SlideShare a Scribd company logo
1 of 18
Download to read offline
 Transfer of new technologies from universities and research
 institutions to parties capable of commercialization, or in the
 sense of transfer of technologies across international borders,
 generally from developed to developing countries.
 Each year Israeli technology transfer companies generate a
 total of over NIS 1 Billion in royalties.

 Over NIS 100 Million are invested by industrial companies in
 scientific research collaborations at universities

 About 150 new technologies are licensed from Israeli
 universities and research institutes each year
 Entering into technology transfer agreements

 Setting up joint ventures and partnerships to share both the risks
 and rewards of bringing new technologies to market

 Other corporate vehicles such as spin-outs. In such cases, the
 parent company usually offers support to the “spin out” company
 doing one or more of the following:
      investing equity in the new firm,
      being the first customer of the spin-out (helps to create cash
       flow),
      providing incubation space (desk, chairs, phones, internet
       access, etc.),
      providing services such as legal, finance, technology, etc…
   Employee poaching
        One of the methods used in the technology transfer industry to capture the expertise of competition is
        to poach executives and technology specialists. This is one of the activities of headhunters,
        recruitment firms.

   Industrial espionage
        It implies corporate spying with professional criminals targeting specific technology, initiating network
        attacks (hacks), laptop computer thefts accessing source code, product designs, marketing plans,
        customer lists, approaching employees to reveal company information, etc

   Reverse engineering
        It occurs when someone legally obtains a product, and then discovers how that product works or how
        it was put together by carefully studying it, taking it apart, experimenting on it, etc..

   Counterfeiting
        Counterfeit goods (commonly called "knockoffs") consist of the imitation of a product. If it is usually
        made ​without compliance with quality standards of the infringing product, it sometimes leads to an
        acquisition of knowledge, by the method of trial and error.
Patents
       Designs                  An invention, whether a product
       & Models                    or a process, which must be
                                                                             Trademarks
                                 industrially applicable (useful),
 The unique way a product                   be new (novel)                  A distinctive sign,
looks such as a computer’s            and exhibit a sufficient       which identifies certain goods
         molding                           “inventive step”         or services as those produced /
                                          (be non-obvious)         provided by a specific person or
                                                                                enterprise
                   Copyrights                                      (i.e. logos, distinctive names for
                                                                              products and
           Rights given to creators for their                                 technologies)
                                                    Trade secrets
                 literary and artistic works
              (including technical manuals,
                  software, specifications,       A protected formula or
                formulae, schematics, and         method, undisclosed
                       documentation)             customer or technical
                                                       information,
                                                     algorithms, etc.
Patents
e.g. Apple vs. Samsung case
Trademarks

             Registration Number: 3886196                                                            Mark
             Standard Character claim: No
             Current Status: Registered. The registration date is used to determine when post-registration maintenance
             documents are due.
             Filing Date: 2010-04-21                                            Registration Date: 2010-12-07
             LAST APPLICANT(S)/OWNER(S) OF RECORD 1. Apple Inc.
             GOODS AND/OR SERVICES International Class: 009
             Class Status: Active
             Telephony software, namely, computer software for making, managing, and receiving phone calls, and for
             reviewing, managing, and playing electronic voice messages
             Basis: 1(a)        First Use Date: 2007-06-29          First Use in Commerce Date: 2007-06-29
             ADDITIONAL INFORMATION Color(s) Claimed: The color(s) green, light green, dark green and white
             is/are claimed as a feature of the mark.
             Description of Mark: The mark consists of a rectangle with rounded corners depicting a stylized white
             telephone receiver against a striped green and dark green background. A shade of light green covers the
             upper half of the rectangle design.
             Design Search Code(s):
             16.01.08 - Telephones
             26.11.21 - Rectangles that are completely or partially shaded
             26.17.06 - Bands, diagonal; Bars, diagonal; Diagonal line(s), band(s) or bar(s); Lines, diagonal
             MADRID PROTOCOL INFORMATION USPTO Reference Number: A0022117
             International Registration Number: 1058208 International Registration Date: 2010-11-12
             Original Filing Date with USPTO: 2010-11-12
             International Registration Status: Application For IR Registered By IB
             Date of International Registration Status: 2010-12-16
             International Registration Renewal Date: 2020-11-12
             Irregularity Reply by Date: (DATE NOT AVAILABLE)
Trade secrets




   e.g. Coca Cola formula
Copyright protection is not
Copyrights   subject to any formality (unlike
             patents, registered designs or
             trademarks). The work is
             protected automatically upon its
             creation. Basically it is the act of
             creation which gives rise to
             copyright.
Designs & Models
 Three categories:

 Agreements may be for certain IP rights only
        e.g. a license to practice an identified patent or to copy and distribute a certain work of
        authorship


 Agreements may be for all the IP rights of any kind that are necessary
  to reproduce, make, use, market, and sell products based on a type of
  technology
        e.g. a license to develop a new software product that is protected by patent, copyright,
        trademark and trade secret law


 Agreements may also be for all the IP rights necessary in order to
  create and market a product that complies with a technical standard
  or specification
        e.g. a group of enterprises has agreed on a technical standard to ensure interoperability of
        devices—the group agrees to pool their IP rights and license to each other all rights each will
        need to manufacture and sell the product
 Complexity and level of development of the technology that is to be acquired;

 Actual needs of the recipient; His technological capacity and his ability to use
 and/or adapt the technology being purchased

 The relevance, availability and cost effectiveness of alternative technologies

 Price (in cash or any other kind)

 Other proposed terms and conditions for transfer, such as support offered during and
 after transfer in absorbing and adapting the new technology, or rights over
 improvements or adaptations made by the recipient,

 The negotiating power of both parties (which will, in turn, depend on variables such
 as size, technological sector, demand for the technology, number of competitors, etc.)

 The type of relationship envisaged between the two parties (e.g. long-term, short-
 term or one-off purchase of products/services.)

 Product liability, indemnity, warranty, etc,

 Whether technical support and training for use of new technology and related
 equipment is required.
 An IP Audit is defined as
 a systematic review of the
 IP owned, used or
 acquired by a business.

 1st step: identify the
 readily identifiable IP

 2nd step: itemize external
 or market influences

 Valuation of these items:
 How much will it cost to
 replace the item if it were
 lost? What is the
 expected income, e.g. in
 the next five years, that
 can be generated by the
 IP assets?
 Assignment of IP Rights


 Licensing Agreements


 Know-How contracts


 Joint Venture Agreements


 Franchise


 Acquisition of Equipment and Capital Goods
 IP right is to give its holder a competitive advantage in its
 commercial activities, by preventing unauthorized exploitation by
 third parties. This is especially important for SMEs, which IP rights
 provide with powerful weapons to compete with much larger
 companies.

 IP rights can also be licensed or used to help create or finance a
 spin-off company. It is therefore possible to derive value from them
 even if their owner does not have its own manufacturing capability
 (e.g. universities). IPRs protection should form a part of the overall
 innovation and business strategy envisaged for the asset.
Attorney at law, admitted to Paris and Brussels bars
       Professor at La Sorbonne University

                thibault.verbiest@ulys.net


           France: +33 (0)1 40 70 90 11
           Belgium: +32 (0)2 340 88 10
            Israel: +972 (0)3 970 70 20

More Related Content

What's hot

Ip & npd razaghi-ramezankhani-ghiassaleh-parvizian
Ip & npd razaghi-ramezankhani-ghiassaleh-parvizianIp & npd razaghi-ramezankhani-ghiassaleh-parvizian
Ip & npd razaghi-ramezankhani-ghiassaleh-parvizian
Omid Aminzadeh Gohari
 
Ss leveraging intellectual property assets for business success
Ss leveraging intellectual property assets for business successSs leveraging intellectual property assets for business success
Ss leveraging intellectual property assets for business success
Marcus Vannini
 
To patent or not to patent
To patent or not to patentTo patent or not to patent
To patent or not to patent
Stephen Mason
 
Protecting Intellectual Property
Protecting Intellectual PropertyProtecting Intellectual Property
Protecting Intellectual Property
kborah
 

What's hot (20)

Why should you care about intellectual property?
Why should you care about intellectual property?Why should you care about intellectual property?
Why should you care about intellectual property?
 
