^ WP_User {#13738
  +data: {#13739
    +"ID": "6"
    +"user_login": "Msiceloff"
    +"user_pass": "$P$BVg0DDH.AOcuasVwoTguJCoGHjNlJt1"
    +"user_nicename": "msiceloff"
    +"user_email": "msiceloff@weintraub.com"
    +"user_url": ""
    +"user_registered": "2022-06-21 15:33:28"
    +"user_activation_key": ""
    +"user_status": "0"
    +"display_name": "Mary Siceloff"
  }
  +ID: 6
  +caps: array:1 [
    "administrator" => true
  ]
  +cap_key: "wp_capabilities"
  +roles: array:1 [
    0 => "administrator"
  ]
  +allcaps: array:69 [
    "switch_themes" => true
    "edit_themes" => true
    "activate_plugins" => true
    "edit_plugins" => true
    "edit_users" => true
    "edit_files" => true
    "manage_options" => true
    "moderate_comments" => true
    "manage_categories" => true
    "manage_links" => true
    "upload_files" => true
    "import" => true
    "unfiltered_html" => true
    "edit_posts" => true
    "edit_others_posts" => true
    "edit_published_posts" => true
    "publish_posts" => true
    "edit_pages" => true
    "read" => true
    "level_10" => true
    "level_9" => true
    "level_8" => true
    "level_7" => true
    "level_6" => true
    "level_5" => true
    "level_4" => true
    "level_3" => true
    "level_2" => true
    "level_1" => true
    "level_0" => true
    "edit_others_pages" => true
    "edit_published_pages" => true
    "publish_pages" => true
    "delete_pages" => true
    "delete_others_pages" => true
    "delete_published_pages" => true
    "delete_posts" => true
    "delete_others_posts" => true
    "delete_published_posts" => true
    "delete_private_posts" => true
    "edit_private_posts" => true
    "read_private_posts" => true
    "delete_private_pages" => true
    "edit_private_pages" => true
    "read_private_pages" => true
    "delete_users" => true
    "create_users" => true
    "unfiltered_upload" => true
    "edit_dashboard" => true
    "update_plugins" => true
    "delete_plugins" => true
    "install_plugins" => true
    "update_themes" => true
    "install_themes" => true
    "update_core" => true
    "list_users" => true
    "remove_users" => true
    "promote_users" => true
    "edit_theme_options" => true
    "delete_themes" => true
    "export" => true
    "wf2fa_activate_2fa_self" => true
    "wf2fa_activate_2fa_others" => true
    "wf2fa_manage_settings" => true
    "copy_posts" => true
    "wpseo_manage_options" => true
    "manage_postman_smtp" => true
    "manage_postman_logs" => true
    "administrator" => true
  ]
  +filter: null
  -site_id: 1
}
Mary Siceloff, Author at Weintraub Tobin - Page 132 of 179

Welcome to the Weintraub Tobin Resources Page

Browse below for news, legal insights, information on presentations and events, and other resources from the Weintraub Tobin legal team.


Will The Copyright Act be Amended to Include a “Making Available” Right

Under the WIPO Internet Treaties, member states are required to recognize in their national laws  the exclusive right of  authors of works to ‘‘make [the works] available’’ and ‘‘communicate [the works] to the public’’, including through interactive platforms, such as the Internet. The United States implemented the WIPO Internet Treaties through the Digital Millennium Copyright Act (‘‘DMCA’’) in 1998.  Based on advice received from the Copyright Office and others, Congress did not amend U.S. law to include explicit references to ‘‘making available’’ and ‘‘communication to the public,’’ concluding that the distribution right under the Copyright Act already covers those rights.  However, because of  the absence of express “making available” language in the Copyright Act, courts in file-sharing litigation have reached somewhat different conclusions as to whether the distribution right requires proof of actual dissemination.

Commentators on the subject have opined that the “making available” right is subsumed within the distribution rights set forth in Section 106 of the Copyright Act and that most courts have correctly interpreted the Act as such.  These courts have found that a defendant infringes the distribution right by making the work available without having proof that the work was actually accessed by others.  For example, in  A&M Records, Inc. v. Napster, the 9th Circuit held that “Napster users who upload file names to the search index for others to copy violate plaintiffs’ distribution rights”.  Also in UMG Recordings, Inc. v. Alburger, the United States District Court for the Eastern District of Pennsylvania held that “There is no requirement that plaintiffs show that the files were actually downloaded by other users from Defendant, only that files were available for downloading.”

However, it appears that some courts have concluded that an infringement of the distribution right under the Act does not occur in the absence of actual dissemination. For example, in Atlantic Recording Corp. v. Howell, the District Court of Arizona  held that “[the distribution right] is not violated unless the defendant has actually distributed an unauthorized copy of the work to a member of the public.” 

