From Invention To Patent: Protecting New and Innovative Business Ideas: The Importance of Proper Management of Trade Secrets and Patents Guriqbal Singh Jaiya Director, SMEs Division WIPO (www.wipo.int/sme) Short Guides on IP for Business • Published – – – – Flash Version Making a Mark (Trademarks) Looking Good (Designs) Inventing the Future (Patents) Creative Expression (copyright) • In the pipeline – Trade Secrets Useful Book • Intellectual Property Management: A Guide for • • • • • Scientists, Engineers, Financiers, and Managers By Claas Junghans and Adam Levy © 2006 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim, Germany ISBN-13: 978-3-527-3186-3 ISBN-10: 3-527-31286-2 170 pages Key Message By establishing a culture of identifying, cultivating and strategically using its IP assets, an enterprise can increase its revenue, have an edge over its competitors and position itself well in the market. Ignoring IP altogether is in itself an IP strategy that may prove costly to the enterprise in the longterm. Dr. Horst Fischer, Corporate Vice President, Siemens AG “Any company wishing to prosper in the next millennium will also have to efficiently manage its IP portfolio”. “For this reason it has become essential that every manager in the enterprise - not just those working in the corporate legal department - appreciates and understands not only what IP is, but how it can be more effectively exploited." What are IP Rights? • Industrial Property Rights – – – – – – Patents and Utility Models (or “short-term patents”) Trademarks Industrial Designs Geographical Indications Trade secrets Topographies of integrated circuits • Copyright and Related Rights • New Varieties of Plants • Non-original databases Trade Secrets • • • • • Definition Examples Protection Strategies Using; sharing (CA/NDA/NCA) Licensing; strategic alliances; partnerships • Audit • Competitive intelligence; espionage • Re-assess risk & value: Internal/external Actual Vs Legal Trade Secrets • Actual secrets: Trespass or theft • Legal trade secrecy is not actual or absolute secrecy. Definition: Identify Trade Secrets Considerations in determining whether information is a trade secret: • Whether known outside the company • Whether widely known by employees and others involved with the company • Have measures been taken to guard its secrecy/confidentiality Identify Trade Secrets Contd... • What is the value of the Information to your company? • What is the potential value to your competitors? • How much effort and/or money spent in collecting/developing it? • How difficult would it be for others to acquire, collect or duplicate it? Definition • Formula, pattern, device or compilation of information, unknown to others, that gives competitive advantage • Common law or statute • Unlimited Duration / No registration • Cost (of maintaining secrecy, security, ; surveillance, litigation) • Reverse engineering; independent development Examples • Unpatented inventions • Future product designs/models • Valuable nonpublic company documents: Drawings, blueprints, laboratory notebooks, test data and training manuals • Marketing, purchasing, planning and customer information • Financial, accounting, recruiting and legal information Examples Contd... • • • • • • • Strategic plans Product concepts Financial reports Customer lists Employee files Engineering plans Production manuals You may get a lot! In a single misappropriation act a biotechnological trade secret may be obtained which represents: • (1) the blueprint (DNA); • (2) the machinery (expression system used) • (3) the factory itself (host cell contining the recombinant DNA under control of the expression system) Stealing may be Easy! • Micro-organisms: vast numbers, microscopic size and self replicating! • Italian subsidiary of a US pharmaceutical house dipped handkerchief into fermentation vat at his own retirement party! Integrated Security Environment • Identify key corporate assets/ “crown jewels” • Integrate and Balance security components in interlocking layers to protect against perceived risk profile • Communicate, train, and educate employees to distribute ownership of the security process throughout the employee (weakest Link) • Monitor and Reassess to adapt to changing risk profile Protection Strategies • • • • • • • Identify Trade Secrets Develop Protection Policy; Document it Educate Employees; Monitor Compliance Restrict Access Mark Documents Physically Isolate and Protect Maintain Computer Secrecy Protection Strategies Contd... • Restrict Public Access to Facilities • Deal Cautiously with Third Parties; Confidentiality Agreements and Nondisclosure Agreements • Be Careful and Consistent with Unsolicited Submissions • Security/Trade Secret Audit; internal / external • Coordination of integrated security enterprise-wide