Archive for the ‘Technology’ Category

The Right to be Forgotten

leave a comment

This past May, the Court of Justice of the European Union approved “the right to be forgotten” in a case brought by Mario Costeja against a newspaper and Google, a move which fundamentally changed our notions of Internet privacy. More than a decade earlier, Costeja had posted two notices about an auction of his property to pay off debt, and the links to the notices were still appearing in the search results when Googling his name. Costeja brought suit in an effort to remove the links from the search results. The court said the links could be removed if they were found to be “inadequate, irrelevant or no longer relevant.” Under the right to be forgotten, only searches that include a person’s name will provoke the search result removal, which means that the articles or website can still show up in the results if the search is under a different keyword. The European Union’s right to be forgotten has spurred much concern for free speech campaigners, who claim the ruling unjustly limits what can be published online. Privacy advocates, however, are praising the ruling for allowing people some exercise of power over what content appears about them online. This new right creates a process for people to remove links to embarrassing, outdated, and otherwise unwanted content from Google and other search engines' results. Courts are directed to balance the public’s interest in access to the information in question and the privacy interests of the person affected by the content. As of now, the ruling applies only to Google’s local European sites, such as Google.de in Germany, Google.fr in France, and other search engines. This leaves an easy loophole because the content is still available by searching from Google.com. European data protection representatives are, of course, eager to apply the right to be forgotten worldwide in order to make the ruling more effective. Europe’s Article 29 cross-European panel of data protection watchdogs recently announced: “de-listing decisions must be implemented in such a way that they guarantee the effective and complete protection of data subjects’ rights and that EU law cannot be circumvented.” The Article 29 Working Party is comprised of data protection representatives from across Europe and it has very recently published guidelines on the implementation of the right to be forgotten ruling. The guidelines note, “a balance of the relevant rights and interests has to be made and the outcome may depend on the nature and sensitivity of the processed data and on the interest of the public in having access to that particular information. The interest of the public will be significantly greater if the data subject plays a role in public life.” They also address concerns of how this will impact free speech: “in practice, the impact of the de-listing on individuals’ rights to freedom of expression and access to information will prove to be very limited. When assessing the relevant circumstances, [Data Protection Authorities] will systematically take into account the interest of the public in having access to the information. If the interest of the public overrides the right of the data subject, de-listing will not be appropriate.” The representatives ask search engines to apply this new right to be forgotten to all of their websites, including Google.com, for enforcement worldwide. Privacy advocates allege Google has been undermining the new right by limiting its application to local European sites, while free-speech advocates say the rule is “a gateway to Internet censorship that would whitewash the Web.” It is up to the data regulators in individual countries to decide whether to enforce the panel’s guidelines, and it remains unclear whether Google will move to implement the rule.

Will federal legislation make consumers’ private information safer?

