Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-nmvwc Total loading time: 0 Render date: 2024-06-21T22:48:17.826Z Has data issue: false hasContentIssue false

57 - Intellectual Property Compliance: Systematic Methods for Building and Using Intellectual Property

from Part IX - Analysis of Particular Fields

Published online by Cambridge University Press:  07 May 2021

Benjamin van Rooij
Affiliation:
School of Law, University of Amsterdam
D. Daniel Sokol
Affiliation:
University of Florida
Get access

Summary

Abstract: Systematic methods for building and using intellectual property (IP) support companies in creative projects. These methods ensure compliance with IP laws to both establish IP interests and enforce those interests. More than just systematic means to advance legal interests, well-crafted and carefully operated IP compliance programs serve as reliable sources of new creative assets and IP-enhanced profits. At the same time, IP compliance programs are often preventative. IP owned by other parties can severely limit companies’ freedom of action and produce unexpected liabilities that can scuttle major business enterprises. IP compliance programs can prevent commitments to business actions that will conflict with other parties’ IP interests, allowing alternatives avoiding the conflicts to be considered or the requisite permissions obtained to allow use of the needed IP.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2021

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ad Hoc Advisory Group on the Organizational Sentencing Guidelines. 2003. Advisory Group Report. Washington, DC: US Sentencing Commission. www.ussc.gov/guidelines/organizational-guidelines/report-ad-hoc-advisory-group-organizational-sentencing-guidelines-october–7–2003.Google Scholar
American Health Lawyers Association. 2019. “Intellectual Property Policy.” In Health Law Practice Guide 4:App. C–148.Google Scholar
Bochner, Steven E., and Krause, Susan P.. 1989. “Intellectual Property Management and Board Liability.” In Securities Law Institute. New York: Practising Law Institute.Google Scholar
Boyle, Gary W. 1998. “The Foundation of Preventive Law in Corporate America.” National Center for Preventive Law Essays, www.preventivelawyer.org/main/default.asp?pid=essays/boyle.htm.Google Scholar
Brown, Louis M. 1995. “The Other Side of the Law.” In What Is Preventive Law? Cyber Institute. www.cyberinstitute.com/preventivelaw/week1.htm.Google Scholar
Brownlee, L. M. 2019. “Post-Transaction Intellectual Property Management.” In IP Due Diligence in Corporate Transactions, April 2019 Updates at §§ 13:55 to 13:117.Google Scholar
Business Software Alliance. 2019a. Software Licensing Basics, https://smeinfoportal.org/blog/software-licensing-basics/.Google Scholar
Business Software Alliance. 2019b. The Software Asset Management Blueprint, https://smeinfoportal.org/blog/the-software-asset-management-blueprint–2/.Google Scholar
Carr, Chris, Morton, Jack and Furniss, Jerry. 2000. “The Economic Espionage Act: Bear Trap or Mousetrap?Texas Intellectual Property Law Journal 8: 159.Google Scholar
Chen, Hui. 2019. “Don’t Let Your Compliance Program Fail Because You’re Afraid of Data.” Bloomberg Law, Feb. 12, https://huichenethics.files.wordpress.com/2019/02/afraidofdata.pdf.Google Scholar
Content Delivery & Security Association. 2012. Copyright & Licensing Verification (CLV) Program Standards & Procedures, www.mesalliance.org/wp-content/uploads/2016/04/CDSA-APCP-5-CLV-Standard-September-2012.pdf.Google Scholar
Copenhaver, Karen Faulds. 2008. “Managing Compliance with Open Source Software Licenses.” Practical Lawyer 54: 21.Google Scholar
Cottrell, Eric. 2016. “ISO 37001 – The Potential Impact of the New International Anti-Bribery Management System Standard.” JD Supra, Dec. 13, https://www.jdsupra.com/legalnews/iso-37001-the-potential-impact-of-the–69322/.Google Scholar
Dawson, Dave, DeZabala, Ted and King, Joe. 2017. “A Strategic Approach to Software Asset Management.” CIO Insights and Analysis from Deloitte, https://deloitte.wsj.com/cio/2018/10/03/a-strategic-approach-to-software-asset-management/.Google Scholar
Desio, Paula. 2003. “An Overview of the Organizational Guidelines.” In US Sentencing Commission. Organizational Guidelines. Washington, DC: US Sentencing Commission. www.ussc.gov/sites/default/files/pdf/training/organizational-guidelines/ORGOVERVIEW.pdf.Google Scholar
Fay, Erin, and Frymark, Julie. 2005. “Businessowners Beware: You May Have Insurance, But Does It Cover Your Intellectual Property?” Fire Casualty & Surety Bulletins (April/May).Google Scholar
Frankel, William H., Dolan, Christopher M., Lane, Bradley G. and Sendek, Timothy K.. 2018. Designing an Effective Intellectual Property Compliance Program. Eagan, MN: Thompson Reuters.Google Scholar
