Categories
Conferences High Tech Industry Innovation Patent Law Patents Software Patent

Panel on “SEP Current & Proposed Regulations” at C-IP2’s 2024 Annual Fall Conference

By Keith Mallinson

It was my pleasure to participate in a panel session on “SEP Current & Proposed Regulations” last month at the George Mason University Antonin Scalia Law School Center for Intellectual Property x Innovation Policy (C-IP2) Annual Fall Conference entitled “The Importance of Exclusive Rights.” The other panelists were Angela Barr, Mark Cohen, and David Kappos. Our moderator was Kristen Osenga.

We compared SEP policies and developments in various jurisdictions including the United States, China, the EU, Germany and the UK. Discussion encompassed many aspects of SEP licensing including availability of injunctions, patent pooling, use of international arbitration, what constitutes discriminatory licensing, and rate setting such as that using the top-down approach.

I started by describing the European Commission’s audacious proposed new SEP regulation. I said this is bold, risky, reckless, and will be counter-productive to the Commission’s new industrial policy to slash red tape, promote innovation and improve global competitiveness. With the purported objective of increasing transparency and predictability in SEP licensing, the proposed legislation requires registration of patents, subjecting these to essentiality checking and rate regulation with the setting of an aggregate royalty and the apportionment of that based on patent counting using the top-down approach. The proposed rate setting is non-binding but introduces a 9-month delay, for example, before SEP owners can pursue litigation for infringement and unwillingness to pay FRAND royalties.

The proposed regulation — still in the works also with the European Parliament and Council — is contentious because the SEP licensing business model that prevails in smartphone licensing is in fundamental and major conflict to the way use of patented intellectual property has been licensed, indemnified, and monetized (or not) elsewhere, such as in the automotive industry.

David Kappos highlighted the global ramifications for the proposed EU regulation, reiterated that the EU’s impact assessment found no harm to rectify, and he questioned whether political support for the policy would be sustained with changing leadership in Europe. He identified fundamental deficiency in what is being proposed, including disregard for patent validity in proposed valuation assessments.

The United States has withdrawn from having an SEP policy — having wandered from side to side like the crab, according to Kappos. Proposed rate setting regulation has not been pursued in the United States. He also had much to say about the need for injunction availability — “the importance of exclusive rights,” as is the title of this conference. For example, availability in Germany versus the United States where it is difficult for SEP owners to obtain FRAND licenses.

Mark Cohen said that China, with its judicial-made civil law “sets its own course,” has no disclosed SEP policy and has been very unpredictable. For example, its pursuit of anti-suit injunctions a couple of years ago was a surprise. But these stopped after the EU filed a complaint against China at the WTO. China even interprets the meaning for FRAND in its own way. It is “highly experimental” there regarding SEPs. Once highly territorial, China acts with global considerations now. China is favoring the top-down approach in SEP valuation. If the EU adopts its proposed regulation, that will accelerate what China is doing. On the other hand, he noted that as Chinese companies such as Huawei become increasingly SEP licensors, rather than mostly licensees, China might well reconsider the generally low SEP valuations it derives.

Angela Barr explained InterDigital’s focus on standardized technologies and position as major a global licensor. She emphasised extensive work and long timescales in the technical developments, standard development and patent prosecution, with financial returns from licensing coming much later. She voiced concern about prospective price fixing with proposed SEP regulation. She believes that Europe is leading in SEP policy setting, but it is doing that in the wrong direction. There is a strong ecosystem in standard development and SEP licensing — things are not broken and don’t need fixing.

Here is some additional support to what was said in this panel session.

The United States officially has no SEP policy. A June 2022 joint press release by the DoJ, USPTO, and NIST — following issuance of their 2021 draft policy on SEPs —notes that the withdrawal of 2013 and 2019 SEP policies “Best serves the Interests of Innovation and Competition.”

I also compared the proposed EU regulation with developments in the United States and in China in a paper I published in the Antonin Scalia Law School’s Journal of Law, Economics and Policy in February 2024.

In September 2024, I co-authored an op-ed about the proposed EU regulation, how it is a solution absent a problem to fix, and how it is in conflict with the new Commission’s industrial strategy, as previously explained. Despite the European Commission’s own Impact Assessment finding no harm, the Commission is in the throes of outsourcing the task of identifying which standards and applications to regulate based on a new blanket test and the contractor’s opinion of where “severe distortion of internal market due to inefficiencies in licensing” has occurred or is expected to occur. This will be a very bureaucratic, burdensome, and contentious demand on SEP owners.

There are also new academic publications on the controversial issue of availability and use of injunctions in SEP litigation. Empirical Analysis of the German Caselaw on SEP Injunctions after Huawei v ZTE by Justus Baron, Santiago Bergallo, and Eric Sergheraert can be found on SSRN. A paper by Kristina Acri née Lybecker*, also on SSRN, explores Injunctive Relief in Patent Cases: the Impact of eBay. She also moderated the panel session on “Cross-Industry Exclusive Rights” at the conference. For example, John Kolakowski of Nokia explained at 44:18 why injunctive relief is vital for SEP owners.

*Update November 22, 2024: Dr. Acri’s new policy brief, The Importance of Injunctive Relief and the RESTORE Patent Rights Act, is also now available.

Categories
C-IP2 News High Tech Industry Innovation Internet Patent Law Patents Software Patent

C-IP2 Celebrates the Release of Book 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things[1]

The following post comes from Jack Ring, a 3L at Scalia Law and a Research Assistant at C-IP2.

 On April 15, 2024, C-IP2 scholars and contributors to 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things met for a live-streamed book launch event.[2] Professor Jonathan Barnett, one of the books two co-editors, described the book as “break[ing] the boundaries between the learning that academics have the luxury of acquiring” while being “informed by the realities of business markets” and “the insights of policy makers.” The book achieved this by purposefully bringing together decades—possibly centuries—worth of knowledge in the standardization field, including pieces from academics, policy makers, and industry practitioners.

The book’s impressive contributors include former USPTO Directors David Kappos and Andrei Iancu, former FTC Commissioner and Acting Chair Maureen Ohlhausen, former ITC Commissioner F. Scott Kieff, and J. Gregory Sidak, all of whom spoke at the event. Professors Jonathan M. Barnett and Seán M. O’Connor, the book’s co-editors, moderated and also gave remarks during the event. Beyond those who participated in a panel at the book release, chapter contributors included Mark A. Cohen, Alexander Galetovic, Thomas D. Grant, Stephen Haber, Bowman Heiden, Fabian Hoffmann, Igor Nikolic, Kristen Osenga, Jorge Padilla, Ruud Peters, Jana I. Seidl, David J. Teece, Nikolaus Thumm, Andrew Tuffin, and Lew Zaretzki. For a full list of all contributors’ titles and organizations, see the book’s “Contributors” page.[3]

The first panel included the Honorable Andrei Iancu[4] and the Honorable F. Scott Kieff.[5] Mr. Iancu, who authored the foreword to the book,[6] began with the observation that innovation in the United States is at a crossroads, with its leadership in technology and innovation being questioned for the first time. He emphasized the need for a robust patent system to incentivize innovation and technology developments. Indeed, his foreword makes this point very directly: “A patent serves little purpose if others can ignore it and the owner cannot practically stop them or secure timely and adequate compensation.”[7] In Mr. Iancu’s view, “[p]atents can and should serve [the] role” of incentivizing and overcoming the risks of innovation.[8] He closed his remarks by noting that the “bottom line is, if the United States is going to continue its technological leadership . . . our leaders absolutely must recognize that that cannot be done here without a robust patent system.” Mr. Iancu also responded to questions about the effects of eBay v. MercExchange during the panel.

Professor Kieff, who co-authored the last chapter of the book,[9] explained his chapter as looking “at concepts like invention; concepts like the difference between a reward system, a prize system, and a patent system; concepts like . . . a more predictable enforcement system and a less predictable enforcement system.” Following his opening remarks, Professor Kieff expanded on a metaphor used in his chapter about the patent system as a beacon. The chapter discusses how, in a commercialization approach to IP, the IP rights are like “‘beacons in the dark,’ drawing to themselves potential complementary users” of the IP.[10] This leads to the bargaining process and “the possibility of striking contracts with one another.”[11] Professor Kieff also responded to an audience-member comment regarding injunction bonds.

The Honorable Maureen Ohlhausen[12] spoke on the second panel about her chapter, which she co-authored with Jana Seidl.[13] Ms. Ohlhausen’s chapter focuses on the geopolitical factors surrounding IP and standards policies, particularly the interplay between IP and antitrust. It traces the roots of IP and antitrust enforcement, largely beginning in the 1970s.[14] But her panel comments focused on the current enforcement landscape by looking to recent executive orders, DOJ policy statements, and speeches by government officials. She suggested that the United States is seeing “movement towards adopting a broader antitrust liability standard across the board,” not just limited to IP. The FTC’s enforcement of IP rights through its unfair methods of competition authority—which, she explained, construes this authority as extremely broad—illustrates this point.

Ms. Ohlhausen touched on the FTC’s unfair competition rulemaking surrounding non-competes, predicting that this same authority—if upheld—would likely be used to bring antitrust and unfair competition lawsuits against SEP holders seeking injunctions.[15] Following her remarks, Ms. Ohlhausen responded to questions about the chilling effects a regulation may have on parties, even if the regulation at issue is unlikely to stand up to a court challenge and to a question about the EU’s regulatory approach.