EUT440 LAW 4 (Intelectual Property)
EUT440 LAW 4 (Intelectual Property)EUT440 LAW 4 (Intelectual Property)
EUT440 LAW 4 (Intelectual Property)
 
Presentation on IP Management and Start Ups by Prof. A. B. Suraj
Presentation on IP Management and Start Ups by Prof. A. B. SurajPresentation on IP Management and Start Ups by Prof. A. B. Suraj
Presentation on IP Management and Start Ups by Prof. A. B. Suraj
 
1.management of intellectual property rights (assets) 2016
1.management of intellectual property rights (assets) 20161.management of intellectual property rights (assets) 2016
1.management of intellectual property rights (assets) 2016
 
Intellectual Property for Startups
Intellectual Property for StartupsIntellectual Property for Startups
Intellectual Property for Startups
 
Intellectual Property Strategies
Intellectual Property StrategiesIntellectual Property Strategies
Intellectual Property Strategies
 
Intellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-UpsIntellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-Ups
 
201501 gests423 s4
201501 gests423 s4201501 gests423 s4
201501 gests423 s4
 
Ip & npd razaghi-ramezankhani-ghiassaleh-parvizian
Ip & npd razaghi-ramezankhani-ghiassaleh-parvizianIp & npd razaghi-ramezankhani-ghiassaleh-parvizian
Ip & npd razaghi-ramezankhani-ghiassaleh-parvizian
 
IP in Malaysia
IP in MalaysiaIP in Malaysia
IP in Malaysia
 
Intellectual properties presentation
Intellectual properties presentationIntellectual properties presentation
Intellectual properties presentation
 
Ss leveraging intellectual property assets for business success
Ss leveraging intellectual property assets for business successSs leveraging intellectual property assets for business success
Ss leveraging intellectual property assets for business success
 
To patent or not to patent
To patent or not to patentTo patent or not to patent
To patent or not to patent
 
Intellectual Property Rights in India
Intellectual Property Rights in IndiaIntellectual Property Rights in India
Intellectual Property Rights in India
 
Protecting Intellectual Property
Protecting Intellectual PropertyProtecting Intellectual Property
Protecting Intellectual Property
 
Copy right ppt in intellectual property rights
Copy right ppt in intellectual property rightsCopy right ppt in intellectual property rights
Copy right ppt in intellectual property rights
 
Introduction to Intellectual Property in Cambodia
Introduction to Intellectual Property in CambodiaIntroduction to Intellectual Property in Cambodia
Introduction to Intellectual Property in Cambodia
 
Intellectual Property Strategy
Intellectual Property StrategyIntellectual Property Strategy
Intellectual Property Strategy
 
Intellectual property theft
Intellectual property theftIntellectual property theft
Intellectual property theft
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
 

Similar to Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Brussels 10/31/11

Entrepreneur Assignment
Entrepreneur AssignmentEntrepreneur Assignment
Entrepreneur Assignment
so_hell85
 
Wipo ip mct_apr_04_5
Wipo ip mct_apr_04_5Wipo ip mct_apr_04_5
Wipo ip mct_apr_04_5
Satish Rana
 
4-28-16 IP for general counsel (publish)
4-28-16 IP for general counsel (publish)4-28-16 IP for general counsel (publish)
4-28-16 IP for general counsel (publish)
Stephen Mason
 
Intellectual property protection
Intellectual property protectionIntellectual property protection
Intellectual property protection
MSIZI NDABA
 

Similar to Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Brussels 10/31/11 (20)

Entrepreneur Assignment
Entrepreneur AssignmentEntrepreneur Assignment
Entrepreneur Assignment
 
Technology management
Technology managementTechnology management
Technology management
 
Wipo ip mct_apr_04_5
Wipo ip mct_apr_04_5Wipo ip mct_apr_04_5
Wipo ip mct_apr_04_5
 
Protecting and profiting from your intellectual property_Carter DeLuca for mH...
Protecting and profiting from your intellectual property_Carter DeLuca for mH...Protecting and profiting from your intellectual property_Carter DeLuca for mH...
Protecting and profiting from your intellectual property_Carter DeLuca for mH...
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009
 
4-28-16 IP for general counsel (publish)
4-28-16 IP for general counsel (publish)4-28-16 IP for general counsel (publish)
4-28-16 IP for general counsel (publish)
 
Intellectual property issues for start ups
Intellectual property issues for start upsIntellectual property issues for start ups
Intellectual property issues for start ups
 