leave a comment

After JP Morgan’s computers were penetrated in the early summer of 2014 by hackers, exposing the personal information of the firm’s customers, the firm did not disclose the breach until late in the summer.[1] Over 76 million customers' contact information—phone numbers and email addresses—were stolen.[2] The Connecticut and Illinois Attorney Generals started scrutinizing JP Morgan’s delayed notification to their customers that their contact information was obtained by hackers, taking issue with the fact that JP Morgan “only revealed…limited details” about the extent of the breach.[3] Both attorneys general are assessing whether JP Morgan complied with their state privacy laws—mainly their state’s data breach notification laws. With the size of JP Morgan and with 76 million customer information breached, it is safe to assume that residents of Connecticut and Illinois were not the only ones whose personal information was compromised. Data breach has become a big issue not only for JP Morgan, but for many other companies. The same hackers who breached JP Morgan’s security wall attempted to get customer data from Deutsche Bank, Bank of America, Fidelity and other financial institutions.[4] Hackers breached Target and Home Depot’s customer credit information, taking 40 million of Targets’ customer credit card information and 56 million of Home Depot’s customer credit card information.[5] Data breach and data lost seem to be inevitable, whether it is through someone working internally for an organization—à la Edward Snowden—or through hackers— like in the case of JP Morgan, Home Depot and Target. Regardless of how data is lost, there is a need to evaluate the best approach in notify a consumer when someone else obtain a consumer’s personal information.[6] The matter is made worse since states have varying definitions of what personal information is, and vary in their definitions of the circumstance that might trigger notification and the method in which a breach must be notified.[7] Some states don’t have a timeline in which a company must notify its customers.[8] And when they do have a timeline, it tends to be vague.[9] It took Target three weeks to notify its customers that their customer’s personal data was breached.[10] The matter is made worse since there is no commonplace federal data breach notification law.[11] Big companies like JP Morgan, who are more likely to be targets of hackers, operate in almost all 50 state, and when their customer’s personal data is breached, they have to deal with each state’s data breach laws state-by-state.[12] As a result, some advocate for the need of a federal data breach law.[13] There’s an assumption that a federal response to data notification would be better than a state by state response. California’s attorney general is currently suing the Kaiser Foundation Health Plan because it took the health plan 5 months to notify its customers about a breach.[14] It may not take long until other attorneys general start scrutinizing Kaiser. Some of Target’s customers in various states are suing Target for its data breach notification as well.[15] However, a federal response to data breach notification may not be panacea that some advocate. Legislating is a murky process—even murkier when there’s not much precedent to work with. Data breach, at least the digital kind, is relatively new phenomenon. While various states have their own laws on data breach notification, it is not clear which state(s) have the best process. If a federal notification law is enacted, the standards may be less than what some states currently have. A federal response may serve as a way for companies to absolve themselves from data breach notification. Though the state-by-state approach may be cumbersome, a state-by-state approach in the end will provide a better result as issues are litigated out in public and judges learn about best practices in each state. As cases are litigated in court, states will naturally learn from each other. This organic process is may be more likely to produce a better result than a top-down federal process. [16] [1] Michael Corkery, Jessica Silver-Greenberg and David E. Sanger, Obama Had Security Fears on JPMorgan Data Breach, N.Y. Times (Oct. 8, 2014), http://dealbook.nytimes.com/2014/10/08/cyberattack-on-jpmorgan-raises-alarms-at-white-house-and-on-wall-street/. [2] Id. [3] Emily Glazer and AnnaMaria Andriotis, J.P. Morgan Data Breach Draws Scrutiny From State Attorneys General, Wall St. J. (Oct. 4, 2014), http://online.wsj.com/articles/j-p-morgan-data-breach-draws-scrutiny-from-state-attorneys-general-1412376500. [4] See Corkery, supra note 1. [5] Robin Sidel, Home Depot's 56 Million Card Breach Bigger Than Target's, Wall St. J. (Sept. 18, 2014), http://online.wsj.com/articles/home-depot-breach-bigger-than-targets-1411073571. [6]Delays revealing data breaches costly: Like JPMorgan, industry practice is hide evidence, JOURNALGAZETTE.COM (Sept. 1, 2014), http://www.journalgazette.net/article/20140901/BIZ/309019956 [7] Reid J. Schar & Kathleen W. Gibbons, Complicated Compliance: State Data Breach Notification Laws, Privacy & Security Law Report, BLOOMBERG (Aug. 9, 2013), http://www.bna.com/complicated-compliance-state-data-breach-notification-laws/. [8] Kelli B. Grant, Why did Target take so long to report the breach?, CNBC (Dec. 20, 2013), http://www.cnbc.com/id/101287567# [9] See Luis J. Diaz and Caroline E. Oks, When Fast Is Too Slow: Notification Compliance Following Target’s Data Breach, The Metropolitan Corp. Couns. (Jan. 16, 2014), http://www.metrocorpcounsel.com/articles/27002/when-fast-too-slow-notification-compliance-following-target%E2%80%99s-data-breach#_ftn2 [10] Grant, supra note 8; See Gregg Steinhafel, a message from CEO Gregg Steinhafel about Target’s payment card issues, Target.com, (Dec. 20, 2013), available at https://corporate.target.com/discover/article/Important-Notice-Unauthorized-access-to-payment-ca. [11] See Judy Greenwald, Federal data breach notification law could simplify process, BUSINESS INSURANCE (Oct 24, 2014), http://www.businessinsurance.com/article/99999999/NEWS070101/399999850 [12] With the exception of Alabama, Kentucky, New Mexico and South Dakota, every state as well as the District of Columbia, Puerto Rico and the U.S. Virgin Islands has enacted legislation requiring notification of security breaches involving personal information. See Schar, supra note 7. [13] See Jill Joerling, Data Breach Notification Laws: An Argument for A Comprehensive Federal Law to Protect Consumer Data, 32 Wash. U. J.L. & Pol'y 467, 468 (2010); see also Jacqueline May Tom, A Simple Compromise: The Need for A Federal Data Breach Notification Law, 84 St. John's L. Rev. 1569 (2010). [14] David Navetta, California Attorney General Files Lawsuit Based on Late Breach Notification, INFORMATION LAWGROUP (Jan. 30, 2014), http://www.infolawgroup.com/2014/01/articles/breach-notice/california-attorney-general-files-lawsuit-based-on-late-breach-notification/. [15] See Diaz, supra note 9. [16] See Flora J. Garcia, Data Protection, Breach Notification, and the Interplay Between State and Federal Law: The Experiments Need More Time, 17 Fordham Intell. Prop. Media & Ent. L.J. 693, 697 (2007); see also Brandon Faulkner, Hacking into Data Breach Notification Laws, 59 Fla. L. Rev. 1097 (2007).