The final panel included J. Gregory Sidak[16] and the Honorable David Kappos.[17] Mr. Sidak, who authored the book’s fourth chapter, spoke first.[18] His remarks largely focused on good faith, which was one of the two main topics discussed in his chapter. He discussed the differences in the approaches to the FRAND contract between American and European lawyers and judges. This point is well-made in his chapter: “Judicial opinions in SEP cases also refer to the duty to negotiate a FRAND license in good faith, but judges so far have failed to explain that duty’s precise origin or its metes and bounds.”[19] Mr. Sidak’s chapter analyzes the different approaches taken by specific German, English, and American court decisions.[20] More generally, during his remarks, Mr. Sidak discussed the different stopping rules for American and European negotiations. The American approach is brief: “[I]f a good faith offer is made and it’s not accepted, then the game is over.” Conversely, the European approach is a more iterative back-and-forth process. Mr. Sidak emphasized the need for a “stopping rule”—which he referred to as a “closing rule” in his chapter—and analogized this to the Federal Communications Commission’s auctioning of spectrums.[21]

Mr. Kappos, who co-authored a chapter with co-editor Professor Barnett, spoke second.[22] He focused on the “next-best alternative” to a legislative correction in a post-eBay world: enhanced damages. In the chapter, he and Professor Barnett walk through four case studies of efficient infringement in action.[23] The chapter also discusses two forms of enhanced damages, attorney fee shifting and treble damages, both of which already exist.[24] In fact, as the chapter points out, the 1793 patent statute mandated treble damages, even absent a showing of willfulness, and provided judges the authority to impose a higher damages multiplier.[25] The chapter closes by attempting to balance the incentives between implementer and patent holder.

Following Mr. Sidak and Mr. Kappos’s remarks, they fielded questions about private ordering from Professor Barnett and Lew Zaretzki, who also authored a chapter in the book with Stephen Haber and the late Alexander Galetovic.[26] In response to the questions, Mr. Sidak analogized the present incentives to those faced in binding arbitrations under the Telecommunications Act of 1996. He further noted that there is an enormous and successful functioning SEP licensing market. He pointed to the fact that there are no examples of inabilities to license relevant technology. Mr. Kappos suggested that there has already been extensive private ordering, pointing to the Avanci 5G licensing regime.[27]

The book 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things is available online for free through open access at Cambridge University Press; a hard copy is also available to order at the same link. A recording of the book launch event is available on YouTube.


[1] 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things (Jonathan M. Barnett & Seán M. O’Connor eds., Cambridge Univ. Press, Dec. 2023). The book is available online through open access at https://www.cambridge.org/core/books/5g-and-beyond/AFF9EE741CD0CF1B28E8B698F985E0C1. Hard copies are available at the same link or from other booksellers.

[2] A recording of the event is available at: https://www.youtube.com/watch?v=6ir08SXj7Ts.

[3] 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things ix-x (Jonathan M. Barnett & Seán M. O’Connor eds., Cambridge Univ. Press, Dec. 2023), https://www.cambridge.org/core/services/aop-cambridge-core/content/view/23B8A5FB02B3C0C8EE9DCC22E562BA52/9781009274272loc_ix-x.pdf/contributors.pdf.

[4] Mr. Iancu’s remarks begin at 5:02. https://youtu.be/6ir08SXj7Ts?si=XLUT2BAlyzP699ic&t=303.

[5] Professor Kieff’s remarks begin at 12:32. https://youtu.be/6ir08SXj7Ts?si=We_AgSyTe2pKlfQi&t=752.

[6] Andrei Iancu, Foreword: Why Patents Are Critical for Standard-Based Technologies, in 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things xi-xiv (Jonathan M. Barnett and Seán M. O’Connor eds., Cambridge Univ. Press, Dec. 2023), https://www.cambridge.org/core/services/aop-cambridge-core/content/view/8816915941D08B63BDDD7670A574AB09/9781009274272fwd_xi-xiv.pdf/foreword.pdf.

[7] Id. at xiii.

[8] Id. at xii.

[9] F. Scott Kieff & Thomas Grant, Patents and Competition: Commercializing Innovation in the Global Ecosystem for 5G and the Internet of Things, in 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things 242-262 (Jonathan M. Barnett and Seán M. O’Connor eds., Cambridge Univ. Press, Dec. 2023), https://www.cambridge.org/core/services/aop-cambridge-core/content/view/B32E45469995B5649034AAE47660EAE8/9781009274272c11_242-262.pdf/patents_and_competition.pdf.

[10] Id. at 249.

[11] Id.

[12] Ms. Ohlhausen’s remarks begin at 37:46. https://youtu.be/6ir08SXj7Ts?si=W28CIZSO5wQ_M7jr&t=2266.

[13] Maureen Ohlhausen & Jana Seidl, Antitrust Convergence on Substantive Norms for SEP Licensing Negotiations: Should and Could It Be?, in 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things 33-50 (Jonathan M. Barnett and Seán M. O’Connor eds., Cambridge Univ. Press, Dec. 2023), https://www.cambridge.org/core/services/aop-cambridge-core/content/view/A97F752332F8BD95A9E98D87E5C9F070/9781009274272c2_33-50.pdf/antitrust_convergence_on_substantive_norms_for_sep_licensing_negotiations.pdf.

[14] See id. at 34-35.

[15] Just over a week after Ms. Ohlhausen made her remarks, the FTC released its final rule on non-competes. See Press Release, FTC Announces Rule Banning Noncompetes, Fed. Trade Comm’n (Apr. 23, 2024).

[16] Mr. Sidak’s remarks begin at 58:33. https://youtu.be/6ir08SXj7Ts?si=REhrf3tx5ufwoGGJ&t=3511.

[17] Mr. Kappos’s remarks begin at 1:03:23. https://youtu.be/6ir08SXj7Ts?si=njsiknZV9UjEQCer&t=4103.

[18] J. Gregory Sidak, The Fair Division of Surplus from a FRAND License Negotiated in Good Faith, in 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things 79-108 (Jonathan M. Barnett and Seán M. O’Connor eds., Cambridge Univ. Press, Dec. 2023), https://www.cambridge.org/core/services/aop-cambridge-core/content/view/0FE57AE13642207F55C1DB5FCAE74470/9781009274272c4_79-108.pdf/fair_division_of_surplus_from_a_frand_license_negotiated_in_good_faith.pdf.

[19] Id. at 80.

[20] Id. at 80-81, 86-88.

[21] Id. at 82-86.

[22] Jonathan M. Barnett & David J. Kappos, Restoring Deterrence: The Case for Enhanced Damages in a No-Injunction Patent System, in 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things 129-52 (Jonathan M. Barnett and Seán M. O’Connor eds., Cambridge University Press, Dec. 2023), https://www.cambridge.org/core/services/aop-cambridge-core/content/view/7300CC1E1279179F57B099E478E3170F/9781009274272c6_129-152.pdf/restoring_deterrence.pdf.

[23] Id. at 138-42.

[24] Id. at 134-38.

[25] Id. at 144.

[26] Alexander Galetovic, Stephen Haber & Lew Zaretski, Cellular SEP Royalties: What Should Competition Policy Be?, in 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things 53-78 (Jonathan M. Barnett and Seán M. O’Connor eds., Cambridge Univ. Press, Dec. 2023), https://www.cambridge.org/core/services/aop-cambridge-core/content/view/8755988D408D15C5BD5F64C7DAFA9696/9781009274272c3_53-78.pdf/cellular_sep_royalties_and_5g.pdf.

[27] Avanci 5G Vehicle, Avanci, https://www.avanci.com/vehicle/5gvehicle/ (last visited Apr. 22, 2024).

Categories
High Tech Industry

Privacy Law Considerations of AI and Big Data – In the U.S. & Abroad

By Kathleen Wills, Esq.*

Kathleen Wills is a graduate of Antonin Scalia Law School and former C-IP2 RA.

circuit boardArtificial Intelligence and Big Data

While many of us have come to rely on biometrics data when we open our phones with Apple’s “Face ID,” speak to Amazon’s Alexa, or scan our fingerprints to access something, it’s important to understand some of the legal implications about the big data feeding artificial intelligence (AI) algorithms. While “Big Data” refers to processing large-scale and complex data,[1] “biometrics data” refers to the physical characteristics of humans that can be extracted for recognition.[2] AI and biometrics work together in the dynamics as exemplified above, since AI is a data-driven technology and personal data has become propertised.[3] The type and sensitivity of the personal data used by AI depend on the application, and not all applications trace details back to a specific person.[4] The already-active field of Big Data analysis of biometrics working with AI continues to grow, promising to pose challenges and opportunities for consumers, governments, and companies.

A. How AI Uses Big Data

AI works with Big Data to accomplish several different outcomes. For example, AI can use Big Data to recognize, categorize, and find relationships from the data.[5] AI can also work with Big Data to adapt to patterns and identify opportunities so that the data can be understood and put into context. For organizations looking to improve efficiency and effectiveness, AI can leverage Big Data to predict the impact of various decisions. In fact, AI can work with algorithms to suggest actions before they have been deployed, assess risk, and provide feedback in real time from the Big Data pools. When AI works with Big Data and biometrics, AI can perform various types of human recognition for applications in every industry.[6] In other words, the more data AI can process, the more it can learn. Thus, the two rely on each other in order to keep pushing the bounds of technological innovation and machine learning and development.

B. How AI relates to Privacy Laws

Since AI involves analyzing and understanding Big Data, often the type involving biometrics, or personal information, there are privacy considerations and interests to protect. Further, since businesses want access to consumer data in order to optimize the market, governments are placing limits on the use and retention of such data. For some sectors, the boundary between privacy and AI becomes an ethical one. One can immediately imagine the importance of keeping biometric health data private, calling to mind the purpose of HIPAA, the Health Insurance Portability and Accountability Act,[7] even though AI can help doctors better understand patterns in their patients’ health, diagnoses, and even surgeries.

I. United States Privacy Law

A. Federal Privacy Law

 As concerns grow about the privacy and security of data used in AI, there is currently no federal privacy law in the United States. Senators Jeff Merkley and Bernie Sanders proposed the National Biometric Information Privacy Act in 2020, which was not passed into law; it contained provisions such as requiring consent from individuals before collecting information, providing a private right of action for violations, and imposing an obligation to safeguard the identifying information.[8] The act also required private entities to draft public policies and implement mechanisms for destroying information, limit collection of information to valid business reasons, inform individuals that their information is stored, and obtain written releases before disclosure.