As a result, Congress asked the Copyright Office to assess the state of U.S. law recognizing and protecting ‘‘making available’’ and ‘‘communication to the public’’ rights for copyright holders.   The study resulted in numerous comments reflecting a vast array of interests. Among those who submitted comments are The Motion Picture Association of America, Inc., and the Recording Industry Association, Public Knowledge and the Electronic Frontier Foundation, and ASCAP, BMI, SGA, SESAC and NMPA, with each reflecting a different point of view.

The MPAA and the RIAA are of the opinion that existing U.S. laws “fully implement the making available and public communication rights within the framework of the reproduction, distribution, performance and display rights of Section 106 of the Copyright Act.”  These organizations note that although there have been some anomalies, “courts generally have interpreted U.S. copyright laws to afford copyright owners the rights of making available and communication to the public, consistent with Congressional intent and in conformity with U.S. obligations.”

ASCAP, BMI, et al have expressed a slightly different opinion.  These organizations believe that the current Copyright Act could “in theory” protect the ‘‘making available’’ and ‘‘communication to the public’’ rights for copyright holders, however, divergent court opinions demonstrate the downside of such a solution.  They claim that the “range and dissonance of these judicial opinions show that the ‘umbrella approach’ to implementing WIPO’s terms has failed to reliably bring U.S. copyright law into compliance with international obligations and norms.”  These organizations fully support Congress amending the Copyright Act to “clearly, plainly, and explicitly state the ‘making available’ right under Section 106 [of the Act]” and note that “the fix can potentially be as simple as incorporating the words ‘including by making available the works to the public’ in that section.”

Public Knowledge and EFF take a somewhat different view of the subject.  Like the MPAA and the RIAA, Public Knowledge and the EFF believe that the Copyright Act currently protects “making available’’ and ‘‘communication to the public’’ rights for copyright holders.  However unlike the RIAA/MPAA, they do not state a position on whether those courts that have held that the distribution right is not violated unless the defendant has actually distributed an unauthorized copy of the work to a member of the public are outliers.  Quite to the contrary, they state that even if the courts “ultimately determine that in some instances, merely offering to upload a file does not implicate an exclusive right, WIPO obligations will still be fulfilled.”  Public Knowledge and the EFF reason that “the making available act turns not on whether a work has been posted or listed, but on whether members of the public have the ability to access [it] from a place and at a time individually chosen by them and that one might reasonably conclude that the right has only been implicated when at least one member of the public has indeed accessed the work.”

Public Knowledge and the EFF go further and state that the creation of a new “making available” right would risk outlawing presently legal and desirable activities and could impede the use of important efficiency enhancing technologies.  They also argue that such a law could put internet users at risk of copyright liability for hyperlinking to content.

One might say that the differing viewpoints from this small sample of comments to the study (27 comments in all) are mostly driven by economic or social agendas.  This may be a fair statement.  However, these differing viewpoints clearly exemplify the complex nature of Copyright law and show that copyright lawyers will continue to stay busy as content focused technology continues to develop.

High Stakes High Tech Drama: Why Companies with Millions of Users Are Concerned About A Class Action Lawsuit By Thousands of Workers

By The Labor and Employment Group

As you will recall from previous posts, a large high tech antitrust class action is being waged in California that has major implications for employer non-solicitation agreements.  Questions regarding agreements between employers that impact employee mobility are being addressed in this lawsuit against the backdrop of antitrust allegations.

High-Tech Employee Mobility Antitrust Class Action: Background Developments

On October 24, 2013, U.S. District Court Judge Lucy H. Koh granted plaintiffs’ motion for certification in a class action alleging that Adobe, Apple, Google, Intel, and other large tech companies worked together from approximately 2005 to 2009 to negatively impact the pay of valuable employees by, among other things, agreeing not to actively recruit each other’s employees. The complaint seeks lost compensation and treble damages for the alleged antitrust violative employment practices of Adobe, Apple, Google, Intel Corporation, Intuit, Lucasfilm, and Pixar. The complaint states the tech companies formed agreements to (1) not recruit each other’s employees; (2) provide notification when making an offer to another’s employee (without the knowledge or consent of that employee); and (3) cap pay packages offered to prospective employees at the initial offer.  The allegations are an interesting twist on previous employee mobility cases.

On January 14, 2014, the U.S. Court of Appeals for the Ninth Circuit denied defendants’ petition to appeal the district court’s order granting class certification.  Now past the certification process, the individual plaintiffs that filed the antitrust lawsuit can now represent all class members in claims that Adobe, Apple, Google, Intel and other tech companies violated federal antitrust laws.

Trial of the class action is set to begin on May 27, 2014.

