Nov 13, 2024 | General
India’s Digital Personal Data Protection Bill was tabled in 2022, and was finalized as India’s Digital Personal Data Protection Act (DPDP Act) when it received approval from both houses of Parliament and the assent of the President in August 2023. The law came into effect August 11, 2023 and covers personal data collected in digital format, or collected by other means and later digitized. The law aims to strike a balance between the recognized need to process personal data for various purposes, and individuals’ right to control and protect it.
The DPDP Act has its roots in the early 2000s. With the Information Technology Act of 2000, India took its first formal step into cybersecurity laws. However, as technology evolved and the amount of digital data expanded, the need for a more comprehensive data protection framework became evident.
Data Protection Laws exist to prevent fraud and cybercrimes, as well as enforce rights regarding privacy. Applying strong data protection measures and safeguards not only protects individuals’ or customers’ personal data, but also an organisation’s data. Therefore, avoiding considerable problems, which may damage your reputation or your organisations’ confidential information. The DPDP Act grants certain rights to individuals including the right to obtain information, seek correction and erasure, and grievance redressal.
Key Provisions
Scope and Applicability: The DPDP Act applies to the processing of digital personal data within the territory of India collected online or collected in a non-digital and later digitised. It is also applicable to processing digital personal data outside the territory of India, if it involves providing goods or services to the data principals within the territory of India.
Definition of “Personal Data”: Defined under Section 2(t) of the Act, it refers to any data about an individual who is identifiable by or in relation to such data. This includes an individual’s name, address, date of birth, government identity proof, phone number, email address, etc, which most organisations would require from a user or a customer, especially if they conduct their business through the internet.
Consent Requirements: The new Act mandates that organisations, both existing (i.e., having already collected personal data prior to the passing of the Act) and new, must have robust consent mechanisms which satisfy all the requirements under Section 6 (free, specific, informed, unconditional and unambiguous with a clear affirmative action, and shall signify an agreement to the processing of her personal data for the specified purpose and be limited to such personal data as is necessary for such specified purpose).
Obligations of Data Fiduciaries and Date Processors: Data Fiduciaries (any person who determines the purpose and means of processing personal data) and Data Processors (any person who processes personal data on behalf of a Data Fiduciaries) have a higher set of standards to adhere to in the collection, storage and processing of data. The primary obligations of a Data Fiduciary include:
- Appointment of a Consent Manager;
- Legality of collection and processing of data;
- Issuing of notice on usage of data;
- Providing consent revocation mechanisms;
- Take reasonable measures to prevent personal data breaches;
- Implementation of an effective Grievance Redressal Mechanism regarding the users’ personal data
The obligations borne by Significant Data Fiduciaries are even higher, such as:
- Appointment of a data protection officer to serve as a point of contact for grievance redressal;
- Conducting of Periodic Data Protection Impact Assessments;
- Appointment of an Independent Data Auditor to carry out period audits to evaluate compliance with the Act.
Implications for Businesses and Organisations (Data Fiduciaries)
One of the most notable features of the Act is the high penalties imposed, extending up to two hundred and fifty crores. In light of this, entities which qualify as Data Fiduciaries must take the provisions of the Act seriously and begin the enforcement of the same as soon as possible. Some implications for Data Fiduciaries are:
- Increased focus on cybersecurity measures: In order to prevent the breach of personal data, organisations must ensure that they protect the data they collect in a more robust manner. This can entail enforcing a seniority-level based access system to personal data, implementation of firewalls and higher encryption standards, etc..
- Timely updation of privacy policies: Any move made by the organisation must also include the step of assessing their privacy policy. For example, if an organisation were to introduce a newsletter delivered to their users’ email inboxes, this would require the Data Fiduciary to update their privacy policy and their consent mechanism to reflect the collection and storage of users’ email addresses, and the purpose for which such email address is collected, i.e, sending newsletters.
- Ensuring non-processing of personal data of minors: Data Fiduciaries are prohibited from processing the data of children under 18, including targeted advertisements based on analytics without obtaining the verifiable consent of their lawful guardian.
- Issuance of consent and notice to new and existing users: Data Fiduciaries must issue a notice describing the details and use of individuals’ personal data in English and 22 other languages, as well as implement a clear, informed and detailed mechanism of obtaining consent from its users.
- Review contracts and agreements with Data Processors: Data Fiduciaries bear the primary accountability in case of any personal data breach, rather than the Data Processor. In order to ensure that user is given full disclosure regarding the processing of their personal data, agreements between the Data Fiduciaries and Data Processors must be clear, comprehensive, and exhaustive in terms of due diligence, risk assessment, transferring liability, indemnification, confidentiality, data security, business continuity and disaster recovery.
- Investment in compliance, technology and personnel: The nature of penalties would naturally require organisations to invest in lawyers to ensure that they are in compliance with the act and avoid any breaches under the Act, or to ensure that even in the event of a personal data breach, they had conducted due diligence to reduce any impact or penalties arising from the same. Investment into higher security measures is also under the purview of due diligence and compliance, as well as technology to ensure automatic deletion mechanisms, consent management mechanisms, and grievance redressal portals. Furthermore, organisations can ensure compliance by increasing training and awareness among staff on the handling of personal data and confidentiality, as well as the mandatory appointment of personnel under the Act such as a Data Protection Officer, a Consent Manager, and an Independent Data Auditor.
As a result, the legal framework for the protection of personal data in India has advanced significantly with the passage of the Digital Personal Data Protection Act of India. The Act aims to promote responsible data use and respect for individual privacy rights by imposing high standards and legal obligations on data fiduciaries and processors. Businesses will need to maintain transparency and accountability in their data practices in addition to strengthening their cybersecurity safeguards as they adjust to these new responsibilities. The DPDP Act, which emphasizes the value of consent, data security, and the protection of personal information in an increasingly digital age, is a critical step towards establishing a safer digital environment, and will ultimately result in an increased amount of trust between consumers and businesses.
Author: Sumedha Vadhulas
Please contact us at info@origiin.com to know more about our services (Patent, Trademark, Copyright, Contract, IP Licensing, M&A of companies)
Subscribe to YouTube Channel HERE
Join LinkedIn Group: Innovation & IPR
WhatsApp: +91 74838 06607
Oct 28, 2024 | General
When planning to file a patent in India or any other country, one might wonder why patent examiners consider inventions and publications from other countries. Shouldn’t the focus be solely on what has been invented locally?
The answer is, ‘Not necessarily!’ Let us now understand, why global prior art matters when filing for a patent and what is the role of the prior art from around the world in the patent process.
A. GLOBAL NOVELTY REQUIREMENT
Novelty is a fundamental requirement for a patent to be granted. To be considered novel, an invention must be new and not disclosed anywhere in the world before the filing date of the patent application. This means that if the invention has been disclosed in any prior art, whether in India or any other country, it cannot be patented. An invention must be something the world hasn’t seen before, and when they say “world,” they mean it! If an idea or a similar one has already been disclosed in a research paper from Germany, a product launch in Japan, or a patent application in the U.S., then the idea doesn’t qualify as new. Because for an invention to be considered as patentable, it has to be truly new, globally! So, a worldwide prior art search helps ensure that the invention isn’t just new in our country, but genuinely novel on a global scale.