B. State Privacy Laws

There are a few states that have passed their own privacy laws or amended existing laws to include protections for biometric data, such as Illinois, California, Washington, New York, Arkansas, Louisiana, Oregon, and Colorado. Other states have pending bills or have tried—and currently, failed—to pass biometric protection regulation.

The first, and most comprehensive, biometric regulation was enacted in 2008: the Illinois Biometric Information Privacy Act (BIPA), which governs collecting and storing biometric information.[9] The biometric law applies to all industries and private entities but exempts the State or any local government agency.[10] BIPA requires entities to inform individuals in writing that their information is being collected and stored and why, and restricts selling, leasing, trading, or profiting from such information. There is a right of action for “any person aggrieved by a violation” in state circuit court or a supplemental claim in federal district court that can yield $1,000 for negligence, and $5,000 for intentional and reckless violations, as well as attorneys’ fees and equitable relief. In 2018-2019, over 200 lawsuits have been reported under BIPA, usually in class action lawsuits against employers.[11]

Texas’s regulation, Chapter 503: Biometric Identifiers, varies greatly from Illinois’s act.[12] Under this chapter, a person can’t commercialize another’s biometric identifier unless they inform the person and receive consent; once consent is obtained, one can’t sell, lease, or disclose that identifier to anyone else unless the individual consents to that financial transaction or such disclosure is permitted by a federal or state statute. The chapter suggests a timeframe for destroying identifiers, sets a maximum of $25,000 civil penalty per violation, and is enforced by the state attorney general. Washington’s legislation, Chapter 19.375: Biometric Identifiers, is similar to Texas’s regulation in that the attorney general can enforce it; however, Washington carved out security purposes to the notice and consent procedures usually required before collecting, capturing, or enrolling identifiers.[13]

California enacted the CCPA, or California Consumer Privacy Act of 2018, which provides a broader definition of “biometric data” and that consumers have the right to know which information is collected and how it’s used, delete that information, and opt-out from the sale of that information.[14] This law applies to entities that don’t have a physical presence in the state but either (a) have a gross annual revenue of over $25 million, (b) buy, receive, or sell the personal information of 50,000 or more California residents, households, or devices, or (c) derive 50% or more of their annual revenue from selling California residents’ personal information.[15] This was amended by the CPRA (the California Privacy Rights and Enforcement Act), which will become effective January 1, 2023, and expands the CCPA.[16] One expansion of the CPRA is a new category of “sensitive personal information” which encompasses government identifiers; financial information; geolocation; race; ethnicity; religious or philosophical beliefs; along with genetic, biometric, health information; sexual orientation; nonpublic communications like email and text messages; and union membership. It also adds new consumer privacy rights including the right to restrict sensitive information and creates a new enforcement authority. Thus, the CRPA brings California’s privacy law closer to the European Union’s General Data Protection Regulation.[17]

New York amended its existing data breach notification law to encompass biometric information into the definition of “private information.”[18] Similar to California’s law, the SHIELD Act applies to all companies holding residents’ data; on the other hand, the SHIELD Act outlines various procedures companies should implement for administrative, technical, and physical safeguards. New York also passed a limited biometric legislation for employers, but there is no private right of action.[19] Similar to New York, Arkansas amended its Personal Information Protection Act so “personal information” now includes biometric data. Louisiana also amended its Data Breach Security Notification Law to do the same, as well as added data security and destruction requirements for entities.[20] Finally, Oregon amended its Information Consumer Protection Act to include protections for biometric data with consumer privacy and data rights.

Most recently, on July 8, 2021, Colorado enacted the Colorado Privacy Act (CPA) after the Governor signed the bill into law.[21] The state Attorney General explains that the law “creates personal data privacy rights” and applies to any person, commercial entity, or governmental entity that maintains personal identifying information. Like consumers in California, consumers in Colorado can opt out from certain provisions of the Act­­—but not all; residents cannot opt out from the unnecessary and irrelevant collection of information, and controllers must receive a resident’s consent before processing personal information. As for remedies, the CAP provides for a 60-day cure period to fix non-compliance of the Act, or controllers will face civil penalties, but consumers do not have a private right of action under this law.

II. International Privacy Law 

Other countries have pioneered data privacy regulations, as exemplified by the European Union’s (EU’s) regulation: General Data Protection Regulation (GDPR).[22] Since 2018, this regulation has been enforced against companies that operate within any EU member state in order to protect “natural persons with regard to the processing of personal data and rules relating to the free movement of personal data.” The GDPR “protects fundamental rights and freedoms of natural persons,” particularly personal data. The regulation is quite comprehensive, with chapters on rights of data subjects, transfers, remedies, and even provisions for particular processing situations such as freedom of expression and information. There are several carve-outs or “exceptions” to the regulation, such as where a citizen gives consent for a specific purpose or the data are necessary for preventative or occupational medicine. Citizens also have “the right to be forgotten” or withdraw consent at any time and can lodge a complaint for violations or seek judicial remedy, compensation, or administrative fines.

Since the GDPR protects data of EU citizens and residents, it has an extraterritorial effect. In January of 2021, the European Data Protection Board (EDPB) adopted written opinions for new standard contractual clauses of the GDPR jointly with the European Data Protection Supervisor. One clause will be for the transfer of personal data between processors to third countries outside of the EU.[23] The transfer of personal data to a third country or international organization may only take place if certain conditions are met, namely following some of the safeguards of European data protection law. However, enforcement of the GDPR is taking time, and Ireland’s data protection commissioner, Helen Dixon, has explained that enforcement goes beyond issuing fines. Interestingly, as Apple, Facebook, Google, LinkedIn, and Twitter are based in Ireland, the country takes the lead in investigating companies.[24]

The GDPR has influenced other countries’ privacy laws. For example, Canada has a federal privacy law, the Personal Information Protection and Electronic Documents Act, and provincial laws that protect personal information in the private sector, which were heavily influenced by the EU’s GDPR.[25] Argentina has begun the legislative process to update its National Data protection regime, and such resolution was passed in January 2019.[26] Further, Brazil’s General Data Protection Law replicates portions of the GDPR and includes extraterritoriality provisions, but it also allows for additional flexibility. The GDPR has also affected the Israeli regulatory enforcement, which has been recognized by the European Commission as an adequate jurisdiction for processing personal information. While the list of countries affected by, or taking notes from, the GDPR is quite extensive, it’s important to note that this is a global challenge and opportunity to protect the privacy of consumers when handling biometrics, Big Data, and using them in AI.

III. Why the Legal Considerations for AI Matter

AI and the usage of Big Data and biometric information in everyday life effect a multitude of individuals and entities. AI can use a consumer’s personal information and, often, highly sensitive information. Misappropriation or violations of that information are enforced against business entities. Governments all over the globe are working to determine which, if any, regulations to pass to protect AI and what the scope of such rules should be. In the U.S., some states require the Attorney General to enforce state privacy laws, while other state laws provide individuals with a private right of action. Interestingly, given the role AI plays in innovation and technology, venture capitalists (VC) might also play a role as the law develops, since VC firms can work with policy makers and lobbyists to determine potential market failure, risk assessments, and benefits from protecting AI and data.[27]

In addition to the individuals, governments, entities, and industries affected by AI and Big Data biometric analysis, there are also legal implications. While this article discusses, at a high level, the international and national privacy law considerations from AI, there are other constitutional and consumer protection laws implicated as well. AI and other uses of Big Data and biometric information have quickly become ingrained in our everyday lives since the first smartphone was created by IBM in 1992. As laws all over the world continue to be discussed, drafted, killed, adopted, or amended, it’s important to understand the importance of AI and the data it uses.


* The information in this article does not, nor is it intended to, constitute legal advice, and has been made available for general information purposes only.

[1] Shafagat Mahmudova, Big Data Challenges in Biometric Technology, 5 J. Education and Management Engineering 15-23 (2016).

[2] Ryan N. Phelan, Data Privacy Law and Intellectual Property Considerations for Biometric-Based AI Innovations, Security Magazine (June 12, 2020).

[3] Gianclaudio Malgieri, Property and (Intellectual) Ownership of Consumers’ Information: A New Taxonomy for Personal Data, 4 Privacy in Germany 133 ff (April 20, 2016).

[4] Jan Grijpink, Privacy Law: Biometrics and privacy, 17 Computer Law & Security Review 154-160 (May 2001).

[5] Jim Sinur and Ed Peters, AI & Big Data; Better Together, Forbes, https://www.forbes.com/sites/cognitiveworld/2019/09/30/ai-big-data-better-together/?sh=5c8ed5f360b3 (Sept. 30, 2019).

[6] Joshua Yeung, What is Big Data and What Artificial Intelligence Can Do?, Towards Data Science, https://towardsdatascience.com/what-is-big-data-and-what-artificial-intelligence-can-do-d3f1d14b84ce (Jan. 29, 2020).

[7] David A. Teich, Artificial Intelligence and Data Privacy – Turning a Risk into a Benefit, Forbes, https://www.forbes.com/sites/davidteich/2020/08/10/artificial-intelligence-and-data-privacy–turning-a-risk-into-a-benefit/?sh=5c4959626a95 (Aug. 10, 2020).

[8] Joseph J. Lazzarotti, National Biometric Information Privacy Act, Proposed by Sens. Jeff Merkley and Bernie Sanders, National Law Review, https://www.natlawreview.com/article/national-biometric-information-privacy-act-proposed-sens-jeff-merkley-and-bernie (Aug. 5, 2020).

[9] Natalie A. Prescott, The Anatomy of Biometric Laws: What U.S. Companies Need to Know in 2020, National Law Review (Jan. 15, 2020).

[10] Biometric Information Privacy Act, 740 ILCS 14 (2008).

[11] Supra note 9.

[12] Tex. Bus. & Com. Code § 503.001 (2009).