Latest Pre-Trial Developments: Documents Show Not Everyone Joined 

As the parties prepare for trial next month, documents show that the companies that are accused of creating a system to prevent employee mobility were unable to pull another tech giant into the group.  Facebook declined the other companies’ friend request.  Facebook would not agree to not poach other’s employees, share salary information or agree to cap technical workers pay.

Today, these companies vigorously compete for talent.  However, pretrial documents seem to show that in the 2000s, executives of various tech companies frequently had conversations with one another before recruiting each others’ technical workers or making strategic moves in hiring and setting of salaries.

The failed effort to bring Facebook into the group was revealed in recently released pretrial documents, which include emails and depositions filed with the court.  In a March 28 ruling allowing the case to go to trial, U.S. District Judge Lucy Koh stated that an executive from one of the Defendant Companies “unsuccessfully sought to expand Google’s anti-solicitation agreements to Facebook.”

Waiting for Trial

If this matter proceeds to trial, it has the potential to captivate the world like no other trial since the Lindberg Baby Trial.  Tech’s glitterati will parade through the courtroom with court reporters and the press hanging on every word.  If the reports are correct, a potential mediated settlement may deny us the opportunity to see this spectacle.  More importantly for other companies, we will not get an answer to the vexing question of what mobility agreements can companies agree to between themselves when they potentially have an impact on employees.

We will continue to monitor this case here at the blog.  In the meantime, if you are currently considering employee mobility questions, please contact your Weintraub Tobin attorney to discuss.

Patent Filings and the Potential Discovery of Trade Secret Misappropriation

Under California law, a plaintiff must bring a claim for trade secret misappropriation within three years of discovering the misappropriation or, by the exercise of reasonable diligence, should have discovered the alleged misappropriation.  Often times, discovery of alleged trade secret misappropriation is rather straightforward, i.e., a company discovers that its former employee has downloaded information from a computer and has started soliciting customers to do business with a competitor.  However, there are times when discovery is less straightforward, especially in product development where it can take years for a product to hit the market.  One potential source of information that may give rise to the discovery of trade secret misappropriation that employers must be aware of are patent filings.  The U.S. District Court in the Northern District of California recently used evidence of a patent filing to grant summary judgment in favor of a defendant accused of trade secret misappropriation in the case: Wang v. Palo Alto Networks, Inc. (Case No. 12-05579).

Mr. Wang was a design engineer specializing in the field of network security.  He spent approximately a decade trying to commercialize his firewall technology that included  “fast signature scan” technology.  In 2004, he filed a patent application on his technology.  His patent eventually issued in November 2008.

For years prior to the issuance of his patent, he tried to interest venture capitalists in his product.  In 2005, Mr. Wang met defendant Fengmin Gong at a seminar.  Mr. Gong was a chief scientist at McAfee, Inc. at the time.  Mr. Wang gave Mr. Gong a brief overview of the technology he was developing and later had Mr. Gong sign a nondisclosure agreement.   Over the next year, Mr. Wang discussed his alleged trade secrets with Mr. Gong and even gave him a copy of his patent application that contained trade secret information.  Mr. Gong was supposedly the only person to whom Mr. Wang disclosed his trade secret information.

The nondisclosure agreement was for a period of three years and required Mr. Gong to return all trade secret information back to Mr. Wang at the end.  When the agreement expired by its terms, however, Mr. Wang never demanded that Mr. Gong return the information to him nor did Mr. Gong return the information.

In June 2005, defendant Nir Zuk formed Palo Alto Networks, Inc., which intended to develop its own next generation firewalls.  Shortly thereafter, Mr. Wang and Mr. Gong met with Mr. Zuk to discuss a possible joint development of their firewall products.  Mr. Wang understood Mr. Zuk to state during that meeting that he did not care whether or not he infringed on any patents.  Later that year, Mr. Gong joined Palo Alto Networks as its chief scientist and was introduced as one of its “founders”.  Mr. Wang learned at that time that Mr. Gong joined Palo Alto Networks.

During the following year, there were discussions about possibly licensing Mr. Wang’s technology by Palo Alto Networks.  However, these discussions were not fruitful and Palo Alto Networks decided not to bring Mr. Wang on board.

During that same time, Mr. Wang sought other investors to develop his product.  In preparing his summary for potential investors, Mr. Wang identified Palo Alto Networks as a potential competitor.  In June 2006, Zuk, Gong and two others filed a patent application for their firewall technology.  One year later Palo Alto Networks announced on its website the sale of its first commercial product, a next generation firewall.  Mr. Gong left Palo Alto Networks shortly thereafter.

