January 8, 2007
The protection of intellectual property should be a significant concern to all Information Technology organizations. Without protection, commercial hardware/software vendors would quickly evaporate as others would inevitably steal their designs and programs. Corporate developers would also suffer if their ideas, inventions, and programs were misappropriated thereby causing them to lose their competitive advantage. In fact, our corporate landscape and standard of living would be radically different if we had no such protection. Fortunately, the framers of the U.S. Constitution were wise enough to implement legislation safeguarding the authorship and ownership of literature, art, and inventions, thus causing the United States to flourish in the arts and sciences. But the advent of the computer caused us to reconsider how we safeguard such property. For example, the concept of a computer program has been a bit nebulous to some people; should the source code be protected by copyright? What about the object code (executable)? Attorneys have been debating this subject over the last thirty years and there is still general confusion in the field.
In 1974, MBA embarked on our own lawsuit to protect the "PRIDE" methodology. This was a lengthy legal battle which took the courts into unchartered waters. At the time, "PRIDE" was nothing more than a methodology implemented with printed manuals and forms (no software support at the time). To safeguard our product, our lawyers drafted a standard nondisclosure agreement which all prospective buyers would sign prior to our sales presentation. Further, our contracts included similar verbiage instructing the customer to safeguard the physical embodiment of the product and not to divulge it to unauthorized third parties.
We were contacted by Arthur Young & Company in 1974 to conduct a "PRIDE" sales presentation for one of their consulting clients in Milwaukee, Wisconsin; the Harley Davidson Motorcycle Company (then a division of AMF). The attendees signed the nondisclosure agreement and the presentation was conducted as usual. Following the presentation, MBA was informed that Harley wouldn't be purchasing our product, and that Arthur Young would be developing a similar methodology for Harley instead. This made MBA suspicious, particularly since one of Young's consultants was a former "PRIDE" user. Consequently, MBA initiated a lawsuit over misappropriation of trade secrets.
This turned into a long and ugly legal battle which lasted eight years. Basically, the lawyers for the opposition contended that since the "PRIDE" materials had copyright notation printed on them, they were in the public domain. In contrast, it was our contention that "PRIDE" was a trade secret. In the end, we won the lawsuit and "PRIDE" was proven to be a trade secret in a court of law. This litigation established many precedents and is often referenced in similar cases; for additional information, see:
Many years have gone by since the verdict was passed. In 1989, Arthur Young & Company merged with Ernst and Ernst (now called Ernst & Young), the principals of the case have moved on and we no longer bear any ill-will towards the company. Further, "PRIDE" was placed on the Internet in 2004 (with copyright notation).
As a result of the lawsuit, MBA learned a lot about the protection of intellectual property. I may not be an attorney, but you may look upon this as a convenient primer to protect yourself.
COPYRIGHTS
Copyrights are primarily concerned with the authorized reproduction of such things as text, graphics, music, and audio/video recordings. As such, it protects publishers, authors, artists, and designers from unauthorized republication or redistribution of their work. Not too long ago, in order for a copyright to be enforceable, it had to be registered with the copyright office. However, the laws were somewhat loosened in 1976 whereby copyright protection is now effective from the moment the work is first created in fixed form. Although the use of copyright notation is no longer mandatory, it is highly beneficial to include it whenever possible to indicate your work is protected by copyright. Notation typically appears as:
"Copyright © 2007 ABC Company"
Since computer program source code is written as text, it is a wise idea to add such notation in the source code. But understand this, copyright only protects the work from unauthorized reproduction, it does not protect the author's ideas (which is how the lawyers of Arthur Young argued against us). Although the exact source code cannot be reused, it does not protect the logic of the program. To illustrate, suppose a new employee brings with him some source code from his last place of employment. Copyright protection would prohibit him from reusing the source code, but it wouldn't stop him from using the ideas contained in the program. Unfortunately, most programmers do not like to reinvent the wheel and, as such, frequently reuse source code over and over again. From this perspective, probably every company with an I.T. department is guilty of some form of copyright infringement.