CVSG Filed in Commil: Is This Yet Another “Fundamental Misunderstanding” of Patent Law by the Federal Circuit?

leave a comment

On June 2nd, the Supreme Court unanimously reversed the Federal Circuit’s decision in Limelight Networks, Inc. v. Akamai Technologies, Inc. The Court found a defendant could not be held liable for induced infringement of a patent under 35 U.S.C. §271(b) where there has been no infringement under §271(a). In the opinion, the Court had some harsh words for the Federal Circuit. The Court was uncertain why, despite the “simple truth” that liability for inducement must be predicated on direct infringement (to which all parties and the Federal Circuit agreed), the Federal Circuit nonetheless continued its analysis. Ultimately, the Court felt that “the Federal Circuit’s analysis fundamentally misunderstands” method patent infringement.  The amicus brief filed by the Government on October 16th in Cisco Systems, Inc. v. Commil USA, LLC suggests that if and when the Court considers the case, it might reject the Federal Circuit’s decision with comparable vigor. Commil alleged that Cisco both directly infringed and induced infringement of its method patent for hand-offs of mobile devices between base stations in a wireless network system. During the district court trial (the second, the first being reversed after an attempt to unfairly prejudice the jury by counsel for Cisco), the jury found for Commil on both issues and awarded $63.7 million in damages (with an additional $10.3 million awarded by the court for prejudgment interest and costs). On appeal, Cisco argued that the jury instruction on the claim of induced infringement used the language of negligence as opposed to instructing the jury on the higher scienter requirement the Court has adopted for induced infringement cases. Of greater importance, the Federal Circuit held that Cisco should have been able to admit evidence of its good-faith belief that the patent was invalid which bears upon the “willful knowledge” scienter requirement. As it is “axiomatic that one cannot infringe an invalid patent,” the court reasoned that a “good-faith belief of invalidity” could negate the requisite “specific” intent for induced infringement. The Federal Circuit’s support for this new defense was hardly unanimous. Judge Newman, in dissent, argued that the majority’s holding was “contrary to the principles of tort liability, codified in [§271(b)].” A subsequent petition to grant rehearing en banc was denied by a 6-5 vote in the face of two additional dissents. All five dissenting judges, led by Judge Reyna, argued that the defense is “without foundation in law and precedent.” The Government’s brief in support of granting certiorari on the issue of the good-faith defense asserted a similar position. As with the dissenting judges, the Government took issue with the good-faith defense as being “inconsistent with the text, structure, and the purposes of the relevant Patent Act provisions.” Firstly, the Government argued that patent invalidity and non-infringement of the patent are separate defenses under the Patent Act. “The validity of the patent is not an element of direct infringement” so they argued that any belief that the patent is invalid is “irrelevant” to direct infringement. Direct infringement is a strict-liability tort, so the only defense is simply that no direct infringement occurred (i.e. non-infringement). The brief was particularly concerned with the “axiomatic” proposition that one cannot infringe an invalid patent: it noted that one of the authors of the original Patent Act described the very assertion as a “nonsense statement.” An actual finding of invalidity would preclude liability for infringement, direct or induced, and not “negate the fact of infringement.” Furthermore, infringement is understood as practicing the actions which the granted patent allegedly protects, whether or not that grant should have been made by the PTO. Even if the inducer subjectively believes that the patent is invalid, inducing the conduct amounts to inducing infringement. Finally, the Government affirmed the belief held by the Federal Circuit dissenting judges that this defense would “fundamentally change” inducement suits, and not necessarily in a manner favorable to patent holders attempting to enforce their rights. Recognizing that some amount of direct patent infringement (perhaps 20 or 30 percent) cannot be enforced in a practical manner, Congress made the policy decision to allow for an induced infringement cause of action in order to provide some recourse in these situations. Recognizing that all defendants may now “quickly obtain an ‘opinion of counsel’ to support a claim of good-faith belief in invalidity,” the Government sees the potential that this defense may “substantially undermine” a primary purpose of §271(b). Amidst a clear opposition by almost half of the Federal Circuit and the US government, on top of the existing and explicit lack of trust the Supreme Court has in the Federal Circuit’s understanding of method patents (the type allegedly infringed in Commil), it would be surprising if the Court denied cert. on this issue. If the misunderstanding here is as fundamental as in Limelight (as those in opposition present it to be), the Court may soon be forcefully overruling another Federal Circuit inducement decision.