[13] Wash. Rev. Code Ann. § 19.375.020 (2017).

[14] California Consumer Privacy Act (CCPA), State of California Department of Justice, https://oag.ca.gov/privacy/ccpa (last accessed May 22, 2021).

[15] Rosenthal et. al., Analyzing the CCPA’s Impact on the Biometric Privacy Landscape, https://www.law.com/legaltechnews/2020/10/14/analyzing-the-ccpas-impact-on-the-biometric-privacy-landscape/ (Oct. 14, 2020).

[16] Brandon P. Reilly and Scott T. Lashway, Client Alert: The California Privacy Rights Act has Passed, Manatt, https://www.manatt.com/insights/newsletters/client-alert/the-california-privacy-rights-act-has-passed (Nov. 11, 2020).

[17] Peter Banyai et al., California Consumer Privacy Act 2.0 – What You Need to Know, JDSupra, https://www.jdsupra.com/legalnews/california-consumer-privacy-act-2-0-93257/ (Nov. 27, 2020).

[18] Samantha Ettari, New York SHIELD Act: What New Data Security Requirements Mean for Your Business, JDSupra, (June 1, 2020).

[19] Supra note 9, referring to N.Y. Lab. Law §201-a.

[20] Kristine Argentine & Paul Yovanic, The Growing Number of Biometric Privacy Laws and the Post-COVID Consumer Class Action Risks for Businesses, JDSupra,  https://www.jdsupra.com/legalnews/the-growing-number-of-biometric-privacy-2648/#:~:text=In%202019%2C%20Arkansas%20also%20jumped,of%20an%20individual’s%20biological%20characteristics.%E2%80%9D (June 9, 2020).

[21] The Colorado Privacy Act: Explained, Beckage, https://www.beckage.com/privacy-law/the-colorado-privacy-act-explained/ (last accessed July 13, 2021); see also Phil Weiser: Colorado Attorney General, Colorado’s Consumer Data Protection Laws: FAQ’s for Business and Government Agencies, https://coag.gov/resources/data-protection-laws/ (last accessed July 13, 2021).

[22] General Data Protection Regulation (GDPR), https://gdpr-info.eu/ (last accessed May 22, 2021).

[23] Update on European Data Protection Law, National Law Review, https://www.natlawreview.com/article/update-european-data-protection-law (Feb. 24, 2021).

[24] Adam Satariano, Europe’s Privacy Law Hasn’t Shown Its Teeth, Frustrating Advocates, New York Times, https://www.nytimes.com/2020/04/27/technology/GDPR-privacy-law-europe.html (April 28, 2020).

[25] Eduardo Soares et al., Regulation of Artificial Intelligence: The Americas and the Caribbean, Library of Congress Legal Reports, https://www.loc.gov/law/help/artificial-intelligence/americas.php (Jan. 2019).

[26] Ius Laboris, The Impact of the GDPR Outside the EU, Lexology, https://www.lexology.com/library/detail.aspx?g=872b3db5-45d3-4ba3-bda4-3166a075d02f (Sept. 17, 2019).

[27] Jacob Edler et al., The Intersection of Intellectual Property Rights and Innovation Policy Making – A Literature Review, WIPO (July 2015).

Categories
High Tech Industry Patents

Accenture Report Outlines How 5G Technology Accelerates Economic Growth

The following post comes from Wade Cribbs, a 2L at Scalia Law and a Research Assistant at CPIP.

closeup of a circuit boardBy Wade Cribbs

Everyone in the technology industry knows that 5G is posed to revolutionize the world, but the finer points of 5G’s impact on the U.S. economy are detailed in a new report by Accenture entitled The Impact of 5G on the United States Economy. In the report, Accenture explains how 5G stands to add up to $1.5 trillion to the U.S. GDP and create or transform up to 16 million jobs from 2021 to 2025.

5G’s benefits include enabling the development of new industries, improving current industries, and accommodating the current, rapid growth of interconnected technologies. Autonomous vehicles are only achievable through 5G’s increased broadband, which can handle the large amount of data transferred to and from the sensors on vehicles on the road as they are operating. Furthermore, 5G is necessary to support the expected growth to 29.3 billion devices and 14.7 billion machine-to-machine connections by 2023. To get a better look at the specific impact 5G will have on the coming business and consumer landscape, Accenture focuses on five key business sectors: manufacturing, retail, healthcare, automotive and transportation, and utilities.

As 10,000 baby boomers retire a day, the manufacturing industry is in dire need of some way to meet its labor shortage. Due in part to a lack of interest from the younger generations, manufacturers are increasingly looking to automation. 5G will allow for an unprecedented level of control and synchronization across the warehouse floor. Examples of manufacturing improvements implementable with 5G include: AI assisted asset management utilizing video analytics and attached sensors; connected worker experiences implementing augmented reality to provide workers with a safer work experience and reduced training times; and enhanced quality monitoring through a combination of AI inspection and UHD video streaming monitoring. Accenture estimates that 5G will provide a $349.9 billion increase in sales for manufacturing of the equipment and products necessary to implement 5G in other business sectors.

In the retail sector, 5G can provide the data needed to support frictionless checkout experiences. AI used in combination with UHD video monitoring will allow for customers to be charged when putting items in their basket, eliminating the long lines that 86% of customers say have caused them to leave a store, which in turns leads to $37.7 billion in missed sales annually. Furthermore, this same AI monitoring system can be used to personalize a shopping experience through monitoring customers and alerting sales associates to a customer with a problem without the customer having to find and flag down an associate; the system can also monitor for theft, which costs the retail industry $25 million daily. Overall, Accenture estimates that the retail industry stands to see a $269.5 billion increase in sales due to 5G sales and cost savings.

Healthcare costs are expected to rise from $3.4 trillion to $6 trillion by 2027. As the need for healthcare professionals is expected to outstrip the labor supply, increases to technology and treatment efficiency are essential to address the problems presented by an aging population. The good news is that 5G is suited to address just these issues by eliminating waste, which is estimated to make up as much as 30% of spending. 5G will expand medical professionals’ ability to monitor patients, giving the option for at-home care to a wider range of patients as well as lowering the number of doctors required to monitor intensive care patients. Doctors will also be able to access previously unreachable patients for virtual consultations. No longer will rural Americans have to travel long distances to visit their doctor in the city. 5G will allow online consultants rapid access to vast amounts of data, such as MRI images, CAT scans, ultrasounds, ECGs, and stethoscope data. Accenture estimates that the healthcare industry stands to gain $192.3 billion in economic output and up to 1.7 million jobs.

As vehicles become smarter, safer, and more connected, 5G will enable automobiles to exchange data with other vehicles, the automotive infrastructure, and pedestrians. This will enhance vehicle safety, fleet management, and smart traffic management. The U.S. National Highway Traffic Safety Administration (NHTSA) estimates that the combined impact of vehicle-to-everything communication technology could reduce the severity of 80% of sober multi-vehicle crashes and 70% of crashes involving trucks. 5G video-based telematics will allow for automated vehicle fleets and fleet management capability, such as improved logistics security and goods-condition diagnostics to eliminate the up to 20% of empty cargo space in U.S. trucks. Through smart traffic managing by vehicle-to-vehicle communication and vehicle-to-infrastructure communication, traffic congestion, traffic accidents, and smog due to idling can all be reduced by an expected 15 to 30%. On the whole, Accenture estimates that $217.1 billion in revenue will be generated in the automotive and transportation industry by 5G.

5G will address multiple problems facing the utility industry, including vegetation and asset management, energy supply and resiliency, and next-generation workforces. 5G will allow smart grid technology to be implemented that can track and adapt to real-time disruptions to the power grid. In combination with smart grid technology, smart power plant technology will be able to map out peak power use and wear on equipment to determine optimal times for taking a machine offline for maintenance. Safer work environments can be created for the next generation workforce using augmented and virtual reality to train and eliminate manual methods with digital tools. Accenture estimates that the utility industry stands to grow by $36.9 billion in total sales from the implementation of 5G.

Accenture concludes that 5G is the necessary step towards achieving a new normal through AI, mass machine communications, and digital cloud technology. Every aspect of American life will be affected, and an unprecedented boost will be given to the economy.

To read the report, please click here.

Categories
Biotech High Tech Industry History of Intellectual Property Innovation Intellectual Property Theory Inventors Legislation Patent Law Patent Litigation Patent Theory Patentability Requirements Software Patent Supreme Court Uncategorized

Federal Circuit Brings Some Clarity and Sanity Back to Patent Eligibility Doctrine

By Adam Mossoff and Kevin Madigan

closeup of a circuit boardFollowing the Supreme Court’s four decisions on patent eligibility for inventions under § 101 of the Patent Act, there has been much disruption and uncertainty in the patent system. The patent bar and most stakeholders in the innovation industries have found the Supreme Court’s decisions in Alice Corp. v. CLS Bank (2014), AMP v. Myriad (2013), Mayo Labs v. Prometheus (2012), and Bilski v. Kappos (2010) to be vague and doctrinally indeterminate. Given the moral panic about the patent system that has been created as a result of ten years of excessive lobbying in D.C. for legislation that weakens patent rights, judges have responded to the excessive discretion they have under these cases by invalidating whole swaths of patented innovation in the high-tech, biotech, and pharmaceutical industries. The Patent Office is also rejecting patent applications at record levels, even for traditional inventions outside of high-tech and life sciences directly affected by the recent § 101 case law.

In Sequenom v. Ariosa, the Supreme Court had the opportunity to bring some clarity to the law of patent eligibility and to reign in some of the judicial and Patent Office excesses, but unfortunately it rejected this opportunity when it denied Sequenom’s cert petition this past June. Fortunately, the Court of Appeals for the Federal Circuit is now taking the lead in providing some much-needed legal guidance on patent eligibility to the inventors and companies working in the innovation industries. In two recent decisions, Enfish v. Microsoft and Rapid Litigation Management v. CellzDirect, the Federal Circuit has set forth some important doctrinal guideposts for defining what counts as a patent-eligible invention. Not only do these two decisions bring some reason and clarity back to the law of patent eligibility under § 101, they provide important doctrinal insights on how stakeholders may wish to address this problem if they ultimately choose to seek relief in Congress.

