IP Archives – Blog Business Law – a resource for business law students

Posted by Nadia Haddad.

Throughout the article, “Intellectual Property,” the author Darren Dahl talks about four different common fallacies that small business is unaware. The two most precious resources for any small business owner are time and money. Small business owners believe that it is not worth the time or effort to secure intellectual property rights. A patent can cost up to $25,000 to secure, in comparison to trademarks and Web addresses, which are cheap and can be obtained with the help of a lawyer.

In one case, Daniel Lubetzky, chief executive of New York City, Kind Snacks, heard that one of his competitors had copied the packaging, look, and feel of his bars. Lubetzky had secured components for his property like trademarks, trade dress, and Web addresses after founding his company. Mr. Lubetzky sent a competitor that was stealing his IP a cease-and-desist letter in order to stop the offender.

The above example stresses the erroneous belief that “once I get a trademark, my brand is safe.” In another case, Tracey Deschaine, who runs a restaurant called Dixie Picnic in Ocean City, N.J., secured trademarks, logo and name of her signature item, cupcakes. Even though she had trademarks for her business, someone else was monitoring the activity on the United States Patents and Trademark Office’s website and her spotted her application. They secured the Web address, or URL, before she could. This shows that, just because you have a trademark, it does not mean you are completely protected.

The third topic mentioned was about how “having a patent gives me the right to produce something.” What a patent does is gives you the right to prevent someone else from producing what your patent covers. Mr. Kocher of Cryptography Research says, “having a strong IP position helps ensure that other pay you for your innovation like they would on a toll on a road.” (Dahl).

Another fallacy mentioned is “If I have a patent or trademark in the United States, I don’t need to worry about the rest of the world.” In some countries, like Japan, it is expensive to acquire patents. The author suggested when deciding what your international IP strategy should be, consult a lawyer, and conduct some cost-benefit analysis to see if expanding your IP rights makes proper sense.

The last fallacy the article states “people who collect patents but don’t actually make anything are ‘patent trolls.’” In many cases, companies invent something, obtain a patent, and license it out for manufacturing by another. An example described was how a patent for wireless e-mail delivery held by NTP, a small holding company, something that R.I.M eventually would pay millions of dollars to license from them. The problem with this was NTP was trying to enforce its patent when it did notmake any products itself from the beginning.

Nadia is a business administration major with a minor in international business at Montclair State University, Class of 2016.

Hacking into computer systems is nothing new, and government and businesses alike have always been aware that they must be one step ahead of computer criminals. But the attack on Sony Pictures Entertainment was more than that. It was a shot across the bow in what appears to be a potentially rampant future form of warfare. As a result, every cyber attack on government or business systems must now be carefully examined to see whether it is either criminal or an act of war.

In the face of evidence from the FBI that North Korea was responsible for the Sony attack, senior Republican senators disagree with the administration that it was only a form of “cybervandalism.” Sen. McCain stated this attack “is a new form of warfare, and we have to counter that form of warfare with a better form of warfare.” Sen. Lindsey Graham called “the cyberhacking ‘an act of terrorism’ and suggested re-imposing sanctions on North Korea and adding the country to the terrorism list.” In 2001, President George W. Bush called North Korea part of the “Axis of Evil,” along with Iran and Iraq.

The FBI concluded the attack on Sony was evidenced by IP addresses directly linked to North Korea. This attack was similar to those that occurred last year against South Korean banks and media outlets. The FBI stated:

We are deeply concerned about the destructive nature of this attack on a private sector entity and the ordinary citizens who worked there. . . . Further, North Korea’s attack on SPE reaffirms that cyber threats pose one of the gravest national security dangers to the United States. Though the FBI has seen a wide variety and increasing number of cyber intrusions, the destructive nature of this attack, coupled with its coercive nature, sets it apart.

North Korea’s actions were intended to inflict significant harm on a U.S. business and suppress the right of American citizens to express themselves. Such acts of intimidation fall outside the bounds of acceptable state behavior.

There will most likely be more cooperation between business and government in sharing information and technology. Only together can this new threat to our national security and economy be defeated.