Friday, August 31, 2007

Legal framework on sharing of IP [India]

Corporate houses that use government funds for research, particularly in the pharmaceutical and biotechnology sectors, will soon have a legal framework to share the intellectual property generated by these joint efforts.

At present, the government provides assistance in the form of non-repayable grant in aid and as soft loans for specific research projects undertaken by industry, universities and other public and private entities. The move is set to give a major boost to publicly funded research which has started picking up recently.

It is also expected to boost nano-technology research, for which the government has allocated a massive fund which has received lukewarm response till now.

At present, universities and autonomous research institutions that get government funding lack the mandate to commercialise their research results that is largely done by the industry. Innovations also get wasted as the it belongs to the funding agency and there is no incentive for the innovators.

The new legislation would provide a legal framework that would develop an active interface between the funding agencies, academia and the industry, which has been lacking so far.

“One reason why our country lags behind in generating IPs is that our innovations remain within the confines of R&D institutions and fail to get commercialised. The department of bio-technology has now drafted the Public Funded R&D Projects (Protection, Utilisation and Regulation of Intellectual Property) Bill, 2007 for giving a fillip to government aided R&D and promotion of the culture of innovation in the country,” an official source said.

As per the provisions of the draft bill, R&D institutions funded by the government would be permitted to make applications to protect the IP developed by them in countries of their choice and use the revenue generated from such commercialisation. The funding agency (government) could apply for IPs only in such countries not selected by the institutions.

Microsoft settles IE patent dispute with Eolas [International]

The long-running legal battle over web-browser technology is over, but neither side is talking about the details

Microsoft has settled a long-running and expensive lawsuit with Eolas Technologies, a start-up backed by the University of California, that alleged Internet Explorer infringed a patent.

"We're pleased to be able to reach an amicable resolution in this long-running dispute with Eolas and the University of California," the company said in a statement on Thursday, though it declined to share further details. Eolas couldn't immediately be reached for comment.

The suit concerned technology that lets web browsers call up separate applications or plug-ins, such as Flash or Java, within a web page. While at the University of California at San Francisco, Eolas chief executive Michael Doyle led a team that worked on the technology in the patent, and he spun off Eolas to help commercialise it, according to Eolas.

Microsoft revamped Internet Explorer to work around the patent in 2005.

Eolas prevailed earlier in the case, with a court awarding damages of $521m (£258m) in 2003US Patent and Trademark Office upholding the validity of the Eolas patent in 2005. However, a US Supreme Court decision this year weakened Eolas' case, and Microsoft said it expected the damages in the case to be revisited. and the

The Seattle Post-Intelligencer reported the settlement on Thursday and published on Monday a letter from Eolas chief operating officer Mark Swords to shareholders that said: "We are very pleased that we can now focus our resources on commercialising our existing intellectual property portfolio and developing new technologies." It didn't offer details of the settlement, but said Eolas anticipates paying shareholders a dividend by the end of 2007.

Although Microsoft has been a target in several intellectual property cases, the company affirmed its support for intellectual property in the computing industry.

"Microsoft values intellectual property and believes that the proper protection and licensing of IP enables companies and individuals to obtain a return on investment, sustain business and encourages future innovations and investment in the IT industry," the company said.

Source: ZD Net [United Kingdom]


Wednesday, August 29, 2007

Apple Files Movable-Interface Patent for iPhone [International Patents]

Even if you're not currently blown away with the iPhone, there's more to come.

According to MacNN, Apple has reportedly filed a patent with the World Intellectual Property Organization covering a user interface on portable devices with touchscreen interface that would allow for quick, tactile reconfiguration of on-screen elements such as icons.

In this case, a user could drag an icon to a desired location, such as with a widget under Dashboard. The method would allow for easy reconfiguration of icons as well as allow them to be automatically displaced by other icons.

The patent is currently filed under application number 60,755,368, was filed on December 30th of 2005 and credits Marcel Van Os, Freddy A. Anzures, Scott, Forstall, Greg Christie, Bas Ording, Imran Chaudhri and Stephen Lemay as inventors of the patent.

Wednesday, August 22, 2007

Australia's data privacy landscape questioned [Data Privacy - Australia]

When it comes to privacy, bank customers in Australia are left to choose between garbage, trash or junk. That is how Gartner's vice president of research, Rich Mogull, describes the current data privacy landscape in Australia.

A strong advocate of the introduction of disclosure laws which force banks to notify customers of a security breach, Mogull said the Australian government needs to act by implementing legislation that includes penalties to ensure compliance.

