[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...CODE BLUE
Cybercrime legislations – or hacking laws- tend to be notoriously broad, resting on a set of assumptions about what ‘unauthorised access’ means, assumptions which hardly match those of the technical or ethical fields. The result is that the offences of unauthorised access and misuse of tools have the potential to criminalise most aspects of legitimate vulnerability research (discovery, proof of concept, disclosure). Independent security researchers are notably at risk of criminal prosecution as they work, by definition, without vendors’ prior authorisation.
The UK is a particular case in point, having drafted its original Computer Misuse Act 1990 in such a way that even switching a computer on can constitute unauthorised access. Further reforms in 2006 and 2015 have expanded even more the scope of the legislation by modifying or adding other offences as broad in scope as the original ones. While the UK is in that respect an outlier, the EU Directive 2013/40/EU on attacks against information systems as well as the Convention on cybercrime n.185 (which is de facto the international treaty) are not without their own weaknesses, despite serious and effective efforts to restrict the scope of criminal law and protect security researchers.
Prosecution guidelines or a memorandum of understanding between the security industry and prosecutorial authorities are a welcome step to avoid outlandish prosecution of security researchers, but I argue that they are not sufficient to protect them once a prosecution starts. Their motive (and the methods used) to improve security will not constitute a legal argument unless a public interest defence exists.
Hence, my proposal to reform the cybercrime legislations (UK, EU and the Convention) by incorporating a public interest defence to cybercrime offences, in particular to the ‘hacking’ offence (unauthorised access). Momentum is certainly gathering in the UK. The Criminal Law Reform Now network (CLRNN) has now released a comprehensive study of the UK Computer Misuse Act with a series of recommendations. It is time to make cybercrime legislations fit for the 21st Century, to borrow the slogan of a significant part of the security industry in the UK endorsing the report and the reform.
Disclosures by whistleblowers under the qui tam provisions of the False Claims Act (FCA) have enabled the federal government to recover more than $40 billion. But with strong protections against retaliation, whistleblowers would be reluctant to come forward. This course, presented by Jason Zuckerman, Principal at Zuckerman Law, provides an overview of whistleblower protections for employees of government contractors and grantees, focusing on the whistleblower protection provisions of the FCA and National Defense Authorization Act (NDAA). The course will also offer practical tips and insights for practitioners on how to evaluate potential whistleblower claims and overlapping remedies to maximize damages. In addition, the course will address the challenging issues that arise when a whistleblower simultaneously prosecutes both retaliation and rewards claims.
William Moorehead, President, All Clear Emergency Management Group
Using situational analysis, participants will learn to identify common legal issues in emergency
management and how to enhance response through agreements. This session will examine common
legal issues encountered within emergency management and emergency response including liability and
the formation of mutual aid agreements. The audience will analyze hypothetical scenarios and news
stories to identify potential liability issues. The session will highlight the challenges and barriers to
implementing agreements, benefits of prepositioned contracts, and the importance of putting agreement
in place now before they are needed. The goals of the session are to review the fundamentals of
liability, examine common legal issues, discuss best practices, and analyze situations common in
emergency management.
This seminar provides an overview of the U.S. Dep’t of Labor’s (DOL) enforcement and adjudication of whistleblower protection laws, including the burden to establish the elements of the approximately 24 whistleblower laws that OSHA enforces, the damages that whistleblowers can recover, the procedural rules governing DOL whistleblower claims, strategies for effectively representing whistleblowers at OSHA and at the DOL Office of Administrative Law Judges, and settlement and mediation strategies.
A number of laws protect whistleblowers from retaliatory adverse employment actions.
Course Content
Whistleblower Protection Laws
Defining "Protected Activity" and "Adverse Action" in Sarbanes-Oxley Retaliation Claims
Detangling Causation Issues
Whistleblower Rewards, Damages and Remedies
Employer vs. Whistleblower Best Practices
New Developments in SEC Whistleblower Program
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...CODE BLUE
Cybercrime legislations – or hacking laws- tend to be notoriously broad, resting on a set of assumptions about what ‘unauthorised access’ means, assumptions which hardly match those of the technical or ethical fields. The result is that the offences of unauthorised access and misuse of tools have the potential to criminalise most aspects of legitimate vulnerability research (discovery, proof of concept, disclosure). Independent security researchers are notably at risk of criminal prosecution as they work, by definition, without vendors’ prior authorisation.