Written by

December 3rd, 2014 at 7:01 pm

Posted in Cases,Technology

“We Don’t Care”? Maybe Kanye should…

leave a comment

140 characters may not seem like enough room to really say something of value. But if Kanye West is saying something, it can be worth a lot more than one may expect. Etsy seller “supervelma” has hand-stitched popular tweets from the rapper Kanye West onto fabric, framed them, and is currently selling them for $45 each on the online craft retailer Etsy. Understandably, West may be upset that someone else is profiting off of his hard-earned Twitter notoriety, but does he have a remedy? Copyright is the traditional form of protection for works of art. Having a registered copyright can prevent others from reproducing the work, making a derivative piece of art based on your original work, or further diluting the value of your work by displaying it. West could argue a claim of copyright infringement, however he may encounter difficulty proving that a tweet can actually receive copyright protection. Many tweets simply state facts—which cannot be protected by copyrights—or link to news articles, whose headlines are generally found to be insufficiently creative to warrant copyright protection. It is also debatable whether a tweet like, “Fur pillows are hard to actually sleep on” meets the de minimis requirement of creativity that a copyrighted work must have. Most copyright experts agree that there is not a bright line rule about whether tweets can gain copyright protection; a copyrightable tweet would certainly be the exception rather than the norm because of the observational nature of Twitter. West—a professional wordsmith—might be able to make a stronger argument than most that his tweets go beyond mere observations, and are artistic expressions that might even make it into future albums. Viewing his tweets as strings of song lyrics may convince a judge that his entire Twitter history, or at least some of his more introspective and personal tweets, would warrant the protective shield of a copyright. Even without a copyright, West would likely prevail because of the use of his name and “likeness”—in the form of a hand-stitched avatar on the cloth. Most states have held that people are entitled to a “right of publicity,” which recognizes a property right in the commercial value of a person’s identity. The commercial value of the name Kanye West, and the public image he has developed, is clearly what is driving the market for these embroideries. While “supervelma” does offer customers the chance to custom order whatever tweets they would like, West’s tweets are what gained the recognition of popular website Buzzfeed and undoubtedly drove up business. West certainly has grounds to seek an injunction to stop “supervelma” from continuing to produce these items, and depending on the state statute regarding remedies he could also sue to recover for any damages and may even be able to get exemplary damages if a jury felt they were appropriate. Public figures should be aware that the same media making them more available to fans can also provide more material for appropriation, and it may be worthwhile to increase their monitoring of retail websites like Etsy, Amazon, and eBay for unauthorized products.