When patent examiners look at prior art from other countries, they perform their due diligence to ensure the invention is novel. It is not enough for the invention to be new only in India, but it needs to stand out globally. This global approach ensures that patents granted in India aren’t challenged later because of existence of any old article or research paper from another country that describes the same invention.
B. HARMONIZATION OF PATENT LAWS
Many countries, including India, are signatories to international treaties and agreements like the Patent Cooperation Treaty (PCT) and the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). These agreements aim to harmonize patent laws across countries of the world, ensuring that patents are examined based on global standards. Considering prior art from other countries helps maintain consistency with international patent practices. Thanks to the harmonized patent rules, whether we are filing for a patent protection in India, Europe, or the U.S., the rules for examining patents, like identifying the prior arts are pretty similar.
C. AVOIDING DOUBLE PATENTING
If prior art from other countries were not considered, it could lead to a situation where the same invention is patented in multiple jurisdictions by different inventors, leading to double patenting issues. Imagine, a patent application has been filed for an invention in India, and at the same time, a person in France files for patent protection for the exact same invention. Without determining international prior art, both patents might get approved, and the true first inventor might not enjoy the fruits of their hard work. By considering global prior art, the patent office ensures that an invention is truly novel on a global scale, and helps avoid the issue of double-patenting, ensuring there aren’t multiple patents granted for the same invention in different places.
D. COMPREHENSIVE EXAMINATION
The purpose of including prior art from other countries allows for a more comprehensive examination of the patent application. This ensures that the invention is not just new in the local context but also globally, and helps prevent the granting of patents for inventions that might already be known or used elsewhere in the world.
E. LEGAL AND COMMERCIAL IMPLICATIONS
In order to keep the patentable subject matter of an inventor safe and strong, considering the international prior arts is highly critical. If the international prior arts are not considered during the application stage, the competitors might use it later to challenge our patent’s validity, leading to expensive legal disputes or, even revoking the patent. If a patent is granted without considering international prior art, it could lead to legal challenges or disputes later on. Considering global prior art during the examination process and by addressing the potential issues upfront, we can help mitigate these risks and strengthens the enforceability of the patent.
By considering prior art from other countries, the Indian patent office ensures that the patents granted are robust, globally competitive, and less likely to be invalidated due to the existence of prior art elsewhere.
In order to understand the perspective of the patent examiners in this context, let us understand some of the case laws in India that address the importance of considering prior art from other countries in patent examination.
1. Bristol-Myers Squibb Company vs. Controller General of Patents (2015)
In this case, Bristol-Myers Squibb, a pharmaceutical company, filed a patent application in India for an anti-cancer drug. During the examination process, the Indian Patent Office considered prior art from various international sources. The patent application was eventually rejected on the grounds that the invention was not novel, as similar prior art existed in other countries.
Court’s Decision: The Intellectual Property Appellate Board (IPAB) upheld the decision of the Indian Patent Office, affirming that the prior art from other countries was rightly considered. The court emphasized that for an invention to be patented in India, it must be novel and non-obvious not just in India but globally. Therefore, considering prior art from other jurisdictions is crucial to ensuring that patents are granted only for truly novel inventions.
2. F. Hoffmann-La Roche Ltd. vs. Cipla Ltd. (2008)
This case involved a patent dispute over the drug Erlotinib. Cipla, an Indian pharmaceutical company, challenged the validity of Roche’s patent, arguing that the drug was not novel as similar inventions had already been disclosed in prior art outside India.
Court’s Decision: “In 2015, the Hon’ble Division Bench of Delhi High Court held that Cipla’s product ‘Erlocip’, which is professed to be a polymorph B type of the compound ‘Erlotinib’, infringes Roche’ patent and confirmed its legitimacy too. It put away the Single Adjudicator choice excusing the suit for injunction recorded by Roche. The bench additionally expressed that this compound might exist in different polymorphic designs; nonetheless, any such designs will be subsumed inside this patent. Hence, ‘Erlocip’ (Polymorph B) by Cipla will encroach this patent. The judgment set out a few guidelines and steps that ought to be continued in each encroachment of patent suit.
The Delhi High Court recognized the importance of global prior art in determining the novelty of an invention. The court considered prior art from multiple countries and eventually ruled that Roche’s patent was valid, as the prior art cited by Cipla did not sufficiently prove a lack of novelty.
3. Novartis AG vs. Union of India (2013)
In this case, Novartis applied for a patent on the beta crystalline form of the drug Imatinib Mesylate, but the Indian Patent Office rejected the application based on prior art from other jurisdictions.
Court’s Decision: The Supreme Court case hinged on the interpretation of section 3(d), and also emphasized that the invention lacked an inventive step, and was obvious in light of prior art, including those from other countries. The Supreme Court decided that the substance that Novartis sought to patent was indeed a modification of a known drug (the raw form of imatinib, which was publicly disclosed in the 1993 patent application and in scientific articles), that Novartis did not present evidence of a difference in therapeutic efficacy between the final form of Gleevec and the raw form of imatinib, and that therefore the patent application was properly rejected by the patent office and lower courts. This case reaffirmed the importance of considering global prior art in patent examination.
CONCLUSION
Considering the global prior art is not a mere formality, but a critical step in ensuring that the invention is both credible and competitive. This practice ensures that the invention can withstand international scrutiny, avoid potential conflicts, and establish a solid foundation for the invention. This is highly essential for guaranteeing that the invention is robust and is recognized not only in India, but also on a global scale.
The above cases demonstrate that the Indian courts and patent office consistently consider prior art from other countries to ensure that the patents granted are truly novel and non-obvious on a global scale. This practice is in line with international standards and helps maintain the integrity of the patent system in India.
As India continues to evolve as a hub of innovation, the role of global prior art in patent law will remain crucial in balancing the interests of inventors, businesses, and the public, ensuring that the patent system serves its purpose of promoting genuine innovation.
Author: Megha Nadiger
Please contact us at info@origiin.com to know more about our services (Patent, Trademark, Copyright, Contract, IP Licensing, M&A of companies)
Subscribe to YouTube Channel HERE
Join LinkedIn Group: Innovation & IPR
WhatsApp: +91 74838 06607
Sep 25, 2024 | Copyright
The assignment of copyright is dealt under S.18 of the Copyright Act, 1957. The assignment of copyright, as per S. 18(1) means the transfer of rights of the copyright from the owner (assignor) to another entity (assignee). This transfer can be done either wholly or partially or subject to some limitations and in respect of work already existing or some future work when it comes into existence.
The steps and process of copyright assignment in India are as follows-
- There should be a proof of ownership of the copyright or copyright registration certificate
- A copyright assignment agreement. The essentials of the agreement are prescribed under 19 of the Act and are as follows
- The agreement shall be made in writing and should be duly signed by the assignor or by his duly authorised agent. (S.19(1)).
- It shall identify the work and specify the scope of rights assigned (S.19(2)).
- It should also provide the consideration or royalty payable. It also prescribes that the matters of revision, extension or termination of the copyright assignment shall be decided upon mutual agreement of the parties. (S.19(3)).