The UK is a particular case in point, having drafted its original Computer Misuse Act 1990 in such a way that even switching a computer on can constitute unauthorised access. Further reforms in 2006 and 2015 have expanded even more the scope of the legislation by modifying or adding other offences as broad in scope as the original ones. While the UK is in that respect an outlier, the EU Directive 2013/40/EU on attacks against information systems as well as the Convention on cybercrime n.185 (which is de facto the international treaty) are not without their own weaknesses, despite serious and effective efforts to restrict the scope of criminal law and protect security researchers.
Prosecution guidelines or a memorandum of understanding between the security industry and prosecutorial authorities are a welcome step to avoid outlandish prosecution of security researchers, but I argue that they are not sufficient to protect them once a prosecution starts. Their motive (and the methods used) to improve security will not constitute a legal argument unless a public interest defence exists.
Hence, my proposal to reform the cybercrime legislations (UK, EU and the Convention) by incorporating a public interest defence to cybercrime offences, in particular to the ‘hacking’ offence (unauthorised access). Momentum is certainly gathering in the UK. The Criminal Law Reform Now network (CLRNN) has now released a comprehensive study of the UK Computer Misuse Act with a series of recommendations. It is time to make cybercrime legislations fit for the 21st Century, to borrow the slogan of a significant part of the security industry in the UK endorsing the report and the reform.
Disclosures by whistleblowers under the qui tam provisions of the False Claims Act (FCA) have enabled the federal government to recover more than $40 billion. But with strong protections against retaliation, whistleblowers would be reluctant to come forward. This course, presented by Jason Zuckerman, Principal at Zuckerman Law, provides an overview of whistleblower protections for employees of government contractors and grantees, focusing on the whistleblower protection provisions of the FCA and National Defense Authorization Act (NDAA). The course will also offer practical tips and insights for practitioners on how to evaluate potential whistleblower claims and overlapping remedies to maximize damages. In addition, the course will address the challenging issues that arise when a whistleblower simultaneously prosecutes both retaliation and rewards claims.
William Moorehead, President, All Clear Emergency Management Group
Using situational analysis, participants will learn to identify common legal issues in emergency
management and how to enhance response through agreements. This session will examine common
legal issues encountered within emergency management and emergency response including liability and
the formation of mutual aid agreements. The audience will analyze hypothetical scenarios and news
stories to identify potential liability issues. The session will highlight the challenges and barriers to
implementing agreements, benefits of prepositioned contracts, and the importance of putting agreement
in place now before they are needed. The goals of the session are to review the fundamentals of
liability, examine common legal issues, discuss best practices, and analyze situations common in
emergency management.
This seminar provides an overview of the U.S. Dep’t of Labor’s (DOL) enforcement and adjudication of whistleblower protection laws, including the burden to establish the elements of the approximately 24 whistleblower laws that OSHA enforces, the damages that whistleblowers can recover, the procedural rules governing DOL whistleblower claims, strategies for effectively representing whistleblowers at OSHA and at the DOL Office of Administrative Law Judges, and settlement and mediation strategies.
A number of laws protect whistleblowers from retaliatory adverse employment actions.
Course Content
Whistleblower Protection Laws
Defining "Protected Activity" and "Adverse Action" in Sarbanes-Oxley Retaliation Claims
Detangling Causation Issues
Whistleblower Rewards, Damages and Remedies
Employer vs. Whistleblower Best Practices
New Developments in SEC Whistleblower Program
Federal Circuit will review en banc two recent panel decision relating to joint infringement of method claims — Akamai Technologies, Inc. v. Limelight Networks, Inc., 629 F.3d 1311 (Fed. Cir. 2010) and McKesson Technologies Inc. v. Epic Systems Corp., 98 U.S.P.Q.2d 1281 (Fed. Cir. 2011).
Divided Infringement of Method Claims: A Tough SellMichael Cicero
Discusses the state of the law on this issue prior to the Federal Circuit's decision in Akamai Techs., Inc. v. Limelight Networks, Inc., 692 F.3d 1301 (Fed. Cir. 2012).
Partners Melanie Seelig and Mauricio Uribe kicked off a two-part, comprehensive discussion on responding to IP threats and assertions. The presentation served as an introduction to the topic and provided more general information.
Speakers: Melanie Seelig and Mauricio Uribe
Join Logikcull and a panel of experts for lessons and best practices to be learned from the most important eDiscovery cases -- and debacles -- of the year. Seven cases will be featured. Come for the hardcore precedence. Stay for the surprise bonus lessons. Michael Simon and Timothy Lohse will host.
The Federal Circuit Review is a monthly newsletter featuring the latest case summaries handed down from the U.S. Court of Appeals for the Federal Circuit.