In December 2007, the patent application submitted by defendants was published.  The patent was in the same field as Mr. Wang’s, i.e., firewall technology and would later form the basis of Mr. Wang’s claim that his trade secrets had been misappropriated by defendants and used in the filing of their patent application.

After defendants’ patent application was published, there were numerous press releases and articles over the next couple of years describing Palo Alto Networks’ technology.  In December 2011, Juniper Networks, Mr. Zuk’s former employer, filed a patent-infringement lawsuit against Palo Alto Networks.  Eight months later, in August 2012, Mr. Wang read a brief from that case and “allegedly learned about the [defendants] patent.”  During that same summer, Palo Alto Networks held a successful initial public offering at which time Mr. Wang claimed that he became aware for the first time that Palo Alto Networks was not a “conventional” firewall company.  In October 2012, Mr. Wang filed a lawsuit against defendants claiming patent infringement and trade secret misappropriation.

Defendants moved for summary judgment as to Mr. Wang’s trade secret misappropriation claim on the ground that it was not filed within three years of Mr. Wang discovering or should have discovered the alleged acts of misappropriation.  The Court noted that a plaintiff in a trade secret misappropriation case is “required to conduct a reasonable investigation after becoming aware of an injury and [is] charged with knowledge of the information that would have been revealed by such an investigation.”  Thus, the statute of limitations on a claim for trade secret misappropriation will begin to run when there is “actual or constructive notice of a claim.”  The U.S. Supreme Court had previously held that the issuance of a patent and its recording with the patent trade office constitutes “notice to the world of their existence.”

The Court examined the facts and concluded that the defendants had filed their patent application in June 2006 containing the alleged trade secrets and that it was published 18 months later in December 2007.  Shortly thereafter in April 2008, the nondisclosure agreement between Mr. Gong and Mr. Wang was technically violated because Mr. Gong had not returned the documents disclosing Mr. Wang’s alleged trade secrets.  Despite this, Mr. Wang did not file this action until more than four years later in October 2012.

In granting summary judgment, the Court held that “an inventor actively practicing in the field and prosecuting his own patent application must be deemed to be on constructive notice of published patent applications in the same field.”  Because Mr. Wang was prosecuting his own patent, the Court concluded that he either knew, or should have known, of the existence of defendants’ patent since it was in the same field.  In fact, Mr. Wang testified that at some point he had reviewed Palo Alto Networks’ patent application and saw that “pretty much everything in the patent application is already covered by my trading [sic] secret.”

The Court found it further significant that Mr. Wang did not take any action upon Mr. Gong’s breach of the nondisclosure agreement by failing to return the documents in April 2008.  This issue was compounded by the fact that Mr. Wang knew that Mr. Gong had gone to work with Palo Alto Networks, which was engaged in the same product field.

When there is evidence that a plaintiff knew or should have known that an alleged misappropriation has taken place, the law shifts the burden to the plaintiff to establish facts as to why he or she did not or could not have discovered the alleged misappropriation and/or filed the lawsuit sooner.  Essentially, the burden is on the plaintiff to show why the statute of limitations period should be “tolled” as to his or her claim. The Court found it significant that Mr. Wang could not offer any credible evidence suggesting that the statute of limitations period should have been tolled.

Mr. Wang’s trade secret misappropriation claim was dismissed because he did not diligently prosecute it after he learned of, or should have learned of, the facts constituting the alleged misappropriation.  The Wang case is a reminder that product developers should examine patent filings in their field to determine whether or not a competitor is misappropriating their trade secret information.  Failure to do so, or if having done so, failing to diligently prosecute such trade secret misappropriation claims, could result in a developer losing the right to sue for trade secret misappropriation.

Mandatory AB 1825 Sexual Harassment Prevention Training

Download: Flyer – Mandatory AB 1825 Sexual Harassment Prevention Training (1747805).PDF

Summary of Program
The regulations regarding California’s Mandatory Sexual Harassment Prevention Training for supervisors require that certain employers provide training to their supervisors every two years.

Program Highlights

  • an overview of sexual harassments laws;
  • examples of conduct that constitute sexual harassment;
  • lawful supervisory responses to complaints of harassment in the workplace;
  • strategies to prevent harassment in the workplace; and
  • practical and inter-active hypotheticals and examples to help illustrate what sexual harassment, discrimination, and retaliation can look like.

Seminar Program
9:00 a.m. Registration
9:30 a.m. – 11:30 p.m. Training

Cost: $75.00 per supervisor

RSVP
Ramona Carrillo
400 Capitol Mall, 11th Fl.
Sacramento, CA 95814
916.558.6046
rcarrillo@weintraub.com

Weintraub Tobin
400 Capitol Mall, 11th Floor
Sacramento, CA 95814

Parking validation provided. Please park in the Wells Fargo parking garage, entrances on 4th and 5th Street.