Enfish and the Patentability of Computer-Implemented Inventions (a/k/a “Software Patents”)

At the time it was decided, some commentators believed that the Alice decision was a directive from on high that most, if not all, computer software programs were not patentable inventions. This was a surprising claim if only because the Alice Court did not once use the phrase “software” in its entire opinion. Of course, “software patent” is not a legal term in patent law; the proper term is “computer-implemented invention,” as used by the Alice Court, and so the Court may have been only avoiding vague rhetoric from the patent policy debates. More important, though, this claim about Alice contradicts the Court’s opinion in Bilski just four years earlier, when the Court warned the Federal Circuit not to adopt a bright-line rule that limited § 101 to only physical inventions of the “Industrial Age,” because this created unnecessary and innovation-killing “uncertainty as to the patentability of software.”

Unfortunately, the ambiguities in Alice and in the Court’s prior patentable subject matter decisions, such as Mayo, left enough discretionary wiggle room in applying the generalized patent-eligibility test to permit judges and patents examiners to wage war on computer-implemented inventions. They thus made real again in the twenty-first century Justice Robert Jackson’s famous observation in 1949 that “the only patent that is valid is one which this Court has not been able to get its hands on.” Jungersen v. Ostby & Barton Co., 335 U.S. 560, 572 (1949) (Jackson, J., dissenting). As one commentator remarked several months after Alice was decided, “It’s open season on software patents.” The data over the next several years has borne out the truth of this statement.

The key argument against patents on computer-implemented inventions, such as key components of word processors, programs that run internet searches (like the patented innovation that started Google), and encryption software, is that such inventions are inherently “abstract.” The judicial interpretation of § 101 has long maintained that abstract ideas, laws of natural, and natural phenomena are unpatentable discoveries. In Alice, for instance, the Court held that a complex software program for extremely complex international financial transactions was an “abstract idea” and thus unpatentable under § 101. But beyond claims that something long known is “abstract,” the Court has failed to define with precision what it means for a discovery to be abstract. With little to no specific guidance from the Alice Court, it is no wonder that judges and examiners have succumbed to the recent moral panic about patents and declared “open season” on patents covering computer-implemented inventions.

In this context, the Federal Circuit’s decision in Enfish v. Microsoft is extremely important because it ends the unreasoned, conclusory “I know it when I see it” rejections of patents as “abstract” by judges and examiners.

In Enfish, the Federal Circuit reversed a trial court’s summary judgment that a patent on a computer-implemented invention was an unpatentable abstract idea. The patent covered a type of database management system on computers, a classic incremental innovation in today’s digital world. In its decision, the trial court dissected the invention down into the most basic ideas in which all inventions can be reframed as representing; for example, methods of using internal combustion engines can easily be reframed in terms of the basic laws in thermodynamics. In this case, the trial court asserted that this patent on a computer-implemented invention covered merely the “abstract purpose of storing, organizing, and retrieving” information. The trial court thus easily concluded that the invention was merely “abstract” and thus unpatentable.

The Federal Circuit rejected the trial court’s conclusory assertion about the invention being “abstract” and further held that such assertions by courts are a legally improper application of § 101. With respect to the patent at issue in this case, Judge Todd Hughes’ opinion for the unanimous panel found that

the plain focus of the claims is on an improvement to computer functionality itself, not on economic or other tasks for which a computer is used in its ordinary capacity. Accordingly, we find that the claims at issue in this appeal are not directed to an abstract idea within the meaning of Alice.

More important, the Enfish court cautioned courts against the methodological approach adopted by the trial court in this case, in which “describing the claims at such a high level of abstraction and untethered from the language of the claims all but ensures that the exceptions to § 101 swallow the rule.” The court recognized that adopting a “bright-line” rule that computer-implemented inventions—the “software patents” decried by critics today—are necessarily “abstract” runs counter to both § 101 and the recent Supreme Court cases interpreting and applying this provision: “We do not see in Bilski or Alice, or our cases, an exclusion to patenting this large field of technological progress.”

Further confirming that Enfish represents an important step forward in how courts properly secure technological innovation in the high-tech industry, the Federal Circuit relied on Enfish in its recent decision in BASCOM Global Services Internet Inc v AT&T Mobility LLC. Here, the Federal Circuit again rejected the trial court’s dissection of a patent claim covering a software program used on the internet into an “abstract” idea of merely “filtering content.” The BASCOM court emphasized that courts must assess a claim as a whole—following the Alice Court’s injunction that courts must assess a patent claim as “an ordered combination of elements”—in determining whether it is a patentable invention under § 101. As numerous patent scholars explained in an amicus brief filed in support of Sequenom in its failed cert petition before the Supreme Court, requiring a court to construe a “claim as a whole” or “the invention as a whole” is a basic doctrinal requirement that runs throughout patent law, as it is essential to ensuring that patents are properly evaluated both as to their validity and in their assertion against infringers.

CellzDirect and the Patentability of Discoveries in the Bio-Pharmaceutical Industry

The high-tech industry is not the only sector of the innovation industries that has been hit particularly hard by the recent §101 jurisprudence. The biotech and pharmaceutical industries have also seen a collapse in the proper legal protection for their innovative discoveries of new therapeutic treatments. One recent study found that the examination unit at the Patent Office responsible for reviewing personalized medicine inventions (art unit 1634) has rejected 86.4% of all patent applications since the Supreme Court’s decision in Mayo. Anecdotal evidence abounds of numerous rejections of patent applications on innovative medical treatments arising from extensive R&D, and the most prominent one was the invalidation of Sequenom’s patent on its groundbreaking innovation in prenatal diagnostic tests.

In this light, the decision on July 5, 2016 in Rapid Litigation Management v. CellzDirect is an extremely important legal development for an industry that relies on stable and effective patent rights to justify investing billions in R&D to produce the miracles that comprise basic medical care today. In CellzDirect, the trial court found unpatentable under § 101 a patent claiming new methods for freezing liver cells for use in “testing, diagnostic, and treating purposes.” The trial court asserted that such a patent was “directed to an ineligible law of nature,” because scientists have long known that these types of liver cells (hepatocytes) could be subjected to multiple freeze-thaw cycles.

In her opinion for a unanimous panel, Chief Judge Sharon Prost held that the method in this case is exactly the type of innovative process that should be secured in a patent. Reflecting the same methodological concern in Enfish and BASCOM, the CellzDirect court rejected the trial court’s dissection of the patent into its foundational “laws of nature” and conventional ideas long-known in the scientific field:

The claims are simply not directed to the ability of hepatocytes to survive multiple freeze-thaw cycles. Rather, the claims of the ’929 patent are directed to a new and useful laboratory technique for preserving hepatocytes. This type of constructive process, carried out by an artisan to achieve “a new and useful end,” is precisely the type of claim that is eligible for patenting.

In other words, merely because a patentable process operates on a subject matter that constitutes natural phenomena does not mean the patent improperly claims either those natural phenomena or the laws of nature that govern them. To hold otherwise fails to heed the Mayo Court’s warning that “all inventions at some level embody, use, reflect, rest upon, or apply laws of nature, natural phenomena, or abstract ideas,” and thus to dissect all patents down into these unpatentable foundations would “eviscerate patent law.” The CellzDirect court was explicit about this key methodological point in evaluating patents under § 101: “Just as in [the industrial process held valid by the Supreme Court in] Diehr, it is the particular ‘combination of steps’ that is patentable here”—the invention as a whole.

Conclusion

The U.S. has long prided itself as having a “gold standard” patent system—securing to innovators stable and effective property rights in their inventions and discoveries. As scholars and economic historians have long recognized, the patent system has been a key driver of America’s innovation economy for more than two hundred years. This is now threatened under the Supreme Court’s § 101 decisions and the “too broad” application of the Court’s highly generalized patent-eligibility tests to inventions in the high-tech and bio-pharmaceutical sectors. The shockingly high numbers of rejected applications at the Patent Office and of invalidation of patents by courts, as well as the general sense of legal uncertainty, are threatening the “gold standard” designation for the U.S. patent system. This threatens the startups, new jobs, and economic growth that the patent system has been proven to support. Hopefully, the recent Enfish and CellzDirect decisions are the first steps in bringing back to patent-eligibility doctrine both reason and clarity, two key requirements in the law that have been sorely lacking for inventors and companies working in the innovation economy.

Categories
Antitrust Commercialization DOJ High Tech Industry Innovation Inventors Patent Law Patent Licensing Uncategorized

Busting Smartphone Patent Licensing Myths

closeup of a circuit boardCPIP has released a new policy brief, Busting Smartphone Patent Licensing Myths, by Keith Mallinson, Founder of WiseHarbor. Mr. Mallinson is an expert with 25 years of experience in the wired and wireless telecommunications, media, and entertainment markets.

Mr. Mallinson discusses several common myths concerning smartphone patent licensing and argues that antitrust interventions and SSO policy changes based on these myths may have the unintended consequence of pushing patent owners away from open and collaborative patent licensing. He concludes that depriving patentees of licensing income based on these myths will remove incentives to invest and take risks in developing new technologies.

We’ve included the Executive Summary below. To read the full policy brief, please click here.

Busting Smartphone Patent Licensing Myths

By Keith Mallinson

Executive Summary

Smartphones are an outstanding success for hundreds of handset manufacturers and mobile operators, with rapid and broad adoption by billions of consumers worldwide. Major innovations for these—including standard-essential technologies developed at great expense and risk primarily by a small number of companies—have been shared openly and extensively through standard-setting organizations and commitments to license essential patents on “fair, reasonable, and non-discriminatory terms.”