In this Issue:
• Judgment of Infringement Entered as Sanction
• Patent Exhaustion Does Not Apply to Harvested Seeds
• Judges Disagree on § 101 Standards
• Litigation Is Not a Domestic Industry
This is the most common type of search invalidity contentions to determine if there is any area which has been overlooked by competitors or to determine how active the competitors are in this particular area means if a lot of patenting activities are going on in any particular area. If there is any scope to license or get license any particular technology.
Klemchuk LLP sponsors its 14th Annual Ethics CLE featuring Charles M. Hosch, Parter at Strasburger & Price, and Shawn E. Tuma of Scheef & Stone as speakers.
Federal Circuit will review en banc two recent panel decision relating to joint infringement of method claims — Akamai Technologies, Inc. v. Limelight Networks, Inc., 629 F.3d 1311 (Fed. Cir. 2010) and McKesson Technologies Inc. v. Epic Systems Corp., 98 U.S.P.Q.2d 1281 (Fed. Cir. 2011).
Divided Infringement of Method Claims: A Tough SellMichael Cicero
Discusses the state of the law on this issue prior to the Federal Circuit's decision in Akamai Techs., Inc. v. Limelight Networks, Inc., 692 F.3d 1301 (Fed. Cir. 2012).
Partners Melanie Seelig and Mauricio Uribe kicked off a two-part, comprehensive discussion on responding to IP threats and assertions. The presentation served as an introduction to the topic and provided more general information.
Speakers: Melanie Seelig and Mauricio Uribe
Join Logikcull and a panel of experts for lessons and best practices to be learned from the most important eDiscovery cases -- and debacles -- of the year. Seven cases will be featured. Come for the hardcore precedence. Stay for the surprise bonus lessons. Michael Simon and Timothy Lohse will host.
The Federal Circuit Review is a monthly newsletter featuring the latest case summaries handed down from the U.S. Court of Appeals for the Federal Circuit.
In this Issue:
• Judgment of Infringement Entered as Sanction
• Patent Exhaustion Does Not Apply to Harvested Seeds
• Judges Disagree on § 101 Standards
• Litigation Is Not a Domestic Industry
This is the most common type of search invalidity contentions to determine if there is any area which has been overlooked by competitors or to determine how active the competitors are in this particular area means if a lot of patenting activities are going on in any particular area. If there is any scope to license or get license any particular technology.
Klemchuk LLP sponsors its 14th Annual Ethics CLE featuring Charles M. Hosch, Parter at Strasburger & Price, and Shawn E. Tuma of Scheef & Stone as speakers.
Managing Principal Kirby Drake and Associate Tiffany Johnson delivered the fashion law presentation “Fashionably Legal” at a Women and the Law Section event of the State Bar of Texas on August 17, 2017. Read more at bit.ly/2wv0gj1
Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX. The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights. The firm also provides a wide range of technology, Internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution. Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.
Managing Principal Kirby Drake's presentation for the 13th Annual Advanced Patent Litigation course of the Texas Bar CLE. Read more at bit.ly/2vQtju2
Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX. The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights. The firm also provides a wide range of technology, Internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution. Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.
Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX. The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights. The firm also provides a wide range of technology, Internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution. Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.
Recent Ethics and Professional Responsibility Cases (David Coale): Discussion of recent ethics and professional responsibility cases from the U.S. Court of Appeals for the Fifth Circuit, including the scope of the “attorney immunity” doctrine, when sanctions can be imposed for improper pleadings and litigation conduct, when a court’s contempt power is properly applied to the alleged violation of an injunction, and the contours of attorney-client privilege for in-house counsel.
Conflicts of Interest in Pricing (Kirk Bowman): Pricing is not always as black and white as we might think. As with the law, there are shades of gray. In this session, Kirk Bowman will explore conflicts of interest in pricing, especially as it relates to attorneys. Learn how to price your engagements based on the value you create, rather than the traditional method of hourly rates. Kirk will also discuss the ethic guidelines attorney’s face in pricing their services. This single innovation can enhance your relationship with your clients and help you avoid the ethical dilemma of thinking of your client as a number of hours per month rather than a person and business you have the privilege to serve.
Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX. The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights. The firm also provides a wide range of technology, internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution. Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.
Best practices to avoid plagiarism and copyright infringement.
About Klemchuk:
Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX. The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights. The firm also provides a wide range of technology, internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution. Additional information about the copyright firm and its copyright attorneys may be found at www.klemchuk.com.