Freyer, Dana H. 1996. “Corporate Compliance Programs for FDA-Regulated Companies.” Food & Drug Law Journal 51: 225.Google Scholar
Gollin, Michael A. 1991. “Using Intellectual Property to Improve Environmental Protection.” Harvard Journal of Law & Technology 4: 193.Google Scholar
Gruner, Richard S. 2018. Corporate Criminal Liability and Prevention. New York: Law Journal Press.Google Scholar
Gruner, Richard S., and Brunell, Norman E.. 2018. “Goals of Intellectual Property Audits.” In The Legal Audit: Corporate Internal Investigation, edited by Brown, Louis M., Kandel, Anne O. and Gruner, Richard S.. Eagan, MN: Thompson Reuters.Google Scholar
Gruner, Richard S., Ghosh, Shubha and Kesan, Jay. 2018. Transactional Intellectual Property: From Startups to Public Companies, 4th ed. Durham, NC: Carolina Academic Press.Google Scholar
Gutterman, Alan S. 2018. “Business Uses of Intellectual Property Rights – Value and Uses of Intellectual Property Rights.” Corporate Counsel’s Guide to Technology Management & Transactions 1 Dec. 2018 Updates at § 1:3.Google Scholar
Gutterman, Alan S. 2019. “Executive Summary for Clients Regarding Intellectual Property Audits.” Business Transactions Solutions. April 2019 Updates at § 206:44.Google Scholar
Haislmaier, Jason. 2009. “Practical Strategies for Developing Open Source Compliance Programs: Why Compliance (Increasingly) Matters.” Practical Lawyer 55: 45.Google Scholar
Hancock, William A. 2005. “Drafting Intellectual Property Provisions for Codes of Conduct.” Intellectual Property Counselor (Nov.).Google Scholar
Harris, Ray K., and Burgess, James D.. 2003. “Compliance Planning for Intellectual Property Crimes.” Buffalo Intellectual Property Law Journal 2: 1.Google Scholar
International Chamber of Commerce. 2007. Model Intellectual-Property Guidelines for Business. Paris: International Chamber of Commerce. www.wipo.int/edocs/mdocs/sme/en/wipo_icc_smes_08/wipo_icc_smes_08_topic03-related2.pdf.Google Scholar
International Organization for Standardization. 2016. ISO 37001:2016 Anti-Bribery Management Systems – Requirements with Guidance for Use, www.iso.org/obp/ui/#iso:std:iso:37001:ed-1:v1:en.Google Scholar
Kendall, Frank (Acting Under Secretary of Defense). 2012. Overarching DoD Counterfeit Prevention Guidance, www.acq.osd.mil/log/SCI/.anti-counterfeit.html/Counterfeit-Prevention-Guidance.pdf.Google Scholar
Livingston, Henry. 2013. “Compliance Programs for Counterfeit Parts Avoidance and Detection.” Contract Management, May: 46.Google Scholar
Magarick, Pat, and Brownlee, Ken. 2019. “Intellectual Property.” In Casualty Insurance Claims, 4th ed. May 2019 Update, 3:§ 48:32. Eagan, MN: Thompson Reuters.Google Scholar
Microsoft Corporation. 2004. A Guide to Software Asset Management, http://download.microsoft.com/documents/australia/piracy/MIC035_SAM_Guide_FINAL.pdf.Google Scholar
Microsoft Corporation. 2005. Software Asset Management (SAM) Implementation Guide, http://download.microsoft.com/download/f/8/5/f859245b-f740-4168-8dbb-a92d72a62f6d/samguide.pdf.Google Scholar
National Center for Preventive Law. 1996. Corporate Compliance Principles. San Diego, CA: National Center for Preventive Law. www.preventivelawyer.org/content/pdfs/corporate.pdf.Google Scholar
Proctor, Melissa. 2019. “Core Elements of an Import Compliance Program.” Westlaw Practice Notes, www.westlaw.com/w-005-2872?transitionType=Default&contextData=(sc.Default)&VR=3.0&RS=cblt1.0.Google Scholar
Scheineson, Marc J., and Klinger, Shannon Thyme. 2005. “Lessons from Expanded Government Enforcement Efforts Against Drug Crime.” Food & Drug Law Journal 60: 1114.Google Scholar
Simensky, Melvin, and Osterberg, Eric C.. 1999. “The Insurance and Management of Intellectual Property Risks.” Cardozo Arts & Entertainment Law Journal 17: 321.Google Scholar
Tomeny, John. 2013. “Software License Compliance: Five Essential Steps.” Sassafras Software News, Nov. 22, https://web.archive.org/web/20180813041551/www.sassafras.com/software-license-compliance/.Google Scholar
United States Department of Defense. 2014. Defense Federal Acquisition Regulation Supplement: Detection and Avoidance of Counterfeit Electronic Parts. 79 FR 26092–01 (May 6).Google Scholar
United States Department of Justice. 2019. Evaluation of Corporate Compliance Programs (April 2019), www.justice.gov/criminal-fraud/page/file/937501/download.Google Scholar
United States Sentencing Commission. 2018. Sentencing Guidelines Manual. Washington, DC: United States Sentencing Commission.Google Scholar
Watts, Stephen, and Davis, Scott. 2018. “Software License Management (SLM) Explained.” The Business of IT Blog, Feb. 5, www.bmc.com/blogs/software-license-management/.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×