SlideShare a Scribd company logo
1 of 3
Download to read offline
Ober|Kaler - IP Watch: Trade Secrets in the Video Game Industry, 5/22/09                                          Page 1 of 3




      In this Issue             MAY 22, 2009

      Patent Prosecution
      Issues
                                     Trade Secrets in the Video Game
      For International Brand
      Protection Consider
      Madrid
                                                Industry
      Trade Secrets in the
                                                                  Kyle E. Conklin
      Video Game Industry                                          410-347-7360
                                                               keconklin@ober.com
      Intellectual Property
      Group                     There has always been significant migration among video game industry
                                employees, but this is especially true in today's economic climate. Unfortunately,
      E. Scott Johnson, Chair
      Royal W. Craig
                                this trend heightens the risk that a company's trade secrets will be
      Jonathan M. Holda         misappropriated. This risk is exemplified by a recently-filed lawsuit involving a well-
      Anthony F. Vittoria       known video game company.
      James B. Wieland
      Cynthia Blake Sanders
      Christopher F. Lonegro    In April, Genius Products and Numark Industries filed suit against Activision and 7
      Jed R. Spencer            Studios, claiming that the defendants misappropriated trade secrets involving an
      Kyle E. Conklin           interactive disc-jockey video game, Scratch: The Ultimate DJ. Under a
                                development agreement, 7 Studios was developing the game for Genius, but when
      Carlyle C. Ring, Jr.
      (Counsel)                 Activision, which was also producing its own disc-jockey game, acquired 7
                                Studios, 7 Studios demanded new terms to the agreement. Genius refused to
                                accept the new terms and terminated the agreement. Subsequently, Genius filed
                                suit alleging that Activision and 7 Studios misappropriated its trade secrets,
                                including "computer source code, generic code, object code, the ‘game engine,'
                                graphic materials, art work, story lines, music, sound effects, documentation, and
                                user manuals."

                                As this lawsuit suggests, trade secret protection is important to commercial
                                success, and to fully protect a company's trade secrets, one must first know what
                                can be a trade secret and the different mechanisms of protecting these secrets.
                                This article discusses trade secrets and how they relate to the software and video
                                game industry.

                                                            What is a trade secret?

                                The legal definition of a trade secret varies by jurisdiction, but it is generally
                                defined as any information that has economic value from not being known to the
                                public, industry, or others who could realize economic value. This information must
                                also be the subject of reasonable efforts to maintain its secrecy. If information
                                qualifies as a trade secret, the trade secret owner may prevent anyone who
                                improperly discovers the information from disclosing or using it.

                                A variety of information may qualify as a trade secret, including a formula, pattern,
                                compilation of data, device, method, technique, or process. And in the gaming
                                industry, trade secrets commonly comprise software, including firmware, software




http://www.ober.com/shared_resources/news/newsletters/ipw/ipw-052209-p03.html#page=1 7/10/2009
Ober|Kaler - IP Watch: Trade Secrets in the Video Game Industry, 5/22/09                                    Page 2 of 3



                           tools, encoded file formats, story and character ideas and the code itself—source
                           code, object code, and machine code.1

                             Software Must Be a Secret and Subject to Reasonable Security
                                                      Measures

                           For software to qualify as a trade secret it must be a legitimate secret—the
                           software cannot be disclosed to anyone not having a duty of confidentiality. And in
                           some jurisdictions, the software must be novel—it cannot be common industry
                           knowledge.2 This novelty requirement, however, has a low threshold requiring
                           some degree of change over what is already known. Software is typically also
                           protectable under copyright law; these two forms of protection are not mutually
                           exclusive.

                           If the software has been disclosed to a party not having a duty of confidentiality,
                           the software is no longer considered a secret, and trade secret protection is lost.
                           Thus, in the gaming industry, it is important to examine disclosures to employees,
                           hired contractors, joint venturers, licensees, and end users.

                           The circumstances determine what necessary measures must be taken to ensure
                           secrecy. Requiring all employees to sign a non-disclosure agreement is a common
                           measure. An employee handbook or a written policy notifying the employee of the
                           confidential nature of the employment relationship is another security measure that
                           helps maintain secrecy, as well as restricting dissemination and access to the
                           source code. And when disclosing confidential information to third parties such as
                           independent contractors and joint venturers, a nondisclosure agreement should be
                           signed by the recipient before making the disclosure.

                           With licensees and end users of widely distributed software, it is important that the
                           license or EULA contain a provision that prohibits "reverse engineering" because
                           of the ease software can be reverse engineered. Further, the trade secret owner
                           should only distribute the software in object code, not source code, and always
                           provide notice that the software is proprietary.

