https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Telephony/UC/Collaboration


Keep Competitors Off Your Intellectual Property

  • Written by Channel
  • July 31, 1999

Posted: 09/1999

Keep Competitors Off Your Intellectual Property

Telecommunications companies, like other technology-related ventures, often base their
businesses on the unique and proprietary nature of their business ideas, processes,
products and services. Indeed, it is these proprietary products and services that allow
many telecommunications businesses to stake out a niche in the marketplace and to
distinguish themselves from the multitude of competing service providers. Yet, despite the
importance of these ideas, processes, products and services to the success of their
businesses, many telecommunications companies do not take the steps necessary to protect
themselves against copycats lying in wait to steal such "intellectual property"
from them, thus gaining access to the market niche they have so carefully developed.

In most cases, they need not let this happen. Service providers can protect their
company’s intellectual property by obtaining appropriate patent, trademark and copyright
protection. This article briefly explains each type of protection, the matters to which
they apply, how to determine if protection is needed and, if it is, the steps necessary to
obtain such protection.

Patents

A patent may be obtained for "any new and useful process, machine, manufacture or
composition of matter, or any new and useful improvement thereof." To be patentable,
the process, machine, manufacture or composition of matter must meet the requirements of
patentability, including novelty and nonobviousness. Thus, for example, software may be
patentable to the extent that it is not merely a mathematical algorithm and is associated
with a practical application. The same is true of a business process: it may be patentable
if it is sufficiently unique, useful, concrete and tangible.

Patent law confers what is called a "negative monopoly." That is, a patent
owner may prevent others from making, using or selling the invention for a period of 20
years from the date the application is filed. The patent owner also can elect to license
the patent to others and to derive often substantial royalties from such licenses.

In determining whether your business has a patentable process or product, it is
important to keep in mind that the United States is the last remaining country in the
world in which the initial patent applicant must be the "first to invent" and
not the "first to file." Thus, even if a competitor has stolen your invention
and has filed first, you still may have the opportunity to secure your rights.

Trademarks

The function of a trademark is to evoke a connection in the minds of the purchasing
public between a product or service offered under the mark with the source of the product
or service or the company that produces it. By using a trademark and making it known in
the marketplace, a company creates a valuable asset: goodwill. Goodwill is a byproduct of
the consumers’ loyalty to a product, as well as their ability to recognize the product,
thereby being able to distinguish just that product from others that are similar.

The best marks to consider are those that are arbitrary and fanciful. For example,
"Kodak" and "Polaroid" for cameras are excellent marks. These
trademarks do not describe the products in any way and are very strong. Trademarks should
not describe products or services. In fact, the U.S. Patent and Trademark Office will not
register marks that are descriptive or that it determines to be generic. Examples of marks
that have become generic are cellophane and escalator.

Unlike patents, trademark registrations do not expire as long as certain statutory
requirements are met. For example, between the fifth and sixth year after the date of
registration, an affidavit of continued use and incontestability must be filed at the
Trademark Office. Also, every 10 years from the date of registration a renewal must be
filed. Thus, with a little thought and planning, you can protect your company’s name and
business identity through the trademark process.

Copyrights

Unlike a patent, a copyright does not protect ideas; it protects the expression of
ideas
in original works of authorship in a tangible medium of expression. Thus,
businesses may be able to copyright software (including source code and object code),
promotional materials, databases and related materials.

The beauty of a copyright is that you don’t have to do much to obtain protection, and
you can get the protection immediately. A business automatically obtains copyright
protection by fixing the work in a tangible medium of expression. In fact, a work
expressed in RAM on a computer will be protected by copyright. Notice of copyright is
provided by the placing the copyright symbol ")" on the relevant work, along
with a date of copyright and an indication of the party to whom the copyright belongs. For
an individual, a copyright lasts for the life of the author plus 50 years. For a work
created as a "work made for hire," which is typical in a company setting, the
copyright lasts for 75 years after the first publication of the work or for 100
years from the year of creation, whichever expires first.

A copyright owner, in most circumstances, has the right to exclude others from
reproducing, distributing, displaying or importing infringing copies of the work, or from
making derivative works. Derivative works are works based on the underlying copyrighted
work. For example, certain enhancements to software can be viewed as derivative works.