Without these laws, Mogull said customers cannot make an informed decision when seeking a financial services provider.

He said breaches are occurring in Australia but it is impossible to get meaningful statistical data that could provide some insight into the current IT security landscape.

"There is no legislative protection in Australia just the National Privacy Principles [under the Privacy Act] which are not enforced; the current landscape in Australia is what it was like in the United States pre-2005 before the first breach notification law was introduced in California," he said.

Mogull's comments delivered at Gartner's IT security summit in Sydney today are part of a broader push for changes to the Privacy Act currently being reviewed by the Australian Law Reform Commission (ALRC).

The ALRC is releasing a discussion paper next month recommending the introduction of security breach disclosure laws in Australia with the final report to be delivered to the federal Attorney General, Philip Ruddock in March, 2008.

The recommendation also has the support of the Federal Privacy Commissioner, Karen Curtis.

Mogull said disclosure laws in the US have been the biggest single driver in improving the IT security landscape. Under the Californian law, which he said is the first of its kind in the world, if a specific combination of data is disclosed then customers must be notified. That combination includes the customer's first and last name, along with credit card and banking details, and social security number. "The law was ignored for two years until the Choice Point breach then the flood gates opened," Mogull explained.

"Previously there was no external pressure to act. If an organization is losing customer data and it doesn't affect the business then there is no impact.

"The customer suffers but the business doesn't. There is a built-in market force to keep your mouth shut. Basically, market forces are working against privacy protection."


Mogull said 40 states in the US now have disclosure laws providing customers with a level playing field to make informed decisions.

"The IT security landscape here today has been reduced to a choice of garbage, trash or junk but bad publicity about breaches can change that, it can force change," he said.

"Australia isn't any safer than the US when it comes to data protection I know breaches are occurring as I work with the financial services sector here and know what security programs the banks have in place.

"In fact I think it is a much harsher environment here, especially when it comes to phishing and Australia's proximity to Asian economies; it is just hidden more from consumers.

"There are no market forces pushing organizations to do better."

Mogull said disclosure laws are a good starting point to improve the IT security landscape because it would enable the collection of valuable data and to understand how breaches occur.

"With good stats we can make good decisions," he added.

While Mogull believes the laws should include penalties, he said there should also be a built-in mechanism that allows consumers to take legal action themselves.

He admits organizations may need to increase budgets to be compliant.

"If an organization is currently spending five percent of their budget on security they may have to bump that up to seven percent; but this usually involves a shifting of funds rather than new money," Mogull said.

The Australian Bankers Association (ABA) CEO, David Bell, told Computerworld banks already have a legal duty to protect customer data under a number of laws without the introduction of data disclosure legislation.

Bell said confidentiality and privacy is at the core of customer relationships.

He went on to say it would be premature to comment on the introduction of data disclosure laws before the ALRC's final report is handed down next year.

"But we are certainly awaiting the outcome of the report as the ABA has made a submission to the ALRC on the privacy review," Bell said.

Britain's Information Commissioner's Office Worried Over Data Privacy [Data Privacy - United Kingdom]

The UK's data protection watchdog has warned that greater transparency about data collection is needed as more personal information is shared between different organisations.

The Information Commissioner's Office (ICO) has published new guidelines for individuals to better understand how and why organisations use their data under the current Data Protection Act.

People are not always aware of the extent to which their personal data can be shared by different organisations, according to the ICO -- between, for instance, the police and a local authority.

Iain Bourne, head of data protection projects at the ICO, said in a statement: "More and more information is being shared about us, often for useful and wholly legitimate purposes. It is important that individuals are aware of their rights under the Data Protection Act."

Responding to the ICO's warning, Graham Hann, a technology partner at European law firm Taylor Wessing, said UK data protection laws "are not clearly interpreted in many areas" which can make it difficult for people to understand their rights. Wessing warned that although the general legal requirement is that companies cannot use individuals' data in ways they have not consented to, there are exceptions.

He said in a statement: "New laws brought in recently require that customers opt in to sharing of data for marketing purposes where the marketing would be by email. However not all organisations have caught up to speed with these laws and individuals may find their details being used by businesses wishing to sell them goods or services that they have no interest in receiving."

Businesses should be wary of buying data from third-party sources, he said, and be sure to verify they have legal right to use the data in the way they intend.

The law firm added that consumers' awareness of data protection issues has "risen dramatically in recent years".

The latest data warning from the data protection watchdog follows the launch of silicon.com's Full Disclosure campaign - which is aiming to persuade the UK government to change the law on data breaches so that companies have a legal requirement to inform individuals when their data has been put at risk by a security breach.

