematician and subject of A Beautiful Mind—is based on the Nash bargaining game. The two players in the game are both seeking a portion of some good, such as money. If the total amount desired is less than the total good, each player will receive what he or she wants. If the total amount desired is greater than the total good, neither player will get what he or she wants. The Nash bargaining solution is a framework to solve the game by using a set of conditions reasonable to any bargaining situation. Although Nash described his game theory in 1950, damages experts have only recently begun using the Nash bargaining solution to argue that the starting point of any negotiation between the players would be a 50-50 split of the incremental contribution of the patent to the licensee’s product.

Reaction from the courts has been mixed. No court has wholeheartedly adopted the application of the Nash bargaining solution, while several courts have rejected it as an “abstract rule of thumb” comparable to the 25 percent “rule of thumb.”

In a 2011 opinion in Oracle v. Google, 798 F. Supp 2d 1111 (N.D. Cal. 2011), Judge Alsup rejected application of the solution under Daubert and Uniloc: Daubert v. Merrell Dow Pharm., Inc., 509 U.S. 579 (1993); Uniloc, 632 F.3d 1292. “The Nash bargaining solution would invite a miscarriage of justice by clothing a fifty-percent assumption in an impenetrable facade of mathematics.” In that case, the damages report was served five months after the Federal Circuit rejected the 25 percent rule. Judge Alsup noted: “It is no wonder that a patent plaintiff would love the Nash bargaining solution because it awards fully half of the surplus to the patent owner, which in most cases will amount to half of the infringer’s profits, which will be many times the amount of real-world royalty rates.” In a later case in the same district, Mformation Techs, Inc. v. Research in Motion Ltd, 2012 U.S. Dist. LEXIS 56784 (N.D. Cal. March 29, 2012), Judge Ware allowed the use of the Nash bargaining solution “as a check” on the reasonableness of the royalty rate where the expert had engaged in “extensive analysis of the Georgia-Pacific factors.”

Since that time, in VirnetX Inc. v. Cisco Systems, 2013 WL 789288 (E.D. Tex. Mar. 1, 2013) lined to exclude an expert’s application of Nash bargaining, while excluding the expert’s reasonable royalty analysis as unreliable. Most recently, in Suffolk Techs. LLC v. Aol Inc, 2013 U.S. Dist. LEXIS 64630 (E.D. Va. Apr. 12, 2013), Judge Ellis rejected application of the Nash bargaining solution, stating: “Weinstein’s use of the NBS to opine that the hypothetical negotiation of the parties would result in a ‘50-50 split of the incremental profits attributable to the patents-in-suit’ is not adequately tied to the facts of the case. This is indistinguishable from the 25 percent rule of thumb in issue in Uniloc, and accordingly, Dr. Weinstein’s expert report must be excluded.” Judge Ellis noted that in Uniloc, the “expert first applied a theoretical rule of thumb and then applied the Georgia-Pacific factors,” but “here, Weinstein first applied the Georgia-Pacific factors and then applied a theoretical rule of thumb, albeit one clothed as NBS.” The variation in the order did not meaningfully distinguish the expert’s opinion from the one distinguished in Uniloc.

The Federal Circuit rejected the 25 percent rule of thumb as inadmissible because it “fails to tie a reasonable royalty base to the facts of the case at issue.” Since that opinion, two district courts have rejected the Nash bargaining solution on the same basis. Courts have differed in whether “extensive” fact-based analysis of the Georgia-Pacific factors is sufficient to overcome the “theoretical” nature of Nash bargaining. Georgia-Pacific Corp. v. U.S. Plywood Corp., 318 F. Supp 1116 (S.D.N.Y. 1970). Until the Federal Circuit addresses the issue, plaintiff-side damages experts will continue to rely on the more generous 50 percent rule of thumb. And defendants who thought they were insulated from “rules of thumb” will continue to challenge the reliability of those opinions.