                                Software Must Provide Competitive Advantage and Value

                           For software to qualify as a trade secret, the owner must derive some advantage
                           over competitors who do not have the software.3 Commercial advantage may
                           comprise the mere time and effort it took to develop the software, or the fact that
                           the software is unknown to competitors.4 The competitive advantage must also
                           result in some value to the trade secret owner.

                                   Proving Misappropriation of a Software Trade Secret

                           For a trade secret owner to prove misappropriation, the owner must prove that the
                           defendant (1) is using the trade secret and (2) wrongfully obtained it.5 With
                           software, these requirements are generally satisfied by showing that the
                           defendant's code is substantially similar to the trade secret or contains some
                           unique identifying characteristics, such as unique syntax errors or algorithms. To
                           show that the defendant wrongfully obtained the software, the owner can show,
                           among others things, that the defendant (1) illegally gained access to the owner's
                           computer and communication systems, (2) used misrepresentations or fraud to
                           procure the trade secret, (3) bribed the owner's employee to gain information, or
                           (4) hired the owner's former employees for the purpose of obtaining the trade
                           secret.6

                                                              Conclusion

                           Virtually any type of software can be trade secret as long as it is a legitimate
                           secret, provides a competitive advantage and value, and is subject to reasonably
                           security measures.




http://www.ober.com/shared_resources/news/newsletters/ipw/ipw-052209-p03.html#page=1 7/10/2009
Ober|Kaler - IP Watch: Trade Secrets in the Video Game Industry, 5/22/09                                 Page 3 of 3



                           Because of the increased mobility and competition in the industry, it's now more
                           important than ever to ensure you have procedures in place to identify and secure
                           trade secrets.

                           NOTES

                           1International Game Developers Association, Intellectual Property and the Video
                           Game Industry (2003), available at
                           http://www.igda.org/ipr/IGDA_IPRights_WhitePaper.pdf.

                           2L.J. Kutten, Computer Software Protection: Liability; Law; Forms § 4:27 (2009).


                           3L.J. Kutten, Computer Software Protection: Liability; Law; Forms § 4:29 (2009).


                           4Id. § 4:30.


                           5Id. § 4:26.


                           6Id.




                           Copyright© 2009, Ober, Kaler, Grimes & Shriver




http://www.ober.com/shared_resources/news/newsletters/ipw/ipw-052209-p03.html#page=1 7/10/2009

More Related Content

What's hot

The Guardian Project
The Guardian ProjectThe Guardian Project
The Guardian Projectnatdefreitas
 
Mobile Tagging: Bridging the Gap - Mobile Portland
Mobile Tagging: Bridging the Gap - Mobile PortlandMobile Tagging: Bridging the Gap - Mobile Portland
Mobile Tagging: Bridging the Gap - Mobile PortlandPaul Dockter
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authenticationlfilliat
 
Security for heterogeneous enviroments
Security for heterogeneous enviromentsSecurity for heterogeneous enviroments
Security for heterogeneous enviromentsFederman Hoyos
 
Avigilon Investor Presentation
Avigilon Investor Presentation Avigilon Investor Presentation
Avigilon Investor Presentation Avigilon
 
Iadis Tns2007 Presentation
Iadis Tns2007 PresentationIadis Tns2007 Presentation
Iadis Tns2007 PresentationCarlos Serrao
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraKishor Satpathy
 
The Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityThe Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityManah Khalil
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
Smartfinger applications brochure
Smartfinger applications brochureSmartfinger applications brochure
Smartfinger applications brochureIDEX ASA
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 janJason Kong
 
Glonetex Biometrics Proposal
Glonetex Biometrics ProposalGlonetex Biometrics Proposal
Glonetex Biometrics ProposalCarleton Bedell
 

What's hot (20)

The Guardian Project
The Guardian ProjectThe Guardian Project
The Guardian Project
 
Privacy Armor
Privacy ArmorPrivacy Armor
Privacy Armor
 
Mobile Tagging: Bridging the Gap - Mobile Portland
Mobile Tagging: Bridging the Gap - Mobile PortlandMobile Tagging: Bridging the Gap - Mobile Portland
Mobile Tagging: Bridging the Gap - Mobile Portland
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
DigiChain Blockhain on HyperLedger
DigiChain Blockhain on HyperLedgerDigiChain Blockhain on HyperLedger
DigiChain Blockhain on HyperLedger
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
 
Security for heterogeneous enviroments
Security for heterogeneous enviromentsSecurity for heterogeneous enviroments
Security for heterogeneous enviroments
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
Avigilon Investor Presentation
Avigilon Investor Presentation Avigilon Investor Presentation
Avigilon Investor Presentation
 