Friday, August 17, 2007

USPTO Proposes New Rules for Alternative Claim Language [International Patent Law]

As part of its ongoing efforts to enhance patent quality and reduce pendency in accordance with its "21st Century Strategic Plan," the U.S Patent and Trademark Office published a Notice of Proposed Rulemaking on August 10, 2007 to revise its treatment of claims that recite alternatives, including claims use Markush groups and/or other forms of alternative language. To be ensured of consideration, written comments must be received on or before October 9, 2007. No public hearing will be held. For further official information, contact Kathleen Kahler Fonda, Legal Advisor, Office of the Deputy Commissioner for Patent Examination Policy, by telephone at (571) 272–7754; by mail addressed to: Box Comments Patents, Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313–1450; or by facsimile to (571) 273–7754.

Current Office policy requires examination of all species of a claim that recites a Markush group when the alternatives are sufficiently few in number or so closely related that search and examination can be made without serious burden. Even where the search and examination of a claim that has "unity of invention" would require serious burden, the examiner must determine the patentability of the claim. In such case, however, the examiner may require applicant to elect a single species under 37 CFR 1.146 for initial search and examination to facilitate examination on the merits. If the elected species is not allowable, examination of the Markush claim will be limited to the elected species and any species not patentably distinct therefrom, and any separate claims to the elected species and any species not patentably distinct therefrom. Claims that drawn to species patentably distinct from the elected species are held withdrawn from further consideration. If the elected species is allowable, then the search and examination of the Markush claim will be extended to non-elected species to the extent necessary to determine patentability of the claim. See MPEP 803.02.

According to the Notice, Markush and other alternative formats are being used to claim multiple inventions and/or to recite hundreds, if not thousands, of alternative embodiments of a single invention in one claim. Proper search of such complex claims often consume a disproportionate amount of Office resources as compared to other types of claims. The prosecution of these complex claims likewise requires separate examination and patentability determinations for each of the alternatives within the claim, e.g., if the alternatives raise separate prior art, enablement, or utility issues. Furthermore, the variety and frequency of alternatives recited in claims filed in applications pending before the Office, driven in part by trends in emerging technologies, have exacerbated problems with pendency.

Under the proposed rules, claims that recite alternatives will have to meet two new requirements:

1. Each Claim Must Be Limited to a Single Invention

In addition to proposing a requirement limiting a claim to a single invention, the Office is proposing to specify that when subject matter that reads on multiple species is defined in a single claim using alternative language, the claim is limited to a single invention when at least one of the following two conditions is met: (1) All of the species encompassed by the claim share a substantial feature essential for a common utility, or (2) all of the species are prima facie obvious over each other. The Office proposes to encourage applicants, when filing a claim that employs alternative language, to provide an explanation as to why the claim is directed to a single invention.

The Office also proposes that applicants using alternative formats in continuation-in-part applications must identify which claim or claims in the application are disclosed in the manner provided by the first paragraph of 35 U.S.C. 112 in the prior-filed application. This proposal would reduce examination complexities and identify situations wherein a prior art reference that anticipates or renders prima facie obvious at least one species within the scope of a claim would not be available as prior art against another species if that species was set forth in a separate claim.

2. New Format Requirements for a Claim With Species Presented as a Set of Alternatives

A simplified format for the presentation of such claims must be met by any claim that uses alternative language. The Office proposes to adopt language similar to that in the PCT Guidelines, specifically requiring that the number and presentation of alternatives in the claim not make the claim difficult to construe, and requiring that each alternative within a list of alternatives must be substitutable one for another. (PCT Guidelines (paragraph 5.18) specifies that a claim can contain alternatives ‘‘provided those alternatives are of a similar nature and can fairly be substituted one for another, and provided also that the number and presentation of alternatives is a single claim does not make the claim obscure or difficult to construe.’’)

In addition, to reduce the complexity of determining whether a claim is directed to a single invention, the Office proposes to specify that no alternative may itself be defined as a set of further alternatives. Finally, the Office proposes to specify that no alternative may be encompassed by any other alternative within a list of alternatives, unless there is no other practical way to define the invention. In other words, applicants should file a series of individual claims from the broadest scope that they feel they are entitled to the narrowest scope they are willing to accept. Put differently, applicant should narrow the scope of protection sought via separate claims, and not via nested sets of overlapping alternatives.