Written by

December 1st, 2014 at 1:44 pm

Posted in Commentary,Technology

Tagged with , ,

Appellate Review of Markman Hearings

leave a comment

In Markman, the Supreme Court declared that determining the meaning of patent claims, i.e. “claim construction,” is a question to be decided by the court; the Seventh Amendment right to a jury trial does not apply. Markman v. Westview Instruments, Inc., 517 U.S. 370, 372 (1996). Shortly thereafter, in Cybor, the Court of Appeals for the Federal Circuit held that de novo review applied when results from these newly-created ‘Markman hearings’ are appealed. Cybor Corp. v. FAS Technologies, Inc., 138 F.3d 1448, 1451 (Fed. Cir. 1998) (en banc).   Earlier this year, the Federal Circuit granted a rehearing en banc to determine if Cybor should be overruled, and what, if any, deference should be given to a District Court’s claim construction. Lighting Ballast Control LLC v. Philips Electronics N. Am. Corp., ___F.3d___, WL 667499 (Fed. Cir. Feb. 21, 2014) (en banc). The court considered three options: (1) reaffirm Cybor and maintain de novo review, (2) overrule Cybor and declare claim construction a question of fact, or (3) adopt a “hybrid” standard of review that affords deference to the District Court’s factual determinations but preserves de novo review of the “ultimate” conclusion. Amici from industrial and technological companies advocated reaffirming Cybor. Academics and practitioners generally favored either the hybrid approach or the overruling of Cybor. Relying on stare decisis, a 6-4 majority reaffirmed Cybor.   The majority pointed out that since Cybor was decided, Congress has not acted to overturn it while enacting other patent legislation during that time. They further explained that predictability and consistency favor maintaining the status quo. Consistency is a concern particularly relevant in patent law – a concern which led to the creation of the Federal Circuit over thirty years ago. The majority feared a return of “forum shopping” because the same patent could be subject to conflicting interpretations in different District Courts. Parties would be incentivized to choose a forum with judges likely to interpret patent claims in their favor knowing that reversal on appeal is unlikely.   The dissent, appearing to favor the hybrid approach, pointed out that the parties in the present case, almost all amici, and the Supreme Court recognize that claim construction involves some questions of fact. Thus, they vehemently argued that under Rule 52(a)(6), courts of appeal can set aside only those findings of fact that are “clearly erroneous.” Rejecting stare decisis, the dissent argued that “informal deference” is already given to District Courts because they spend “hundreds of hours” learning the relevant technology, so overruling Cybor would “not upset settled expectations.” The dissent also stated that de novo review incentivizes the losing party to appeal, decreases the likelihood of settlement, and increases litigation costs.   But Lighting Ballast may not stand for long. In April, the Supreme Court granted certiorari in Teva Pharmaceuticals USA, Inc. v. Sandoz, Inc., which presents a nearly identical question as that in Lighting Ballast. In Teva, the District Court held a Markman hearing and construed the claims in Teva’s favor, avoiding invalidity for indefiniteness. The trial judge relied heavily on Teva’s expert witness to determine the level of ordinary skill in the art at the time of invention. Teva Pharm. USA, Inc. v. Sandoz Inc., 810 F. Supp. 2d 578, 596 (S.D.N.Y. 2011). On appeal, the Federal Circuit explicitly applied de novo review, compared the testimony of the competing expert witnesses, reversed the District Court, and held the claims indefinite. Teva Pharm. USA, Inc. v. Sandoz, Inc., 723 F.3d 1363, 1369 (Fed. Cir. 2013), reh’g en banc denied. Similar to the dissent in Lighting Ballast, Teva claims that Rule 52(a)(6) should have governed the Federal Circuit’s standard of review because determining the level of ordinary skill in the art is a question of fact. Unfortunately, Teva will not be heard until the Supreme Court’s October 2014 term. Until then, Lighting Ballast remains good law; de novo review of claim construction still applies.   Guest Post Written by Brian Apel