- It should mention the duration and territorial extent of the assignment. As per S. 19(5), if the period of assignment is not stated, it will be presumed to be for a period of five years (5). Under 19(6), it provides that if the territorial extent of the assignment is not mentioned, it is to be presumed to extend to the whole of India.
- Under 19(4), if the copyright has been assigned and the assignee does not exercise the rights conferred upon him within a period of one year, the assignment of such rights shall deem to have been lapsed, unless the agreement provides otherwise.
- An assignment of copyright can be done either before or after the work comes into existence. In cases where assignment follows the registration of copyright, a request under Form XV (registration of changes in particulars of copyright provided under the Copyright Rules, 2013 as per Rule 71)
The following documents are required-
- Notarized copy of the Assignment Deed
- An affidavit certifying that there is no pending matter in any court regarding the Assignment
- Attested copies of the deed
- If any authorised agent is appointed, a power of attorney should be filed
- If the original owner is deceased, attested copy of the death certificate of the owner has to be produced.
- Address and ID proof of the assignor and assignee are required.
As per Schedule 2 and Rule 83, for any application of change in particulars of a copyright entered in the Register of Copyrights in respect of a
- Literary, dramatic, musical or artistic work- Fee-Rs. 200/work
- Provided that in respect of 3[***] Artistic work which is used or is capable of being used in relation to any goods 4[or services] (section 45).- Fee-Rs 1,000/work
- For an application for registration of changes in particulars of copyright entered in the Register of Cinematograph Film- Rs 2,000/work
- For an application for registration of changes in particulars of copyright entered in the Register of Copyrights in respect of a Sound Recording-Rs. 1,000/-
All the above documents and the form should be registered with the Copyright Office with the prescribed fee as mentioned above.
- The Copyright Office will examine the agreement and if found acceptable, will register the assignment. . Registration creates a legal record of the transfer and gives notice of the assignment to the public.
The assignment takes effect as soon as it is registered. A certificate of registration for the assignment, which provides additional evidence of the transfer of rights, may be issued by the Copyright Office. Following a successful registration, the parties concerned may receive a confirmation or acknowledgment letter from the Copyright Office confirming the registration. The Copyright Office may occasionally publish the assignment’s specifics in the Official Gazette, which acts as a public notice.
The effect of registration of assignment deed-
- Dilution of Rights: The assignor’s rights are diminished to the degree that the third party’s (assignee) rights are increased
- Royalty: The rights that are assigned and the amount of royalty that is paid to the creator should be clearly stated in the assignment agreement.
Author: Rachana Koushik (Symbiosis Law School, Hyderabad) & Harish Kumar P (VIT University, Chennai Campus)
Please contact us at info@origiin.com to know more about our services (Patent, Trademark, Copyright, Contract, IP Licensing, M&A of companies)
Subscribe to YouTube Channel HERE
Join LinkedIn Group: Innovation & IPR
WhatsApp: +91 74838 06607
Sep 17, 2024 | Patent
- INTRODUCTION
- Overview of Patent Law and its importance
Patent law is a branch of intellectual property law that grants inventors exclusive rights to their inventions for a limited period, typically 20 years from the filing date of the patent application. The main objectives of patent law are to:
- Encourage Innovation: By providing inventors with exclusive rights, patent law incentivizes the development of new technologies, products, and processes. This exclusivity allows inventors to potentially recoup their investment and earn a profit from their invention.
- Disseminate Knowledge: In exchange for exclusive rights, inventors must disclose detailed information about their invention in the patent application. This disclosure enriches the public domain with technical knowledge, enabling others to learn from and build upon existing innovations.
- Promote Economic Growth: Patents stimulate economic growth by fostering a competitive environment where new and improved technologies can thrive. This leads to the creation of new industries and job opportunities.
- Legal Protection: Patent law provides a legal framework to protect inventors from unauthorized use, reproduction, or sale of their inventions, thus ensuring that their intellectual property is safeguarded.
- Importance of Secrecy Directions under Patent Law
- Secrecy directions are special provisions within patent law designed to protect national security and other critical interests by restricting the disclosure, publication, and processing of certain patent applications. These directions are crucial for several reasons.
- National Security Protection: Inventions that have military applications or strategic significance must be protected from unauthorized disclosure to prevent potential adversaries from gaining access to sensitive technologies. Secrecy directions ensure that such information remains confidential and secure.
- Public Safety: Certain inventions may pose significant risks to public health and safety if misused. Secrecy directions help prevent the dissemination of information about hazardous technologies until they can be safely managed and controlled.
- Economic and Competitive Advantage: Maintaining the secrecy of strategic innovations helps preserve a country’s competitive edge in critical industries. This protection can be vital for maintaining technological superiority and economic stability.
- Compliance with International Obligations: Many countries have international agreements that require them to implement secrecy measures for specific types of technologies. Secrecy directions help ensure compliance with these obligations, fostering international cooperation and security.
- Intellectual Property Security: Secrecy directions act as a deterrent against industrial espionage and unauthorized access to proprietary technologies. By controlling the disclosure of sensitive inventions, countries can better protect their intellectual property and economic interests.
- Definition of secrecy directions in patent law Secrecy directions in patent law refer to official orders issued by patent authorities or relevant government bodies to restrict the disclosure, publication, or processing of a patent application. These directions are typically imposed when an invention is deemed to have implications for national security or other critical interests, and the unrestricted dissemination of its details could potentially harm national interests or public safety.
- HISTORICAL CONTEXT AND DEVELOPMENT
The concept of secrecy in patent law emerged alongside the advent of modern patent systems. As industrialization accelerated in the 19th century, the potential for technological innovations to impact national security became increasingly evident. Governments began to recognize the need to control the dissemination of sensitive inventions that could have military or strategic applications.
- 19th and Early 20th Century
- Industrial Revolution: The Industrial Revolution (late 18th to early 19th century) saw rapid technological advancements that significantly impacted national economies and defence capabilities. During this period, the importance of protecting strategic inventions became apparent, although formal secrecy provisions were not yet widespread.
- World War I: World War I (1914-1918) marked a turning point in the understanding of technological superiority in warfare. Nations began implementing more structured approaches to protect sensitive inventions. For instance, the United Kingdom and other European countries introduced measures to prevent the disclosure of technologies critical to their war efforts.
- Mid-20th Century Developments
- World War II: World War II (1939-1945) significantly influenced the development of secrecy provisions. The need to safeguard innovations in areas such as cryptography, radar, and nuclear technology led to stricter controls over patent disclosures. This period saw the formalization of secrecy measures to protect national security interests.
- Invention Secrecy Act of 1951 (USA): In the United States, the Invention Secrecy Act of 1951 was enacted in response to the critical need for protecting sensitive technological information. This act allowed the government to impose secrecy orders on patent applications deemed detrimental to national security if disclosed. This legislation marked a significant step in the formalization of secrecy measures in the patent system.
- Cold War Era: The Cold War (1947-1991) heightened the need for secrecy in technological advancements. Both the United States and the Soviet Union implemented stringent controls to protect innovations related to defence, space exploration, and other strategic areas. Secrecy orders became a common practice to prevent sensitive information from reaching potential adversaries.
- Late 20th and Early 21st Century
- Globalization and Technological Advancement: The late 20th century saw increased globalization and rapid technological progress. Countries recognized the need for international cooperation to ensure the protection of sensitive technologies across borders.