Federal Circuit Holds That Failure to Abide by NDA Confidentiality Designation Provisions Can Preclude Trade Secret Protection

Prior to discussing or exchanging proprietary information with one another, companies frequently enter into non-disclosure agreements (NDAs) to afford protections beyond what they would otherwise be entitled to under their states’ trade secret misappropriation laws. Most NDAs will lay out the scope of protectable information and procedure for designating it as such. It is important for a party entering such an NDA to understand, however, that doing so may preclude it from later pursuing a trade secret misappropriation claim in the event it believes that its confidential information has been misused. Such was the case for Convolve, the plaintiff in a trade secret misappropriation and patent infringement action against Compaq and Seagate. In Convolve, Inc. v. Compaq Computer Corp., No. 2012-1074, 2013 WL 3285331 (Fed. Cir. July 1, 2013), the Federal Circuit upheld the district court’s grant of summary judgment to defendants Compaq and Seagate upon concluding that they had not, as a matter of law, misappropriated Convolve’s trade secrets.

The origin of the dispute dates back to 1998, when Convolve and Compaq began licensing negotiations regarding Convolve’s disk drive technology and signed an NDA to facilitate sharing of their respective confidential information. The NDA stated that in order to be protected under the agreement, the disclosed information must be: (1) Marked as confidential at the time of disclosure; or (2) Unmarked, but treated as confidential at the time of disclosure, and later designated confidential in a written memorandum summarizing and identifying the confidential information. Seagate, Compaq’s hard drive supplier, was also involved in the negotiations and signed a similar NDA with Convolve.

After the NDA was in place, Convolve gave several oral presentations to Compaq and Seagate regarding its signal shaping technology and its application to disk drives, but did not state in writing that these oral disclosures were confidential. Ultimately, the negotiations broke down and the parties failed to reach a licensing deal. Several years later, when Seagate began making a type of drive for Compaq’s computers that allegedly included features of the signal shaping technology disclosed during the negotiations, Convolve sued. While Convolve acknowledged that its failure to abide by the NDA’s confidentiality designations provisions precluded it from bringing a breach of contract claim, it argued that it was still entitled to assert separate state tort law claims for trade secret misappropriation under the California Uniform Trade Secrets Act (CUTSA).

The district court, and then later the Federal Circuit on appeal, disagreed. The Federal Circuit reasoned that because the NDA had expressly set the boundaries of the confidential relationship between the parties, it would not make sense to impose a separate duty of confidentiality under the CUTSA. Because the information disclosed by Convolve clearly fell within the subject matter of the NDA, and because Convolve failed to comply with the NDA’s designation requirements, Convolve forfeited its right to pursue a separate tort against the defendants arising from their use of the information. This case not only serves as an important reminder that any party entering into an NDA must vigilantly abide by its requirements for designating confidential information, but it also suggests that parties wishing to preserve their trade secret claims might consider drafting their NDA language accordingly or else risk forfeiting such claims entirely.

ICANN Set to Launch New Generic Top-Level Domains: Understanding the Nuts and Bolts

The universe of generic top-level domains (gTLDs), currently limited to about a dozen such as .com, .net, and .org, will expand this year, as some of the more than 1,000 potential new gTLDs are rolled out. Businesses may want to use some of these gTLDs—such as .store, .cloud, .software, .app, .home, and many more—as part of their brand strategies.

The Internet Committee for Assigned Names and Numbers (ICANN) has been reviewing new gTLD applications on a rolling basis. On July 15, 2013, ICANN announced the first three approved gTLD applicants that have signed Registry Agreements, indicating that these applicants are now permitted to begin operating their new gTLD registries:

  1. International Domain Registry Pty. Ltd. — ???? (Arabic for “web” or “network”)

  2. Core Association — ?????? (Russian for “online”) and .???? (Russian for “website”)

  3. Spring Fields, LLC — ?? (Chinese for “game”)

Brand owners should think about defensively registering their brand names as second level domains (SLDs) in new gTLDs that are relevant to their specific industries (e.g., www.yourbrand.app, www.yourbrand.cloud). SLD registrants will be given access to two primary rights protection mechanisms provided by all new gTLD operators:

  1. Trademark Clearinghouse. The Clearinghouse is a trademark registration database that ICANN requires each new gTLD registrar to cross-reference when someone tries to register an SLD that is identical to a brand in the database. Brand owners can deposit their marks in the Clearinghouse at http://trademark-clearinghouse.com. Marks must be nationally or multinationally (e.g., the European Union (EU)) registered or otherwise validated by a court. Brand owners must also submit evidence that their marks are in use if they wish to register a given mark as an SLD during a “Sunrise Period.”

  2. Sunrise and Claims Periods. ICANN requires each new gTLD registrar to give Clearinghouse members a first chance at SLD registrations by offering a Sunrise Period of at least 30 days before registrations become available to the general public. Some brand owners will want to use SLDs themselves; others will obtain SLDs simply to keep third parties from registering them.

