SlideShare a Scribd company logo
1 of 35
IP Outsourcing
Problems
 William A. Tanenbaum
  Chair, IP, Technology and Outsourcing Group
  Chair, GreenTech and Sustainability Group
  Kaye Scholer LLP
  New York and Palo Alto Offices


  Copyright © 2012 by William A. Tanenbaum. All Rights Reserved
Simultaneous IP Protection

• Different types of IP can apply to different aspects of a single
  product or process simultaneously
• Example: for software:
 – patent protects the algorithm or process, even if public
 – trade secrets protect secret methods
 – copyright protects the code and similar versions of it
 – trademarks and service marks protect the name, and maybe domain
   name




  2       60943294
Business Framework for IP Issues

• Two kinds of IT and outsourcing objectives
 – Set and Forget = stable, backroom approach
 – Competitive advantage = leverage IP as competitive tool
• Choosing one of the objectives leads to different result for
  same IP issues
• Cloud Computing changes the analysis, because of “the
  Stack”
• Summary: Updating company’s IT Ecosystem




  3      60943294
When Do IP Issues Arise?

• Updating IT ecosystem
• Big Bang or incremental improvements
• Using Cloud as Test Bed
• Anticipating Greece – decentralizing an international IT
  infrastructure




  4      60943294
Problem No. 1: Work Made for Hire

• Is a Work for Hire really a Work for Hire?
• Limitations of the Work Made for Hire Rule
 – Copyright “prongs”
 – Other IP regimes
• Why getting an assignment is often best
• Providers’ risk
• Due diligence with small providers and Cloud providers




  5   60943294
Assignments Generally

• What should the contract say?
• Why should there also be a schedule, and what form should it
  take?
• Practical effects of a schedule
• Role in collaborative improvements and joint works
• Due diligence by Customer
• Need to police Task Orders
• Application to the Cloud



  6      60943294
Problem No. 2: Chain of Assignment
• Risk: IP “Chain of Assignment” infected by the “virus” of
  subcontractors and affiliates who create work product and fail
  to convey IP to Provider
 – Compounded by offshore work
• Risk: Provider is too small to provide indemnity protection
• Solutions
 – Require Customer approval of subcontractors
 – Require form and approval of IP assignment from subcontractor to
   Provider
 – Customer audit rights
 – Alternative: direct assignment from subcontractor to Customer

  7      60943294
Problem No. 3: Custom Developments

• Pre-existing vs. new IP
• Ownership vs. license rights depend upon overall business
  objectives
• When should Provider retain ownership?
 – Layered on pre-existing
 – What incentives does Customer’s ownership create?
 – Impact on price
 – Impact on indemnification
 – Customer audit rights?
 – What license rights protect Customer?

  8      60943294
Custom Developments (2)

• When should Customer retain ownership?
 – Improvements to pre-existing rights
 – Business objective is to leverage IP for competitive advantage
 – What requests will Customer’s ownership rights trigger from Provider?
 – What IP rights should Customer obtain to protect itself?
• Who can make Derivative Works?
• Use of MSA and Contract documents to allocate IP rights
• Potential problems in Cloud Computing caused by “the Stack”



  9       60943294
Problem No. 4: Joint Ownership
• Collaborative improvements
 – Common and will increase
• Joint ownership: superficial appeal; hidden problems
 – Will your competitor use your technology against you?
 – Ownership in what?
 – Can trump Customer’s ownership of customizations
 – Inventorship vs. authorship vs. trade secrets




  10      60943294
Joint Ownership (2)

• Impact of new America Invents Act
 – In March 2012 changed from first-to-invent to first-to-file system
• Practical IP patent prosecution problems
• Who controls patent and copyright prosecution?
• Disclosure of trade secrets
• What will you own after patent prosecution?
• Who owns patentable improvements to original collaborative
  invention?