Despite this success, manufacturers seeking to severely reduce what they must pay for the technologies that make their products possible have widely promoted several falsehoods about licensing in the cellular industry. Unsubstantiated by facts, these myths are being used to justify interventions in intellectual property (IP) markets by antitrust authorities, as well as changes to patent policies in standard-setting organizations. This paper identifies and dispels some of the most egregious and widespread myths about smartphone patent licensing:

Myth 1: Licensing royalties should be based on the smallest saleable patent practicing unit (SSPPU) implementing the patented technology, and not on the handset. The SSPPU concept is completely inapplicable in the real world of licensing negotiations involving portfolios that may have thousands of patents reading on various components, combinations of components, entire devices, and networks. In the cellular industry, negotiated license agreements almost invariably calculate royalties as a percentage of handset sales prices. The SSPPU concept is inapplicable because it would not only be impractical given the size and scope of those portfolios, but it would not reflect properly the utility and value that high-speed cellular connectivity brings to bear on all features in cellular handsets.

Myth 2: Licensing fees are an unfair tax on the wireless industry. License fees relate to the creation—not arbitrary subtraction—of value in the cellular industry. They are payments for use of essential patented technologies, developed at significant cost by others, when an implementer chooses to produce products made possible by those technologies. The revenue generated by those license fees encourages innovation, and is directly related to the use of the patented technologies.

Myth 3: Licensing fees and cross-licensing diminish licensee profits and impede them from investing in their own research and development (R&D). Profits among manufacturers are determined by competition among them, including differences in pricing power and costs. Core-technology royalty fees, which are charged on a non-discriminatory basis and are payable by all implementers, are not the cause of low profitability by some manufacturers while others are very profitable. Cross-licensing is widespread: It provides in-kind consideration, which reduces patent-licensing costs and incentivizes R&D.

Myth 4: Fixed royalty rates ignore the decreasing value of portfolio licenses as patents expire. Portfolio licensing is the norm because it is convenient and cost efficient for licensor and licensee alike. All parties know the composition of the portfolio will change as some patents expire and new patents are added. Indeed, this myth is particularly fanciful given that the number of new patents issued greatly exceeds the number that expires for the major patentees. In fact, each succeeding generation of cellular technology has represented and will continue to represent a far greater investment in the development of IP than the prior generation.

Myth 5: Royalty charges should be capped so they do not exceed figures such as 10% of the handset price or even well under $1 per device. There is no basis for arbitrary royalty caps. It is not unusual for the value of IP to predominate as a proportion of total selling prices, in books, CDs, DVDs, or computer programs. Market forces—not arbitrary benchmarks wished for or demanded by vested interests and which do not reflect costs, business risks, or values involved—should also be left to determine how costs and financial rewards are allocated in the cellular industry with smartphones.

Categories
Administrative Agency Copyright High Tech Industry Innovation International Law Internet Inventors ITC Patent Law Remedies Software Patent Trademarks Uncategorized

Digital Goods and the ITC: The Most Important Case That Nobody is Talking About

circuit boardBy Devlin Hartline & Matthew Barblan

In its ClearCorrect opinion from early 2014, the International Trade Commission (ITC) issued cease and desist orders preventing the importation of infringing digital goods into the United States. The ITC’s 5-1 opinion has since been appealed to the Federal Circuit, with oral argument scheduled for the morning of August 11th, and the case has drawn a number of amicus briefs on both sides. Despite receiving little attention in media or policy circles, the positive consequences of the ITC’s decision are significant.

This case is important because the problem of the importation of infringing digital goods continues to grow. The ITC’s authority over digital goods can be a powerful tool for creators and innovators against a threat that has only gotten worse, and it would permit the ITC to go about doing what it’s always done in the intellectual property space—protecting our borders from the threat of foreign infringing goods. Interestingly, a look at the proceedings in the ITC and the briefs now before the Federal Circuit reveals how some parties now opposing the ITC’s authority over digital goods had argued for the opposite just a few years back.

The ITC Proceedings

This case began in March of 2012, when Align Technology Inc. filed a complaint with the ITC alleging that its only competitor, ClearCorrect Operating LLC, violated Section 337 of the Tariff Act of 1930 by importing digital goods that infringed several of its orthodontic patents. Section 337, codified at 19 U.S.C. § 1337, makes unlawful the “importation . . . of articles” that infringe “valid and enforceable” patents, copyrights, or trademarks, and it declares that the ITC “shall investigate any alleged violation of this section on complaint under oath or upon its initiative.”

There are two statutory remedies available to a complainant in an ITC proceeding. The first is an exclusion order, which dictates that “the articles concerned . . . be excluded from entry into the United States.” Exclusion orders are issued by the ITC and enforced by the U.S. Customs and Border Protection. The second remedy is a cease and desist order, which directs any person violating Section 337 “to cease and desist from engaging in the unfair methods or acts involved.” The ITC enforces its own cease and desist orders through the imposition of civil penalties, recoverable in the federal district courts.

Align’s complaint with the ITC involved its patented Invisalign System, a “proprietary method for treating crooked and misaligned teeth” using modern plastic aligners instead of old-fashioned metal braces. Align alleged that ClearCorrect violated Section 337 by importing “digital models, digital data and treatment plans that . . . infringe or induce infringement of” its patents, and it asked the ITC to “issue permanent cease and desist orders” prohibiting ClearCorrect from importing the digital files. In response, ClearCorrect argued that “no articles” had been imported since the digital data associated with the teeth aligners were not themselves “articles.”

This was the primary bone of contention: The ITC only has statutory authority over the “importation . . . of articles,” and if digital goods are not “articles,” then the ITC has no jurisdiction. After an administrative law judge (ALJ) determined that the digital files at issue were indeed “articles” within the meaning of Section 337, ClearCorrect petitioned the ITC to review that determination. The ITC took the case and solicited comments from the public as to whether electronic transmissions are “articles” under Section 337.

The ITC ultimately sided 5-to-1 with Align. On the threshold issue of whether electronic transmissions constitute “articles” under Section 337, the ITC affirmed the ALJ’s conclusion that they do: “[T]he statutory construction of ‘articles’ that hews most closely to the language of the statute and implements the avowed Congressional purpose for Section 337 encompasses within its scope the electronic transmission of the digital data sets at issue in this investigation.” This was consistent, said the ITC, with the “legislative purpose . . . to prevent every type of unfair act in connection with imported articles . . . and to strengthen protection of intellectual property rights.”

Appeal to the Federal Circuit

Having lost at the ITC, ClearCorrect appealed to the Federal Circuit. There, it focused its arguments on the statutory question of whether digital goods constitute “articles” under Section 337.

Public Knowledge and the Electronic Frontier Foundation (EFF) filed an amicus brief calling the ITC’s decision “sweeping and unprecedented,” and they urged the Federal Circuit to reject the ITC’s “overzealous construction” of the term “articles.” Aside from the statutory issue, the digital rights groups suggested that there were “important reasons” why Section 337 “ought not cover telecommunications.” They stressed the “real and unanswered questions about the enforcement role” ISPs would play, and they noted how ISPs “could be required to actively block transmission of certain content.”

It’s worth noting that no ISPs were involved in the ClearCorrect litigation—only ClearCorrect itself was subject to a cease and desist order. But this ISP question seems to be the reason why the case drew their attention: The real concern wasn’t whether ClearCorrect had infringed Align’s patents; it was whether the ITC had the authority to issue cease and desist orders to ISPs. This sentiment was echoed in an amicus brief by the Internet Association, which includes Google, arguing that the internet “should not be restricted to national borders” because of “the unforeseeable but far-reaching results that would follow.”

The policy arguments made by Public Knowledge, the EFF, Google, and others were essentially circular: The internet should be “open” so we shouldn’t let the ITC “close” it. But that begs the question of what the ideal “open” internet looks like, and what illegal activities should or should not be tolerated in the digital space. We shut our borders to infringing physical goods. What makes infringing digital goods so special? A right is only as good as the remedies available to enforce it, so why should we give short shrift to the property rights of artists, creators, and innovators?

Align’s intervenor brief took the groups to task: “The amici briefs supporting ClearCorrect brim with hyperbole.” Align noted that the ITC “only asserts jurisdiction over the ‘articles” that are electronically transmitted, not over all acts of transmission.” It pointed out that it is the “owner, importer, or consignee” of the “articles” that violates Section 337, not the carrier, and it said that the claim that the ITC could issue cease and desist orders against ISPs for “data transmission activities” is “baseless.”

Supporting the ITC’s understanding of “articles,” an amicus brief filed by the Association of American Publishers explained that the ITC’s “authority over electronically transmitted copyrighted works is critical because . . . there has been rapid growth in digital publications.” It pointed to the rise in digital piracy “at the expense of U.S. creators and innovators.” It urged that affirming the ITC’s decision was “crucial” since it “will help ensure that unfair trade practices abroad do not harm the livelihoods” of those that “rely on copyright protection.”

An amicus brief filed by Nokia supporting the ITC also noted the importance of protecting intellectual property: “Stripping the Commission of its long-exercised authority over electronic transmissions could gravely damage the protection of valid patent rights through Section 337 investigations.” It pointed out that holding otherwise would lead to “absurd results” since the ITC would have jurisdiction over software “imported on a USB stick or CD-ROM” but not software disseminated by “electronic transmission.” Such a result would be “wholly contrary to the remedial purpose of Section 337.” Nokia concluded that the ITC’s “authority should not wax and wane as technology develops new methods of dissemination.”

The MPAA and the RIAA likewise submitted an amicus brief supporting the ITC. The industry groups pointed out that “illegal downloads and illegal streaming” account for most of the infringement losses they suffer, and they argued that “copyright protection is essential to the health” of their industries. They urged the Federal Circuit to affirm the ITC because “Section 337 is a powerful mechanism for stopping illegal electronic imports,” and doing so “would give effect to the intent of Congress that Section 337 protect U.S. industries from all manner of unfair acts in international trade.”