Scott Hervey Named to Variety’s 2014 Legal Impact Report

Download: Scott Hervey.Variety Legal Impact Report.2014.pdf

Los Angeles, California, April 21, 2014 – Weintraub Tobin Chediak Coleman Grodin Law Corporation congratulates its partner, Scott Hervey on being recognized by Variety in its 2014 Legal Impact Report.

This report, appearing in the April 15 issue of Variety, highlights the nation’s top entertainment industry lawyers whose work has helped shape the film, television, music and digital media industries.

“Scott keeps one foot in Hollywood and the other in Silicon Beach” said Weintraub’s managing partner, Michael Kvarme. “His unique mix of traditional television and technology and digital media clientele earned him this prestigious spot.”

Scott works with tech start-ups, gaming companies, TV production companies, multi-channel online networks, YouTube channels and technology investors. Scott Hervey received his J.D. with distinction, from the University of Pacific, McGeorge School of Law. Scott is a professor of entertainment law at King Hall, U.C. Davis, serves on the Hollywood Radio and Television Society’s Board of Directors and as the chair of the Digital Media section of the Los Angeles Venture Association.

More Whistles May Be Blowing

Employers may begin to see an increase in whistleblower litigation.

Effective January 1, 2014, the Legislature, through Senate Bill 496, amended Section 1102.5, California’s “whistleblower protection” statute. We covered this in our “year in review” seminar, but given the scope of the changes in the law, we wanted to make sure to get the word out to those of you who may have missed it.

First, the revised statute now expands the statute’s protections to employees who report suspected violations of the law internally to “a person with authority over the employee” or to another employee with the authority to “investigate discover, or correct” the reported violation. This means, to trigger whistleblower protection, the employee does not have to report the alleged violation to any entity, agency, or person outside the company.

Second, whistleblower protection now extends to external reports to any “public body conducting an investigation, hearing, or inquiry.”

Third, it is now unlawful for any employer to have any rule, regulation, or policy that prevents the disclosure of reasonably-believed violations of local (in addition to state and federal) laws, rules, or regulations. Previously, the statute had been interpreted to exclude violations of local laws (see Edgerly v. City of Oakland (2012) 211 Cal.App.4th 1191).

Fourth, the revised statute also newly imposes liability where any person acting on the employer’s behalf (i.e., a manager) retaliates against an employee who either does engage in protected whistleblowing activity or who the employer believes has disclosed or may disclose the information externally or internally. This so-called “anticipatory retaliation” is particularly troubling, because the employee alleging retaliation may not have disclosed or even planned to disclose anything.

Fifth, the protection of whistleblowers applies even if disclosing illegal activity is part of the employee’s job duties. For example, a publicly traded company’s compliance officer is now protected for disclosing alleged illegal activity even though her job requires her to report such activity, externally or internally. This change was in reaction to previous California court decisions, which had previously interpreted this section not to provide protection to an employee whose duties include disclosure of legal compliance information.

Although the change in law creates new sources of liability for California employers – with penalties of up to $10,000 per violation – the law at least clarifies a prior split of authority. California and federal law are now harmonized regarding whether an employee must first report an alleged violation of securities laws to the SEC to receive protection against retaliation under the Dodd-Frank Act. A California employee is protected under state and federal law, regardless of whether he or she first reports violations of securities laws to a government or law enforcement agency, to a specified public body, or via an employer’s internal reporting procedure.

In light of the expanded protection for whistleblowers who report unlawful conduct to or about their employers, employers should update their anti-retaliation policies to reflect these new provisions and request that employees acknowledge receipt of this update. Employers should train managers and supervisors regarding their compliance obligations and anti-retaliation laws. Employers must be even more diligent in investigating employee reports promptly, impartially (i.e., a supervisor who is accused should not be the one to investigate), and take appropriate corrective action. Employers should always carefully document the legitimate business reasons for adverse employment decisions such as discipline and terminations, but the expansion of whistleblower protections to difficult-to-disprove “internal complaints” and perceived planned complaints makes this even more important. And, if at all possible, persons accused of alleged violations should not be permitted to make unilateral decisions adverse to the complaining employee.

Patent Myths Corrected – Part One

Patent law is a complicated area of law governed by a confusing set of statutes and regulations that are interpreted by the United States Patent and Trademark Office (PTO) and the federal courts.  Patents themselves are sometimes almost unintelligible and, if intelligible, may require many hours of reading to understand.  It is no wonder that there are a lot of misconceptions or myths about patents.

This is the first of two columns in which I will discuss a few of the most common aspects of patent law that are misunderstood.

1. Ideas Are Not Patentable.

Clients often want to patent an idea.  Ideas are not patentable – inventions are patentable.

