Thursday, December 10, 2009

SOCIAL MEDIA GUIDELINES

First, understand that your employees are going to use social media with or without you and recognize it for the opportunity that it is. For companies seeking to leverage the social media frenzy the question is not "How do I control these relationships" but, rather, "How do I leverage the value of all these relationships?" The answer lies in understanding how the content you and your employees contribute to the conversation enhances the value of the conversation.

Second, understand that you are building your social reputation, so you don't want to be frivolous or uninteresting. Simply put, "Just got on a plane to Florida" doesn't add value. A very experienced business consultant whom I follow can seem to tweet about nothing other than his current location or state of nourishment.

Third, focus on strategies that empower employees to become brand ambassadors, increase knowledge, share ideas and information and promote collaboration. Businesses should stay ahead of the curve and set some basic guidelines as to when, where, how and why an employee can appropriately discuss aspects of their job or the company.

Some appropriate guidelines include the following:

1) Philosophy: how does social media fit into an employees job expectations and performance

2) Behavioral Expectations: areas of expertise; respectful conduct; timeliness; perspective; transparency & judiciousness

3) Channel expectations: Which sites (communication channels) are appropriate for which types of communications.

4) Contextual Expectations: conversational style; perception; value

5) Content Expectations: use of company proprietary information, including current projects, trademarks, names, logos

Online social Media Strategy & Guidelines

Is your business interested in using social media? Are you struggling to understand the "best practices" for allowing your employees to engage in social networking, as employees? Many of our clients are asking for guidance on how to go about implementing social media as part of their online marketing strategy. This article is intended to be a guide on how to approach incorporating social media into your marketing objectives.

CREATING A SOCIAL MEDIA STRATEGY: A 10 Step Guide

1. Social Media Overviews: Create an overview of the top ten social media platforms: Del.icio.us, DocStoc, Facebook, Flickr, Friend Feed, LinkedIn, Scribd, SlideShare, StumbleUpon, Technorati, Twitter & You Tube, including how its used and how your business might participate, e.g. brand management, customer service, knowledge management, networking.

2. Competitive Analysis: Build a social media profile analysis of a competitor or client. This might include what platforms they use, how they participate and some metrics to determine how they are successful.

3. Account creation: Create and populate an executive's social media accounts. Then, set up some time for an intern to teach the executive about the platform. (NOTE: the intern should not participate on behalf of the executive).

4. Research: Are your main media contacts using social media? If so, which platforms? Are they blogging? Using Twitter? Do they want to be contacted through any of these by your company?

5. Template creation: If you have design skills, it might be fun to create customized templates for your firm's Twitter pages or a logo/avatar for your company's employees.

6. RSS: Set up an RSS reader to monitor social media activity around your brand, your client or your industry.

7. Blog monitoring: Of the millions of blogs, probably hundreds reference your brand or industry. Conduct research about the most important blogs in your niche.

8. Blogging: Have employees/interns post about their experiences on your internal or external blog. Not only will it showcase another side to your company, namely that you're empowering your interns, but it also provides your team with important feedback.

9. Web Analysis: Conduct an internal, in-depth analysis of your corporate site. A fresh set of eyes from your target demographic might be useful.

10. Video: Editing images and video are important new media skills. Record a few interviews with executives/customers.

Friday, September 25, 2009

ANATOMY OF A FINANCIAL FRAUD: Part II

By John A. Franczyk, Esq.

You wouldn’t send money to Nigerians who contacted you through the internet on the premise that your payment to them will facilitate a much larger payment to you. So why would you pay fees to businesses or individuals who promise to assist your company to procure lines of credit or other business opportunities? Fraudulent schemes that target individuals are rampant, and estimates of losses due to those schemes range between two and four billion dollars annually. Less publicized, however, are schemes that target businesses with promises of readily-available financing or low-cost loans. Fraudulent schemes that target businesses are remarkably similar to the Nigerian internet schemes, differing only in the gloss of legitimacy that scammers have been able to create.

Last month, we described how one of our clients had been targeted by an unscrupulous individual who had created multiple layers of forged documents and websites in order to convince our client of the legitimacy of his financial resources. Here, we describe a much simpler scheme that was used to dupe a company out of a substantial upfront payment. Both schemes share a number of characteristics, including forged documentation that mirrored the existence of otherwise legitimate organizations. By following the lessons of these schemes, companies can protect themselves from being the next target of scammers who rely on these techniques.