Iadis Tns2007 Presentation
Iadis Tns2007 PresentationIadis Tns2007 Presentation
Iadis Tns2007 Presentation
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Disha Tek Corporation, New Delhi, MAGIC-SS
Disha Tek Corporation, New Delhi, MAGIC-SSDisha Tek Corporation, New Delhi, MAGIC-SS
Disha Tek Corporation, New Delhi, MAGIC-SS
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital era
 
Key2 share moosecon
Key2 share mooseconKey2 share moosecon
Key2 share moosecon
 
The Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityThe Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital Identity
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Smartfinger applications brochure
Smartfinger applications brochureSmartfinger applications brochure
Smartfinger applications brochure
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 jan
 
10.1.1.70.1834
10.1.1.70.183410.1.1.70.1834
10.1.1.70.1834
 
Glonetex Biometrics Proposal
Glonetex Biometrics ProposalGlonetex Biometrics Proposal
Glonetex Biometrics Proposal
 

Viewers also liked

Lista De Todos Los Alumnos Rechazados Y Aceptados
Lista De Todos Los Alumnos Rechazados Y AceptadosLista De Todos Los Alumnos Rechazados Y Aceptados
Lista De Todos Los Alumnos Rechazados Y Aceptadosguest098ec31
 
Silverlight 3 Briefing
Silverlight 3 BriefingSilverlight 3 Briefing
Silverlight 3 BriefingDavid Chou
 
Tim Elliott Art Direction
Tim Elliott Art DirectionTim Elliott Art Direction
Tim Elliott Art Directionelliottdesign
 
Web mining (structure mining)
Web mining (structure mining)Web mining (structure mining)
Web mining (structure mining)Amir Fahmideh
 

Viewers also liked (7)

I-Cinema Bits Newsletter issue 2 summer 2006
I-Cinema Bits Newsletter issue 2 summer 2006I-Cinema Bits Newsletter issue 2 summer 2006
I-Cinema Bits Newsletter issue 2 summer 2006
 
Lista De Todos Los Alumnos Rechazados Y Aceptados
Lista De Todos Los Alumnos Rechazados Y AceptadosLista De Todos Los Alumnos Rechazados Y Aceptados
Lista De Todos Los Alumnos Rechazados Y Aceptados
 
Silverlight 3 Briefing
Silverlight 3 BriefingSilverlight 3 Briefing
Silverlight 3 Briefing
 
Rain Network 2007
Rain Network 2007Rain Network 2007
Rain Network 2007
 
Tim Elliott Art Direction
Tim Elliott Art DirectionTim Elliott Art Direction
Tim Elliott Art Direction
 
Building RIA Apps with Silverlight
Building RIA Apps with SilverlightBuilding RIA Apps with Silverlight
Building RIA Apps with Silverlight
 
Web mining (structure mining)
Web mining (structure mining)Web mining (structure mining)
Web mining (structure mining)
 

Similar to Trade Secrets in the Video Game Industry

FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexera
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintNowSecure
 
Intellectual Property Rights for Business
Intellectual Property Rights for Business Intellectual Property Rights for Business
Intellectual Property Rights for Business Ritu Sah
 
Tamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against HackingTamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against HackingFlexera
 
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...South Tyrol Free Software Conference
 
How can a decentralized exchange prevent hacking
How can a decentralized exchange prevent hacking How can a decentralized exchange prevent hacking
How can a decentralized exchange prevent hacking AmniAugustine
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
20080229_WashburnU_KS_PatentTradeSecretComplementarinessUnsuspectedSynergy200...
20080229_WashburnU_KS_PatentTradeSecretComplementarinessUnsuspectedSynergy200...20080229_WashburnU_KS_PatentTradeSecretComplementarinessUnsuspectedSynergy200...
20080229_WashburnU_KS_PatentTradeSecretComplementarinessUnsuspectedSynergy200...Mehdi Rahmani
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSINTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSIRJET Journal
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
Intellectual Property When Working With 3rd Party Developers
Intellectual Property When Working With 3rd Party DevelopersIntellectual Property When Working With 3rd Party Developers
Intellectual Property When Working With 3rd Party DevelopersSoftjourn, Inc.
 
Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenUnderstanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenWerksmans Attorneys
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP FracasAntigone Peyton
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 

Similar to Trade Secrets in the Video Game Industry (20)

FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
Cs207 6
Cs207 6Cs207 6
Cs207 6
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
 
Intellectual Property Rights for Business
Intellectual Property Rights for Business Intellectual Property Rights for Business
Intellectual Property Rights for Business
 
Tamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against HackingTamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against Hacking
 
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
 
How can a decentralized exchange prevent hacking
How can a decentralized exchange prevent hacking How can a decentralized exchange prevent hacking
How can a decentralized exchange prevent hacking
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
20080229_WashburnU_KS_PatentTradeSecretComplementarinessUnsuspectedSynergy200...
20080229_WashburnU_KS_PatentTradeSecretComplementarinessUnsuspectedSynergy200...20080229_WashburnU_KS_PatentTradeSecretComplementarinessUnsuspectedSynergy200...
20080229_WashburnU_KS_PatentTradeSecretComplementarinessUnsuspectedSynergy200...
 
DSS - Investor Presentation
DSS - Investor PresentationDSS - Investor Presentation
DSS - Investor Presentation
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSINTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
 
https-::www.akgec.ac.in:wp-content:uploads:2021:08:6-Prity_Khastgir.pdf
https-::www.akgec.ac.in:wp-content:uploads:2021:08:6-Prity_Khastgir.pdfhttps-::www.akgec.ac.in:wp-content:uploads:2021:08:6-Prity_Khastgir.pdf
https-::www.akgec.ac.in:wp-content:uploads:2021:08:6-Prity_Khastgir.pdf
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Intellectual Property When Working With 3rd Party Developers
Intellectual Property When Working With 3rd Party DevelopersIntellectual Property When Working With 3rd Party Developers
Intellectual Property When Working With 3rd Party Developers
 
Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenUnderstanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP Fracas
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 

Recently uploaded

Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...noor ahmed
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEApsara Of India
 
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Riya Pathan
 
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near MeBook Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Meanamikaraghav4
 
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...aamir
 
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Apsara Of India
 
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...ritikasharma
 
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...anamikaraghav4
 
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...perfect solution
 
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolVIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolRiya Pathan
 
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...anamikaraghav4
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...aamir
 
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Riya Pathan
 
Call Girls Jodhpur Park - [ Cash on Delivery ] Contact 8250192130 Escorts Ser...
Call Girls Jodhpur Park - [ Cash on Delivery ] Contact 8250192130 Escorts Ser...Call Girls Jodhpur Park - [ Cash on Delivery ] Contact 8250192130 Escorts Ser...
Call Girls Jodhpur Park - [ Cash on Delivery ] Contact 8250192130 Escorts Ser...Riya Pathan
 
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Apsara Of India
 
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...Riya Pathan
 
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur EscortsVIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Riya Pathan
 
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
 
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
 
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near MeBook Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
 
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
 
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
 
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
 
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
 
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
 
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolVIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
 
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
 
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
 
Call Girls Jodhpur Park - [ Cash on Delivery ] Contact 8250192130 Escorts Ser...
Call Girls Jodhpur Park - [ Cash on Delivery ] Contact 8250192130 Escorts Ser...Call Girls Jodhpur Park - [ Cash on Delivery ] Contact 8250192130 Escorts Ser...
Call Girls Jodhpur Park - [ Cash on Delivery ] Contact 8250192130 Escorts Ser...
 
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
 
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
 
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur EscortsVIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
 