- European Patent Convention (EPC): Established in 1973, the EPC included provisions for member states to impose secrecy orders on patent applications. This allowed European countries to coordinate their efforts in protecting sensitive technologies and maintaining national security.
- Digital Age and Cyber security: The rise of the digital age and cyber security threats brought new challenges to the implementation of secrecy provisions. Governments needed to adapt their laws to address vulnerabilities associated with digital technologies and cyber warfare.
- Strengthening of National Laws: Countries like China and Japan strengthened their patent laws to include more comprehensive secrecy provisions, reflecting the growing importance of technological protection in national security strategies.
- Modern Context and Challenges
- Balancing Innovation and Security: Modern patent laws strive to balance the need to promote innovation with the necessity of protecting national security. This involves periodic reviews of secrecy orders and updating regulations to reflect new technological realities.
- Harmonization Efforts: Efforts to harmonize secrecy provisions globally have been ongoing, with international treaties and agreements playing a key role. Organizations like the World Intellectual Property Organization (WIPO) facilitate discussions on best practices and harmonization.
- Emerging Technologies: The emergence of new technologies such as artificial intelligence, biotechnology, and quantum computing presents new challenges for secrecy provisions. Governments continue to evolve their laws to address these advancements.
- SECRECY DIRECTIONS IN DIFFERENT JURISDICTIONS
Legislation: Patents Act, 1970
- Procedure: When a patent application is filed, it is reviewed by the Indian Patent Office and the Ministry of Defence. If the invention is deemed to have potential implications for national security, the Controller General of Patents may issue a secrecy direction.
- Enforcement: The patent application process is halted, and the details of the invention are kept confidential. Inventors are prohibited from disclosing the invention to unauthorized persons or entities. Secrecy directions are periodically reviewed, and can be renewed or lifted based on the assessment of national security risks.
- Penalties: Violations of secrecy directions can result in fines, imprisonment, or both, as stipulated by the Patents Act.
- USA Legislation: Invention Secrecy Act of 1951
- Procedure: The United States Patent and Trademark Office (USPTO) forward certain patent applications to defence agencies for review. If an invention is deemed to threaten national security, a secrecy order is imposed.
- Enforcement: The application is withheld from publication, and the processing is suspended. The applicant is notified of the secrecy order and must comply with restrictions on disclosure. Secrecy orders are reviewed annually and can be renewed or rescinded based on security assessments.
- Penalties: Unauthorized disclosure can lead to significant fines, imprisonment, and the forfeiture of patent rights.
- Notable Cases: Historical examples include innovations in cryptography and nuclear technology that were kept under secrecy orders during and after World War II.
Legislation: European Patent Convention (EPC)
- Procedure: National patent offices in EPC member states review patent applications for security concerns. If a national security issue is identified, a secrecy order can be issued.
- Enforcement: The patent application is withheld from publication, and processing is suspended. Coordination among member states ensures that secrecy directions are consistently applied. Secrecy orders are reviewed periodically to determine if they should be maintained or lifted.
- Penalties: Violations can result in fines, imprisonment, or both, as per the national laws of the member state imposing the secrecy order.
- Japan Legislation: Japanese Patent Act
- Procedure: Patent applications are screened by the Japan Patent Office (JPO) and relevant security agencies. If an invention poses a national security risk, the Commissioner of the JPO can issue a secrecy order.
- Enforcement: The patent application is not published, and examination is suspended. Applicants are prohibited from disclosing the invention to unauthorized parties. Secrecy orders are reviewed periodically and can be extended or lifted based on national security evaluations.
- Penalties: Violations of secrecy orders can result in substantial fines, imprisonment, or both.
- China Legislation: Patent Law of the People’s Republic of China
- Procedure: The China National Intellectual Property Administration (CNIPA) and national security agencies review patent applications for sensitive information. If an invention is considered a threat to national security, a secrecy order is issued.
- Enforcement: The patent application is withheld from publication, and processing is halted. Applicants are notified and must comply with non-disclosure requirements. Secrecy orders are periodically reviewed and can be renewed or rescinded based on security assessments.
- Penalties: Unauthorized disclosure can lead to severe penalties, including fines, imprisonment, and the loss of patent rights.
- KEY CHARACTERISTICS OF SECRECY DIRECTIONS
Secrecy directions are specialized legal provisions designed to protect sensitive inventions that may have implications for national security, public safety, or other critical interests. Here are the key characteristics that define secrecy directions in the context of patent law:
- Restriction on Disclosure
- Confidentiality: Secrecy directions impose strict confidentiality on the details of the patent application. Inventors and applicants are prohibited from disclosing any information about the invention to unauthorized individuals or entities.
- Controlled Access: Only specific, authorized government officials and security agencies can access the details of the invention. This ensures that sensitive information is tightly controlled and not exposed to potential threats.
- Prohibition on Publication
- Non-Publication: Patent applications subject to secrecy directions are not published in the official patent gazette or made publicly accessible. This prevents the dissemination of sensitive information to the general public and potential adversaries.
- Document Handling: All documents related to the patent application are handled with a high level of security to prevent unauthorized access and leaks.
- Suspension of Patent Processing
- Processing Halt: The examination and grant process of the patent application is suspended while the secrecy order is in effect. This means that the application will not move forward through the usual patent office procedures.
- Conditional Resumption: The processing of the patent application may resume only if the secrecy order is lifted or modified, allowing for limited disclosure under controlled conditions.
- Periodic Review and Duration
- Regular Reviews: Secrecy orders are subject to periodic review by the issuing authority, typically annually. This ensures that the necessity of maintaining the secrecy order is regularly evaluated.
- Adjustable Duration: The duration of secrecy orders is not fixed and can be extended or lifted based on the ongoing assessment of national security or public safety risks.
- Penalties for Violations
- Legal Consequences: Violating a secrecy order can result in severe penalties, including fines, imprisonment, or both. The severity of the penalties underscores the importance of compliance with secrecy directions.
- Enforcement Mechanisms: Governments have robust enforcement mechanisms in place to detect and prosecute violations, ensuring that the secrecy of sensitive inventions is maintained.
- National Security Considerations
- Defence and Military Applications: Secrecy directions are often applied to inventions with potential military or defence applications. This includes technologies related to weapons, surveillance, encryption, and other strategic areas.
- Critical Infrastructure: Inventions that could impact critical national infrastructure, such as energy, communications, or transportation systems, may also be subject to secrecy directions to prevent potential sabotage or exploitation.
- Balancing Innovation and Security
- Innovation Encouragement: While secrecy directions restrict disclosure, they are designed to balance the need for innovation with national security concerns. Inventors are still encouraged to develop new technologies, knowing that their inventions can be protected if necessary.
- Temporary Measures: Secrecy orders are generally viewed as temporary measures. The ultimate goal is to lift the secrecy order when it is safe to do so, allowing the inventor to benefit from their innovation while protecting national interests.
- International Coordination
- Global Security: Secrecy directions are part of a broader effort to coordinate security measures internationally. Countries often work together to ensure that sensitive technologies are protected across borders, reflecting the global nature of modern security threats.
- Treaty Obligations: Many secrecy directions are implemented in accordance with international treaties and agreements that require the protection of specific types of sensitive technologies.