Scirus - the Science Search Engine [International]

Scirus is a science-specific search engine on the Internet for searching more than 415 million science-related pages. According to their site, Scirus helps you quickly locate scientific information on the Web:

  • Filters out non-scientific sites. For example, if you search on REM, Google finds the rock group - Scirus finds information on sleep, among other things
  • Finds peer-reviewed articles such as PDF and PostScript files, which are often invisible to other search engines.
  • Searches the most comprehensive combination of web information, preprint servers, digital archives, repositories and patent and journal databases. Scirus goes deeper than the first two levels of a Web site, thereby revealing much more relevant information.

Monday, August 13, 2007

Authenticating E-Mail Discovery as Evidence [International]

With the recent passage of the amendments to the US Federal Rules of Civil Procedure, the legal press has been filled with articles containing e-discovery advice. At some point, "e-discovery" will need to be converted into "e-evidence" for the purposes of summary judgment or trial. When you're faced with having spent your clients' time and money to both produce e-discovery and mine your opponents' e-discovery to find the "smoking gun," it's critical to ensure you can get those e-mails into evidence -- or keep them out.

Many practitioners think that e-mails are like business letters and will be admitted into evidence just as easily. E-mails, however, may be more prone to problems of authenticity and hearsay than traditional written documents. People often write e-mails casually, dashing off comments with an informality they'd never use with a letter. Little care is given to grammar and context. Their signature or even their name may be omitted. Authenticating an e-mail presents issues not faced with a traditional letter with its formal letterhead, paragraph structure and signature block. Additionally, e-mails are arguably more susceptible to after-the-fact alteration.

Most e-mail systems, for instance, allow a person forwarding an e-mail to edit the message being forwarded. Such alteration wouldn't be discernible to the recipient. E-mails are also more prone to a kind of hearsay-within-hearsay problem: an "e-mail chain" attaches to an e-mail every e-mail that came before it in a discussion. It isn't enough to get the most recent e-mail into evidence when that e-mail attaches a string of previous e-mails. All of the prior e-mails may need to be separately authenticated and found admissible.

Given the dramatic shift toward the use of e-mails in business communications, courts and practitioners are likely to encounter issues of e-mail evidence more frequently than in the past. Are e-mails so different from traditional written documents that the rules of evidence are out of date? We think that there are practical ways to employ the rules of evidence to confront the special admissibility problems posed by e-mails.

AUTHENTICATION

In order to ensure that an e-mail will be admitted into evidence, a proper foundation for its authenticity must be laid.

Authentication is necessary not only at trial but also at the summary judgment stage.

Although challenges to the admissibility of evidence are not always raised in response to summary judgment motions, a lawyer should be prepared to submit evidence in the form of affidavits to support the authenticity of any e-mail that he or she intends to introduce. In several instances, courts have excluded e-mails at the time of dispositive motion -- not because the e-mails were clearly inauthentic, but because evidence wasn't submitted to support their authenticity in the face of a challenge. One such case is the Western District of Pennsylvania's Bouriez v. Carnegie Mellon University.

Similarly, a lawyer may need to depose a witness to establish the authenticity of an e-mail, based on the witness' personal knowledge, or to have that witness available at trial. Stipulations and requests for admissions can eliminate authentication issues or narrow the scope of those e-mails that will be problematic. In federal court, the parties may choose at their Rule 26(f) conference to agree to a process for stipulating to the authenticity of e-mails each party produces during discovery to avoid unnecessary expense.

The bar for establishing authenticity is not high under Federal Rule of Evidence 901. In the 3rd U.S. Circuit Court of Appeals, a court need only be able to legitimately infer that a document is genuine to find it to be "authentic." Deeper questions concerning trustworthiness might go to the weight of the evidence. In U.S. v. Safavian, faced with a mountain of e-mails, the court refused to require detailed authentication.

Some e-mails can be self-authenticated under Rule 902(7). Business labels, including signature blocks, that evidence the company from which an e-mail was sent, or even the name of a company in an e-mail address, might be sufficient proof of authenticity on their own. Other circumstances, such as the distinctive characteristics of an author's e-mail address or the subject matter and style of the e-mail itself, may also be sufficient to establish authenticity.

An e-mail often has attached to it the e-mail or series of e-mails to which it is responding, creating an e-mail "chain," also known as a "string" or "thread." Some courts have found that each e-mail in a chain is a separate communication, subject to separate authentication and admissibility requirements. A lawyer should thus be prepared to authenticate every step of a chain.