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
 
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
 

Trade Secrets in the Video Game Industry

  • 1. Ober|Kaler - IP Watch: Trade Secrets in the Video Game Industry, 5/22/09 Page 1 of 3 In this Issue MAY 22, 2009 Patent Prosecution Issues Trade Secrets in the Video Game For International Brand Protection Consider Madrid Industry Trade Secrets in the Kyle E. Conklin Video Game Industry 410-347-7360 keconklin@ober.com Intellectual Property Group There has always been significant migration among video game industry employees, but this is especially true in today's economic climate. Unfortunately, E. Scott Johnson, Chair Royal W. Craig this trend heightens the risk that a company's trade secrets will be Jonathan M. Holda misappropriated. This risk is exemplified by a recently-filed lawsuit involving a well- Anthony F. Vittoria known video game company. James B. Wieland Cynthia Blake Sanders Christopher F. Lonegro In April, Genius Products and Numark Industries filed suit against Activision and 7 Jed R. Spencer Studios, claiming that the defendants misappropriated trade secrets involving an Kyle E. Conklin interactive disc-jockey video game, Scratch: The Ultimate DJ. Under a development agreement, 7 Studios was developing the game for Genius, but when Carlyle C. Ring, Jr. (Counsel) Activision, which was also producing its own disc-jockey game, acquired 7 Studios, 7 Studios demanded new terms to the agreement. Genius refused to accept the new terms and terminated the agreement. Subsequently, Genius filed suit alleging that Activision and 7 Studios misappropriated its trade secrets, including "computer source code, generic code, object code, the ‘game engine,' graphic materials, art work, story lines, music, sound effects, documentation, and user manuals." As this lawsuit suggests, trade secret protection is important to commercial success, and to fully protect a company's trade secrets, one must first know what can be a trade secret and the different mechanisms of protecting these secrets. This article discusses trade secrets and how they relate to the software and video game industry. What is a trade secret? The legal definition of a trade secret varies by jurisdiction, but it is generally defined as any information that has economic value from not being known to the public, industry, or others who could realize economic value. This information must also be the subject of reasonable efforts to maintain its secrecy. If information qualifies as a trade secret, the trade secret owner may prevent anyone who improperly discovers the information from disclosing or using it. A variety of information may qualify as a trade secret, including a formula, pattern, compilation of data, device, method, technique, or process. And in the gaming industry, trade secrets commonly comprise software, including firmware, software http://www.ober.com/shared_resources/news/newsletters/ipw/ipw-052209-p03.html#page=1 7/10/2009
  • 2. Ober|Kaler - IP Watch: Trade Secrets in the Video Game Industry, 5/22/09 Page 2 of 3 tools, encoded file formats, story and character ideas and the code itself—source code, object code, and machine code.1 Software Must Be a Secret and Subject to Reasonable Security Measures For software to qualify as a trade secret it must be a legitimate secret—the software cannot be disclosed to anyone not having a duty of confidentiality. And in some jurisdictions, the software must be novel—it cannot be common industry knowledge.2 This novelty requirement, however, has a low threshold requiring some degree of change over what is already known. Software is typically also protectable under copyright law; these two forms of protection are not mutually exclusive. If the software has been disclosed to a party not having a duty of confidentiality, the software is no longer considered a secret, and trade secret protection is lost. Thus, in the gaming industry, it is important to examine disclosures to employees, hired contractors, joint venturers, licensees, and end users. The circumstances determine what necessary measures must be taken to ensure secrecy. Requiring all employees to sign a non-disclosure agreement is a common measure. An employee handbook or a written policy notifying the employee of the confidential nature of the employment relationship is another security measure that helps maintain secrecy, as well as restricting dissemination and access to the source code. And when disclosing confidential information to third parties such as independent contractors and joint venturers, a nondisclosure agreement should be signed by the recipient before making the disclosure. With licensees and end users of widely distributed software, it is important that the license or EULA contain a provision that prohibits "reverse engineering" because of the ease software can be reverse engineered. Further, the trade secret owner should only distribute the software in object code, not source code, and always provide notice that the software is proprietary. Software Must Provide Competitive Advantage and Value For software to qualify as a trade secret, the owner must derive some advantage over competitors who do not have the software.3 Commercial advantage may comprise the mere time and effort it took to develop the software, or the fact that the software is unknown to competitors.4 The competitive advantage must also result in some value to the trade secret owner. Proving Misappropriation of a Software Trade Secret For a trade secret owner to prove misappropriation, the owner must prove that the defendant (1) is using the trade secret and (2) wrongfully obtained it.5 With software, these requirements are generally satisfied by showing that the defendant's code is substantially similar to the trade secret or contains some unique identifying characteristics, such as unique syntax errors or algorithms. To show that the defendant wrongfully obtained the software, the owner can show, among others things, that the defendant (1) illegally gained access to the owner's computer and communication systems, (2) used misrepresentations or fraud to procure the trade secret, (3) bribed the owner's employee to gain information, or (4) hired the owner's former employees for the purpose of obtaining the trade secret.6 Conclusion Virtually any type of software can be trade secret as long as it is a legitimate secret, provides a competitive advantage and value, and is subject to reasonably security measures. http://www.ober.com/shared_resources/news/newsletters/ipw/ipw-052209-p03.html#page=1 7/10/2009
  • 3. Ober|Kaler - IP Watch: Trade Secrets in the Video Game Industry, 5/22/09 Page 3 of 3 Because of the increased mobility and competition in the industry, it's now more important than ever to ensure you have procedures in place to identify and secure trade secrets. NOTES 1International Game Developers Association, Intellectual Property and the Video Game Industry (2003), available at http://www.igda.org/ipr/IGDA_IPRights_WhitePaper.pdf. 2L.J. Kutten, Computer Software Protection: Liability; Law; Forms § 4:27 (2009). 3L.J. Kutten, Computer Software Protection: Liability; Law; Forms § 4:29 (2009). 4Id. § 4:30. 5Id. § 4:26. 6Id. Copyright© 2009, Ober, Kaler, Grimes & Shriver http://www.ober.com/shared_resources/news/newsletters/ipw/ipw-052209-p03.html#page=1 7/10/2009