When a new gTLD registry opens to the general public after the Sunrise Period, ICANN requires it to offer a claims period of 90 days. During this time, registrars must notify a Clearinghouse member if anyone tries to register an SLD that is identical to the member’s deposited mark, and notify the SLD applicant that the attempted registration potentially infringes the mark.

It is important to note that the Clearinghouse does not prevent others from registering a brand owner’s mark as an SLD in a new gTLD registry. The Clearinghouse only 1) Gives brand owners an opportunity to register their brand names as SLDs in a new gTLD before the general public (in the Sunrise Period); and 2) Gives notice to brand owners and SLD applicants that an attempted SLD registration may infringe a mark in the Clearinghouse (in the claims period). Given the limitations inherent in these rights protection mechanisms, in addition to defensively registering their brand names, brand owners should also consider expanding existing domain name policing efforts to include the new gTLD space.

Electronic Transfer of Copyright Approved by Fourth Circuit

The Fourth Circuit has confirmed what many copyright holders have long hoped was true: That copyright interests can be validly transferred through electronic means, despite language in the 1976 Copyright Act requiring that the transfer be “in writing and signed by the owner.” Prior to the court’s July 17 ruling, no appellate court had ever squarely addressed the issue.

Both parties to the suit in question, Metropolitan Regional Info. Sys. v. American Home Realty Network, 722 F. 3d 591 (4th Cir. 2013), are operators of real estate listing websites. Metropolitan allowed brokers to list properties for a fee, and American took listings from various listing sites, such as Metropolitan’s, and made them available directly to the public. Metropolitan’s complaint alleged that American had infringed its copyrights by using and reposting the photos from Metropolitan’s site, which copyrights Metropolitan had acquired online from the brokers that photographed the properties.

The appellate court heard argument from the appellant, American, that the infringement claims were invalid because Metropolitan did not own the copyright in the photos because its use of automated, “click-through” agreements was not a valid means of transferring copyright ownership from the original photographers. American sought reversal of the lower court’s injunction against it, on the ground that such transfers do not meet the writing requirement of § 204 of the 1976 Copyright Act, which governs the formalities of copyright assignment.

Section 204 states that a “transfer of copyright ownership, other than by operation of law, is not valid unless an instrument of conveyance, or a note or memorandum of the transfer, is in writing and signed by the owner of the rights conveyed or such owner’s duly authorized agent.”

Metropolitan argued, on the other hand, that despite the language of § 204, such electronic transfers were made valid under a federal law known as the E-Sign Act, which was passed in 2000 to ensure the validity of electronic signatures.

The E-Sign Act, according to the court, was designed to “bring uniformity to patchwork state legislation governing electronic signatures and records,” and to guarantee that no signature could be denied legal effect simply by virtue of being in electronic form. The court noted that the E-Sign Act included various exemptions under which electronic signatures would not suffice as substitutes for written signatures—such as in the case of written wills and testaments—but that copyright transfers were not amongst those exemptions.

For these reasons, the court agreed with Metropolitan, and upheld the lower court’s injunction. The Fourth Circuit wrote that “to invalidate copyright transfer agreements solely because they were made electronically would thwart the clear congressional intent embodied in the E-Sign Act … we therefore hold that an electronic agreement may effect a valid transfer of copyright interests.”

 

Written by:

Fenwick & West LLP
Contact
more
less

Fenwick & West LLP on:

Readers' Choice 2017
Reporters on Deadline

Related Case Law

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide

JD Supra Privacy Policy

Updated: May 25, 2018:

JD Supra is a legal publishing service that connects experts and their content with broader audiences of professionals, journalists and associations.

This Privacy Policy describes how JD Supra, LLC ("JD Supra" or "we," "us," or "our") collects, uses and shares personal data collected from visitors to our website (located at www.jdsupra.com) (our "Website") who view only publicly-available content as well as subscribers to our services (such as our email digests or author tools)(our "Services"). By using our Website and registering for one of our Services, you are agreeing to the terms of this Privacy Policy.

Please note that if you subscribe to one of our Services, you can make choices about how we collect, use and share your information through our Privacy Center under the "My Account" dashboard (available if you are logged into your JD Supra account).