- IMPORTANCE AND RATIONALE BEHIND SECRECY DIRECTIONS.
- Importance of Secrecy Directions
- National Security Protection
- Defence Technology: Secrecy directions safeguard sensitive inventions that have potential military applications, preventing adversaries from gaining access to advanced defence technologies.
- Strategic Assets: Technologies related to national infrastructure, cyber security, and other critical areas are protected to maintain national security and prevent exploitation by hostile entities.
- Hazardous Inventions: Some inventions may pose significant risks to public health and safety if their details are disclosed. Secrecy directions ensure such information is controlled and handled appropriately.
- Preventing Misuse: Restricting access to sensitive technologies reduces the likelihood of their misuse in ways that could endanger public safety.
- Economic and Competitive Advantage
- Innovation Protection: Ensuring that proprietary and sensitive technological advancements are protected helps maintain a country’s competitive edge in global markets.
- Intellectual Property Security: By keeping strategic inventions secret, countries can secure their investments in research and development, preventing economic espionage.
- Legal Frameworks: Compliance with national and international laws and regulations necessitates the protection of certain types of inventions. Secrecy directions help align patent processes with these legal requirements.
- International Obligations: Countries may have treaties and agreements that require them to implement secrecy measures for certain types of technologies.
- Rationale Behind Secrecy Directions
- Preventing Technological Leaks
- Controlled Dissemination: Secrecy directions ensure that sensitive information is only accessible to authorized personnel and entities, preventing leaks that could compromise national security.
- Intellectual Property Theft: They act as a deterrent against industrial espionage and unauthorized access to proprietary technologies.
- Defence and Intelligence: Inventions that can enhance a country’s defence capabilities or intelligence operations need to be protected to maintain strategic advantages.
- Cyber security: Protecting advancements in cyber security technologies helps shield national digital infrastructure from potential threats.
- Market Control: By controlling the dissemination of sensitive inventions, countries can influence markets and ensure economic stability, especially in sectors critical to national interests.
- Innovation Incentives: Encouraging innovation by ensuring that inventors can work on sensitive technologies without fear of premature disclosure or exploitation.
- Health and Safety: Technologies that could be hazardous if misused are kept under wraps to ensure they are developed and deployed safely.
- Environmental Protection: Inventions that might have significant environmental impacts are controlled to prevent misuse and ensure responsible development.
- Compliance with Global Norms: Secrecy directions help countries comply with international norms and treaties regarding the control of sensitive technologies.
- Diplomatic Leverage: By maintaining control over strategic technologies, countries can negotiate and collaborate more effectively on the global stage.
- CHALLENGES AND CRITICISMS
While secrecy directions serve vital national security and public safety purposes, they also face several challenges and criticisms. These issues reflect the complex balance between protecting sensitive information and fostering innovation and transparency.
- Hindrance to Innovation
- Restricted Collaboration: Secrecy orders can limit the ability of inventors to collaborate with other researchers and organizations. This can slow down the development of new technologies and hinder the sharing of knowledge.
- Reduced Commercialization: The inability to disclose or market an invention can prevent inventors from commercializing their innovations, potentially reducing their financial incentives and slowing technological progress.
- Legal and Administrative Burdens
- Complex Procedures: The process of issuing, maintaining, and reviewing secrecy orders can be administratively complex and resource-intensive for patent offices and security agencies.
- Inconsistent Application: The criteria and procedures for imposing secrecy orders can vary between jurisdictions, leading to inconsistent application and potential legal uncertainties for inventors operating in multiple countries.
- Impact on Patent Rights
- Delayed Patent Grant: Secrecy orders suspend the processing of patent applications, delaying the grant of patent rights. This can affect the inventor’s ability to protect their invention against unauthorized use.
- Limited Legal Recourse: Inventors subject to secrecy orders may have limited legal recourse to challenge or appeal the order, potentially affecting their rights and interests.
- Economic Implications
- Financial Losses: Inventors may face financial losses due to the inability to commercialize or license their inventions while a secrecy order is in effect. This can be particularly burdensome for small businesses and individual inventors.
- Market Distortion: Secrecy orders can distort markets by preventing the introduction of potentially disruptive technologies, which can impact competition and economic growth.
- Transparency and Accountability
- Lack of Transparency: The secrecy surrounding these orders can lead to a lack of transparency and accountability in the patent system. Stakeholders may not fully understand the criteria or rationale for imposing secrecy orders.
- Potential for Abuse: There is a risk that secrecy orders could be used improperly to suppress information for reasons unrelated to national security or public safety, such as protecting economic interests or preventing public scrutiny.
- International Coordination and Compliance
- Cross-Border Issues: As technologies and businesses operate globally, coordinating secrecy orders across different jurisdictions can be challenging. Inconsistent rules and enforcement mechanisms can complicate international collaboration and compliance.
- Trade and Diplomatic Concerns: Secrecy orders may impact international trade and diplomatic relations, particularly if foreign entities are involved in the development or commercialization of the technology.
- Ethical and Social Considerations
- Public Interest: There may be ethical concerns about withholding information that could benefit the public, such as medical or environmental technologies. Balancing the public interest with national security needs can be challenging.
- Informed Consent: Inventors and stakeholders may not always be fully informed about the implications of secrecy orders, raising questions about informed consent and the fair treatment of inventors.
- CASE STUDIES AND EXAMPLES
- India: Missile Technology (2018-2020)
Invention: A new missile technology developed by Indian defence scientists.
Secrecy Directions Imposed: In 2018, the Controller of Patents, upon the Central Government’s recommendation, imposed secrecy directions on the patent application due to its potential impact on national defence.
Duration and Review: The secrecy directions were maintained for two years, with periodic reviews.
Revocation: In 2020, after reassessing the threat level, the secrecy directions were revoked as the invention was no longer considered a threat to national security.
Analysis
National Security: The secrecy directions successfully protected sensitive military technology during its critical development phase.
Innovation Impact: The restriction ensured that the missile technology remained confidential, preventing potential adversaries from gaining insights. However, it also delayed potential collaboration and further innovation until the directions were lifted.
Suggestions
Improved Review Mechanisms: Implement more frequent and detailed reviews to assess the necessity of ongoing secrecy directions.
Partial Disclosure: Allow controlled, partial disclosure to trusted collaborators under strict non-disclosure agreements to foster further development without compromising security.
- USA: Encryption Algorithm (2016-2021)
Invention: A new encryption algorithm developed by the National Security Agency (NSA).
Secrecy Directions Imposed: In 2016, a secrecy order was issued, restricting foreign filing and disclosure without written consent from the NSA.
Duration and Review: The secrecy order was reviewed annually and remained in place for five years.
Revocation: In 2021, the technology was declassified, and the secrecy order was lifted, allowing the algorithm to be disclosed and utilized publicly.
Analysis
National Security: The secrecy order protected a critical component of national cyber security, preventing potential adversaries from understanding or circumventing the encryption.
Innovation Impact: The prolonged secrecy order limited the algorithm’s application and development in the private sector, potentially delaying advancements in cyber security.
Suggestions
Enhanced Collaboration: Establish secure channels for collaboration with select private sector entities to expedite innovation while maintaining security.