To be patentable, an invention must fall within one of four categories, referred to as statutory subject matter.  Those categories are:  processes (also referred to as methods), machines, articles of manufacture, and compositions of matter.

Process patents include patents for methods of doing just about anything, including some computer software and some methods of doing business (although business method patents are now under increasing scrutiny both in the PTO and in the courts).  Machine or apparatus patents include traditional types of machines as well as computer systems.  Articles of manufacture are devices such as tools or just about any non-machine.  Compositions of matter include chemical compositions, genes, and genetically engineered (non-natural) living organisms, including bacteria, plants, and animals.

The above four categories are the categories of inventions for which a utility patent can be obtained.  There are two additional types of patents:  design patents and plant patents.

Design patents protect ornamental designs for articles of manufacture, such as chairs, dishes, and glassware.  A design patent protects only the appearance of the article, not any aspect of its functionality.  An article may be the subject of both a design patent and a utility patent, however, if it has both ornamental design and function.

Plant patents protect distinct, new varieties of asexually reproducible plants (i.e., plants that can be reproduced without seeds, such as by budding or grafting). They include such plants as certain types of roses, nuts, flowering plants, and fruit trees.

There are several things that are specifically not patentable.  They are:  abstract ideas and mental processes, laws of nature, natural phenomena, and mathematical algorithms.

Even if a client’s idea fits within one of the four categories of statutory subject matter, it still is not patentable if it is in its infancy.  The idea must be an invention.  The inventor need not have actually made the invention (reduced it to practice), but must have a complete and operative understanding of the invention.  The patent application must contain a detailed written description of the invention and must describe how to make and use the invention without undue experimentation.  Thus, an idea that is not fully fleshed out, even if it is patentable subject matter, is not ready to patent.  The inventor must be able to describe what the invention actually is.

2. The Inventor Cannot Withhold Details of the Invention to Prevent the Public from Copying.

In addition to a detailed description of how to make and use the invention, a patent application must also include the “best mode” of carrying out the invention.  The best mode is the best way of using the invention known to the inventor at the time the application is filed.

This requirement prevents the inventor from keeping the best way of using the invention a secret.  A patent is a trade-off:  in exchange for the Government giving the inventor the rights to exclude others from making, using, selling, or offering to sell the invention, the inventor must fully disclose the invention to the public in the patent.  This is so that the public may practice the invention after the patent expires.

If an invention is easy to reverse-engineer, trade secret protection is essentially useless and patent protection is the better choice.  This is because patents, unlike a trade secret, protect against reverse engineering.  On the other hand, if an invention is difficult to reverse-engineer, trade secret protection may be preferable to obtaining a patent because, unlike a patent, a trade secret does not expire.

3. You Cannot Tell What a Patent Protects by Looking Only at the Text or the Drawings.

A utility patent contains several parts:  a specification or disclosure, a drawing if necessary, and at least one claim.  The specification is a detailed description of the invention that tells a person of ordinary skill in the art how to make and use the invention and describes the best mode of carrying out the invention.  The drawings (which may include flow charts) must illustrate all essential elements of the invention.  Drawings are typically necessary for inventions that fall within the subject matter categories of machines, articles of manufacture, and processes; drawings are usually not necessary for compositions of matter.

The specification and drawings describe the different versions (embodiments) of the invention or examples of the invention.  They do not define what the patent owner may enforce with the patent.  This is determined by the claims.

The claims must contain the patentable elements of the invention.  It is the claims that are used to determine whether there is infringement.  The claims must be read in light of the specification and the drawings, but the claims define what the patent protects.  Sometimes, the claims are broader than what is described in the specification and the drawings, so one must read and interpret the claims to know what the patent protects.

4. A Provisional Patent Application is Not a Quicker, Cheaper Way of Getting a Patent.

A provisional patent application cannot become a patent.  Despite its name, a provisional patent application is not really a patent application at all because it cannot mature into a patent.  Rather, a provisional patent application acts as a placeholder for a utility application – it is a mechanism for allowing an inventor to obtain an earlier filing date for a utility application.

A provisional patent application requires a specification and a drawing if necessary, and should contain at least one claim.  It must satisfy the same requirements as a utility application (written description, enablement, and best mode).  A provisional application is not ever examined by the PTO and no patent ever issues directly from it.  An inventor has one year from the filing date of the provisional application in which to file a non-provisional utility patent application for the same invention, claiming the benefit of the filing date of the provisional application.    Because a provisional application requires the same level of detail as a utility application, it is typically not much quicker or less costly than a utility application.

If a client has limited time or funds, however, filing a provisional application may be better than filing no patent application.  For example, a provisional application may be advantageous if the inventor needs to disclose the invention on short notice and does not have enough time to have a utility application prepared.  In that situation, the provisional application may provide the inventor with an earlier filing date than might otherwise be obtained, as long as what is later claimed in the utility application was disclosed in the provisional application.