This presentation details a life-altering event that lead to a productivity breakthrough that promises to increase an attorney’s productivity by at least 20% in just 15 minutes a day. The presentation will touch on the importance of setting quarterly goals, making a weekly plan, time blocking and project management. The presentation also discusses an attorney’s ethical obligations to handle client matters properly, including ABA Rules 1.1., 1.3, 1.4, as well as a discussion of cases where disciplinary action issues arose regarding attorneys mishandling of matters. The presentation will provide a system to reduce the risk that a matter is neglected and provides guidance on how to avoid such ethical issues.
Stays of Litigation Pending Post-AIA Patent ReviewKlemchuk LLP
Brief overview of post-AIA patent review procedures, overview of post-AIA stays of litigation pending patent review, and the analysis of district court orders on motions to stay pending patent review
First Sale Doctrine - Gray Market GoodsKlemchuk LLP
This presentation references the Costco Wholesale Corp. v. Omega S.A. lawsuit and discusses the first sale doctrine, based on where goods are made and sold.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
2. Agenda
1. Introduction to Method Patent Claims and Definitions
2. Induced Infringement Before Akamai
3. Induced Infringement After Akamai
4. Other Considerations
5. Conclusion
4. Method Patent Claims
A method, or process, is a series of steps for performing a function.
Example: Amazon’s ‘1-click shopping’ method patent claims:
1. On the customer’s computer:
a. Displaying information identifying the item; and
b. In response to a single action being performed, sending a request to order the item along
with an identifier of the purchaser of the item to a server.
2. On Amazon’s server:
a. Receiving the request;
b. Retrieving additional information previously stored for the purchaser identified by the
identifier in the received request; and
c. Generating an order to purchase the requested item for the purchaser identified by the
identifier in the received request using the retrieved additional information…
5. Direct Infringement – 35 U.S.C. § 271(a)
• When a single actor commits all the elements of
infringement, that actor is liable for direct infringement
under 35 U.S.C. § 271(a).
• Direct infringement has not been extended to cases in
which multiple independent parties perform the steps of
a method claim.
• Direct infringement is a strict liability tort.
• Courts have found vicarious liability for direct
infringement when the infringing acts are committed by
an agent of the accused infringer or a party acting
pursuant to the accused infringer's direction or control.
6. Vicarious Liability – Direct Infringement
Where multiple parties combine to perform every step of a
claimed method and one party exercises control or direction over
the entire process.
• The determination of vicarious liability is fact-specific.
Courts will consider:
• Whether the accused provides direction to another entity for performance
or simply contracts out the steps to a third party.
• The nature of the contract if one exists; the mere fact that one exists is
often not sufficient.
• The nature of the relationship; making information available, prompting,
instructing, or facilitating the third party, without more, is often not
sufficient.
7. Induced Infringement – 35 U.S.C. § 271(b)
• Whoever actively induces infringement of a patent
shall be liable as an infringer.
• Not a strict liability tort.
• Requires the alleged infringer to knowingly induce
infringement and possess specific intent to
encourage another’s infringement.
• Does not require proof of agency or control.
• Requires a finding of direct infringement first (pre
Akamai).
9. The “Single-Entity Rule”
• BMC Resources, Inc. v. Paymentech, L.P., 498 F.3d
1373 (Fed. Cir. 2007).
• Liability for induced infringement required findings of
both:
1. Inducement of direct infringement and
2. Direct infringement was committed by a single actor.
• Made imposing liability for infringement of method
patents extraordinarily difficult where no single entity
practiced each of the steps of the claimed method.
10. LIABILITY FOR INDUCED INFRINGEMENT - Before Akamai
One party induces another party to perform all of
the steps of a method claim
YES (inducer) (requires proof of knowledge and
intent)
One party performs some of the steps of a
method claim and induces one or more parties to
perform the remaining steps of a method claim
NO
Multiple parties are required to perform all of the
steps of a method claim and one party induces
such parties to perform those steps NO
12. The New Standard for Induced Infringement
• In August 2012, the U.S. Court of Appeals for the Federal Circuit
reviewed Akamai Technologies, Inc. v. Limelight Networks, Inc.,
614 F.Supp.2d 90 (D. Mass. 2009), and McKesson Info.
Solutions LLC v. Epic Sys. Corp., CIV 1:06-CV-2965-JTC, 2009 WL
2915778 (N.D. Ga. Sept. 8, 2009)
• The court’s analysis focused on induced infringement and
dramatically expanded the scope of liability for divided
infringement of a method patent.