Collection of Information

Registration Information. When you register with JD Supra for our Website and Services, either as an author or as a subscriber, you will be asked to provide identifying information to create your JD Supra account ("Registration Data"), such as your:

  • Email
  • First Name
  • Last Name
  • Company Name
  • Company Industry
  • Title
  • Country

Other Information: We also collect other information you may voluntarily provide. This may include content you provide for publication. We may also receive your communications with others through our Website and Services (such as contacting an author through our Website) or communications directly with us (such as through email, feedback or other forms or social media). If you are a subscribed user, we will also collect your user preferences, such as the types of articles you would like to read.

Information from third parties (such as, from your employer or LinkedIn): We may also receive information about you from third party sources. For example, your employer may provide your information to us, such as in connection with an article submitted by your employer for publication. If you choose to use LinkedIn to subscribe to our Website and Services, we also collect information related to your LinkedIn account and profile.

Your interactions with our Website and Services: As is true of most websites, we gather certain information automatically. This information includes IP addresses, browser type, Internet service provider (ISP), referring/exit pages, operating system, date/time stamp and clickstream data. We use this information to analyze trends, to administer the Website and our Services, to improve the content and performance of our Website and Services, and to track users' movements around the site. We may also link this automatically-collected data to personal information, for example, to inform authors about who has read their articles. Some of this data is collected through information sent by your web browser. We also use cookies and other tracking technologies to collect this information. To learn more about cookies and other tracking technologies that JD Supra may use on our Website and Services please see our "Cookies Guide" page.

How do we use this information?

We use the information and data we collect principally in order to provide our Website and Services. More specifically, we may use your personal information to:

  • Operate our Website and Services and publish content;
  • Distribute content to you in accordance with your preferences as well as to provide other notifications to you (for example, updates about our policies and terms);
  • Measure readership and usage of the Website and Services;
  • Communicate with you regarding your questions and requests;
  • Authenticate users and to provide for the safety and security of our Website and Services;
  • Conduct research and similar activities to improve our Website and Services; and
  • Comply with our legal and regulatory responsibilities and to enforce our rights.

How is your information shared?

  • Content and other public information (such as an author profile) is shared on our Website and Services, including via email digests and social media feeds, and is accessible to the general public.
  • If you choose to use our Website and Services to communicate directly with a company or individual, such communication may be shared accordingly.
  • Readership information is provided to publishing law firms and authors of content to give them insight into their readership and to help them to improve their content.
  • Our Website may offer you the opportunity to share information through our Website, such as through Facebook's "Like" or Twitter's "Tweet" button. We offer this functionality to help generate interest in our Website and content and to permit you to recommend content to your contacts. You should be aware that sharing through such functionality may result in information being collected by the applicable social media network and possibly being made publicly available (for example, through a search engine). Any such information collection would be subject to such third party social media network's privacy policy.
  • Your information may also be shared to parties who support our business, such as professional advisors as well as web-hosting providers, analytics providers and other information technology providers.
  • Any court, governmental authority, law enforcement agency or other third party where we believe disclosure is necessary to comply with a legal or regulatory obligation, or otherwise to protect our rights, the rights of any third party or individuals' personal safety, or to detect, prevent, or otherwise address fraud, security or safety issues.
  • To our affiliated entities and in connection with the sale, assignment or other transfer of our company or our business.

How We Protect Your Information

JD Supra takes reasonable and appropriate precautions to insure that user information is protected from loss, misuse and unauthorized access, disclosure, alteration and destruction. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. You should keep in mind that no Internet transmission is ever 100% secure or error-free. Where you use log-in credentials (usernames, passwords) on our Website, please remember that it is your responsibility to safeguard them. If you believe that your log-in credentials have been compromised, please contact us at privacy@jdsupra.com.

Children's Information

Our Website and Services are not directed at children under the age of 16 and we do not knowingly collect personal information from children under the age of 16 through our Website and/or Services. If you have reason to believe that a child under the age of 16 has provided personal information to us, please contact us, and we will endeavor to delete that information from our databases.

Links to Other Websites

Our Website and Services may contain links to other websites. The operators of such other websites may collect information about you, including through cookies or other technologies. If you are using our Website or Services and click a link to another site, you will leave our Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We are not responsible for the data collection and use practices of such other sites. This Policy applies solely to the information collected in connection with your use of our Website and Services and does not apply to any practices conducted offline or in connection with any other websites.