The details of the scam that was presented to us are relatively simple. The scam became apparent when a prospective client came to us to ask for assistance in closing a transaction for an international line of credit. The client, which was a small business headquartered in Europe, had paid €10,000 to a company which represented itself as “Toyota Financial Services” and which claimed that it would be able to facilitate a line of credit to allow the client to pursue business opportunities in the United States. This facilitator presented a one-page contract, which bore a “Toyota” logo and a New York City address, to the prospective client. The contract was purportedly signed by the chief financial officer of Toyota Financial Services. An internet search revealed that the name on the contract was, in fact, the name of Toyota Financial Services’ CFO, and in all respects the contract appeared to be legitimate.

Yet our prospective client had never spoken with this CFO and did not perform any due diligence beyond reviewing the contract that had been presented to it. The client wired funds to an account that was listed in the contract. Once the money was gone, the client lost all communications with the parties with which it had been speaking. We were asked to intervene. Our research quickly uncovered numerous problems with the contract and the entire transaction.

First and foremost, the Toyota Financial Services address that was printed on the contract was non-existent. Moreover, Toyota’s headquarters address is in California and not New York as had been listed on the contract. Moreover, the contract included none of the typical boilerplate terms that are included in even the most rudimentary agreements. Finally, additional research into the individual with whom the client had been speaking suggested that this person had been using a fictitious name and identity.

The prospective client’s loss could have been easily prevented by simple research and due diligence, as well as by following any number of fraud detection systems and procedures that are generally implemented within business operations. Businesses can find advice on those systems and their implementation in multiple locations. Our analysis deconstructed the matter several steps deeper as we considered the factors that might motivate a business to ignore its systems and lead it into the hands of a scammer. Those factors are easily summarized into four areas:

1. Desperation – The client had been unable to procure a letter of credit through its own efforts and latched onto the facilitator as a last resort;

2. Reliance on Famous Names – If the client had not thought it was dealing with Toyota Financial services, it likely would not have pursued the transaction that led to the loss;

3. Mismatched Bargaining Power – This follows from the client’s desperation and its belief that it was dealing with Toyota, specifically, the client did not challenge the contract it received out of a belief that it was not on par with Toyota and that any challenge would harm the transaction;

4. Inadequate Internal Review – The decision to work with the facilitator fell on one person’s shoulders, and the client had not procured thorough legal, financial and management or operating approval prior to authorizing the release of funds to the facilitator.

In addition to implementing fraud detection and prevention systems, businesses need to remain cognizant of these factors when entering into transactions with new entities, particularly where an outlay of capital is required to initiate any transaction. We were unable to help this particular client to recover their funds, as the facilitator had long since disappeared when we were first contacted. The client reported the matter to the district attorney, but the relatively small amount of the loss coupled with the disappearance of the scammer all but precluded an investigation at either a state or federal level.

As long as there are businesses willing to part with their funds, there will be scammers who develop schemes designed to take those funds. The attorneys at Adler & Franczyk remain ready and able to assist our clients to implement fraud detection systems and to review the legitimacy of transactions that involve transfers of funds.

Thursday, September 3, 2009

Innovation and Technology Transfer

Technology transfer is often an integral component of innovation. In fact, it is probably the most often thought-of aspect of innovation. Companies seeking relief from the recent economic turmoil have looked at ways that innovation can differentiate them from their competitors and provide greater value to their customers. Developing, licensing and sharing technology, or other forms of creative content, can help drive innovation within the enterprise.

Recently, I attended ITDA’s 360° Seminar, “Licensing and Partnership for Effective Technology Commercialization.” This seminar consisted primarily of a panel of “experts” willing to share their knowledge and expertise about the subject. The audience was comprised primarily of technology and medical device entrepreneurs and early-stage companies, licensing executives from various industries and a smattering of intellectual property lawyers (myself included). Although many forms of intangible assets should have been addressed or at least acknowledged - such as copyrights, trademarks, trade secrets and other forms of creative content - the panelists uniformly addressed only patents. Since many of the issues discussed regarding the identification, registration and licensing of patents is applicable across other forms of intangible assets, it is useful to highlight some of the key points.