Written by

July 13th, 2014 at 1:05 pm

IRS Ruling Declares Bitcoin Will Be Taxed As Property

leave a comment

On March 25, 2014, the Internal Revenue Service issued a ruling declaring that it will tax virtual currencies, such as Bitcoin, as property. This ruling could have significant effects on the way that consumers use Bitcoin. The implication of the ruling is that Bitcoin can no longer operate as an alternative form of currency because any transaction using Bitcoin as consideration will lead to a capital gain or loss for the person paying with Bitcoin. Bitcoin fluctuates drastically in value, which means that almost every transaction using Bitcoin will result in some sort of gain or loss which will now be taxable at capital gains rates. So, for example, if a person buys a Bitcoin for $10 and uses it to purchase an item for $15, he or she will be required to pay capital gains tax on the $5 increase in value. The extreme value fluctuation, however, also explains why the IRS’s ruling may not be as extreme as some commentators suggest. It is, in fact, this value fluctuation which has led consumers to use Bitcoin primarily as an investment medium, like gold, silver, and other commodities, rather than as actual currency. The rapidly changing value of Bitcoin provides plenty of room for investors to try to maximize value by betting on the increase or decrease of the technological commodity. There are also significant administrative restrictions which will make the IRS’s ruling difficult, if not impossible, to enforce, at least with respect to the average individual. In order to determine the amount of capital gains tax an individual owes to the U.S. government, he or she will have to carefully track all of the purchases made with Bitcoin over the course of the year. If individuals are making multiple purchases with Bitcoin, this will prove to be a very tedious and complicated requirement and is likely to discourage individuals from using Bitcoin as currency in the first place. In addition to being difficult for individuals to monitor their capital gains, it will be just as complicated for the IRS to figure out how much it should be receiving in taxes from these individuals. Bitcoin’s original purpose was to provide a type of currency that was completely anonymous, which is why it has often been used in funding illegal transactions. The virtual wallets which house Bitcoins are not tied to individuals; this will make it very difficult for the IRS to monitor how much capital gains tax individuals owe on their Bitcoin transactions. This administrative monitoring gap may provide a new venue for entrepreneurs to develop a platform which provides tracking of an individual’s basis in and purchases using Bitcoin in order to properly determine how much capital gains tax they owe in connection with Bitcoin transactions. But without this type of platform, it is unclear how the IRS will effectively enforce its new ruling. Sources:
  • http://money.cnn.com/2014/03/31/technology/irs-bitcoin/
  • http://techcitynews.com/2014/03/28/bitcoin-is-property-not-currency-rules-irs/
  • http://techcrunch.com/2014/03/30/bitcoin-slips-in-the-wake-of-the-irss-tax-decision/
  • http://www.coindesk.com/irs-bitcoin-ruling-may-bright-side/
  • http://www.inman.com/2014/03/31/irss-bitcoin-guidance-turns-every-transaction-into-a-reportable-capital-gain-or-loss-at-tax-time/
  • http://www.irs.gov/uac/Newsroom/IRS-Virtual-Currency-Guidance
  • http://www.theatlantic.com/technology/archive/2014/03/why-bitcoin-can-no-longer-work-as-a-virtual-currency-in-1-paragraph/359648/
  • http://www.theguardian.com/technology/2014/mar/31/bitcoin-legally-property-irs-currency

