LightSwitch - Intellectual Property Law Bulletin -- 4th Quarter - Vol. 4; No. 3 , October 23, 2012

by Nexsen Pruet, PLLC
Contact

[authors: Michael Mann and Corby Anderson]
 

INTELLECTUAL PROPERTY IS WARWARE FOR MARKET SHARE

By Michael A Mann

© 2012 by Nexsen Pruet, LLC

Businesses having strategic advantages over their competitors will take market share.  Think of a business as engaged in a series of battles in a long war, a war with many competitors and few allies, all competing for market share.  Each business needs to gird itself with the warware it needs for market share battles, that is to say, with intellectual property.  Battles will be won and lost; market share will change hands often.  But the prize is always market share and it will go to the competitor with the most powerful intellectual property.

Intellectual property includes know-how, innovation, message, and reputation.  These are the warware of a business.  The advantage goes to the possessor of the better warware.  The more powerful its warware, the greater its advantage in the fight for market share.

No business can compete for market share without an army, but the army of employees and management must have formidable know-how.  This army must be trained and disciplined, organized into teams each with their different capabilities.  Most importantly, the business army needs management with a vision of the competitive battlefield that enables them to see the strategic high ground and to formulate effective marketing strategies for each battle.  To execute this strategy, management must have the leadership to command the respect of their employees.

A business needs to innovate.  It cannot fight today's battles for market share with yesterday's tactics.  It needs the advantage of surprise coming from innovation.  It needs smart products and services, new channels of delivery, and a demonstrably better value proposition than its competitors. 

A business needs a message for its army of employees, a message that overcomes resistance, that persuades and motivates, that gives heart.  The message to employees must embody a clear and compelling vision.  The business must also have a message for its customers, namely, a superior value proposition.

A business needs a reputation.  Its competitors should have a profound respect for that reputation, knowing that they will have to work as hard and smart to acquire a reputation that rivals it.  Customers should welcome the new products and services of a business as they would welcome a liberator, the reputation of the previous products and services of that business having preceded them.      

Intellectual property is warware for market share.  The business that fails to arm itself with intellectual property will lose battles, because its employees will do shoddy work, its management will be indifferent, its products, undistinguished, its message, unheeded and garbled, its reputation, tawdry, and it will see its market share crumble and blow away in the wind.

SEVEN TIPS FOR PROTECTING YOUR INTELLECTUAL PROPERTY

IN THE AGE OF SOCIAL MEDIA

By Corby C. Anderson

© 2012 by Nexsen Pruet, LLC

Social media is an important tool in gaining, and keeping, market share.  A business can use social media to reach huge numbers of current and prospective customers almost immediately, and for relatively low cost, with information about products and services and special offers; to test concepts and get feedback about them; to build loyalty among existing customers and attract new customers; to drive customers to other marketing channels; to find and communicate with prospective business partners; to “start fires” by generating buzz about a product or service; and to “put out fires” with a quick, proactive response to a public relations crisis.

But in the rush to take advantage of the benefits social media has to offer, companies sometimes fail to recognize and guard against the risks inherent in this form of communication.  One of the primary risks involved in using social media is the risk to a company’s intellectual property (otherwise known as IP) including trademarks, copyrights, trade secrets, and publicity and privacy rights.

Before social media arrived on the scene, companies’ primary communication with the public was through carefully crafted monologues, such as scripted ad campaigns, press releases, and appearances by designated spokespersons.  Social media replaces these monologues with conversations – conversations that are fluid, involve many people within and outside the company, and occur in real-time.  In these conversations, the company has less control over what is said and who is saying it.  This increases both business risks and legal risks to the company’s IP. 

Such risks have been widely publicized:  An employee blogging about new developments in the office inadvertently discloses information that is highly confidential, destroying the company’s ability to protect it as a trade secret.  Video footage of rats skittering through a local franchise of a national restaurant chain goes “viral,” inflicting immediate harm on the brand of the entire franchise system.  A company sponsors an ad contest inviting entrants to make and post videos promoting the company’s product, and the most popular entry features the image and music of a celebrity artist, all used without the artist’s authorization.

How can companies minimize such risks?  Outlined below are seven steps to consider:

1. Make it about more than marketing.  The most effective – and safest – users of social media take an integrated approach to it.  They realize that launching and maintaining a social media campaign should involve a broader segment of the company than marketing.  It should also involve information technology, sales, legal, communications, and human resources.

2. Issue a social media policy and enforce it.  No company should be without a social media policy.  Even if the company itself has not taken the plunge into social media, its employees, business partners, and customers surely have.  Many companies have two policies – one governing third parties’ use of social media on company-sponsored sites and another governing employees’ use of social media.  Some have an additional policy specific to employees who are authorized to speak on behalf of the company on social media sites. 

Because social media changes constantly, no policy can cover every contingency that may arise, but every policy should cover certain basics.  Having an effective policy published and implemented gives a company a significant advantage when it must take action to enforce its IP rights.  (On the other hand, having a policy that has been published but forgotten or ignored can do more harm than good.) 