Designs Patent Protection
Designs Patent ProtectionDesigns Patent Protection
Designs Patent Protection
 
Protecting intellectual property white paper
Protecting intellectual property white paperProtecting intellectual property white paper
Protecting intellectual property white paper
 
IPR
IPRIPR
IPR
 
Startups- know 4 types of ip protection for businesses
Startups- know 4 types of ip protection for businessesStartups- know 4 types of ip protection for businesses
Startups- know 4 types of ip protection for businesses
 
FITT Toolbox: Software Patents
FITT Toolbox: Software PatentsFITT Toolbox: Software Patents
FITT Toolbox: Software Patents
 
A Comprehensive Guide to Intellectual Property Rights
A Comprehensive Guide to Intellectual Property RightsA Comprehensive Guide to Intellectual Property Rights
A Comprehensive Guide to Intellectual Property Rights
 
Intellectual property protection
Intellectual property protectionIntellectual property protection
Intellectual property protection
 
Introduction to ip rights
Introduction to ip rightsIntroduction to ip rights
Introduction to ip rights
 
Are we burying our heads in the sand? Exploring issues around intellectual pr...
Are we burying our heads in the sand? Exploring issues around intellectual pr...Are we burying our heads in the sand? Exploring issues around intellectual pr...
Are we burying our heads in the sand? Exploring issues around intellectual pr...
 
IP Protection in the USA
IP Protection in the USAIP Protection in the USA
IP Protection in the USA
 
Anna Gg Intellectual Property Rights
Anna Gg Intellectual Property RightsAnna Gg Intellectual Property Rights
Anna Gg Intellectual Property Rights
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian Legislation
 
Ip practice overview pres 2012
Ip practice overview pres 2012Ip practice overview pres 2012
Ip practice overview pres 2012
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 

Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Brussels 10/31/11

  • 1.
  • 2.  Transfer of new technologies from universities and research institutions to parties capable of commercialization, or in the sense of transfer of technologies across international borders, generally from developed to developing countries.  Each year Israeli technology transfer companies generate a total of over NIS 1 Billion in royalties.  Over NIS 100 Million are invested by industrial companies in scientific research collaborations at universities  About 150 new technologies are licensed from Israeli universities and research institutes each year
  • 3.  Entering into technology transfer agreements  Setting up joint ventures and partnerships to share both the risks and rewards of bringing new technologies to market  Other corporate vehicles such as spin-outs. In such cases, the parent company usually offers support to the “spin out” company doing one or more of the following:  investing equity in the new firm,  being the first customer of the spin-out (helps to create cash flow),  providing incubation space (desk, chairs, phones, internet access, etc.),  providing services such as legal, finance, technology, etc…
  • 4. Employee poaching One of the methods used in the technology transfer industry to capture the expertise of competition is to poach executives and technology specialists. This is one of the activities of headhunters, recruitment firms.  Industrial espionage It implies corporate spying with professional criminals targeting specific technology, initiating network attacks (hacks), laptop computer thefts accessing source code, product designs, marketing plans, customer lists, approaching employees to reveal company information, etc  Reverse engineering It occurs when someone legally obtains a product, and then discovers how that product works or how it was put together by carefully studying it, taking it apart, experimenting on it, etc..  Counterfeiting Counterfeit goods (commonly called "knockoffs") consist of the imitation of a product. If it is usually made ​without compliance with quality standards of the infringing product, it sometimes leads to an acquisition of knowledge, by the method of trial and error.
  • 5.
  • 6.
  • 7. Patents Designs An invention, whether a product & Models or a process, which must be Trademarks industrially applicable (useful), The unique way a product be new (novel) A distinctive sign, looks such as a computer’s and exhibit a sufficient which identifies certain goods molding “inventive step” or services as those produced / (be non-obvious) provided by a specific person or enterprise Copyrights (i.e. logos, distinctive names for products and Rights given to creators for their technologies) Trade secrets literary and artistic works (including technical manuals, software, specifications, A protected formula or formulae, schematics, and method, undisclosed documentation) customer or technical information, algorithms, etc.
  • 8. Patents e.g. Apple vs. Samsung case
  • 9. Trademarks Registration Number: 3886196 Mark Standard Character claim: No Current Status: Registered. The registration date is used to determine when post-registration maintenance documents are due. Filing Date: 2010-04-21 Registration Date: 2010-12-07 LAST APPLICANT(S)/OWNER(S) OF RECORD 1. Apple Inc. GOODS AND/OR SERVICES International Class: 009 Class Status: Active Telephony software, namely, computer software for making, managing, and receiving phone calls, and for reviewing, managing, and playing electronic voice messages Basis: 1(a) First Use Date: 2007-06-29 First Use in Commerce Date: 2007-06-29 ADDITIONAL INFORMATION Color(s) Claimed: The color(s) green, light green, dark green and white is/are claimed as a feature of the mark. Description of Mark: The mark consists of a rectangle with rounded corners depicting a stylized white telephone receiver against a striped green and dark green background. A shade of light green covers the upper half of the rectangle design. Design Search Code(s): 16.01.08 - Telephones 26.11.21 - Rectangles that are completely or partially shaded 26.17.06 - Bands, diagonal; Bars, diagonal; Diagonal line(s), band(s) or bar(s); Lines, diagonal MADRID PROTOCOL INFORMATION USPTO Reference Number: A0022117 International Registration Number: 1058208 International Registration Date: 2010-11-12 Original Filing Date with USPTO: 2010-11-12 International Registration Status: Application For IR Registered By IB Date of International Registration Status: 2010-12-16 International Registration Renewal Date: 2020-11-12 Irregularity Reply by Date: (DATE NOT AVAILABLE)
  • 10. Trade secrets e.g. Coca Cola formula
  • 11. Copyright protection is not Copyrights subject to any formality (unlike patents, registered designs or trademarks). The work is protected automatically upon its creation. Basically it is the act of creation which gives rise to copyright.
  • 13.  Three categories:  Agreements may be for certain IP rights only e.g. a license to practice an identified patent or to copy and distribute a certain work of authorship  Agreements may be for all the IP rights of any kind that are necessary to reproduce, make, use, market, and sell products based on a type of technology e.g. a license to develop a new software product that is protected by patent, copyright, trademark and trade secret law  Agreements may also be for all the IP rights necessary in order to create and market a product that complies with a technical standard or specification e.g. a group of enterprises has agreed on a technical standard to ensure interoperability of devices—the group agrees to pool their IP rights and license to each other all rights each will need to manufacture and sell the product
  • 14.  Complexity and level of development of the technology that is to be acquired;  Actual needs of the recipient; His technological capacity and his ability to use and/or adapt the technology being purchased  The relevance, availability and cost effectiveness of alternative technologies  Price (in cash or any other kind)  Other proposed terms and conditions for transfer, such as support offered during and after transfer in absorbing and adapting the new technology, or rights over improvements or adaptations made by the recipient,  The negotiating power of both parties (which will, in turn, depend on variables such as size, technological sector, demand for the technology, number of competitors, etc.)  The type of relationship envisaged between the two parties (e.g. long-term, short- term or one-off purchase of products/services.)  Product liability, indemnity, warranty, etc,  Whether technical support and training for use of new technology and related equipment is required.
  • 15.  An IP Audit is defined as a systematic review of the IP owned, used or acquired by a business.  1st step: identify the readily identifiable IP  2nd step: itemize external or market influences  Valuation of these items: How much will it cost to replace the item if it were lost? What is the expected income, e.g. in the next five years, that can be generated by the IP assets?
  • 16.  Assignment of IP Rights  Licensing Agreements  Know-How contracts  Joint Venture Agreements  Franchise  Acquisition of Equipment and Capital Goods
  • 17.  IP right is to give its holder a competitive advantage in its commercial activities, by preventing unauthorized exploitation by third parties. This is especially important for SMEs, which IP rights provide with powerful weapons to compete with much larger companies.  IP rights can also be licensed or used to help create or finance a spin-off company. It is therefore possible to derive value from them even if their owner does not have its own manufacturing capability (e.g. universities). IPRs protection should form a part of the overall innovation and business strategy envisaged for the asset.
  • 18. Attorney at law, admitted to Paris and Brussels bars Professor at La Sorbonne University thibault.verbiest@ulys.net France: +33 (0)1 40 70 90 11 Belgium: +32 (0)2 340 88 10 Israel: +972 (0)3 970 70 20