The panel was composed of the following four people: Bruce Lund, an entrepreneur and toy and game inventor, Dr. Alan Hauser, an innovation commercialization expert who currently works with Northwestern University’s Technology Transfer Program, Michael Stolarski, a lawyer formerly with Motorola and currently with Howrey, and Jodi Flax Soriano, Director Business Development at Ohmx Corp., a biotech firm.

A discussion of key issues involved in technology transfer (and joint development relationships such as outsourcing, Joint Ventures, strategic alliances and partnerships) could begin almost anywhere. Although I would leave the valuation issue toward the end of the discussion given what I believe to be the superior needs to determine goals, fit and feasibility, this discussion began with the question (paraphrased): when prioritizing your intellectual property (IP) assets, how do you determine the value of your IP?

Bruce Lund, who tends to develop technology in-house and then commercialize it by licensing to toy and game manufactures and marketers suggested that one begin by introducing the technology to the client and asking whether the client sees a particular application or fit within an existing or proposed product line and then let the Client run the numbers (e.g. conduct a market analysis) to determine what the potential market size, share and value are. In my opinion, this is sage advice only if you are an established company with existing client relationships. For a start-up or early stage business, you are better off determining these parameters on your own.

Michael Stolarski, in typical lawyer fashion, suggested that one begin by looking at court rulings. I fail to see how this is truly helpful unless your technology is easily compared to an exiting, known piece of technology. More importantly, Stolarski brought up the “25% Rule.” According to this rule, royalties paid the IP (patent) developer/owner are 25% of the profit margin.

Dr. Hauser suggested that one should used sophisticated financial tools, driven by certain assumptions, comps in the marketplace and marketplace validation. When prompted by an audience member for some suggested resources or places on the Internet where might access some tools or information, Dr. Hauser was unhelpful. My conclusion from this is two-fold. First, Dr. Hauser is a consultant who makes a living by being the go-to person for such information and analyses. Second, perhaps the information and tools are not readily available and an entrepreneur is better served by securing the advice and guidance of a seasoned subject-matter expert.

Lastly, Jodi Flax Soriano provided some very useful insight from the perspective of the entrepreneur. A business can and often does have many different pieces in its IP portfolio. For example, her field – Biosensors - is crowded. Since it is also highly patent-driven, she suggested that one needs to understand the patent landscape. How is this done? By commissioning a patent search firm to evaluate all the exiting patents in the field and “find the white spaces” left open by existing patents. Again, this is a great suggestion for a successful, well-funded company like hers, which originally raised $1MM on an option to license an existing patent.

What I personally like was the notion of the IP Landscape. This can be done with any relevant IP and should be the first step in any innovation strategy. Take a look at what is out there. Determine where the other players have staked their claims. Evaluate the merits of their claims. Look for the “white spaces.” These will be the “open frontier” within which one will have lower operating risks and higher potential to capture market share and sales.

As the valuation discussion tapered, an audience member asked whether the end use of the technology affected royalty rates. Put another way, what is the effect of a technology that is (a) necessary to launch a product or make it marketable, (b) only improves an existing product, or (c) is a category killer?

From the perspective of Lund, their technology is often incorporated into a third-party product. This generally means a smaller royalty. He suggested that the benchmark used is the wholesale price and that the royalty typically runs between 5-10% of that. He also cautioned that this will be affected by industry (e.g. toys v. medical devices) and territory (e.g. U.S.A., North America, global). In addition, Dr. Hauser suggested that operating margin may be a better benchmark than sales.

At this point in the discussion, thoughts (and questions) started turning toward the underlying issue: money. In other words, once licensed, how does an IP licensor ensure that a product is brought to market and that it generates revenue? Both Lund and Stolarski gave some useful input.

First, require contract minimums: minimum production run, minimum amount of sales. Second, set yearly minimums or milestones with an annual review. Tie this to a right to adjust the royalty and/or terminate the relationship and ensure reversion rights. When the parties are unsure about just how much upside potential there is, set escalating royalty rates by volume. Third, require review of annual marketing plans and budgets. Fourth, work with your partner to ensure realistic baselines. Lastly, consider exclusivity which typically commands a premium.

The discussion next focused on the risks of sharing one’s Confidential Information. All parties agreed that it is necessary to share some information with prospective licensors or partners. But how much in enough? Too little? Too much? And what can be done to safeguard that information once it has been shared?