• The Federal Circuit noted that its reasoning would be predicated
on Section 271(b), not (a), and narrowed its opinion to the issue
of whether induced infringement required a single party to
commit all the acts necessary to constitute infringement.
13. Akamai Technologies, Inc. v. Limelight Networks, Inc.
• Akamai’s patent covers a two-step process to deliver web content efficiently.
• Limelight utilized the same two-step process, executing step one itself, and
teaching its customers to execute step two.
• Akamai sued Limelight, alleging both direct and induced infringement.
• At trial, the jury found that Limelight infringed because it “directed or
controlled” its customers by instructing them on how to perform one of the
steps of the asserted claims.
• Limelight moved for a Judgment as a Matter of Law, arguing that there was no
substantial evidence that it directed or controlled another party to perform.
• The district court initially denied Limelight's motion but ultimately
reconsidered and granted it, holding that Limelight's actions did not rise to the
requisite level of direction or control necessary for direct infringement.
14. McKesson Technologies, Inc. v. Epic Systems Corp.
• McKesson’s patent covers an automatic method of electronic communication
between healthcare providers and their patients.
• McKesson sued Epic Systems alleging that Epic's MyChart software induced
infringement by dividing the steps between patients and healthcare providers.
Epic itself did not perform any of the steps.
• Epic argued that there was no infringement and moved for summary
judgment.
• The district court granted Epic's motion, holding that McKesson failed to
demonstrate a genuine issue of fact on whether any single party directly
infringed the patent.
• The trial court held that McKesson's claims failed to show direct infringement,
a requirement before the court can find indirect infringement.
• Moreover, McKesson failed to demonstrate that MyChart providers direct and
control MyChart users to perform one of the steps of the patented method.
15. Akamai Technologies, Inc. v. Limelight Networks, Inc.
The Federal Circuit held an alleged infringer may be liable for
induced infringement of a method patent if:
1. The defendant has performed some of the steps of a claimed
method and has induced other parties to commit the remaining
steps; or
2. The defendant has induced other parties to collectively perform
all the steps of the claimed method, even where no single party
has performed all of the steps itself.
16. Induced Infringement No Longer Requires a Single
Entity to Perform Every Step
• Distinguished ‘requiring proof of direct infringement’ from
‘requiring proof that a single party was liable as a direct
infringer’.
• Deemed that a party who induces others to collectively practice
the steps of the method has same impact as inducing a single
direct infringer.
• Addressed the problem where infringers could escape liability by
simply dividing infringing conduct among multiple parties.
17. The Federal Circuit Reversed and Remanded
Application:
AKAMAI
1. Limelight knew of Akamai's patent;
2. Limelight performed all but one of
the steps of the method claimed in
the patent;
3. Limelight induced the content
providers to perform the final step of
the claimed method; and
4. The content providers in fact
performed that final step.
MCKESSON
1. Epic knew of McKesson's patent;
2. Epic induced the performance of the
steps of the method claimed in the
patent; and
3. Those steps were performed.
18. LIABILITY FOR INDUCED INFRINGEMENT - After Akamai
One party induces another party to perform all of the steps of a
method claim
YES (inducer)
One party performs some of the steps of a method claim and
induces one or more parties to perform the remaining steps of a YES (inducer)
method claim
Multiple parties are required to perform all of the steps of a
method claim and one party induces such parties to perform YES (inducer)
those steps
19. Dissenting Opinions May Broaden the Scope of Direct
Liability
Both dissenting opinions by Judge Linn and Judge Newman:
• Addressed the majority's failure to consider the conflict in
application of the single-entity rule to direct infringement.
• Agreed that the correct analysis was whether the defendants'
conduct was sufficient to establish liability under a theory of
direct infringement (or vicarious liability for direct infringement).
• Advocated for expanding the scope of liability for direct
infringement beyond strict "direction or control" agency analysis.
20. Appeal to the Supreme Court
• Parties filing petitions for writ of certiorari to the
Supreme Court
• Amicus Curiae briefs filed by Google, Altera, and CTIA
21. Conclusion
• The Federal Circuit expanded the scope of liability for induced
infringement by allowing for infringement when multiple parties
perform the steps of a method claim.
• Since Akamai, the Federal Circuit has avoided opportunities to
expand the scope of vicarious liability for direct infringement.
• In dicta, however, the court has suggested that the direction or
control standard may be broader than traditional principles of
vicarious liability.
• Applying the new standard, district courts have resolved fewer
cases through dispositive motions such as summary judgment.