Written by

April 8th, 2014 at 10:27 am

Keurig Walls Off the Garden by Shutting Out Third Party K-cups

leave a comment

Keurig, the single serve coffee machine produced by Green Mountain, is nearly ubiquitous in offices, homes, and schools around the country. The device rose to popularity on the back of the K-cup, the single serve pods produced by Green Mountain that allowed a single cup of hundreds of different coffee, tea, and chocolate drinks to be brewed in a matter of seconds. Green Mountain made $3.9 billion in sales in 2012, with 2.7 billion coming from K-cup sales. Keurig was able to maintain strong sales of its K-cups because of several patents on the design and features of the K-cup. However, in September 2012, U.S. Patent Nos. 5,353,765 and 5,840,189 expired. These two patents covered the original K-cup design. Their expiry has opened the door for generic knockoff K-cups to flood the market. Green Mountain claims that the design covered by these patents is outdated and has been superseded by new and improved designs covered under patents that are still in force, including, U.S. Patent Nos. 6,645,537 and the still pending Application No. 20050051478. However, many generic K-cups are already on the market and work in Keurig’s brewing machines. While Keurig claims that generic K-cups will continue to make up less than 15% of the total K-cup market and stress that their current design is superior to any competing product, Green Mountain is clearly worried about the generic threat. In early March of this year Green Mountain announced “Keurig 2.0,” an improved brewing device that would be launching as early as the fall of 2014. Among other changes over previous models, the new Keurig brewer will contain technology that prevents generic K-cups from being used. Green Mountain is the latest to introduce protections for their propriety technology, following in the footsteps of Hewlett-Packard and other printer manufacturers who have added technology to their printers preventing generic printer cartridges from being used, or software companies that have added Digital Rights Management (DRM) to their software to prevent piracy. It is unclear exactly what sort of form this proprietary protection will take, but past forms used in printers include RFID tags. In any case, Green Mountain has made clear that they will still allow third parties to produce K-cups so long as they obtain a license from Green Mountain. Already, a legal fight is brewing over Green Mountain’s proposed move. TreeHouse Foods and Rogers Family are already suing Green Mountain on antitrust grounds. Besides the antitrust concerns, Green Mountain may have difficulty stopping third parties that circumvent their protections. In 2012, Lexmark installed technology to prohibit generic printer ink refills in their printers and lost an appeal in the 6th Circuit for a copyright and DMCA claim against a company that developed a work around for the protection technology for their generic ink refills. In the near future, the legal precedents set by these cases could have far-reaching effects on DRM and physical proprietary protections across the market.

Written by

April 2nd, 2014 at 4:22 pm

Coalition for Patent Fairness Attempts to Curb Inefficient Patent Litigation

one comment

On February 5, 2014, Google and Cisco announced a long-term cross-licensing deal. The agreement permits either company to utilize the other company's patent portfolio. That day, Cisco also agreed to a similar cross-licensing agreement with Samsung. Last week, Google also reached a cross-licensing agreement with Samsung. Why are there so many of these cross-licensing agreements? It begins with intense competition in the technology sector. Companies with large patent portfolios have a financial incentive to sue other infringing companies to either procure licensing fees or protect market share. Of course, other companies may have large patent portfolios as well, and they can counter-sue for infringement of their patents. Thus, we have a form of mutual deterrence. Each company is infringing on patents of the other, and it is often impossible to predict how a judge or jury will decide the case. Companies don't deal well with uncertainty and often choose not to roll the dice. As a result, very few of these cases go to court. The cases that we do see involve highly sophisticated markets such as the smartphone battle between Samsung and Apple, which resulted in a near $1,000,000,000 judgement to Apple. There is another aspect to the patent litigation game. As mentioned above, large companies are deterred from suing each other because of the risk of countersuit. However, a large company could contract with a patent assertion company (or "patent troll") to sue the other corporation on its behalf. The company maintains anonymity and gains the desired market advantage. In these proxy lawsuits, it is often hard to determine the actual interested parties. Companies can in effect hire paid guns to do their dirty work. Fittingly, this practice is called "patent privateering." And to many, this is seen as inefficient and undesirable for the economy. The Coalition for Patent Fairness is such a group that believes that the current method of doing business  is broken. As stated on their website, the Coalition is "a diverse group of companies dedicated to enhancing U.S. innovation, job creation, and competitiveness in the global market by modernizing and strengthening our nation’s patent system." Google, Cisco, and Samsung are companies in the Coalition. By negotiating long-term cross-licensing agreements, these companies are announcing that they are tired of the gamesmanship and shadow tactics common in the technology industry, and they are choosing to compete in the marketplace. Hopefully, in time, more companies will follow their lead.  