So if you already have copyright protection in the instant you create the work, why
register it in the Copyright Office? First, it allows you immediate access to the federal
courts in case someone infringes your copyright. Second, it automatically gives you
statutory damages in case of infringement. Third, if you prevail in a copyright
litigation, you automatically will get attorneys’ fees. Litigation is extremely expensive
in this country, and litigation over intellectual property is no exception.

Trade Secrets

A trade secret "… may consist of any formula, pattern, device or compilation of
information which is used in one’s business, and which gives one an opportunity to obtain
an advantage over competitors who do not know or use it." Examples include technical
and nontechnical data, plans, drawings, recipes, financial data, lists of customers and
suppliers and software, which have economic value. Trade secrets can be used in
conjunction with both patents and copyrights.

Trade secrets give you very powerful protection. At the same time, trade secrets are
extremely vulnerable. If you own any trade secrets they must be kept secret or the
protection will be lost. Once this cat is out of the bag, it is out forever. License
agreements involving any trade secret material need not disclose the secret itself, but
must identify that trade secrets exist in the subject matter of the license. Furthermore,
the license must direct the licensee to take sufficient measures and safeguards to keep
the trade secret actually secret.

Unless prohibited under contract or license, reverse engineering is a legitimate means
to let the trade secret cat out of the bag, so contracts and licenses must be drafted with
care. Nevertheless, legal action can be brought for misappropriation of trade secrets. In
such a case, you would have to prove three elements: 1. relative secrecy (e.g., that you
have taken reasonable steps to protect your proprietary rights in the trade secret); 2.
the trade secret’s value to you; and 3. novelty of the trade secret (although a unique
combination of generally known information, or even data in the public domain, still can
constitute a trade secret).

The duration of a trade secret is as long as it is kept secret. Companies would do well
to set up internal safeguards in addition to the external safeguards set forth in their
licensing agreements. The only cost is that associated with maintaining the secrecy.

The best way to determine whether you have assets–e.g., intellectual property–that
need to be protected is to have a qualified attorney perform an intellectual property
audit. We know–when you hear the word "audit" you automatically assume the
fetal position, begin to whimper and to envision long visits with nasty, boring
accountants. In this case, however, the audit will help you protect your business and save
you money.

The intellectual property audit also will help you identify whether your company name,
product names, logos or slogans have trademark or service mark significance. The
intellectual property audit also will investigate and examine whether your company has
documents, software and the like that should be registered with the U.S. Copyright Office.
Finally, the intellectual property audit also will help you consider whether you have
developed anything that could be considered a trade secret, and how you should protect it.

Once the intellectual property audit is completed, you will be in a position to make an
informed judgment as to which of your assets need to be protected and the most efficient
and effective means of obtaining protection. Like many other things in life, a little care
and attention now inevitably will pay substantial dividends later.

Susan E. Colman is founder of the Law Office of Susan E. Colman in Washington. Her
practice includes computer law, information technology law, copyrights and trademarks. She
can be reached at +1 202 775 4937 and by e-mail at [email protected].
Neil S. Ende is founder and partner of Technology Law Group, LLC, a Washington-based
communications law firm. His practice includes telecommunications business, regulatory and
litigation matters. He can be reached at +1 202 895 1707 or by e-mail at [email protected]

New Training Program Can Help Keep Secrets
Secret

By Charlene O’Hanlon

You just
don’t get it. …Your super top-secret formula for ruling the world was guarded diligently
for months on end, yet your competitor has managed to beat you to world domination. Could
there be a leak in your organization?

Intellectual property losses could cost a company millions, not only in lost revenue,
but also in time wasted tracking down the source of the leak. But a new training tool from
Phoenix-based Corpedia.com can help cut down on intellectual property losses and protect
your company from future losses.

"An Employee’s Guide to Protecting Intellectual Property and Trade Secrets"
is a training course on CD-ROM that enables employers to train employees on the fine art
of not spilling the beans to their competitors. The course covers several major ways that
intellectual property is lost and what employees can do to help protect their employer.
This includes protecting secrets from outsiders, including visitors and hackers, and also
while traveling. The course also discusses what constitutes a trade secret and how federal
law and the principle of "inevitable disclosure" limit what employees can take
with them when they leave their employer.

Should an unscrupulous employee take a trade secret with him or her, the program keeps
records on training policies that can be used in a court of law. Specifically, the program
can prove that the employee was trained on and knew the company’s compliance policies, as
well as what constitutes a trade secret, by the results of a test given to each employee
upon completion of the training program. Armed with this information, an employer can
disprove a former employee’s claims that the taking of intellectual trade secrets was not
done willfully.