Who has the better argument here? Obviously, both sides argued that the text of Section 337 favored their positions. ClearCorrect and its supporters claimed that “articles” should be interpreted narrowly to include only tangible goods, while the ITC and its supporters wanted a read of the statute that allows the ITC to continue to fulfill its mission even as new technology and methods of trade become more common. What may come as a surprise, however, is that many of the groups now seeking to limit the ITC’s jurisdiction were arguing just the opposite a few years ago.

Remember the OPEN Act?

It may seem like ages ago, but it’s been less than four years since Congress debated the Stop Online Piracy Act (SOPA) and the PROTECT IP Act. Those two bills would have explicitly afforded artists and creators robust tools to use in the federal district courts against foreign rogue sites that aim their infringements at the United States. Many vocal opponents of the bills supported an alternative approach: the OPEN Act. Under the OPEN Act, the ITC would have been given explicit authority to investigate complaints against foreign rogue sites that import infringing digital goods into the United States.

The OPEN Act’s sponsors set up a website at keepthewebopen.com where members of the public could see the text of the bill and suggest changes to it. The website included an FAQ to familiarize supporters with the thinking behind the OPEN Act. As to why online infringement was an issue of international trade, the FAQ pointed out that “there is little difference between downloading a movie from a foreign website and importing a product from a foreign company.”

When advocating for the OPEN Act as a good alternative to SOPA and the PROTECT IP Act, the bill’s sponsors touted the ITC as being a great venue for tackling the problems of foreign rogue sites. Among the claimed virtues were its vast experience, transparency, due process protection, consistency, and independence:

For well over 80 years, the independent International Trade Commission (ITC) has been the venue by which U.S. rightsholders have obtained relief from unfair imports, such as those that violate intellectual property rights. Under Section 337 of the Tariff Act of 1930 – which governs how the ITC investigates rightsholders’ request for relief – the agency already employs a transparent process that gives parties to the investigation, and third party interests, a chance to be heard. The ITC’s process and work is highly regarded as independent and free from political influence and the department already has a well recognized expertise in intellectual property and trade law that could be expanded to the import of digital goods.

The Commission already employs important safeguards to ensure that rightsholders do not abuse their right to request a Commission investigation and the Commission may self-initiate investigations. Keeping them in charge of determining whether unfair imports – like those that violate intellectual property rights – [sic] would ensure consistent enforcement of Intellectual Property rights and trade law.

Some of the groups now arguing that the ITC shouldn’t have jurisdiction over digital goods openly supported the OPEN Act. Back in late 2011, the EFF stated that it was “glad to learn that a bipartisan group of congressional representatives has come together to formulate a real alternative, called the OPEN Act.” The EFF liked the bill because the “ITC’s process . . . is transparent, quick, and effective” and “both parties would have the opportunity to participate and the record would be public.” It emphasized how the “process would include many important due process protections, such as effective notice to the site of the complaint and ensuing investigation.”

Google likewise thought that giving the ITC jurisdiction over digital goods was a great idea. In a letter posted to its blog in early 2012, Google claimed that “there are better ways to address piracy than to ask U.S. companies to censor the Internet,” and it explicitly stated that it “supports alternative approaches like the OPEN Act.” Google also signed onto a letter promoting the virtues of the ITC: “This approach targets foreign rogue sites without inflicting collateral damage on legitimate, law-abiding U.S. Internet companies by bringing well-established International trade remedies to bear on this problem.”

Conclusion

The ITC has been protecting our borders against the importation of infringing goods for nearly a century now. As technology and trade evolves, it makes perfect sense to let the ITC continue to do its job by protecting our borders against the importation of infringing digital goods. This is an important tool for our innovators and creators in combating the ever-growing flood of foreign infringing goods.

The fact that many of those who supported the OPEN Act are now supporting ClearCorrect suggests that for them this appeal isn’t really about whether digital goods are “articles” under Section 337. The ITC is an appropriate venue for all of the reasons the supporters of the OPEN Act publicized just over three years ago: The process is transparent, there’s ample due process protections, the commissioners are experienced and independent, and their decisions are consistent.

As the 5-1 opinion suggests, affirming the ITC’s decision should be an easy choice for the Federal Circuit. Let’s hope the Federal Circuit does the right thing for our artists and innovators.

Categories
Administrative Agency Biotech High Tech Industry Innovation Intellectual Property Theory Inventors Legislation Patent Law Patent Litigation Patent Theory Software Patent Statistics Supreme Court Uncategorized

The One Year Anniversary: The Aftermath of #AliceStorm

The following post, by Robert R. Sachs, first appeared on the Bilski Blog, and it is reposted here with permission.

It’s been one year since the Supreme Court’s decision in Alice Corp. v. CLS Bank. On its face the opinion was relatively conservative, cautioning courts to “tread carefully” before invalidating patents, and emphasizing that the primary concern was to avoid preemption of “fundamental building blocks” of human ingenuity. The Court specifically avoided any suggestion that software or business methods were presumptively invalid. But those concerns seem to have gone unheeded. The Court’s attempt to side step the tricky problem of defining the boundary of an exception to patent eligibility—”we need not labor to delimit the precise contours of the ‘abstract ideas category in this case'”—has turned into the very mechanism that is quickly “swallow[ing] all of patent law.” The federal courts, the Patent Trial and Appeal Board, and the USPTO are using the very lack of a definition to liberally expand the contours of abstract ideas to cover everything from computer animation to database architecture to digital photograph management and even to safety systems for automobiles.

Let’s look at the numbers to present an accurate picture of the implications of the Supreme Court’s decision. My analysis is a data-driven attempt to assess the implications of Alice one year out. It is with an understanding of how the Supreme Court’s decision is actually playing out in the theater of innovation that we can better project and position ourselves for what the future holds.

Alice at Court

Table 0 Fed Courts

As of June 19, 2015 there have been 106 Federal Circuit and district court decisions on § 101 grounds, with 76 decisions invalidating the patents at issue in whole or in part. In terms of patents and claims, 65% of challenged patents have been found invalid, along with 76.2% of the challenged claims.

The success rate of motions on the pleadings (including motions to dismiss and judgments on the pleadings) is extremely impressive: 67% of defense motions granted, invalidating 54% of asserted patents. There has never been a Supreme Court ruling that the presumption of validity does not apply to § 101—only the Court’s use of the originally metaphorical notion that eligibility is a “threshold” condition. Given that, and the general rule that to survive a motion to dismiss the patentee (historically) need only show that there was a plausible basis that the complaint states a cause of action— there is a plausible basis that the patent claim is not directed to an abstract idea, law of nature, or natural phenomena. One would be forgiven for thinking, as did former Chief Judge Rader in Ultramercial, LLC v. Hulu, LLC that a “Rule 12(b)(6) dismissal for lack of eligible subject matter will be the exception, not the rule.” Apparently the rules change in the middle of the game.

Turning specifically to the Federal Circuit, the numbers are stark:

Table 00Fed Circuit

Of the 13 decisions, 11 are in software or e-commerce and only two are in biotech. The one case where the court held in favor of the patentee, DDR Holdings, LLC v. Hotels.com, L.P. appeared to offer a narrow avenue for patentees to avoid invalidation. However, only nine district court opinions have relied upon DDR to find patent eligibility, with over 30 court opinions distinguishing DDR as inapplicable. Even more interesting is the fact that in DDR the Federal Circuit essentially held that creating a website that copies the look and feel of another website is patent eligible. In the Silicon Valley, that’s called phishing, and it’s not a technology in which most reputable companies invest.

Alice at the Office

The impact of Alice is similarly impacting practitioners before the USPTO. In December, 2014 the Office issued its Interim Guidance on Patent Subject Matter Eligibility, providing guidance to patent examiners as to how to apply the Alice, Mayo, and Myriad decisions along with various Federal Circuit decisions, to claims during prosecution. Importantly, the Guidance noted that “the Supreme Court did not create a per se excluded category of subject matter, such as software or business methods, nor did it impose any special requirements for eligibility of software or business methods,” and it reminded examiners that “Courts tread carefully in scrutinizing such claims because at some level all inventions embody, use, reflect, rest upon, or apply a law of nature, natural phenomenon, or abstract idea.” Alas, most patent examiners are acting as if the patent applications before them are the exceptions to these cautionary instructions.

With the assistance of Patent Advisor, I compiled a dataset of almost 300,000 office actions and notice of allowances sampled in two week periods during 2013, 2013, 2014 and early 2015, and all actions during March, April and May 2015, across all technology centers:

Table0 Number of Apps

About 100,000 actions were notices of allowances, leaving about 200,000 office actions. Each office action was coded as to whether it included rejections under §§ 101, 102 and 103. For each office action the art unit and examiner was identified as well, and the status of the application (abandoned, pending or patented) as of the date that the data was obtained. I then analyzed the data for office actions rejections based on § 101, allowance rates, and examiner rejection rates. Here’s what I found.

Percent of all Actions with § 101 Rejections

Table2

Here, we have the percentage of all actions in each period that received a § 101 rejection, considering both rejections issued and notices of allowances. The black line separates pre-Alice from post-Alice data. For example, in TC 1600, the biotech area, in January, 2012 6.81% of all actions issued (counting both office actions and notices of allowances) were office actions with § 101 rejections; by May 2015 that percentage almost doubled to 11.86% of actions.

Overall, data shows that in 2012 subject matter rejections were mainly in the computer related Tech Centers (2100, 2400) and began declining thereafter, while escalating in biotechnology (1600) and so-called “business methods” Tech Center, TC 3600, following Mayo and Alice. Other technology centers such as semiconductors and mechanical engineering had essentially low and constant rejection rates. But that’s not because there are no software patents in these technology centers: you find plenty of software patents in these groups. Rather, my view is that it is because examiners in these groups treat software patents as they do any other technology.