  11      60943294
Problem No. 5: Required Use of IP by
Customer
• Advantages to Customer:
 – Beneficial technology
 – IP risks known
 – Used across business units
 – Used by other Providers in Provider Portfolio
• Risks to Provider
 – Risk of infringement
 – Interferes with continuous improvement and resell model
• Prediction: will arise in sustainability and supply chain
  management outsourcing transactions
 – Will move from unusual to common

  12      60943294
Required Use of IP by Customer (2)

• Enable Provider to conduct IP due diligence
• Should the Customer indemnify the Provider?
 – If so, what limitations on scope should Customer require?
• Should be a license from Customer to provider
 – What are important terms?
 – What about Provider’s subcontractors?
• If Customer is a sublicensor, risk is that its license will be put
  at risk if Provider violates license
• Customer should merge IP license with confidentiality
  obligations

  13      60943294
Problem No. 6: Scope of License Grant

• Direct vs. indirect Customer needs
• Is it broad enough to cover:
 – Relevant parties and business units?
 – Relevant territories?
 – Relevant emergencies?
• Will it cover future IP?
• Why create a definition of “Use”?”




  14      60943294
Problem No. 7: IP Indemnities

• Separate buckets for breach of regular reps and warranties
  and for breach of IP and confidentiality reps and warranties
 – How to set dollar amount
 – Additional bucket for breach during termination assistance phase
• Dollar cap = allocation of risk of IP infringement
• Indemnity cap can be a license to infringe
• Increase caps as scope of services increase
• Provider will want to reduce if scope is reduced



  15     60943294
IP Indemnities (2)

• Fact Pattern: Provider has right to terminate entire agreement
  if it cannot cure or avoid allegation of IP infringement
• Risk: Termination right is a bridge too far
• Issue: Provider’s system infringes a patent, but underlying
  technology standing alone does not
• Solution: Reduce scope of termination right to allow
  Customer to use underlying technology apart from system; to
  procure license from IP owner; to operate outside of U.S., etc.
• Summary: Infringement “remedies” should preserve not
  preclude Customer options


  16     60943294
IP Indemnities (3)

• Risk: IP infringement suits threaten Provider ability to provide
  services
• Solutions
 – Require timely notice of claims, including pre-lawsuit
 – Notice given as part of governance meetings to structure a remedy
 – Breach of contract in addition to indemnification obligation




  17      60943294
IP Indemnities (4)

• Fact Pattern: Customer requires Provider to use specific
  technology or IP licensed from third party. Provider wants
  indemnifications.
• Solution
 – Have Provider seek indemnity from IP owner, not Customer
 – Who will retain control of litigation?




  18      60943294
IP Indemnities (5)

• Risk presented by minimum threshold requirements for
  indemnification obligations
• Minimum threshold favored by indemnitees because
       • Eliminates immaterial losses
       • Eliminates administrative overhead of addressing numerous small
         claims
 – Issue is whether each claim must exceed a threshold or whether basket
   is satisfied on an aggregate basis
 – Note: often different baskets apply to “losses” and to “litigation
   expenses”
• Reasons why IP should be exempted from minimum threshold
  requirement
  19         60943294
IP Indemnities (6)

• Providers sometimes seek to carve out certain patents
 – Named specific patents
 – Class of business method patents




  20     60943294
Indemnities (7)

• Indemnification exception combinations
• Solutions
 – Limit exclusions (identify covered combinations, especially when multiple
   providers)
 – If cannot limit exclusion for combination, then indemnified Party requires
   all information from indemnifying party necessary to defend IP
   infringement suit
       • Access to documents and employees
       • Waiver of trade secret and other protections
       • Control of litigation
• What is the practical result?
  21          60943294
IP Infringement vs. Breach of Contract

• Test = license conditions vs. contractual commitments
• Breach of license condition = IP infringement
 – Need to be a breach of right provided by IP license
• Breach of contractual commitment = action for contract breach
  only (e.g., breach of covenant)
• Why does it matter?
 – Remedy for infringement vs. breach of contract
 – Cannot sue for infringement if alleged wrongful act is breach of
   contractual commitment rather than violation of IP license
 – Otherwise, IP licensor could claim infringement for any violation of
   agreement, even violations of non-IP contractual limitations
  22      60943294
Problem No. 7: Covenants Not to Sue

• When they are needed
• How to document them
• Cover patent improvements and copyright derivative works
• Should it survive termination of outsourcing agreement?




  23     60943294
Problem No. 8: Software Escrow

• Do you need software escrow?
• What goes in escrow?
• What does Cloud Computing change?