Information for EU and Swiss Residents

JD Supra's principal place of business is in the United States. By subscribing to our website, you expressly consent to your information being processed in the United States.

  • Our Legal Basis for Processing: Generally, we rely on our legitimate interests in order to process your personal information. For example, we rely on this legal ground if we use your personal information to manage your Registration Data and administer our relationship with you; to deliver our Website and Services; understand and improve our Website and Services; report reader analytics to our authors; to personalize your experience on our Website and Services; and where necessary to protect or defend our or another's rights or property, or to detect, prevent, or otherwise address fraud, security, safety or privacy issues. Please see Article 6(1)(f) of the E.U. General Data Protection Regulation ("GDPR") In addition, there may be other situations where other grounds for processing may exist, such as where processing is a result of legal requirements (GDPR Article 6(1)(c)) or for reasons of public interest (GDPR Article 6(1)(e)). Please see the "Your Rights" section of this Privacy Policy immediately below for more information about how you may request that we limit or refrain from processing your personal information.
  • Your Rights
    • Right of Access/Portability: You can ask to review details about the information we hold about you and how that information has been used and disclosed. Note that we may request to verify your identification before fulfilling your request. You can also request that your personal information is provided to you in a commonly used electronic format so that you can share it with other organizations.
    • Right to Correct Information: You may ask that we make corrections to any information we hold, if you believe such correction to be necessary.
    • Right to Restrict Our Processing or Erasure of Information: You also have the right in certain circumstances to ask us to restrict processing of your personal information or to erase your personal information. Where you have consented to our use of your personal information, you can withdraw your consent at any time.

You can make a request to exercise any of these rights by emailing us at privacy@jdsupra.com or by writing to us at:

Privacy Officer
JD Supra, LLC
10 Liberty Ship Way, Suite 300
Sausalito, California 94965

You can also manage your profile and subscriptions through our Privacy Center under the "My Account" dashboard.

We will make all practical efforts to respect your wishes. There may be times, however, where we are not able to fulfill your request, for example, if applicable law prohibits our compliance. Please note that JD Supra does not use "automatic decision making" or "profiling" as those terms are defined in the GDPR.

  • Timeframe for retaining your personal information: We will retain your personal information in a form that identifies you only for as long as it serves the purpose(s) for which it was initially collected as stated in this Privacy Policy, or subsequently authorized. We may continue processing your personal information for longer periods, but only for the time and to the extent such processing reasonably serves the purposes of archiving in the public interest, journalism, literature and art, scientific or historical research and statistical analysis, and subject to the protection of this Privacy Policy. For example, if you are an author, your personal information may continue to be published in connection with your article indefinitely. When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize it, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.
  • Onward Transfer to Third Parties: As noted in the "How We Share Your Data" Section above, JD Supra may share your information with third parties. When JD Supra discloses your personal information to third parties, we have ensured that such third parties have either certified under the EU-U.S. or Swiss Privacy Shield Framework and will process all personal data received from EU member states/Switzerland in reliance on the applicable Privacy Shield Framework or that they have been subjected to strict contractual provisions in their contract with us to guarantee an adequate level of data protection for your data.

California Privacy Rights

Pursuant to Section 1798.83 of the California Civil Code, our customers who are California residents have the right to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes.

You can make a request for this information by emailing us at privacy@jdsupra.com or by writing to us at:

Privacy Officer
JD Supra, LLC
10 Liberty Ship Way, Suite 300
Sausalito, California 94965

Some browsers have incorporated a Do Not Track (DNT) feature. These features, when turned on, send a signal that you prefer that the website you are visiting not collect and use data regarding your online searching and browsing activities. As there is not yet a common understanding on how to interpret the DNT signal, we currently do not respond to DNT signals on our site.

Access/Correct/Update/Delete Personal Information

For non-EU/Swiss residents, if you would like to know what personal information we have about you, you can send an e-mail to privacy@jdsupra.com. We will be in contact with you (by mail or otherwise) to verify your identity and provide you the information you request. We will respond within 30 days to your request for access to your personal information. In some cases, we may not be able to remove your personal information, in which case we will let you know if we are unable to do so and why. If you would like to correct or update your personal information, you can manage your profile and subscriptions through our Privacy Center under the "My Account" dashboard. If you would like to delete your account or remove your information from our Website and Services, send an e-mail to privacy@jdsupra.com.