The initial advice was to have the prospective partner/licensor/licensee sign a Non-disclosure Agreement. However, both panelists and audience members pointed out that these are not always airtight and that some, often larger, businesses will simply refuse to sign them. According to Lund, at least in his industry, customers don’t see inside the product, they only see the results. Therefore it would be difficult for a competitor or usurper to backward engineer the exact method of creating the end result. In other words, business circumstances dictate reveals.

Again, the discussion tended to focus mostly on patents and, not only was there some misinformation, but those in the know failed to correct it. Specifically, Lund stated that sometimes after his firm demonstrates a piece of technology, or once it’s viability has been proven in the marketplace, the firm then goes back and files patents on it if they feel it may have more commercialization potential. Stolarski agreed with this approach.

Noticeably absent from this part of the discussion were any caveats regarding the timeframes within which a patent must be filed once it’s been disclosed, nor the effect of the “On Sale” bar, both of which are unfortunately outside the scope of this article.

As a strategic maneuver, Soriano admonished entrepreneurs to look at competitors’ patents, “poke holes in them” and know the competitors’ weaknesses as well as one’s own. Second, she suggested filing provisional patents covering any new inventions that might be necessary to connect-up the Licensor’s technology with the Licensee’s. Lastly, segment the market to understand how your tech fits into your partner’s strategy and entrenched position.

Hauser pointed out that, in academia at least, there is a propensity to talk about one’s research and all its wonderful possibilities. To counter such forces, Hauser recommended having invention disclosures in place to ensure that employers identify and register IP before it’s disclosed.

So what can one take away from this discussion? Although the panel focused nearly exclusively on patents, the tips and strategies apply to all intangible assets and creative content. First and foremost, know your IP and know your market. An effective licensing program requires that the IP owner know the strengths and weakness of its IP and that of its competitors. A strong knowledge of the IP landscape will reveal the strategic opportunities for products, markets and prospective partners. Second, get strategic advice from domain experts. My sense is that this will increase the reliability of the information, decrease the cost of acquiring the information and reduce risks associated with acting on the information. Lastly, proactively identify and protect your IP before you share it with others (or it gets shared without your knowledge).

Tuesday, July 28, 2009

Anatomy of a Financial Fraud: Part I

Copyright 2009 John A. Franczyk, Esq. All Rights Reserved.

Any mention of “financial fraud” will likely conjure images of Bernard Madoff or any number of other big-ticket fraudulent schemes that have been exposed over the past several years. Financial fraud is more rampant and insidious on a much smaller scale, however, and frequently, closely-held businesses are the targets and victims of that fraud. Not too long ago, one of our clients came very close to losing several million dollars in a transaction which, initially, looked perfectly legitimate. The client’s instincts, however, caused it to dig deeper into the bona fides of the transaction, which subsequently exposed a broad but ultimately superficial scheme that had been created to defraud the client of its funds. This article describes the nature of that fraud and the client’s and our joint efforts which exposed it.

The client is a lending institution which originates loans that are collateralized by publicly-traded securities. During the term of these loans, the client holds the securities in its own name with an account that it has established with its own brokerage firm. Once the terms and conditions of the loan are agreed upon, the loan transaction typically closes on a “delivery versus payment” (“DVP”) basis, in which the securities are transferred into our client’s account at the same time as the loan funds are transferred into the borrower’s account.

A prospective borrower came to the client seeking a multi-million dollar loan that was to be secured by a basket of blue-chip stocks, which were then held in an eTrade account. The borrower presented several months’ worth of eTrade account statements showing the existence and value of that stock and gave our client personal references and the name of his eTrade account representative. His only unusual request was that the transaction be closed through an escrow account that would be managed by his attorney at a prominent, nationally-known law firm. The borrower gave our client the attorney’s name and contact information, as well as a copy of correspondence from the attorney on the law firm’s letterhead and a copy of the escrow agreement that the attorney had purportedly drafted.

The escrow arrangement conflicted with our client’s internal underwriting requirements, which ratcheted the transaction into a more rigorous underwriting environment. The transaction would clear this rigorous environment only if the escrow agreement could be modified to meet certain standards. Our client asked us to assist with the negotiation of those modifications while the client completed the remainder of its underwriting. We first contacted the borrower’s attorney through the contact information which the borrower had provided. We later researched the nationally-known firm of which this attorney was a member and attempted to contact him through the law firm’s switchboard. The attorney that we then contacted, however, had no knowledge of this transaction nor of the borrower. The transaction and the underlying scheme began to unravel shortly after this latter contact was made.