  24    60943294
Problem No. 9: Data Licenses

• License to use data
 – Databases vs. data elements
 – Derivative Works
• Algorithms and software to perform Big Data predictive
  analytics
• Big Data dashboards and data displays
• IP vs. confidentiality
• U.S. vs. Europe re database protection
• Liability for database breaches


  25      60943294
Problem No. 10: Protecting Customer
Information
• Risk: Make RFPs and Provider assessments disclose
  company secrets
• Risk: Outsourcing/supply chain enable competitive
  intelligence
 – Even subcontractors
 – Even Facilities Management and government filing of building plans




  26     60943294
Protecting Customer Information (2)

• Solution:
 – Combine Confidentiality and IP approaches
 – IP notices and labels
 – Modify public domain exceptions in standard NDA’s
 – Contract confidentiality and trade secret provisions
 – Need to know
 – Background checks (and smart phone camera rules)
 – Indemnification for breach




  27      60943294
Licensing and New Developments
• Cloud + Big Data + Social Media + Mobile Computing =
  Social Business
• “Cloud of Clouds”
• New outsourcing
• Sustainability in mainstream companies and in supply chains
  will be IT-enabled and make use of Cloud
• Cloud vs. IT Outsourcing
• Mobile Computing
• BYOD (bring your own device)
• Security as a service

  28     60943294
Cloud, Big Data, Mobile, and Licensing
• Cloud vs. IT Outsourcing
 – enables Big Data
 – Cloud data centers too expensive for even large companies to do
   through artisanal IT outsourcing
• Big Data – the three “V’s”
 – Volume
 – Velocity
 – Variety
• Unstructured as well as structured data
• User-provided information
• Green/sustainability
  29         60943294
Hypothetical to Illustrate Key Issues
• Property management outsourcing hypothetical
• Underlying city map
• Building locations overlay
• Building interior/mechanicals overlay
• Maintenance records
• Mobile-to-Cloud
• Cloud to legacy records and vice versa
• Tenant PII
 – Lease vs. service agreement
 – Consent
  30     60943294
Data Licensing

• Customer wants historical data to analyze
  performance, staffing, price, etc.
• Provider wants historical data to analyze cost, SLAs, etc.




  31     60943294
Problem No. 11: Remanufacturing and
the Patent Exhaustion Doctrine
• What is “remanufacturing?”
• Patent exhaustion doctrine
• Permissible repair vs. prohibited reconstruction
• Over-the-horizon issue in cleantech and sustainability:
 – Products will be designed to be upgraded with unknown future
   improvements (e.g., computer chips not yet invented).
 – Will such improvements be remanufacturing of base product, and will
   they constitute repairs or reconstructions?
• Solution: contract around repair/reconstruction to support
  argument that patentee intended that purchases would
  replace or repair base product because of its shorter useful
  life
  32     60943294
Carbon and Water Rights

• Address water rights, especially in supply chain contracts and
  offshore outsourcing arrangements
• Carbon rights are assets and can be monetized
• Allocate carbon rights in contracts now




  33     60943294
Questions and Answers

William A. Tanenbaum
       Chair, IP, Technology and Outsourcing Group
       Chair, GreenTech and Sustainability Group
       Kaye Scholer LLP, New York and Palo Alto (not admitted in
       California)
       wtanenbaum@kayescholer.com
       212-836-7661
       LinkedIn: http://www.linkedin.com/in/williamtanenbaum




  34         60943294
William A. Tanenbaum, Kaye Scholer LLP
 wtanenbaum@kayescholer.com
      William A. Tanenbaum is the international chair of Kaye Scholer LLP’s
      Technology, Intellectual Property & Outsourcing Group and its GreenTech & Sustainability
      Group and works in the firm’s New York and Palo Alto offices (not admitted in California).
      He was named “Lawyer of the Year 2013” for Information Technology Law in New York.
      He was elected by his peers in research conducted by U.S. News & World Report and Best
      Lawyers in America. Legal researcher Chambers ranked him in Band One in New York.
      Chambers in its survey of clients and peers and found that he “built one of New York City’s
      most outstanding transactional IT practices;” that he “brings extreme integrity, a deep
      intellect, fearlessness and a practical, world-wide mindset to every problem;” that he is
      “efficient, solution driven and makes excellent judgment calls” and that he is “an
      acknowledged expert on the convergence of mainstream business with cleantech..”
      Legal500 says he is a “high-tech specialist” and “an outstanding attorney with a deep
      knowledge and understanding of technology.” IAM Patent 1000 found he is “recognized as
      a thought leader across the spectrum of IT and IP transactions.” He is Past President of
      the International Technology Law Association, and currently a Vice President of the Metro
      NYSIM, the Society for Information Management, which is an association for CIOs, CTOs
      and senior IT executives. He chairs or co-chairs legal conferences on Outsourcing, Cloud
      Computing, Big Data and Sustainability.