Tags: Agents Telephony/UC/Collaboration

Most Recent


  • Strike
    2,000 Frontier Communications Workers 'Fed Up,' On Strike in California
    The workers say Frontier is violating subcontracting limitations in their contract.
  • Partner Hurdles Adopting AI
    As Artificial Intelligence Advances, Is Human Error Holding Up the Contact Center?
    LiveVox’s CEO discusses the challenges and promise of AI for the industry.
  • Time to sell on clock diagram
    Nice Partners with Microsoft, Creates Co-Sell Arrangement for CXone
    CXone will help organizations globally transform their customers’ experiences, building a digital-first customer service operation.
  • CwCJ Feature Size
    Coffee with Craig and James Episode No. 114: Zayo Group, Telarus Partner Summit
    We take a deep dive into the Zayo partner program with channel leader Lynn Tinney.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Sign a Contract
    Unisys Adds Managed UCaaS with $153 Million Unify Square Acquisition
  • Fortune 500 2021 logo
    AT&T, Microsoft, Verizon, More Tech, Telco Companies Make Latest Fortune 500
  • Telephone poles and lines
    Granite Buys Epik: Score One for Legacy Telecom
  • New
    Martello Technologies Group Targets MSPs, VARs with New Partner Program

Upcoming Events

View all

MSP Summit

September 13, 2022 - September 16, 2022

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Galleries

View all

The Gately Report: SonicWall Partners to Play Big Role in Company’s Next Chapter

August 19, 2022

As Artificial Intelligence Advances, Is Human Error Holding Up the Contact Center?

August 19, 2022

It Will Be Alright: 10 Expert Tips for Surviving a Layoff

August 19, 2022

Industry Perspectives

View all

How to Take Shared Responsibility for Securing Cloud

August 11, 2022

Seize the Application Modernization Opportunity

August 2, 2022

A Growth Mindset: Your Organization’s Strategic Differentiator

August 1, 2022

Webinars

View all

Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack

August 23, 2022

Why it is Important to Upgrade Aging Servers and How to use Live Optics to Upgrade Efficiently

August 25, 2022

Executives at Home are Not Alright: An Intro to Digital Executive Protection

September 8, 2022

White Papers

View all

Work Goes Remote – (and Other Top ITOps Trends)

May 25, 2022

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

Channel Futures TV

View all

ThreatLocker Preaches Zero Trust, Addresses Industry Competition

Kaseya-Datto: Channel Leader Talks MSP Benefits from Acquisition

August 19, 2022

Cisco Taking Partners of All Types to ‘New Heights’

August 19, 2022

Microsoft Targeting Partners to Sell Teams, Windows 365 to SMBs, More

August 15, 2022

Twitter

ChannelFutures

.@FrontierCorp workers on #strike in California for subcontracting. @CWAUnion dlvr.it/SWwXhh https://t.co/c8QQZyBaq5

August 19, 2022
ChannelFutures

.@MichelleRagusa of @CiscoPartners gets us ready for @MSP_Summit by talking #SMB, security and more. #MSPSummit… twitter.com/i/web/status/1…

August 19, 2022
ChannelFutures

.@IGIcyber sidles up to @meetgradient to bring ease of use and added value to MSPs. dlvr.it/SWwRSG https://t.co/vLFDPfAyQ1

August 19, 2022
ChannelFutures

Now Available: Expo Pass to Channel Partners Leadership Summit & #MSPSummit this September 13-16! Take a look at th… twitter.com/i/web/status/1…

August 19, 2022
ChannelFutures

How do you stay on top of your game? 💪 By connecting & sharing knowledge with other elite partners, ready to stay r… twitter.com/i/web/status/1…

August 19, 2022
ChannelFutures

How do you stay on top of your game? 💪 By connecting & sharing knowledge with other elite partners, ready to stay r… twitter.com/i/web/status/1…

August 19, 2022
ChannelFutures

.@NICELtd and @Microsoft have partnered to deliver personalized digital experiences via CXone on @Azure. @msPartner… twitter.com/i/web/status/1…

August 19, 2022
ChannelFutures

For the team at @advantagecg, the recently announced partnership with @ExtremeNetworks is a validation of the partn… twitter.com/i/web/status/1…

August 19, 2022

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X