TRADE SECRETS
A trade secret is much different than a copyright. Basically, it represents some unique formula, design or idea. Perhaps the best known example of a trade secret is the Coca-Cola syrup formula which is strictly protected in a vault. There are essentially two elements for establishing a trade secret; first, that it is a "unique" idea or formula, that it has distinguishable characteristics or properties to differentiate it from others, and; second, that you can demonstrate you are taking effective safeguards to protect it from unauthorized use (hence, making it a "secret"). In the lawsuit over "PRIDE", we were able to successfully demonstrate that "PRIDE" was unique and that we had taken adequate steps to safeguard unauthorized use (our nondisclosure agreement).
PATENTS
A patent is similar to a trade secret in that the inventor has a unique idea or device he wishes to prevent others from producing. To implement a patent, the idea or device must be registered with the U.S. Patent and Trademark Office. A registration process is required which includes a fee. For an invention to be patented, it must be proven to be unique, useful, and not of an obvious nature. If a patent is granted, the inventor is protected from others producing a similar invention for a limited period of time (20 years). The patent is renewable at the end of this period.
The computer field makes active use of patents to establish unique inventions and protect them from others For example, IBM typically registers the most patents each year, both hardware and software.
TRADE MARKS/SERVICE MARKS
A trademark is an arbitrary word, name, symbol, or device used to distinguish a particular product. A service mark is similar except it is used to distinguish a particular service. For example, "PRIDE" is the registered trademark of M&JB Investment Company.
Like a patent, the trade/service mark has to be registered with the U.S. Patent and Trademark Office. And, Yes, a registration fee is required. Notation normally accompanies the trademark to indicate it is registered ®. Use of such notation should be encouraged so that others know your product or service is a trademark.
A trade/service mark means no other company can use it to offer a competing product or service unless authorized by the company holding its title. As such, it is closely related to the integrity of the title company. If a competitor uses it, the public will assume they are somehow aligned with your business and, as customers of your competitor, are entitled to the same level of service or quality your business offers. If the competitor fails in this regards, it is a reflection of both your product/service and your company which could damage your business.
CONCLUSION
When MBA was founded, we were very lucky to get good, sound legal advice for protecting our intellectual property. Because of this, I encourage anyone concerned in this regard to seek such advice from a qualified attorney.
Another way to assist in the protection of your intellectual property is to enact some form of employee agreement, whereby the employee agrees not to misappropriate your products (such as designs and software), or use other intellectual property without expressed authorization. This puts your employees on notice.
Devices such as copyrights, trade secrets, patents, trade/service marks are very helpful for preventing the unauthorized use or distribution of your products. However, if someone really wants to pirate your products, they will. When you catch someone in the act though, try to give them a way out. I always recommend that you try to avoid litigation whenever possible. I find such lawsuits primarily benefit the attorneys and nobody else. But if your livelihood is genuinely threatened, as ours was, then you have no alternative but to use the full force of the law.
OUR BRYCE'S LAW OF THE WEEK therefore is... "Lawsuits primarily benefit the attorneys and nobody else."
"PRIDE" METHODOLOGIES FOR IRM
Friends, the "PRIDE" Methodologies for Information Resource Management (IRM) is a common sense solution for Enterprise Engineering, Systems Engineering, Data Base Engineering, and Project Management. The methodologies include defined work breakdown structures, deliverables, and review points that promote quality and the production of industrial-strength information systems. Building information resources is a science, not an art form. Our methodologies clearly explain the concepts that govern them, which remarkably, is derived from engineering/manufacturing practices. Now you can get these acclaimed methodologies for free at our corporate web site at: http://www.phmainstreet.com/mba/pride/
MY "PET PEEVE OF THE WEEK" IS "COWARDS ON THE INTERNET"
Like many of you, I participate in a variety of Internet Discussion Groups, blogs, and other such forums. These groups represent a variety of interests and different types of discourse. I've noticed though that regardless of the type of forum, few people like to identify themselves by their proper name. Instead, they use a lot of aliases, such as the names of characters from movies, comic books, mythology or perhaps a buzzword from their favorite hobby; anything but their real name. People will also associate an icon with their name, and No, it is not their photograph but rather some other bizarre image or character. The names and icons can be rather clever, but I find it a bit disturbing that people are trying to cloak their identity at all. Maybe its because they're afraid someone will try to steal their identity or begin to stalk them on the Internet. Perhaps. But I tend to believe the real reason people seek anonymity on the Internet is so they can sling mud and venom in the discussion groups without being identified. Its interesting, in these groups people will say things they would never dare say face-to-face with another human being. Because of this, I call such people "cowards" as they are unwilling to properly identify themselves and observe proper decorum. Instead, they relish in being obnoxious and disrupting the harmony of a group. They prefer a juvenile free-for-all as opposed to honest and civil discourse. Further, their negativity can be infectious which has a tendency to create lynch mobs. I'm convinced if people behaved in real life as they do in Internet discussion groups, the country would be nothing more than one big barroom brawl.