Protection Policy Advantages of a Written Policy • Transparency • Clarity (how to identify and protect) • How to reveal (in house or to outsiders) • Demonstrates commitment to protection; important in litigation Educate Employees • Prevents inadvertent disclosure; employment contract • Unscrupulous employees (personal gain) • Terminated employees (revenge) • Former employee (inadvertent loss, hired by competitor, or becomes competitor) • Educate and train (on hiring give copy of policy, periodic training and audit, exit interview, retirement); proactive role Educate Employees Contd... • Make known that disclosure of trade secret may result in termination and/or legal action • Confidentiality agreements/non disclosure agreements/ Non compete agreements • Transform every employee into a potential security officer; every employee must contribute to maintain the security environment • Human and procedural security must be proactive; clear communication and repetition Restrict Access On a “Need to know basis” Mark Documents • Uniform system of marking documents • Paper Based • Electronic Physically Isolate and Protect • • • • • • • Separate locked depository; authorization Access control (third parties; unauthorized ) Log of access; document reviewed or taken Surveillance of depository/company premises Shredding Oversight; audit trail Labs, green houses, test plots, etc Maintain Computer Secrecy • Authorization; access control • Mark confidential or secret; legend pop, or before and after sensitive information • Physically isolate and lock: Computer tapes, discs, other storage media • Remote access • E-mail; SMS messages • Oversight; audit rail Restrict Public Access to Facilities • Log and visitor’s pass to be worn all times • Accompany visitor; sometimes CA/NDA • Visible to anyone walking through a company’s premises (type of machinery; layout; physical handing of work in progress or finished products) • Overheard conversations • Documents left in plain view • Unattended waste baskets Third Parties • Sharing for exploitation • Consultants, financial advisors, computer programmers/professionals, web site host, other independent professional, subcontractors, designers, partners, joint ventures • Confidentiality agreement, Nondisclosure agreements Unsolicited Submissions (US) • Formulate procedures to handle US • Notify (in writing) all persons submitting US disclosures that your company will not enter into a confidential relationship • Requesting the submitter to sign an acknowledgement that your company is not obligated to use the US Information and owes no duty of confidentiality IP Rights: Patents • Definition: A patent is an exclusive legal right granted for an invention that is: – New (Novelty) – Involves an inventive step (Non obvious) – Capable of industrial application • • • • • Duration: 20 years from filing/priority date Territorial right Requires disclosure/deposit of the invention/material Can be licensed to third parties Utility Models (or short-term patent): up to 10 years IP Rights: Patents • • • • • • • Patentable subject matter Exclusions Prior art/secret prior art Utility/best mode/trade secrets Depository institution Employee inventions Joint applicants/joint inventors/independent contractors/joint owners Patents • Why apply for patent protection? – – – – – – – – – Market exclusivity To recover R&D investments Facilitates licensing Advantageous negotiating tool Financing opportunities (venture capitalists, etc) Favorable image and credibility Freedom to operate Higher market value and publicity International expansion Patents contd... • First to file/first to invent: Laboratory books/Drawing • Accelerated examination • Dependence and multi-patent products • Front page, description and drawings • Claims; technological density and claim breadth/Route of filing/amendment of claims Problem-Solution Approach • Definition of closet prior art • Objective identification of technical problem • Examination, whether solution obvious from prior art Patent Office may contrast closest prior art with technical effect of invention; definition of “objective problem to be solved” is different from problem defined in original application Choice of prior art affects whether obvious or not Case study on patent protection • Case study on the commercialization of a patented product – Croatian pharmaceutical company (Pliva) discovers new antibiotic (azythromicin) – Pliva applies for patent protection in Croatia and in various potential export markets – Large pharmaceutical multinational Pfizer searches patent databases and discovers the Pliva patent – Pliva licenses Pfizer to produce the antibiotic in the US as well as in some other countries in Western Europe while Pliva maintains the exclusive right to commercialize the antibiotic in Eastern Europe