Patent Myths Corrected – Part Two

Last week’s column was the first of two columns discussing some of the most common misconceptions or myths about patents.  Here is the second part, starting with number five on my list.

5. A Patent Does Not Give the Patent Owner the Right to Practice the Invention.Inventors and patent owners often assume that a patent gives them rights to practice the patented invention, i.e., freedom from infringement.  Not true.

A patent is a grant to its owner of the right to exclude others from making, using, offering to sell, and selling the patented invention in the United States, or importing the invention into the United States.  These rights are called exclusionary rights.  A patent does not provide its owner with the rights to do these things.  An invention may be patentable but still infringe another person’s patent.  In such a case, the patent owner may have a patent on the invention but cannot make or use the invention unless they obtain a license from the owner of the patent that is infringed.

6. Patents Do Not Infringe Other Patents.

A patent cannot infringe another patent.  Only a machine, article of manufacture, composition of matter, or process can infringe a patent.

As stated above, a patent gives its owner the right to exclude others from making, using, offering to sell, selling, or importing the patented invention.  The patent is infringed if any of these acts are committed in the United States without the patent owner’s permission.  Thus, there is no infringement unless someone makes, uses, offers to sell, or sells the invention in the United States, or imports the invention into the United States.  An invention described in a patent may infringe another patent, but only if it is made, used, offered for sale, sold, or imported in the United States.  The patent itself is not an act of infringement.

7. Patentability and Patent Infringement are Not the Same Thing.

Inventors often think that if their invention is patentable, then it cannot infringe other patents.  Not so.  Patentability and patent infringement are two different things.  An invention may be both patentable and infringe an existing patent.  In both cases, the starting point of the analysis is the claims.

To determine if an invention is patentable, the invention, as it is claimed, is compared to what is known in the field (the prior art).  In general, prior art includes written documents (such as other patents, published articles, catalogs, and websites), as well as actions by the inventor and third parties, that exist before the patent application is filed.

The first requirement of patentability is that the claims must be novel (new or different) over the prior art.  The test for novelty is performed by looking at each element of the invention as claimed. If all of the elements of the claimed invention are present in a single prior art reference, then the invention is not novel and is said to be anticipated by the prior art.  The invention is not patentable.

The second requirement of patentability is that the claims must be nonobvious over the prior art.  The invention is obvious if the differences between the invention and the prior art are such that the invention, as a whole, would have been obvious at the time it was made to a person with ordinary skill in the art.  Unlike the test for novelty, the test for obviousness is not limited to a single prior art reference – any number of references can be combined to render an invention obvious.  For obviousness to be found, every element of the claimed invention must be present or suggested in the prior art, although not necessarily in the same reference.

To determine if an invention infringes an existing, in force (not expired) patent, the claims of the patent in question are compared to the invention (in a patent infringement action, the district court first interprets or construes the claims to determine their meaning and scope).  If each element of a claim is present in the invention (literally, or in some cases, by an equivalent), that claim is infringed.  Only one claim need be infringed for the patent to be infringed.

Thus, although it sounds counter-intuitive, an invention can be patentable over a prior art patent and, at the same time, infringe the same patent.

Roughneck Hazing Lands Nabors Drilling in a Blowout of a Verdict

By Labor & Employment

In a recent decision, the Court of Appeals for the Second Appellate District upheld a $150,000 sexual harassment verdict and a $680,000 attorneys’ fee award against one of the Countries’ largest rigging and drilling company, Nabors.  Given the nature of the allegations and the size of the award against the drilling tycoon, expect to see more of these types of cases in the near future.

Max Taylor, the Plaintiff in Taylor v. Nabors Drilling USA, LP (2014) 222 Cal. App. 4th 1228, began his employment as a “floor hand” on a drilling rig for Nabors in 2008. Starting at an entry-level position, Taylor was subject to daily verbal abuse by his supervisor and by senior employees. Several times a day they called him, among other things, “queer,” “fagot,” and “homo,” and posted pictures of him around the restroom with derogatory sexual comments. Taylor’s supervisor and coworkers knew that Taylor was not a homosexual, knew that Taylor had a girlfriend, and their spouses’ and Taylor’s girlfriend would even go shopping together. In addition to verbally abusing Taylor, his coworkers would also physically assault him by, among other things, spanking his buttocks. According to Taylor’s girlfriend, Taylor would come home after work emotionally distressed.