Maybe this is another small sign of the social deterioration of the country. We now have a tendency to speak before we listen or think. And because people now use a form of shorthand in their on-line correspondence, they have forgotten how to properly articulate an idea or a response. Instead, they go for the jugular. Again, I don't believe this is how people would dare communicate one-on-one. If they did, there would be a heck of a lot more people with black eyes.
Such is my Pet Peeve of the Week.
eBOOK: THE BRYCE IS RIGHT!
Folks, be sure to check out our eBook entitled, "The Bryce is Right! Empowering Managers in today's Corporate Culture." This is a frank and candid description of the state of the art in management and includes essays on the problems in management today, along with some pragmatic advice on how to deal with them. Basically, this is a condensed course in management. As such, it is suited for managers, either those aspiring to become a manager or for those who need a refresher course. It will also be of interest to young people entering the work force, and is excellent for college curriculums.
Charles Cole of Lyndhurst, OH, said it is a "Very interesting book. Good work! It reminds me of some of the early works I read by W. Edwards Deming. Too bad the American corporate gurus of his day didn't pay him heed."
And Wolf Hager of Fort Myers, FL, says it is "A very impressive publication which requires careful reading and reminds me somewhat of Peter Drucker."
The price is just $20 plus tax. For more information on our book or to order on-line, see:
http://www.phmainstreet.com/mba/bryce1.htm
We have also produced a new one-day training program of the same name. For more information on both the eBook and course, please visit our web site at:
http://www.phmainstreet.com/mba/bryce1.htm
While there, look for our MS PowerPoint presentation describing both the book and the training program.
AND FINALLY...
I received an e-mail from Jeff Fabor in Wyoming who wrote me regarding last week's essay, "Ruptured Stalkthrus - Why Reviews are so Important."
Jeff writes:
"Incremental reviews sounds like a bit of overkill doesn't it?"
Thanks Jeff for your note,
It depends on the scope of your project. If you are trying to build something small and insignificant, you won't have that many reviews. But if you are doing anything of substance, such as a major systems development effort, communications becomes critical and you must have consensus before getting too deep into the detail. Such reviews are actually quite common, particularly in engineering, construction, and manufacturing. Why should systems development be any different? It promotes design correctness and customer satisfaction. As I said, it depends on the scope of what you are trying to build.
Again, thanks for your e-mail. Keep those cards and letters coming.
MBA is an international management consulting firm specializing in Information Resource Management. We offer training, consulting, and writing services in the areas of Enterprise Engineering, Systems Engineering, Data Base Engineering, Project Management, Methodologies and Repositories. For information, call us at 727/786-4567. For a complete listing of my essays, see the "PRIDE" Special Subject Bulletins section of our corporate web site.
Our corporate web page is at:
Management Visions is a presentation of M. Bryce & Associates, a division of M&JB Investment Company of Palm Harbor, Florida, USA. The program is produced on a weekly basis and updated on Sundays. It is available in versions for RealPlayer, Microsoft Media Player, and MP3 suitable for Podcasting. See our web site for details. You'll find our broadcast listed in several Podcast and Internet Search engines, as well as Apples' iTunes.
If you have any questions or would like to be placed on our e-mailing list to receive notification of future broadcasts, please e-mail it to timb001@phmainstreet.com
For a copy of past broadcasts, please contact me directly.
We accept MP3 files with your voice for possible inclusion in the broadcast.
There is no charge for adding a link to "Management Visions" on your web page, for details and HTML code, see the "Management Visions" web site.
Management Visions accepts advertising. For rates, please contact yours truly directly.
Copyright © 2007 by M&JB Investment Company of Palm Harbor, Florida, USA. All rights reserved. "PRIDE" is the registered trademark of M&JB Investment Company.
This is Tim Bryce reporting.
Since 1971: "Software for the finest computer - the Mind."
END
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home