 35           60943294

More Related Content

Similar to IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Scholer LLP How To Avoid Procuring Ip Problems When Procuring IT

Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Black Duck by Synopsys
 
Managing intellectual property
Managing intellectual propertyManaging intellectual property
Managing intellectual propertySibraWebDev
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomBrendon Noney
 
Managing contracts
Managing contractsManaging contracts
Managing contractstumetr1
 
SLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
SLALOM Project Legal Webinar Introduction 20151019 Legal AspectsSLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
SLALOM Project Legal Webinar Introduction 20151019 Legal AspectsOliver Barreto Rodríguez
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30This account is closed
 
NCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsNCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsWhitmeyerTuffin
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThis account is closed
 
Business Law & Order - January 21, 2012
Business Law & Order - January 21, 2012Business Law & Order - January 21, 2012
Business Law & Order - January 21, 2012AnnArborSPARK
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)Arlen Meyers, MD, MBA
 
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid ThemIT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid ThemMeyers Nave
 
Outsourcing fundamentals 9 21
Outsourcing fundamentals 9 21Outsourcing fundamentals 9 21
Outsourcing fundamentals 9 21ideatoipo
 
Outsourcing Fundamentals 9 21 2015
Outsourcing Fundamentals 9 21 2015Outsourcing Fundamentals 9 21 2015
Outsourcing Fundamentals 9 21 2015Paul Petach
 
ITAM UK 2017 Software Maintenance Issues_Guy Tritton
ITAM UK 2017 Software Maintenance Issues_Guy TrittonITAM UK 2017 Software Maintenance Issues_Guy Tritton
ITAM UK 2017 Software Maintenance Issues_Guy TrittonMartin Thompson
 

Similar to IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Scholer LLP How To Avoid Procuring Ip Problems When Procuring IT (20)

Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
 
Managing intellectual property
Managing intellectual propertyManaging intellectual property
Managing intellectual property
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the Boardroom
 
Managing contracts
Managing contractsManaging contracts
Managing contracts
 
SLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
SLALOM Project Legal Webinar Introduction 20151019 Legal AspectsSLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
SLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
 
13756360_1.PPT
13756360_1.PPT13756360_1.PPT
13756360_1.PPT
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
 
NCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsNCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing Vendors
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence
 
Business Law & Order - January 21, 2012
Business Law & Order - January 21, 2012Business Law & Order - January 21, 2012
Business Law & Order - January 21, 2012
 
Inforln.com ERP LN 10.3 & 10.4 Project Peg Audit History Differences
Inforln.com ERP LN 10.3 & 10.4 Project Peg Audit History DifferencesInforln.com ERP LN 10.3 & 10.4 Project Peg Audit History Differences
Inforln.com ERP LN 10.3 & 10.4 Project Peg Audit History Differences
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
 
13530912_2.PPT
13530912_2.PPT13530912_2.PPT
13530912_2.PPT
 
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid ThemIT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
Outsourcing fundamentals 9 21
Outsourcing fundamentals 9 21Outsourcing fundamentals 9 21
Outsourcing fundamentals 9 21
 
Outsourcing Fundamentals 9 21 2015
Outsourcing Fundamentals 9 21 2015Outsourcing Fundamentals 9 21 2015
Outsourcing Fundamentals 9 21 2015
 
ITAM UK 2017 Software Maintenance Issues_Guy Tritton
ITAM UK 2017 Software Maintenance Issues_Guy TrittonITAM UK 2017 Software Maintenance Issues_Guy Tritton
ITAM UK 2017 Software Maintenance Issues_Guy Tritton
 

More from William Tanenbaum

Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...William Tanenbaum
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWilliam Tanenbaum
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction William Tanenbaum
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost William Tanenbaum
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015William Tanenbaum
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...William Tanenbaum
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...William Tanenbaum
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingWilliam Tanenbaum
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...William Tanenbaum
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumWilliam Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsWilliam Tanenbaum
 