The Pennsylvania Superior Court, however, has noted that uncertainties of authenticity for e-mails are the same as for traditional written documents: "A signature can be forged; a letter can be typed on another's typewriter; distinct letterhead stationary [sic] can be copied or stolen," according to In re F.P. The court therefore rejected the notion that e-mail is inherently more unreliable than traditional written documents, as well as the argument that e-mail cannot be properly authenticated within the existing framework of Pennsylvania law.

HEARSAY

The second major hurdle for getting an e-mail into evidence is the hearsay rule. By definition, hearsay is an out-of-court statement "offered in evidence to prove the matter asserted." The first way, therefore, to overcome a hearsay challenge to the admission of an e-mail is to claim that it's not hearsay at all.

An e-mail that is an admission by a party-opponent is "not hearsay." If your opponent is an individual, this is a simple test. In the corporate setting, however, damaging admissions may be authored by lower-level employees who do not have the authority to be making such statements. In order for the e-mail to qualify as a party admission, the author needs not only to be acting in the scope of his or her employment but also to have the proper authority.

Party-opponent admissions would also include statements by "a party's agent" concerning matters within the scope of the agency, i.e., "vicarious admissions." In addition, if your opponent's e-mails contain statements of others without reservation, e.g., when a party forwarded e-mails received from others, the e-mails may be introduced in evidence as "adoptive admissions," according to Safavian. This kind of statement has indicia of reliability because "the party has manifested an adoption or belief in its truth."

Another way to overcome a hearsay challenge is to fit the e-mail into one of the exceptions to the hearsay rule. These exceptions are permitted because their context makes them likely to be reliable.

Many practitioners would consider e-mails as classic examples of business records for corporate entities that routinely use e-mail for both internal and external communication. Under Federal Rule of Evidence 803(6), however, only "if it was the regular practice of that business activity" to make that record can a document come into evidence under the exception. An e-mail might fit this "business records" exception if the company -- not just the individual, but the company itself -- has a reliable practice of sending, receiving and storing that kind of e-mail. A company might have that kind of practice if it takes and records purchase orders via e-mail. Notably, an e-mail that fits into the "business records" exception may also be self-authenticating, under Rule 902(11), if its authenticity is supported by an affidavit.

Many e-mails, however, do not meet the "business records" exception because they are merely chatter, statements that are made casually and not as a matter of obligation or even routine. An e-mail sent at an employee's sole discretion is not likely to have the necessary indicia of reliability and trustworthiness to be admitted as a "business record." If an employee sends off a quick e-mail to a colleague commenting on the substance of a meeting with a business partner, it may not be admissible. By contrast, minutes of the same meeting kept by the same employee and circulated to all in attendance, in e-mail form, at the request of management could qualify under the "business records" exception. Although there is not yet a well-established line of cases on this issue, courts appear concerned that if they allow e-mails into evidence as "business records" too easily, people will begin to use the convenience of e-mails to write self-serving internal communications.

With the advent of handheld devices as well as the ubiquity of laptop computers, e-mails may actually be admitted into evidence on the basis of "present sense impressions," or even as "excited utterances," as in Lorraine. People are often using e-mail to comment on events as they are transpiring, even during meetings. If one can show that an e-mail was written while perceiving an event or immediately thereafter, or while under the stress caused by a startling event, it might meet the "present sense impression" or "excited utterance" standards of rules 803(1) and 803(2).

Of course, these standards are difficult to meet because contemporaneousness or near-immediacy is necessary. An e-mail might still meet the "present sense impression" standard if written 10 minutes after an event, but many e-mails are written hours or days later.

Just as with authentication, one should be prepared to argue for the admissibility, under the hearsay exceptions, of every e-mail in an e-mail chain, as in New York v. Microsoft Corp. One should also be aware, as with authentication, that evidence that is clearly inadmissible at trial cannot be considered by a court on summary judgment.

Although Rule 56 does not require an unequivocal ruling that an e-mail will be admissible at trial for a court to consider it on summary judgment, one should be prepared to support its admissibility with an affidavit.

The special problems posed by e-mails do not change the rules of impeachment. A lawyer's ability to cross-examine a witness with a prior inconsistent statement does not change merely because the statement is contained in an e-mail.

BE PROACTIVE

The admissibility problems related to e-mail extend to other forms of electronically stored information, too. Text messages, instant messaging, chat rooms or "team rooms" (in which all materials concerning a project are preserved electronically for the entire project team to access) all present unique evidentiary challenges.

Practitioners need to be proactive in their efforts to ensure that key pieces of evidence can be admitted at trial. From the time of the initial review of documents through discovery, lawyers need to focus on how to get in or keep out such evidence.