Timely Declassification: Set clear criteria and timelines for declassification to balance national security needs with technological progress.
- UK: Radar Jamming System (2019-2022)
Invention: A new radar jamming system.
Secrecy Directions Imposed: In 2019, the UK Intellectual Property Office imposed secrecy restrictions to prevent the disclosure of sensitive national security information.
Duration and Review: The restrictions were reviewed periodically and remained in place for three years.
Revocation: In 2022, the invention was no longer deemed a threat, and the secrecy directions were lifted.
Analysis
National Security: The secrecy restrictions safeguarded a key defence technology, ensuring it did not fall into the hands of potential adversaries.
Innovation Impact: The restrictions limited broader research and development opportunities but ensured the technologies secure advancement within defence circles.
Suggestions
Strategic Partnerships: Form strategic partnerships with trusted defence contractors to continue development under secure conditions.
Flexible Secrecy Policies: Develop more flexible secrecy policies that allow for phased disclosure as the threat level diminishes.
- China: Missile Guidance System (2020-2023)
Invention: A new missile guidance system developed by a Chinese defence contractor.
Secrecy Directions Imposed: In 2020, the Chinese Patent Office imposed secrecy directions on the patent application to prevent the disclosure of sensitive national security information.
Duration and Review: The secrecy directions were in place for three years, with periodic reviews.
Revocation: In 2023, the technology was declassified, the restrictions were lifted, and the patent was granted.
Analysis
National Security: The secrecy directions effectively protected a crucial military technology during its sensitive development phase.
Innovation Impact: The restriction ensured that the missile guidance system remained confidential, preventing potential adversaries from accessing the technology. However, it also delayed broader innovation and commercial application until the directions were lifted.
Suggestions
Regular Reviews: Implement more frequent reviews to assess the ongoing necessity of secrecy directions and to potentially lift them sooner if the security threat diminishes.
Controlled Collaboration: Allow limited disclosure to trusted research institutions and defence contractors under strict non-disclosure agreements to promote further development while maintaining security.
- Japan: Encryption Algorithm (2018-2023)
Invention: A new encryption algorithm developed by the Ministry of Defence.
Secrecy Directions Imposed: In 2018, a secrecy order was issued, restricting any disclosure or foreign filing of the invention without government approval.
Duration and Review: The secrecy order was reviewed periodically and remained in effect for five years.
Revocation: In 2023, the technology was declassified, and the restrictions were removed.
Analysis
National Security: The secrecy order protected a critical component of Japan’s cyber security infrastructure, preventing potential adversaries from exploiting the encryption technology.
Innovation Impact: The prolonged secrecy restricted broader research and commercial development, but ensured the technologies secure advancement within government-controlled settings.
Suggestions
Secure Development Channels: Develop secure channels for collaboration with select private sector cyber security firms to expedite innovation while maintaining strict security controls.
Timely Declassification: Establish clear criteria and timelines for declassifying technologies to balance national security needs with the benefits of technological progress.
- DETAILED ANALYSIS AND SUGGESTIONS
- Analysis of Outcomes and Implications
- Effectiveness: Secrecy directions have proven effective in protecting critical technologies from unauthorized disclosure, thereby maintaining national security.
- Challenges: The primary challenge is balancing the need for security with the potential stifling of innovation and technological advancement.
- Initial Impact: Secrecy directions often hinder the immediate commercialization and broader development of technologies.
- Long-term Effects: Once lifted, these directions can result in rapid advancements and commercialization as the technologies become available to the private sector and research communities.
- Suggestions for Improvement
- Periodic and Rigorous Review: Establish more frequent and detailed reviews of secrecy orders to ensure they remain necessary and justified. Use a multi-disciplinary approach involving security experts, industry professionals, and legal advisors.
- Partial and Controlled Disclosure: Implement mechanisms for partial disclosure to trusted collaborators under strict non-disclosure agreements, facilitating further innovation without compromising security. Create secure environments for collaboration between government agencies and private entities.
- Timely and Clear Declassification: Set clear criteria and timelines for the declassification of technologies to balance security needs with the benefits of technological advancement. Ensure transparency in the declassification process to build trust and encourage compliance.
- Enhanced Collaboration Channels: Develop secure channels for collaboration with private sector entities to expedite innovation while maintaining necessary security measures. Foster public-private partnerships to leverage the strengths of both sectors in advancing technology securely.
- Flexible Secrecy Policies: Create more flexible secrecy policies that allow for phased disclosure as the threat level diminishes. Tailor secrecy orders to the specific nature of the technology and its potential impact, rather than applying blanket restrictions.
- COMPARATIVE ANALYSIS OF SECRECY PROVISIONS AND PRACTICES IN PATENT LAW
- Comparison of Secrecy Provisions and Practices
- India
- Legal Framework: The Indian Patents Act, 1970 (Sections 35-37) allows the Controller of Patents to impose secrecy directions on inventions deemed prejudicial to national security.
- Duration and Review: Secrecy directions can be initially imposed for one year, with periodic reviews and possible extensions.
- Scope: Primarily used for defence-related technologies and innovations with potential national security implications.
- USA
- Legal Framework: The Invention Secrecy Act of 1951 empowers the Commissioner of Patents to impose secrecy orders on patent applications that may affect national security.
- Duration and Review: Secrecy orders are reviewed annually and can be renewed indefinitely if necessary.
- Scope: Broad application, including technologies developed by defence agencies and private entities working on government contracts.
- Europe (UK)
- Legal Framework: The UK Patents Act 1977 (Sections 22-23) allows the UK Intellectual Property Office to impose secrecy directions on inventions related to defence or other sensitive areas.
- Duration and Review: Secrecy directions are reviewed periodically and can be maintained as long as necessary.
- Scope: Primarily used for defence and security-related technologies, including innovations by private and public sector entities.
- China
- Legal Framework: The Patent Law of the People’s Republic of China (Articles 18-19) grants the Chinese Patent Office the authority to impose secrecy orders on inventions related to national security.
- Duration and Review: Secrecy orders can be imposed for an initial period, subject to periodic review and renewal.
- Scope: Commonly applied to military technologies and other innovations with significant national security implications.
- Japan
- Legal Framework: The Japanese Patent Act (Article 195) enables the Japanese Patent Office to impose secrecy orders on inventions considered vital to national security.
- Duration and Review: Secrecy orders are reviewed periodically and can be extended if necessary.
- Scope: Primarily applied to defence and cyber security technologies, particularly those developed by government agencies.
- Identification of Similarities and Differences
- National Security Focus: All jurisdictions impose secrecy directions to protect national security, particularly for defence and military-related technologies.
- Periodic Review: Secrecy orders are subject to periodic reviews to assess their necessity and effectiveness.
- Government Authority: The power to impose secrecy directions lies with government agencies or patent offices in each jurisdiction.
- Confidentiality Requirements: Secrecy orders restrict the disclosure, foreign filing, and publication of sensitive patent applications.
- Duration and Renewal: The duration and renewal processes for secrecy orders vary, with some jurisdictions (like the USA) allowing indefinite renewals, while others have specific initial periods followed by reviews.