Key IP-related issues that social media policies should cover include:

  • How company trademarks and logos may be used.
  • How copyrighted materials may be used, if at all.
  • What kinds of company information are confidential and proprietary, and how that information should be protected.
  • Who owns user-generated content posted on company-sponsored sites and who may be liable for such content.
  • How information collected on company-sponsored sites may be used, disclosed, or shared.
  • What protocol will be followed for reporting and addressing infringing or defamatory content posted by third parties on company-sponsored sites (including the steps a site host must take to qualify for protection against liability for copyright infringement, under the Digital Millennium Copyright Act, and liability for defamation, under the Communications Decency Act).
  • How the company will enforce its rights in its own IP.
  • Who may speak for the company on social media platforms, and what standards they must meet for tone, content, and timing.
  • When employees must post disclaimers making it clear that the views expressed are their own and not the company’s.
  • What basic expectations exist for online behavior.

3. Make sure standard IP-related policies and agreements take social media into account.  Most companies already have standard IP policies and confidentiality and non-disclosure agreements that they have used for years.  If these policies and agreements were drafted before the advent of social media, they may not cover the risks that can result from using this new form of communication.  Such existing policies and agreements should be reviewed and amended if necessary to account for these risks. 

 4. Know and understand the rules of social media platforms.  Before using any social media platform, companies should review the platform’s terms of use and privacy policy.  If a company is advertising on a social media site, it must follow any additional rules governing advertising.  Social media platforms typically provide rules on how trademarks, copyrights, and other forms of IP are protected.  Companies should consult these rules not only to avoid infringing others’ rights, but also to enforce their own rights when third parties post content that infringes their IP.

Companies should consult privacy policies to understand how information posted on a site may be used and disclosed.  Although some users take comfort in the “privacy settings” offered by social media sites, that comfort can be misplaced. The basic assumption for using social media should be that if it is posted, it is public.  An excerpt from Twitter’s privacy policy illustrates this point:

Our Services are primarily designed to help you share information with the world. Most of the information you provide us is information you are asking us to make public. This includes not only the messages you Tweet and the metadata provided with Tweets, such as when you Tweeted, but also the lists you create, the people you follow, the Tweets you mark as favorites or Retweet, and many other bits of information that result from your use of the Services. . . . Your public information is broadly and instantly disseminated. . . . When you share information or content like photos, videos, and links via the Services, you should think carefully about what you are making public.

Social media platforms can – and do – change their rules from time to time, and companies using these platforms must keep current with the changes.

5. Don’t make promises you can’t (or won’t) keep.  Companies often want to reassure site users about privacy issues by stating in their privacy policies that they protect consumers’ information and do not share it.  Such promises, if not kept, can pose a significant risk of liability. Even if a company initially intends to keep personal information for internal use only, at some point it may be tempted to analyze, and then monetize, that personal information by sharing it with third parties.  Before a company makes promises in its privacy policy, it should think carefully about its current practices and its future business needs and expansion plans. To allow leeway for future changes, a privacy policy should reserve the right to make changes. 

6. Educate employees on why and how they should protect the company’s IP.  Employees, especially those who use social media, should understand the value of the company’s brand and the value of their role in helping the company maintain its brand.  They should be familiar with the proper way to use the company’s trademarks and logos.  And they should be aware of the procedure to follow in reporting any content they see in social media that infringes or disparages the company’s brand. 

Employees should also understand the value of the company’s confidential and proprietary information – its trade secrets – and how best to protect that information.  To claim trade secret protection, a company must show that the information at issue derives independent economic value from not being generally known by others, and that the company has made reasonable efforts to keep the information secret.  Companies need to educate employees about the kinds of information they deem secret and about best practices for guarding against disclosure of that information in social media.  This disclosure could be inadvertent or even intentional, through sites such as Theflyonthewall.com or Wikileaks.com that actively solicit disclosure of company secrets.

7. Be vigilant and proactive.  Companies must monitor their own sites and others’ sites for postings that may diminish their IP rights, by infringement or by disparagement of their brand.  With social media, time is of the essence.  Monitoring for problems permits a quicker response.  To cite one example:  An airline passenger became a cause célèbre on the internet after Tweeting about being ordered off a plane for being too large.  By the time his story had gained traction on Google, however, the airline had apologized to him via Twitter and had posted on its blog an apology and an explanation of its policy regarding passengers who cannot fit into their seats.  This quick and effective response was possible only because the company was on the watch for trouble and had a plan in place for dealing with it as soon as it occurred.

Companies should also be proactive in protecting their IP against new opportunities for infringement in the social media world.  For example, whether or not a company uses social media to promote its products and services, the company should guard against “cybersquatting” by reserving for itself the domains, fan sites, channels, and user accounts in social media that feature the company’s name or brands.  Finally, companies that own trademarks and copyrights should include social media sites in their policing strategy and should enforce their IP rights on those sites just as forcefully as they would in other media. 

These seven steps can help companies minimize the IP risks involved in using social media while making the most of the advantages this powerful communications tool has to offer.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Nexsen Pruet, PLLC | Attorney Advertising

Written by:

Nexsen Pruet, PLLC
Contact
more
less

Nexsen Pruet, PLLC on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
Privacy Policy (Updated: October 8, 2015):
hide

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

Information Collection and Use by JD Supra

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Email Choice/Opt-out

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.

Security

JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at info@jdsupra.com. In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Sharing and Disclosure of Information JD Supra Collects

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

Links to Other Websites

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

Changes in Our Privacy Policy

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

Contacting JD Supra

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at: info@jdsupra.com.

- hide
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.