Cyberlaw: Patents and Trade Secrets in the Information Age

Cyberlaw: Patents and Trade Secrets in the Information Age

4.1 Scope of Patent Protection for Internet Patents and Obviousness
  • Patent Defined: An intellectual property right granted by the U.S. government to an inventor. It allows the inventor to exclude others from making, using, marketing, selling, offering for sale, or importing an invention.

  • Key Requirements for a Patent: The device or invention must be:

    • Novel: New and original.

    • Useful: Serve a practical purpose.

    • Non-obvious: Not apparent to someone skilled in the relevant field.

  • Three Basic Types of Patents:

    • Utility Patents: Granted for any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.

    • Design Patents: Granted for a new, original, and ornamental design for an article of manufacture. These protect the product's appearance or non-functional aspects.

    • Plant Patents: Granted for anyone who invents or discovers and asexually reproduces any distinct and new variety of plant.

  • Case Study: Bid for Position, LLC v. AOL, LLC:

    • Context: This case involved Google's AdWords, a system where ads are displayed with search results based on keywords.

    • Outcome: The Appeals Court ruled that Google's AdWords did not infringe on Bid for Position's patent for an "Online Auction Bid Management System and Method."

  • Business Method Patent (Cyber Patent):

    • A U.S. patent that describes and claims a series of process steps that, as a whole, constitute a method of doing business.

    • Additionally, it is granted on an invention that combines business methods and software programs for Internet applications.

4.2 Requirements for Patentability
  • Novelty Requirement: An invention must have occurred before any anticipation by prior art or reference.

    • Prior Art: Refers to existing knowledge, usage, patents, and descriptions related to an invention that were in existence before the invention itself. If an invention is described in prior art, it is not novel.

  • First to Invent Doctrine: This doctrine dictates that patent ownership is based on who was the "first to invent" a particular item, rather than who was the "first to file" a patent application for it.

    • Interference: An administrative proceeding conducted in the United States Patent and Trademark Office (USPTO) to determine which of two or more applicants is truly entitled to the patent when they claim the same invention.

4.3 Patent Application and Appeals Process
  • Patent Prosecution: This term describes the entire process of applying for a patent with the USPTO and subsequently negotiating with the patent examiner regarding the application's approval.

  • Patent Agent:

    • A specialized legal professional who is not necessarily a licensed lawyer.

    • Their primary function is to prepare and prosecute patent applications before the USPTO.

  • Jurisdiction of Patents: Federal District Courts hold original jurisdiction over any civil action that arises under an act of Congress relating to patents.

4.4 Protecting Assets as Trade Secrets
  • Trade Secret Defined: A formula, process, device, or other business information that is kept confidential to maintain a competitive advantage over competitors.

  • Governing Law: Trade secrets are primarily governed by state law, most notably through the Uniform Trade Secrets Act (UTSA), which many states have adopted.

  • Requirements for Protection: Information can be protected as a trade secret as long as it meets two key conditions:

    • It is not generally known within the industry.

    • It is not readily ascertainable through independent investigation by others.

  • Owner's Responsibility for Protection: The owner of a trade secret must actively take reasonable precautions to protect the confidentiality of the secret. Examples of such precautions include:

    • Implementing firewalls to secure digital information.

    • Monitoring user activity to detect unauthorized access.

    • Employing encryption for sensitive data.

    • Utilizing confidentiality agreements (Non-Disclosure Agreements - NDAs) with employees and partners.