Approximately one-and-a-half-years after his employment with Nabors began, Taylor complained to human resources about the harassment. In response, Nabors removed Taylor’s supervisor from Taylor’s rig and the other employees stopped harassing him. After a thorough investigation Nabors terminated the supervisor. Three months later, however, Nabors terminated Taylor citing workplace absences, tardiness, and a confrontation with one of his new supervisors. Three months later, Taylor filed suit alleging hostile work environment, failure to prevent sexual harassment, unlawful retaliation, and wrongful termination. A jury awarded him $160,000 in damages based on his hostile work environment claim alone.

On appeal, the court upheld the jury award noting that “sex was used a as a weapon to create a hostile work environment” for Taylor. The court further noted that Taylor’s seniors “’employed attacks on (Taylor’s) identity as a heterosexual male as a tool of harassment.’” Nabors argued that the rig crew’s comments were not sexually motivated as they all knew Taylor was not a homosexual. In response, the court cited the newly amended Labor Code section 12940(j)(4)(C), which became operative on January 1, 2014, and which specifically provides that “sexual harassing conduct need not be motivated by sexual desire.” As such, the court held that “a heterosexual male is subjected to harassment because of sex under the FEHA when attacks on his heterosexual identity are used as a tool of harassment in the workplace, irrespective of whether the attacks are motivated by sexual desire or interest.” The court upheld $150,000 of the $160,000 award for non-economic damages to Taylor as well as the entire $680,520 attorney fees award.

While the facts of this case may seem shocking to some, to others who work in the oil fields this might seem like routine hazing. Therein lays the problem. In an industry where new employees are commonly known as “worms,” the historic hazing rituals in these small crews working at remote locations is difficult to break. Given the amount of damages awarded, and given that this is the first case to discuss the newly-revised Labor Code section 12940(j)(4)(C), we expect to see an increase in sexual harassment cases filed against companies performing oil field services such as drilling, cementing, fracking, and treatment where small crews are the norm. Such companies would be well advised to not only ensure that they are promoting trustworthy mature individuals to such crews, but regularly training them in sexual harassment, and mandating that every crew’s binder includes, at the very least, examples of what types of conduct is not permissible.

The Truth About the “Exceptional” Remedy

It is a truism that preliminary injunctions are “rare” and “exceptional” remedies.  But rarity is context specific.  As a percentage of cars made, Cobra GTs are rare.  If you are standing in the plant where they are made, however, they are anything but rare.  So, while it may well be true that preliminary injunctions, as a percentage of all cases filed are “rarely granted,” that does not mean that most preliminary injunctions are denied.   Although I have no numbers, my experience is that most preliminary injunctions that are brought before a court are likely granted.  That is because attorneys who prepare such applications go through a fairly rigorous self-selection.

Attorneys do not like to lose and they rarely try to bring a preliminary injunction if they don’t think they can satisfy a court that the facts necessitate its issuance.  The same is true of temporary restraining orders which, after all, are only a short term preliminary injunction which can be acquired on shortened (and sometimes no) notice.  When an attorney runs into court with a stack of papers screaming that his client’s hair is on fire and that the defendant is lighting the matches, most judges will, just out of caution and prudence, be inclined to order the defendant to stop playing with matches.  This is especially so in trade secret misappropriation and unfair competition cases.  A plaintiff company runs into court essentially asserting that it will be destroyed or irreparably injured unless the court issues an injunction.  It claims that its customer lists or information associated with customer lists known by former employees is being used to destroy or injure it.  On those facts, many judges will issue a preliminary injunction.  The truth in trade secret and business unfair competition cases is that preliminary injunctions are common.

It may also be less of a big deal than everybody thinks.  Such orders will typically say something like: “don’t use your former employer’s trade secrets.”  Orders in excess of that injunction, or that prohibit contact with particular customers, may be subject to a writ of supersedeas or expedited appellate court review.  While some trade secret and unfair competition cases settle after the preliminary injunction issues, increasingly we see cases where the preliminary injunction is put into place will proceed to trial or disposition by later motion.  On motions for preliminary injunction or application for TRO, the defendant has all the disadvantages.  Plaintiff has had substantial time (or at least more time than defendant) to develop evidence, prepare declarations, obtain computer forensics and the like in advance of filing the motion.  Defendant is on, well, the defense and must hurriedly prepare declarations, computer forensics.  This rush often puts defendants at an extreme disadvantage.

Cautionary note:  Many defendants will rush to prepare declarations which commits them to statements that they may later regret.  Very few individuals remember with any accuracy the content of email communications, or what stored documents or computer forensics will actually show when they are examined.  It is all too common an experience that a party will assert that they have never had any contact with X, Y or Z only to find several emails contradicting that assertion in later discovery.  Counsel must take great care not to let defendants overcommit factually in declarations filed in response to a preliminary injunction in advance of electronic communications and documents being collected and reviewed.