Upon closer examination, we discovered that the law firm stationery we had seen included a correct building address, but a different suite number for the borrower’s attorney. Further, the attorney’s email address that we had been given included a slightly different domain name extension than the extension used by all of the other email addresses listed on the law firm’s website. Simultaneously, our client compared the borrower’s eTrade account statements with other eTrade statements in its possession and determined that the account number listed on the borrower’s statements was one digit longer than other eTrade statement numbers. We ultimately conducted a “WHOIS” domain name search on the domain extensions for both the borrower and his attorney, and discovered that the domain names for all of the email accounts we had been given were registered and owned by the same party.

It quickly became apparent that this prospective borrower had prepared forged eTrade statements and law firm stationery, had enlisted one or two accomplices to play the role of attorneys and account representatives, and had concocted a thatch of websites, all of which had a gloss of legitimacy yet none of which withstood a closer inspection. The client then referred the matter to the US Attorney’s Office, and the prospective borrower has since been indicted.

Our client in this transaction was fortunate to have enacted strict internal procedures which precluded it from being a victim. Statistics in this area are hard to come by, as many firms which have been victims of fraud either do not report the fraud or are not able to grab the attention of a prosecutor who is then willing to pursue the perpetrator. The individuals who enact these schemes will generally be long gone before the fraud is uncovered, and the victims will have little recourse as a result.

The best course of action for any company is therefore to impose internal procedures that are designed to catch the fraud before it affects the company. The second part of this article, which will be published shortly, includes a series of suggestions for internal controls that are designed to prevent fraud. Fraudulent schemes remain rampant throughout the world of closely-held businesses. Time- and cash-strapped business owners may well groan over the prospect of the additional work required to implement these procedures, but in light of the alternative, that additional work may well be the best investment of time and cash that the business owner has ever spent.

Wednesday, July 1, 2009

Five lessons on Innovation from Nike.

The July 2009 issue of Wired ran a very interesting piece about the genesis and success of Nike+, a piece of hardware and software so simple yet revolutionary it has changed the way people think about exercise. Like all Wired articles, the piece is well-written and makes a good read. But, if you don’t have time for or access to the full article, here are five lessons that an innovative firm can take from the Nike+ experience.

1. Think about the context in which a product will be used. Nike+ is fantastically successful not just because it is great technology. Rather their success comes from the fact that they created, and then met, a psychological need: they created simple device that can gather data about a runner’s speed and distance and coupled it with an easy to use, ubiquitous interface, the iPod. This little piece of technology they extended their products (shoes) far beyond the quotidian physical use.

2. Focus efforts on a narrow data set then make it simple to collect, use and share. For example, Nike focused on two simple yet desirable and useful data sets, speed and distance, eschewing more complicated data such as heart rate and route.

3. Provide and easy to use, streamlined user experience. Here Nike benefitted from Apple’s category-killing usability found in the iPod. By reducing the burden of implementation to almost zero, getting customers to actually use the technology was ano-brainer.

4. Create a positive feedback loop. Track progress, compare against goals (or benchmarks) and modify. In the case of Nike+, web-enabling the user base created a powerful, community-based support and motivation system. The community feature also has important gaming motivation and competition aspects.

5. Focus on leveraging core value well and use open-sourcing and standard formats to let others develop apps that expand product use and solidify the products stance as the default platform.

Wednesday, June 3, 2009

Lawyers accuse Google of interference with business relations and unjust enrichment by selling TM-triggered ads.

In what appears to be an increasing trend, a Connecticut law firm filed suit last week (May 27, 2009) against Google, inc. alleging that Google's Adwords program tortiously interferes with business relations (by redirecting prospective clients and referrals) and that Goggle is being unjustly enriched by selling trademark-triggered advertising to trademark-owners' competitors.

The allegations resemble similar claims made in a Texas class-action filing, FPX, LLC v. Google, Inc. (ED Tex) which is the how the Connecticut firm learned of the problem. Apparently, one of the Firm's attorney's discovered a competitor was using the firm's name as an advertising trigger while doing a Google search for the Firm.