More from William Tanenbaum (20)

Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech Agreements
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile Computing
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green Buildings
 

IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Scholer LLP How To Avoid Procuring Ip Problems When Procuring IT

  • 1. IP Outsourcing Problems William A. Tanenbaum Chair, IP, Technology and Outsourcing Group Chair, GreenTech and Sustainability Group Kaye Scholer LLP New York and Palo Alto Offices Copyright © 2012 by William A. Tanenbaum. All Rights Reserved
  • 2. Simultaneous IP Protection • Different types of IP can apply to different aspects of a single product or process simultaneously • Example: for software: – patent protects the algorithm or process, even if public – trade secrets protect secret methods – copyright protects the code and similar versions of it – trademarks and service marks protect the name, and maybe domain name 2 60943294
  • 3. Business Framework for IP Issues • Two kinds of IT and outsourcing objectives – Set and Forget = stable, backroom approach – Competitive advantage = leverage IP as competitive tool • Choosing one of the objectives leads to different result for same IP issues • Cloud Computing changes the analysis, because of “the Stack” • Summary: Updating company’s IT Ecosystem 3 60943294
  • 4. When Do IP Issues Arise? • Updating IT ecosystem • Big Bang or incremental improvements • Using Cloud as Test Bed • Anticipating Greece – decentralizing an international IT infrastructure 4 60943294
  • 5. Problem No. 1: Work Made for Hire • Is a Work for Hire really a Work for Hire? • Limitations of the Work Made for Hire Rule – Copyright “prongs” – Other IP regimes • Why getting an assignment is often best • Providers’ risk • Due diligence with small providers and Cloud providers 5 60943294
  • 6. Assignments Generally • What should the contract say? • Why should there also be a schedule, and what form should it take? • Practical effects of a schedule • Role in collaborative improvements and joint works • Due diligence by Customer • Need to police Task Orders • Application to the Cloud 6 60943294
  • 7. Problem No. 2: Chain of Assignment • Risk: IP “Chain of Assignment” infected by the “virus” of subcontractors and affiliates who create work product and fail to convey IP to Provider – Compounded by offshore work • Risk: Provider is too small to provide indemnity protection • Solutions – Require Customer approval of subcontractors – Require form and approval of IP assignment from subcontractor to Provider – Customer audit rights – Alternative: direct assignment from subcontractor to Customer 7 60943294
  • 8. Problem No. 3: Custom Developments • Pre-existing vs. new IP • Ownership vs. license rights depend upon overall business objectives • When should Provider retain ownership? – Layered on pre-existing – What incentives does Customer’s ownership create? – Impact on price – Impact on indemnification – Customer audit rights? – What license rights protect Customer? 8 60943294
  • 9. Custom Developments (2) • When should Customer retain ownership? – Improvements to pre-existing rights – Business objective is to leverage IP for competitive advantage – What requests will Customer’s ownership rights trigger from Provider? – What IP rights should Customer obtain to protect itself? • Who can make Derivative Works? • Use of MSA and Contract documents to allocate IP rights • Potential problems in Cloud Computing caused by “the Stack” 9 60943294
  • 10. Problem No. 4: Joint Ownership • Collaborative improvements – Common and will increase • Joint ownership: superficial appeal; hidden problems – Will your competitor use your technology against you? – Ownership in what? – Can trump Customer’s ownership of customizations – Inventorship vs. authorship vs. trade secrets 10 60943294
  • 11. Joint Ownership (2) • Impact of new America Invents Act – In March 2012 changed from first-to-invent to first-to-file system • Practical IP patent prosecution problems • Who controls patent and copyright prosecution? • Disclosure of trade secrets • What will you own after patent prosecution? • Who owns patentable improvements to original collaborative invention? 11 60943294
  • 12. Problem No. 5: Required Use of IP by Customer • Advantages to Customer: – Beneficial technology – IP risks known – Used across business units – Used by other Providers in Provider Portfolio • Risks to Provider – Risk of infringement – Interferes with continuous improvement and resell model • Prediction: will arise in sustainability and supply chain management outsourcing transactions – Will move from unusual to common 12 60943294