- Scope and Application: The scope of technologies covered and the criteria for imposing secrecy orders can differ. For instance, the USA has a broad application including private sector innovations, whereas other jurisdictions may focus more narrowly on defence-related inventions.
- Legal Frameworks: The specific legal provisions and mechanisms for imposing secrecy orders differ across jurisdictions, reflecting variations in national patent laws and security policies.
- Assessment of Effectiveness and Challenges
- Effectiveness: Secrecy directions effectively protect national defence technologies.
- Challenges: The periodic review process can delay the commercialization of innovations, potentially hindering broader technological progress.
- Effectiveness: The Invention Secrecy Act is highly effective in safeguarding national security through robust annual review processes.
- Challenges: Prolonged secrecy can stifle innovation and delay broader application and collaboration.
- Effectiveness: The UK system is effective in protecting sensitive technologies.
- Challenges: The periodic review process can create administrative burdens and may delay innovation.
- Effectiveness: Secrecy orders effectively protect critical national security technologies.
- Challenges: The lack of transparency and potential for overuse can stifle innovation and create uncertainties for inventors.
- Effectiveness: The Japanese system safeguards national security, particularly in defence and cyber security.
- Challenges: Prolonged secrecy can limit broader technological advancements and delay commercialization
- Challenges Common to All Jurisdictions
- Innovation Stifling: Prolonged secrecy orders can hinder innovation by restricting collaboration and commercial application.
- Administrative Burdens: The periodic review and renewal processes can be resource-intensive for patent offices and inventors.
- Transparency Issues: The lack of transparency in the imposition and review of secrecy orders can lead to uncertainties and potential misuse.
- International Coordination: Differences in secrecy provisions across jurisdictions can complicate international collaboration and compliance for multinational inventors and companies.
10. WAY FORWARD: ENHANCING SECRECY DIRECTIONS IN PATENT LAW
- Regular and Rigorous Reviews
- Implement Frequent Reviews: Increase the frequency of reviews for secrecy orders to ensure their continued relevance and necessity. This will help in timely lifting of unnecessary restrictions, fostering innovation.
- Multi-disciplinary Approach: Involve security experts, industry professionals, and legal advisors in the review process to ensure a balanced assessment of security and innovation needs.
10.2. Transparent and Accountable Processes
10.2.1. Enhance Transparency: Improve transparency in the imposition and review of secrecy orders. Clear criteria and justifications for secrecy directions should be communicated to inventors to reduce uncertainties.
10.2.2. Accountability Mechanisms: Establish accountability mechanisms to prevent misuse or overuse of secrecy orders, ensuring they are only applied when absolutely necessary.
10.3. Controlled Disclosure Mechanism
10.3.1. Partial and Controlled Disclosure: Develop mechanisms for partial disclosure to trusted collaborators under strict non-disclosure agreements. This can facilitate further innovation without compromising security.
10.3.2. Secure Collaboration Channels: Create secure channels for collaboration between government agencies and private sector entities to expedite technological development while maintaining necessary security controls.
10.4. Timely and Clear Declassification
10.4.1. Set Clear Timelines: Establish clear timelines and criteria for declassifying technologies. This ensures that inventions are not unnecessarily held back from commercial application.
10.4.2. Transparency in Declassification: Ensure the declassification process is transparent and predictable, fostering trust and encouraging compliance.
10.5. Flexible Secrecy Policies
10.5.1. Tailored Secrecy Orders: Develop more flexible secrecy policies that allow for phased disclosure based on the diminishing threat level. Tailor secrecy orders to the specific nature of the technology and its potential impact.
10.5.2. Dynamic Policies: Adapt secrecy policies dynamically in response to changes in the technological and security landscape.
10.6. Enhanced Collaboration and Information Sharing
10.6.1. International Collaboration: Promote international collaboration and information sharing on best practices for handling secrecy directions. This can help harmonize approaches and facilitate compliance for multinational entities.
10.6.2. Public-Private Partnerships: Foster public-private partnerships to leverage the strengths of both sectors in advancing technology securely and efficiently.
10.7. Balancing Security and Innovation
10.7.1. Balanced Approach: Strive for a balanced approach that protects national security without unduly stifling innovation. Consider the long-term benefits of technological advancement alongside immediate security concerns.
10.7.2. Incentivize Innovation: Provide incentives for inventors and companies working on sensitive technologies to continue innovation within secure frameworks. This can include grants, tax incentives, and other support mechanisms.
11. IMPLEMENTATION STRATEGY
11.1. Policy Reforms: Governments should review and reform existing patent laws and regulations to incorporate the above recommendations, ensuring a balanced approach to secrecy directions.
11.2. Capacity Building: Invest in training and capacity building for patent office staff, security experts, and legal advisors to handle the complexities of secrecy directions effectively.
11.3. Stakeholder Engagement: Engage with stakeholders, including inventors, industry representatives, and security experts, to gather input and build consensus on the proposed reforms.
11.4. Pilot Programs: Implement pilot programs to test new approaches to secrecy directions, such as controlled disclosure mechanisms and enhanced review processes, before wider adoption.
Monitoring and Evaluation: Establish robust monitoring and evaluation frameworks to assess the effectiveness of secrecy directions and make continuous improvements based on feedback and changing circumstances.
Author: Anshika Agarwal, Dr. B.R. Ambedkar University, Agra
Please contact us at info@origiin.com to know more about our services (Patent, Trademark, Copyright, Contract, IP Licensing, M&A of companies)
Subscribe to YouTube Channel HERE
Join LinkedIn Group: Innovation & IPR
WhatsApp: +91 74838 06607
Sep 5, 2024 | Patent
Under Indian Patents Act, 1970 Section 107A (b), allows for parallel importation of patented products if they are sourced from a legally authorized seller, without constituting patent infringement. This provision reflects the Doctrine of Exhaustion, which aligns with the TRIPS agreement. The section has evolved over time i.e, initially in the 2002 amendment required that the source of the product to be authorized by the patentee, but in the 2005 amendment broadened this to include products from anyone authorized under the law, not necessarily the patentee.
Introduction
Judicial precedents on Section 107A (b) in India are sparse. There are two main interpretations, one suggests that “duly authorized under the law” refers to the exporting country’s laws, supporting international exhaustion, while another argues it should be limited to Indian law, protecting domestic patent rights.
In 2012 Customs Circular, the Indian government implied that “under the law” pertains to the exporting country’s regulations. A public interest litigation challenging this circular did not resolve these ambiguities. The case of Strix Limited v. Maharaja Appliances also failed to clarify the term “duly authorized under the law.”
However, during a 2011 WTO trade policy review, India confirmed that it follows international exhaustion principles, meaning that patented products can be imported from any source authorized by the law of the exporting country. This interpretation allows Indian companies to import products from countries where patents are not enforced, potentially raising concerns about compliance with international IP standards.
Article 6 of the TRIPS agreement allows member states to adopt international exhaustion of intellectual property rights in their own laws. Countries can define how this exhaustion applies domestically without breaching TRIPS principles. The exhaustion principle often supports health policies by making expensive lifesaving drugs more affordable through parallel imports. Thus, member states are encouraged to implement parallel import rules as flexibly as possible to improve access to essential medicines.
