All Tied Up: Independent Ink, Inc. v. Illinois Tool Works, Inc. and Trident, Inc.
On June 20, 2005, the Supreme Court granted certiorari in an important case for intellectual property holders seeking to navigate the sometimes-conflicting dictates of patent and antitrust law. In <i>Independent Ink, Inc. v. Illinois Tool Works, Inc., and Trident, Inc.</i>, 396 F.3d 1492 (Fed. Cir. 2005), the U.S. Court of Appeals for the Federal Circuit held that a patent establishes a rebuttable presumption of market power in a tying case brought under Section 1 of the Sherman Act. The ruling has put the Federal Circuit at odds with several lower courts, the Antitrust Division of the Department of Justice, the Federal Trade Commission and a host of academic critics, each of which maintain that patent rights do not, by themselves, give rise to an inference of market power, and that any rule to the contrary has the potential to reduce legitimate incentives to innovate.
Features
The Preclinical Research Statutory Infringement Exemption: How Far Back Is 'Reasonably Related'?
On June 13, 2005, the U.S. Supreme Court expanded the safe harbor provision of 35 U.S.C. '271(e)(1) to the "use of patented compounds in preclinical studies ... as long as there is a reasonable basis for believing that the experiments will produce 'the types of information that are relevant to an [Investigational New Drug application ("IND")] or [New Drug Application ("NDA")].'" <i>Merck KGaA v. Integra Lifesciences I, Ltd.</i>, __ U.S. __, 125 S.Ct. 2372, 2383-84 (U.S. 2005) (quoting Brief of U.S. as Amicus Curiae 23) ("<i>Integra II</i>").
Industrywide Patent Enforcement Strategies
Enforcement strategies in an industrywide patent enforcement campaign may differ from strategies advantageous in a single litigation. In a single litigation scenario, the goal is to maximize the recovery in the present case without any consideration given to possible effects the present lawsuit may have on future cases. Although this may be somewhat shortsighted as the same players (plaintiff, defendant, and attorneys) are likely to cross paths again and their previous experience will undoubtedly affect their mutual expectations and behavior in subsequent encounters, in reality it is not taken into consideration as often as it should be. Not so in an industrywide enforcement campaign, where the goal is to maximize the monetary recovery for the patent or patent portfolio with respect to all infringers. In this scenario, each case must be considered not in isolation but in the context of the overall enforcement campaign.
Features
Index
Everything contained in this issue in an easy-to-follow format.
Real Property Law
Writ Of Assistance Upheld As to Non-Parties in Foreclosure Action Citibank, N.A. v. Plagakis NYLJ 8/15/05, p. 32, col. 1 AppDiv, Second Dept (memorandum…
A Possible Need to Amend CPLR ' 6501
A recent decision of the Supreme Court, N.Y. County, in a landlord-tenant dispute has highlighted the extreme difficulty facing an owner when a notice of pendency is filed against its realty in an action arguably affecting the title to, possession, use or enjoyment of, the owner's real property, CPLR ' 6501.
Features
Development
Recent rulings of importance to your practice.
Practice Tip: New Federal Rules for Electronic Discovery May Become Effective in 2006
In June 2005, the Committee on Rules of Practice and Procedure of the Judicial Conference of the United States approved comprehensive amendments to the Federal Rules of Civil Procedure regarding discovery of electronically stored information ('ESI'). These amendments were next presented to the Judicial Conference on Sept. 20, 2005 and then to the U.S. Supreme Court and Congress. In their present forms, the amendments would become effective as of Dec. 1, 2006. These e-discovery rule amendments include changes to FRCP Rules 16, 26, 33, 34, 37, and 45, and focus on five areas: 1) early attention to e-discovery issues, 2) discovery of ESI that is not reasonably accessible, 3) procedure for asserting privilege after production, 4) interrogatories and requests for production of ESI, and 5) sanctions and a safe harbor for certain lost ESI.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