  • 13. Required Use of IP by Customer (2) • Enable Provider to conduct IP due diligence • Should the Customer indemnify the Provider? – If so, what limitations on scope should Customer require? • Should be a license from Customer to provider – What are important terms? – What about Provider’s subcontractors? • If Customer is a sublicensor, risk is that its license will be put at risk if Provider violates license • Customer should merge IP license with confidentiality obligations 13 60943294
  • 14. Problem No. 6: Scope of License Grant • Direct vs. indirect Customer needs • Is it broad enough to cover: – Relevant parties and business units? – Relevant territories? – Relevant emergencies? • Will it cover future IP? • Why create a definition of “Use”?” 14 60943294
  • 15. Problem No. 7: IP Indemnities • Separate buckets for breach of regular reps and warranties and for breach of IP and confidentiality reps and warranties – How to set dollar amount – Additional bucket for breach during termination assistance phase • Dollar cap = allocation of risk of IP infringement • Indemnity cap can be a license to infringe • Increase caps as scope of services increase • Provider will want to reduce if scope is reduced 15 60943294
  • 16. IP Indemnities (2) • Fact Pattern: Provider has right to terminate entire agreement if it cannot cure or avoid allegation of IP infringement • Risk: Termination right is a bridge too far • Issue: Provider’s system infringes a patent, but underlying technology standing alone does not • Solution: Reduce scope of termination right to allow Customer to use underlying technology apart from system; to procure license from IP owner; to operate outside of U.S., etc. • Summary: Infringement “remedies” should preserve not preclude Customer options 16 60943294
  • 17. IP Indemnities (3) • Risk: IP infringement suits threaten Provider ability to provide services • Solutions – Require timely notice of claims, including pre-lawsuit – Notice given as part of governance meetings to structure a remedy – Breach of contract in addition to indemnification obligation 17 60943294
  • 18. IP Indemnities (4) • Fact Pattern: Customer requires Provider to use specific technology or IP licensed from third party. Provider wants indemnifications. • Solution – Have Provider seek indemnity from IP owner, not Customer – Who will retain control of litigation? 18 60943294
  • 19. IP Indemnities (5) • Risk presented by minimum threshold requirements for indemnification obligations • Minimum threshold favored by indemnitees because • Eliminates immaterial losses • Eliminates administrative overhead of addressing numerous small claims – Issue is whether each claim must exceed a threshold or whether basket is satisfied on an aggregate basis – Note: often different baskets apply to “losses” and to “litigation expenses” • Reasons why IP should be exempted from minimum threshold requirement 19 60943294
  • 20. IP Indemnities (6) • Providers sometimes seek to carve out certain patents – Named specific patents – Class of business method patents 20 60943294
  • 21. Indemnities (7) • Indemnification exception combinations • Solutions – Limit exclusions (identify covered combinations, especially when multiple providers) – If cannot limit exclusion for combination, then indemnified Party requires all information from indemnifying party necessary to defend IP infringement suit • Access to documents and employees • Waiver of trade secret and other protections • Control of litigation • What is the practical result? 21 60943294
  • 22. IP Infringement vs. Breach of Contract • Test = license conditions vs. contractual commitments • Breach of license condition = IP infringement – Need to be a breach of right provided by IP license • Breach of contractual commitment = action for contract breach only (e.g., breach of covenant) • Why does it matter? – Remedy for infringement vs. breach of contract – Cannot sue for infringement if alleged wrongful act is breach of contractual commitment rather than violation of IP license – Otherwise, IP licensor could claim infringement for any violation of agreement, even violations of non-IP contractual limitations 22 60943294
  • 23. Problem No. 7: Covenants Not to Sue • When they are needed • How to document them • Cover patent improvements and copyright derivative works • Should it survive termination of outsourcing agreement? 23 60943294
  • 24. Problem No. 8: Software Escrow • Do you need software escrow? • What goes in escrow? • What does Cloud Computing change? 24 60943294
  • 25. Problem No. 9: Data Licenses • License to use data – Databases vs. data elements – Derivative Works • Algorithms and software to perform Big Data predictive analytics • Big Data dashboards and data displays • IP vs. confidentiality • U.S. vs. Europe re database protection • Liability for database breaches 25 60943294