Parallel Import & Patent Infringement
Parallel import is that of the patented or marked goods are purchased in a foreign market and resold in the domestic market. Instead, active parallel imports occur when foreign licensees enter the market in competition with the holder of the patent or of the trade mark.
Before the Patent (Amendment) Act, 2002, the Indian Patent Act, 1970, didn’t address the concept of patent exhaustion. The Doha Declaration highlighted the need for international exhaustion to make medicines more affordable. The 2002 amendment introduced Section 107A (b), allowing parallel imports only if the product was bought from someone authorized by the patentee. This limited the scope of parallel imports and hindered access to cheaper medicines. For example, if Company XYZ buys a machine from India and tries to import it into Japan, it could be blocked if the Indian seller wasn’t authorized by the patentee, even though the product was originally sold at a lower price.
The 2005 amendment revised this by stating that imports from anyone legally allowed to sell or distribute the product are not infringing, even if they are not directly authorized by the patentee. This change removed barriers to parallel imports, aligning better with international exhaustion principles. The principle means that once a patented product is sold anywhere by the patentee or with their consent, their rights are exhausted, and they cannot control further sales or imports of that product. However, if the initial sale wasn’t authorized, subsequent sales may still infringe the patent.
Under WIPO, in economic terms, parallel imports represent cross-border arbitrage. IP owners often set different prices for the same product in various markets based on local factors like purchasing power. When a patented product is sold at a lower price in one market compared to another, third parties may be motivated to import it into the higher-priced market to exploit the price difference. However, several factors and regulations influence whether parallel imports occurs.
- Under a national exhaustion regime, once a patented product is sold in a country (Country X), the patentee’s rights are exhausted in that country, preventing them from blocking resale or importation of that product within Country X. However, the patentee can still block imports from other countries (like Countries Y and Z) where the product was not sold.
- In a regional exhaustion regime, the patentee’s rights are exhausted when the product is sold in any country within a defined regional market. This means that once a product is sold in one member country, it can be imported and sold in other member countries without infringing on the patent. For example, if Countries X, Y, and Z are part of a regional agreement, a sale in Country X would exhaust patent rights across all three countries, allowing imports from any of these countries. Conversely, a sale in a non-member country would not exhaust patent rights in the member countries, so the patentee could prevent imports into those countries.
- Under the international exhaustion rule, a patent owner’s control over a patented product is exhausted once it is sold legally anywhere in the world. This means that in a country with international exhaustion, if a product is sold legally in any country, it can be imported into that country without infringing on the patent. For example, if Country X follows international exhaustion, then patented products sold legally in Countries Y or Z can be imported into Country X without any patent infringement, because the patent rights in Country X are already exhausted for products sold in those other countries.
Comparative Analysis
In Japan, the Tokyo High Court applied the international exhaustion rule in the 1995 case BBS Kraftfahrzeug Technik AG v. Kabushiki Kaisha Racimex Japan and Kabushiki Kaisha JapAuto Prods. This ruling overturned the earlier 1969 Osaka District Court case Brunswick, which had held that parallel imports were illegal if the goods were patented in Japan. However, in 1997, the Japanese Supreme Court did not adopt the international exhaustion principle. Instead, it ruled that a patent holder in Japan could not block the importation of the same product into Japan from another country unless it could prove that the gray market importation was contractually prohibited and there was evidence of such a restriction on the product.
In Brunswick Corp. v. Orion Kogyo, K. K., a 1969 Japanese case, the Osaka District Court addressed the issue of parallel importation of patented goods. The case involved an automatic bowling pin device first sold in Australia by a sublicensee of Brunswick, which held patents in both Australia and Japan. The defendant imported used devices from Australia into Japan and was sued by Brunswick for patent infringement. The court ruled against the defendant, upholding the principle of territoriality of patent rights as outlined in the Paris Convention. It concluded that while patent rights are exhausted in the country of the initial sale (Australia, in this case), this does not affect the enforceability of the patent in Japan. The court rejected the argument for extending international exhaustion to patents, emphasizing that patent rights are distinct and must be individually maintained and enforced in each country. Thus, even though Brunswick was compensated for the devices in Australia, it was entitled to enforce its Japanese patent and collect royalties on the imported goods. The court granted Brunswick’s request for an injunction and the disposal of the infringing devices.
In the E.U. is in force the European Union exhaustion principle. Goods patented (or marked) traded for the first time in the European Union or in the European Economic Area can be freely traded inside European Union (or European Economic Area). The patent or trade mark holder can, instead, opposite to parallel importations inside E.U. or E.E.A.
In the U.S., the doctrine of patent exhaustion is recognized, but the government has consistently opposed the principle of international exhaustion. During TRIPS negotiations, the U.S. argued against international exhaustion, particularly for patents and pharmaceuticals. The U.S. government believes that allowing international exhaustion could harm the research and development capabilities of companies by reducing their ability to control patent exploitation and pricing in different markets. The only exception in U.S. law to this stance is for trademarks, where gray market imports are allowed if the U.S. trademark holder is the same as or affiliated with the foreign trademark holder. This exception is based on the belief that trademark protection does not have the same impact on research incentives as patents do.
A study by NERA in 1999 found that the European Union’s exhaustion principle, which applies within the EU, did not significantly reduce price differences among EU countries. This study suggested that parallel imports from countries like the U.S. and Japan might lower company profits more than they reduce consumer prices.
In theory, international exhaustion could help eliminate market segmentation and lower prices for consumers. However, studies on parallel imports are often based on limited evidence and anecdotal data. Recently, there has been a shift toward restricting parallel imports, especially for drugs, to protect research and development. This shift may be influenced by economic challenges and a move towards protecting businesses and fostering innovation. Balancing the benefits of parallel imports (which reduce prices for consumers) with the need to incentivize innovation (by ensuring adequate returns for patent holders) is challenging. The key is to provide fair compensation to intellectual property holders while avoiding excessive market control.
The interaction between parallel importation and patent infringement involves intricate legal and economic issues. The international exhaustion principle supports market integration and benefits consumers by making IP-protected goods cheaper and more accessible. It also counters monopolistic practices by patent holders and their licensees, fostering competition and leading to lower prices. For consumers, parallel imports expand product availability, increase choices, and promote consumption, particularly benefiting those in developing markets with more affordable options.
Most developing countries follow global or international exhaustion principles, as highlighted by the NERA report. However, allowing parallel imports without adequate quality controls poses risks, such as product alterations or substandard goods. To safeguard consumer interests, developing countries should implement quality control measures and learn from the practices of developed countries to mitigate these risks.
Conclusion
There is intersection between parallel imports and patent infringement is complex, reflecting on various nations intellectual property rights. India has a balance innovations and adoption of International exhaustion under Section 107A of Patents act, 1970. While international exhaustion fosters market integration and consumer benefits, it also presents challenges, including potential quality control issues and economic impacts on patent holders. Effective quality controls and informed policy adjustments can help mitigate risks while leveraging the advantages of parallel imports for broader market accessibility and competition.
Author: Yashaswini S, PES University
Please contact us at info@origiin.com to know more about our services (Patent, Trademark, Copyright, Contract, IP Licensing, M&A of companies)
Subscribe to YouTube Channel HERE
Join LinkedIn Group: Innovation & IPR
WhatsApp: +91 74838 06607