Written by

February 17th, 2014 at 11:55 am

Harnessing Deeper Relationships in South Korea

leave a comment

Korea has opened its legal market to foreign law firms under Free Trade Agreements about one and a half years ago.  According to the Ministry of Justice, 16 foreign firms have opened shop and are currently operating in South Korea: • 13 US-based firms: Cleary Gottlieb Steen & Hamilton; Sheppard Mullin Richter & Hampton; Simpson Thatcher & Bartlett; Paul Hastings; Ropes & Gray; Covington & Burling; O'Melveny & Myers; K&L Gates; Cohen & Gresser; Square Sanders; Greenberg Traurig; McKenna Long & Aldridge; McDermott Will & Emer • 3 UK-based firms: DLA Piper; Clifford Chance; Herbert Smith Freehills Why Korea?  South Korea is ranked 15th in the world by nominal GDP and 12th by purchasing power parity, and is considered one of the fastest growing economies in the world.  The combined outbound M&A market for last year was $8.8 billion, an increase of 13% from 2011.  The country also ranks 4th in the number of patents issued by the World Intellectual Property Organization in 2011.  Korea's largest companies are technology companies, such as Samsung, LG, and Hyundai.  Law firms are drawn to the corporate and IP opportunities and Korean companies are similarly drawn to their service.  Korean companies and government have spent close to $1.1 billion in 2011 for foreign legal services in 2011. Law firms are integrating in 3 stages.  For the first two years, firms can open representative offices and provide legal counseling on non-Korean law, which has already attracted a long list of interested corporations.  For the following three years, firms can enter into co-operative agreements with Korean firms, which include advising on legal issues involving a mixture of domestic and foreign law, and entering into fee-share agreements with their Korean counterparts.  The final stage is to allow firms to invest in the local market, recruit Korean lawyers, and enter into partnerships with Korean firms. Some say that heightened competition for legal work will impact fees, and predict that a restructuring period will soon begin.  Others focus on the fierce competition that will emerge from local players that have nurtured deep relationships with Korean companies.  Another consideration is to understand the deeply rooted Confusionistic culture that is pervasive in the business culture, such as the top-down management style whereby decisions are made by committees rising up the hierarchy. But on a whole, foreign firms will have better access to the dynamic global market of Korea and enhance bilateral investment opportunities,  in turn making it easier for Korean companies to navigate investments abroad.

Written by

December 21st, 2013 at 7:31 pm

California Passes New Revenge Porn Law, but is it Good Enough?

leave a comment

Today, just about everything happens on the Internet. That includes flirting, dating, and breaking up. While ex-lovers with broken hearts have sought revenge for centuries, today the implications are far different. Before the Internet, such revenge may have included spreading rumors or writing a phone number in a bathroom stall. Today, however, revenge includes turning private explicit photos of a former lover into non-consensual porn. This is “revenge porn” and California is trying to stop it. Revenge porn is defined as sexually explicit media that is distributed online, without consent of the pictured individual, for the purpose of humiliation. The majority of photos used for revenge porn are taken consensually during a relationship and meant to remain private between the couple. There are a number of websites dedicated to posting such images and they profit from advertising revenue. Revenge porn victims cannot go after web hosts directly due to Section 230 of the Communications Decency Act, which provides a safe harbor. While some believe courts may pierce the section 230 immunity, California took a different approach: making it easier to go after those who distribute sexual images of their exes. Passed by California Governor, Jerry Brown, in early October, the anti-revenge porn legislation would impose a $1,000 dollar fine and six months of jail time upon people convicted of distributing revenge porn. While this may sound good at first, this new legislation has a number of problems. The most glaring problem is that the law only applies when the sexual images are taken by the person accused of posting them online. This means that the law does not apply when a person takes a photo of themselves and shares it with someone who later posts it to a revenge porn website. Unfortunately, according to the Cyber Civil Rights Initiative, over 80% of revenge porn victims (and they are predominantly women) took the photo themselves and assumed it would not later be available for public consumption. The law has been heavily criticized, prompting a robust discussion about how to legislate the tricky issue of non-consensual porn. Other ideas include amending the Copyright Act and establishing a federal law against the practice. While these ideas certainly have merit, they are only ideas. California’s law may have critical flaws, but it is at least a meaningful step toward protecting future victims of revenge porn.

Written by

November 14th, 2013 at 2:09 pm

Search the Blog