Complaint available here. Thanks to Eric Goldman and his Technology & Marketing Law Blog for the link to that complaint.

Monday, June 1, 2009

The Perfect Pitch: A Strategy for Investment Seekers

Perfect Pitch™ ©2009 David M. Adler, All Rights Reserved

A Strategy For Concise And Effective Communication Of The Idea Behind Your Business And Why You Merit Investment

I have spent the last 11 years of my law practice advising entrepreneurs and businesses in varying stages of development. At some point, all growing businesses will need an infusion of capital. Sometimes this comes from “friends, family and fools.” Just as often it comes from professional investors such as Angels or Venture Capitalists. If you or your business needs additional capital to get to the “next level” whether that be development of a “proof of concept,” execution of the go-to-market strategy or strategic investment in new people or technology, you will need to convince the investor that your idea or business is relevant to the target market, achievable by the people and intellectual capital behind it, and likely to result in a substantial increase in value.

It has been my experience that many entrepreneurs or CEO pitch-men lose sight of the forest for the tress. All too often, the “pitch” or presentation only focuses on one thing. Usually, it focuses too heavily on the idea or the market and not enough on the people and strategy. On the other hand successful presentations seem to incorporate three basic, yet distinct concepts, what I call the tri-partite “Perfect Pitch.” In a nutshell the Perfect Pitch answers three questions: Who Am I? What Am I? Why Am I?

Who Am I?

Answering this question tells investors about the people behind the idea. Every presentation should begin with a short, pithy and relevant description of the people and company, their history together and their qualifications for successfully commercializing this idea. For example: “John Doe, Jane Smith and Mary Jones each graduated in 2006 with a MBA from the Whoopity School Of Business. John has 5 years experience managing operations for a national retail chain. Jane has a 4 years experience as an assistant human resources manager for a Fortune 500 Company. Mary operated a small consulting business for 3 years before shutting down operations to pursue her MBA. Last year, they formed National Widget Sales Consultants (NWSC) as a Delaware LLC to capitalize on the emerging/growing/widening need for retailers to leverage the growing list of retail sales technologies.”

What Am I?

Answering this question tells the investor about the specific product or service offered and the revenue model. Put another way, answering this question tells investors what you do, how you do it and how you plan to make money. It never ceases to amaze me how many entrepreneurs forget the making-money part. They simply assume that advisors, investors and strategic partners will intuitively “get it.”

We won’t unless you tell us in plain and simple terms. If it is a product, does it stand alone or will it be incorporated into an end-product? Will it be sold wholesale, at retail, through VARs, through an inside sales team, or through an outside sales team, e.g. commissioned sales reps? How will the product be distributed? Will you have your own distribution? Will you piggy-back on another’s? Will you use a traditional courier, e.g., UPS or FedEx?

If it is a service, how will you market it? How will customers acquire it? Will it be licensed? How do you plan to keep customers coming back?

Continuing our previous example, “NWSC has created a proprietary and highly-customizable system that will be marketed and sold by an inside sales force. We will place consultants within our clients’ businesses to dissect their retail operations, identify operational and sales goals and evaluate which of the many technologies in the marketplace are the best fit for achieving those goals. NWSC generates revenue through consulting fees, commissions on technology sales and licensing the system to third-party business consultants.”

This is also the part of the presentation where you want to highlight the existence and commercial viability of any Intellectual Property including, Patents, Trademarks, Copyrighted content and Trade Secrets as well as proprietary technology or systems and methods.

Why Am I?

Now that you have convinced us that you are qualified to run this business and that you know how it will make money, you need to convince us how or why your idea meets existing or potential needs in the marketplace. Another common mistake I see is a focus on market size, penetration and growth. Yes, it’s true that VCs want to see Billion Dollar markets. But, more importantly, they want to know why your idea is going to penetrate that market and capture sales.

For example, is the market fragmented with no dominant provider? Are there segments of the market that are underserved by existing products/services? Put another way, what is your value proposition? Why will customers choose your product or service over their existing, entrenched ways of doing business? Again, don’t assume your audience will instinctively understand this. The more sophisticated the product or service, the more you will have to flesh out this value proposition.

The Bottom Line.