Changes in Our Privacy Policy

We reserve the right to change this Privacy Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our Privacy Policy will become effective upon posting of the revised policy on the Website. By continuing to use our Website and Services following such changes, you will be deemed to have agreed to such changes.

Contacting JD Supra

If you have any questions about this Privacy Policy, the practices of this site, your dealings with our Website or Services, or if you would like to change any of the information you have provided to us, please contact us at: privacy@jdsupra.com.

JD Supra Cookie Guide

As with many websites, JD Supra's website (located at www.jdsupra.com) (our "Website") and our services (such as our email article digests)(our "Services") use a standard technology called a "cookie" and other similar technologies (such as, pixels and web beacons), which are small data files that are transferred to your computer when you use our Website and Services. These technologies automatically identify your browser whenever you interact with our Website and Services.

How We Use Cookies and Other Tracking Technologies

We use cookies and other tracking technologies to:

  1. Improve the user experience on our Website and Services;
  2. Store the authorization token that users receive when they login to the private areas of our Website. This token is specific to a user's login session and requires a valid username and password to obtain. It is required to access the user's profile information, subscriptions, and analytics;
  3. Track anonymous site usage; and
  4. Permit connectivity with social media networks to permit content sharing.

There are different types of cookies and other technologies used our Website, notably:

  • "Session cookies" - These cookies only last as long as your online session, and disappear from your computer or device when you close your browser (like Internet Explorer, Google Chrome or Safari).
  • "Persistent cookies" - These cookies stay on your computer or device after your browser has been closed and last for a time specified in the cookie. We use persistent cookies when we need to know who you are for more than one browsing session. For example, we use them to remember your preferences for the next time you visit.
  • "Web Beacons/Pixels" - Some of our web pages and emails may also contain small electronic images known as web beacons, clear GIFs or single-pixel GIFs. These images are placed on a web page or email and typically work in conjunction with cookies to collect data. We use these images to identify our users and user behavior, such as counting the number of users who have visited a web page or acted upon one of our email digests.

JD Supra Cookies. We place our own cookies on your computer to track certain information about you while you are using our Website and Services. For example, we place a session cookie on your computer each time you visit our Website. We use these cookies to allow you to log-in to your subscriber account. In addition, through these cookies we are able to collect information about how you use the Website, including what browser you may be using, your IP address, and the URL address you came from upon visiting our Website and the URL you next visit (even if those URLs are not on our Website). We also utilize email web beacons to monitor whether our emails are being delivered and read. We also use these tools to help deliver reader analytics to our authors to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

Analytics/Performance Cookies. JD Supra also uses the following analytic tools to help us analyze the performance of our Website and Services as well as how visitors use our Website and Services:

  • HubSpot - For more information about HubSpot cookies, please visit legal.hubspot.com/privacy-policy.
  • New Relic - For more information on New Relic cookies, please visit www.newrelic.com/privacy.
  • Google Analytics - For more information on Google Analytics cookies, visit www.google.com/policies. To opt-out of being tracked by Google Analytics across all websites visit http://tools.google.com/dlpage/gaoptout. This will allow you to download and install a Google Analytics cookie-free web browser.

Facebook, Twitter and other Social Network Cookies. Our content pages allow you to share content appearing on our Website and Services to your social media accounts through the "Like," "Tweet," or similar buttons displayed on such pages. To accomplish this Service, we embed code that such third party social networks provide and that we do not control. These buttons know that you are logged in to your social network account and therefore such social networks could also know that you are viewing the JD Supra Website.

Controlling and Deleting Cookies

If you would like to change how a browser uses cookies, including blocking or deleting cookies from the JD Supra Website and Services you can do so by changing the settings in your web browser. To control cookies, most browsers allow you to either accept or reject all cookies, only accept certain types of cookies, or prompt you every time a site wishes to save a cookie. It's also easy to delete cookies that are already saved on your device by a browser.

The processes for controlling and deleting cookies vary depending on which browser you use. To find out how to do so with a particular browser, you can use your browser's "Help" function or alternatively, you can visit http://www.aboutcookies.org which explains, step-by-step, how to control and delete cookies in most browsers.

Updates to This Policy

We may update this cookie policy and our Privacy Policy from time-to-time, particularly as technology changes. You can always check this page for the latest version. We may also notify you of changes to our privacy policy by email.

Contacting JD Supra

If you have any questions about how we use cookies and other tracking technologies, please contact us at: privacy@jdsupra.com.

- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.