  • 26. Problem No. 10: Protecting Customer Information • Risk: Make RFPs and Provider assessments disclose company secrets • Risk: Outsourcing/supply chain enable competitive intelligence – Even subcontractors – Even Facilities Management and government filing of building plans 26 60943294
  • 27. Protecting Customer Information (2) • Solution: – Combine Confidentiality and IP approaches – IP notices and labels – Modify public domain exceptions in standard NDA’s – Contract confidentiality and trade secret provisions – Need to know – Background checks (and smart phone camera rules) – Indemnification for breach 27 60943294
  • 28. Licensing and New Developments • Cloud + Big Data + Social Media + Mobile Computing = Social Business • “Cloud of Clouds” • New outsourcing • Sustainability in mainstream companies and in supply chains will be IT-enabled and make use of Cloud • Cloud vs. IT Outsourcing • Mobile Computing • BYOD (bring your own device) • Security as a service 28 60943294
  • 29. Cloud, Big Data, Mobile, and Licensing • Cloud vs. IT Outsourcing – enables Big Data – Cloud data centers too expensive for even large companies to do through artisanal IT outsourcing • Big Data – the three “V’s” – Volume – Velocity – Variety • Unstructured as well as structured data • User-provided information • Green/sustainability 29 60943294
  • 30. Hypothetical to Illustrate Key Issues • Property management outsourcing hypothetical • Underlying city map • Building locations overlay • Building interior/mechanicals overlay • Maintenance records • Mobile-to-Cloud • Cloud to legacy records and vice versa • Tenant PII – Lease vs. service agreement – Consent 30 60943294
  • 31. Data Licensing • Customer wants historical data to analyze performance, staffing, price, etc. • Provider wants historical data to analyze cost, SLAs, etc. 31 60943294
  • 32. Problem No. 11: Remanufacturing and the Patent Exhaustion Doctrine • What is “remanufacturing?” • Patent exhaustion doctrine • Permissible repair vs. prohibited reconstruction • Over-the-horizon issue in cleantech and sustainability: – Products will be designed to be upgraded with unknown future improvements (e.g., computer chips not yet invented). – Will such improvements be remanufacturing of base product, and will they constitute repairs or reconstructions? • Solution: contract around repair/reconstruction to support argument that patentee intended that purchases would replace or repair base product because of its shorter useful life 32 60943294
  • 33. Carbon and Water Rights • Address water rights, especially in supply chain contracts and offshore outsourcing arrangements • Carbon rights are assets and can be monetized • Allocate carbon rights in contracts now 33 60943294
  • 34. Questions and Answers William A. Tanenbaum Chair, IP, Technology and Outsourcing Group Chair, GreenTech and Sustainability Group Kaye Scholer LLP, New York and Palo Alto (not admitted in California) wtanenbaum@kayescholer.com 212-836-7661 LinkedIn: http://www.linkedin.com/in/williamtanenbaum 34 60943294
  • 35. William A. Tanenbaum, Kaye Scholer LLP wtanenbaum@kayescholer.com William A. Tanenbaum is the international chair of Kaye Scholer LLP’s Technology, Intellectual Property & Outsourcing Group and its GreenTech & Sustainability Group and works in the firm’s New York and Palo Alto offices (not admitted in California). He was named “Lawyer of the Year 2013” for Information Technology Law in New York. He was elected by his peers in research conducted by U.S. News & World Report and Best Lawyers in America. Legal researcher Chambers ranked him in Band One in New York. Chambers in its survey of clients and peers and found that he “built one of New York City’s most outstanding transactional IT practices;” that he “brings extreme integrity, a deep intellect, fearlessness and a practical, world-wide mindset to every problem;” that he is “efficient, solution driven and makes excellent judgment calls” and that he is “an acknowledged expert on the convergence of mainstream business with cleantech..” Legal500 says he is a “high-tech specialist” and “an outstanding attorney with a deep knowledge and understanding of technology.” IAM Patent 1000 found he is “recognized as a thought leader across the spectrum of IT and IP transactions.” He is Past President of the International Technology Law Association, and currently a Vice President of the Metro NYSIM, the Society for Information Management, which is an association for CIOs, CTOs and senior IT executives. He chairs or co-chairs legal conferences on Outsourcing, Cloud Computing, Big Data and Sustainability. 35 60943294