While following the method outlined above is not guaranteed to land you that round of financing that you are after, it will no doubt help. Paying attention to answering these three simple questions will help keep you focused, keep you on message and provide a framework for answering the types of questions that your advisors, investors and strategic partners will be asking themselves. Good Luck!

Wednesday, May 27, 2009

Ask The Expert: Web 2.0 Legal Risks

Businesses are racing to engage customers, employees and business partners through the use of online social networking tools. As Web 2.0 proliferates, an increasing number of people and businesses are relying primarily on information and communication technologies to engage and interact with each other and the world. If these various stakeholders are to have meaningful interaction, it is important for them to explore the potential of these communication platforms. But legal considerations must be taken into account when strategizing how best to make use of emerging technologies.

This audio Webinar identifies the practical legal risks associated with activities conducted in online participatory spaces. Encompassing Copyright, Privacy, Defamation, Breach of Confidence and other areas of law, the discussion outlines the main considerations that arise when engaging in the online environment. It also examines popular social networking platforms, analysing legal issues specific to their Terms of Use and functionality. This webcast aims to raise awareness of how the legal risks associated with the use of Web 2.0 technologies can be mitigated.

Download Link here

Whois Proxy Service Can Be Liable For Enabling Cybersquatting

In a recent California case, Solid Host NL v. NameCheap, Inc., (CD Cal, 2009), the Court held that a domain name registrar acting as a Whois proxy service may be held liable as a contributory infringer for a customer's cybersquatting under the Anticybersquatting Consumer Protection Act (ACPA). The question under the ACPA is not whether the registered domain names are likely to be confused with a plaintiff's domain name, but whether they are identical or confusingly similar to a plaintiff's trademark. See 15 U.S.C. § 1125(d)(1)(A)(ii). Contributory liability exists where a party either intentionally induces a third party to infringe a mark or supplies a product or service with actual knowledge that the product or service is being used to infringe the mark.

The decision is important for several reasons. First, the domain tasting trend among brand managers. "Domain tasting" is the practice of registering a domain to test for traffic (brand acceptance/monetization) and deleting it without cost within a grace period. Second, the recent proliferation of "anonymous" domain name registrations and registration services. Third, the pending increase in generic top level domains that will have brand owners scrambling to out-register their competition. Lastly, the case is unusual for an ACPA case. Here, a third-party hacked the domain name owner's registration, and re-registered the domain anonymously in an attempt to re-sell it back to the owner.

The ACPA creates a safe harbor from liability for certain domain registrars. But here, the proxy service did not qualify for the safe harbor because it was not acting as a registrar at the time of the alleged misconduct. In order for a plaintiff to assert a claim of cybersquatting, it must allege facts that demonstrate: (1) a valid trademark entitled to protection; (2) that the subject mark is distinctive or famous; (3) that the defendant's domain name is identical or confusingly similar to the mark; (4) that the defendant used, registered, or trafficked in the domain name; and (5) that defendant did so with a bad-faith intent to profit.

Ordinarily, the cybersquatters themselves are named in ACPA actions . Here, the trademark owner named the proxy service as the defendant because, under the proxy arrangement, the service was listed as the registrant in the Whois directory.

Thursday, May 21, 2009

IP Management: Part 1 - IP Audit

Solutions to many current economic challenges “will come from the industries that rely on IP” according to Bush-era Commerce Secretary Carlos Gutierrez. “We have to innovate our way out of the crisis,” he said. Underscoring this with the fact that that major U.S. brands such as Hewlett-Packard and Texas Instruments were born during previous economic downturns.

Failure to identify and document IP and the relationships of those who come into contact with it at the inception of the new venture can lead to serious entanglements down the road. Because so much of the intrinsic value of a new venture is often tied up in the intangible assets of a new business, it is imperative to:

ü Identify your intangible assets early

ü Protect your intangible assets through registration and contract

ü Leverage your intangible assets strategically

Step 1. IP Audit – Locate & Identify your IP!

  • Conduct an audit to assess your company’s intellectual property assets as well as your liabilities to identify and reduce risks and capitalize on opportunities. Books and services are available to help you do an IP audit.
  • Once a company's intellectual property rights have been identified through an audit, the IP manager should put a program in place to assure that these rights are properly registered and correctly used. This article is intended to serve as a practical guide to the registration and maintenance of IP rights.