The rejection rates in Tech Center 3600 in the 30-40% range are higher than any other group, but they also mask what’s really going on, since TC 3600 covers more than business methods. Tech Center 3600 has nine work groups:

Percent of all Actions with § 101 Rejections in TC 3600 Work Groups

Table3 Ecomm Rej

In TC 3600 most of the work groups handle good old-fashioned machines and processes, such as transportation (3610), structures like chairs and ladders (3630), airplanes, agriculture, and weapons (3640), wells and earth moving equipment (3670), etc. Three work groups handle e-commerce applications: specifically, 3620, 3680 and 3690. Here we see that these groups have significantly higher § 101 rejections than the rest of TC 3600. But let’s drill down further.

Each of work groups 3620, 3680 and 3690 have between five and 10 individual art units that handle specific types of e-commerce technologies, but they are not all under the same work group. For example business related cryptography is handed by both art units 3621 and 3685; healthcare and insurance is handled by art units 3626 and 3686; operations research is handled in 3623, 3624, 3682 and 3684. If we consolidate the data according to technology type and then look at rates of § 101 rejections we get the following:

Percent of all Actions with § 101 Rejections in E-Commerce Art Units by Technology Type

Table3 Ecomm Rej

What’s going on? After Bilski in 2010, the § 101 rejections were running between 17% and 50%. Not great but tolerable since these were mostly formal and were overcome with amendments adding hardware elements (“processor,” “memory”) to method claims or inserting “non-transitory” into Beauregard claims.

But after Alice, everything changed and § 101 rejections started issuing like paper money in a hyperinflation economy. If your perception as a patent prosecutor was that the every application was getting rejected under § 101, this explains your pain. Here’s another view of this data, in terms of actual number of § 101 rejections per sample period:

Number of Office Actions with § 101 Rejections in E-Commerce Art Units by Technology Type

Table4 Ecomm Rej Nos

Notice here that the number of office actions in March, 2015 fell dramatically, and then in April the flood gates opened and hundreds of actions issued with § 101 rejections. This is consistent with the Office’s statements in January 2015 that it was training examiners in view of the 2014 Interim Guidance, so office actions were being held until the training was completed. Apparently, the training skipped the part about no per se exclusions of business methods.

Now let’s consider notice of allowance rates. First with respect to all Tech Centers.

Percent of Actions that Are Notices of Allowance

Table5 All TCs NOA

This data reflects, of all the actions that were issued in a given period, the percentage that were notices of allowances. (Note here that contrary to the preceding tables, red cells are low percentage, and green cells are high since notices of allowance are good things, not bad things). The numbers look good, with a general increasing trend over time.

Now consider what’s happening in TC 3600’s business methods art units.

Percent of Actions that Are Notices of Allowance in Business Methods

Table6 NOAs in Ecomm

Now the picture is quite different. The rate of NOAs drops dramatically after Alice, especially in finance and banking and operations research. If it seemed that you were no longer getting a NOAs, this is why. The zero percent rate in March, 2015 is a result of the Office holding up actions and NOAs in view of the Interim Guidance training, as mentioned above.

Patents issued in the business methods art units typically are classified in Class 705 for “Data Processing.” I identified all patents with a primary classification in Class 705 since January, 2011, on a month by month basis, to identify year over year trends. Again the black line separates pre-Alice from post-Alice data.

Table7 Class 705 Patents

This table shows a precipitous decline in the number of business method patents issued following Alice, especially year over year. The lag between the June, 2014 Alice decision and the drop off in October 2014 is an artifact of the delay between allowance and issuance, as well as the USPTO’s unprecedented decision to withdraw an unknown number of applications for which the issue fee had already been paid, and issue § 101 rejections. It’s an interesting artifact, as well, that the number of Class 705 patents issued peaked in the month after Alice: you have to remember that these patents were allowed at least three months, and as much as a year, before the Alice decision; it just took a long time to actually get printed as a patent.

Next, we’ll consider abandonment rates, on a comparative basis, looking at the percentages of applications that were ultimately abandoned in relationship to whether or not they received a § 101 rejection. We’ll compare the data from January 2012 to July 2014. Again, consider the entire patent corps:

Percent of Abandoned Applications with Prior § 101 Rejection

Table8 Abandon all TCs

Here we see that of the applications that were abandoned during the respective sample periods, the vast majority did not have a prior § 101 rejection. Only in TC 3600 did the majority shift after Alice with 51.83% applications that received § 101 rejections in July 2014 being subsequently abandoned by May 31, 2015. Again, let’s drill down into the business method art units in TC 3600:

Percent of Abandoned Applications with Prior § 101 Rejection

Table9 Ecomm Abandon

First, prior to Alice, abandonments in the business method units appeared to result more frequently from other than § 101 rejections, typically prior art rejections. This is shown by the fact that the Jan. 2012 “No” column (no prior 101 rejection) is greater than the Jan. 2012 “Yes” column. Then after Alice, there is a huge shift with the vast majority of applications that were abandoned having § 101 rejections, as shown by the July, 2014 “Yes” column. The vast majority of abandonments, upwards of 90%, followed a 101 rejection. That’s applicants essentially giving up over what only a few years ago was a relatively minor hurdle. That’s what happens when you change the rules in the middle of the game. Second, there is also significant differential behavior in the business method areas as compared to the rest of the technology centers after Alice.

Here’s my personal favorite.

Rates of Examiner § 101 Rejections in TC 3600

Table12 Examiner Rates

This table shows the numbers of examiners in the business method art units with respect to the percentage of applications in which they issued § 101 rejections after Alice. The first row shows that during the sampled periods since Alice, 58 business methods examiners issued § 101 rejections in 100% of their applications, for a total of 443 applications. Twenty examiners issued § 101 rejections for between 90% and 99% of their cases, covering 370 applications. In short, 199 examiners issued § 101 rejections more than 70% of the time, covering 3,304 applications or about 70.6% of all applications. This is not “treading carefully.”

We find similar, though less dramatic, trends and variations in TC 1600 which handles biotechnology, pharma, and chemistry.

Percent of all Actions with § 101 Rejections in TC 1600 Work Groups

Table10 1600 101 Rej Rate

The red line separate pre-Mayo/Myriad data from post-Mayo/Myriad, and the increase in the post-period is significant. Here too, the various work groups mask the more significant rejection rates in specific technology areas, with the rejection rate in microbiology first jumping up to 34.6% post-Mayo and steadily climbing to the current 53.2%.

Percent of all Actions with § 101 Rejections in TC 1600 by Technology

Table11 1600 Tech Type Rej

This table breaks down the work groups into technology types, and then these are sorting average rejection rate over the past four months. Following Alice, we see a significant increase in eligibility rejections in bioinformatics related applications–inventions that rely on analysis and identification of biological and genetic information, and which are frequently used in diagnostics and drug discovery. This is especially disconcerting because bioinformatics is critical to the development of new diagnostics, therapies and drugs.

Note as well the enormous spike in rejections for plant related applications from 0% between July 2015 and April 2015, to 50% in May 2015. This is likely a result again of the USPTO’s Interim Guidance which essentially instructed examiners to reject any claim that included any form of a natural product.

At least pesticides and herbicides are safe from Alice, since we definitely need more of those. The irony is that the more pesticides and herbicides that come to market, the more we need bioinformatics inventions to identify and treat conditions potentially resulting from these products.

Alice at the Board

The Patent Trial and Appeal Board has been even more hostile to software and business methods patents under the Covered Business Method review program:

Total Petitions

Petitions Granted

Percent Invalid

PTAB CBM Institution on § 101

72

64

89%

PTAB Final Decisions on § 101

27

27

100%

Covered Business Method review is available for patents that claim “a method, apparatus, or operation used in the practice, administration, or management of a financial product or service.” The Board takes a very broad view of what constitutes a financial product or service: if the patent specification happens to mention that the invention may be used in a financial context such as banking, finance, shopping or the like, then that’s sufficient. The Board has found CBM standing in 91% of petitions, and instituted trial in 89% of petitions asserting § 101 invalidity. Once a CBM trial has been instituted, the odds are heavily in the petitioner’s favor: of the 27 final CBM decisions addressing § 101, the Board has found for the petitioner 100% of the time.

Finally, we look at the Board’s activity in handling ex parte appeals from § 101 rejections for the period of March 1, 2015 to May 30, 2015:

  • 32 Ex Parte Decisions on § 101, with 15 in TC 3600.
  • 28 Affirmances overall, 13 in TC 3600
  • Two Reversals on § 101, both in TC 3600
  • Four New Grounds of Rejection for § 101

Following suit with how the Board is handling CBMs, they are also heavily supporting examiners in affirming § 101 rejections. More disconcerting is the trend of new grounds of rejection under § 101. While only four were issued in this period, there have been several dozen since Alice. In this situation, the applicant has appealed, for example, a § 103 rejection. The Board can reverse the examiner on that rejection, but then sua sponte reject all of the claims under § 101. What are the odds that the examiner will ever allow the case? Close to zero. What are the odds that an appeal back to the Board on the examiner’s next § 101 rejection will be reversed? If the Board’s 100% rate of affirming its CBM institution decisions on § 101 is any indication, then you know the answer.

Conclusions

Looking at the overall context of the Alice decision, it’s my view that Supreme Court did not intend this landslide effect. While they were certainly aware of the concerns over patent trolls and bad patents, they framed their decision not as a broadside against these perceived evils, but as simple extension of Bilski and the question of whether computer implementation of an abstract idea imparts eligibility. At oral argument, the members of the Court specifically asked if they needed to rule on the eligibility of software and they were told by CLS and the Solicitor General that they did not. To the extent that there is broad language in that opinion, it is the cautionary instructions to the courts to avoid disemboweling the patent law from the inside, and the emphasis on preemption of fundamental ideas—not just any ideas—as the core concern of the exclusionary rule. The evidence above shows that these guideposts have been rushed past quite quickly on the way to some goal other than the preservation of intellectual property rights.

If the present trends hold, and I see no reason to suggest that they will not, we will continue to see the zone of patent eligibility curtailed in software (not to mention bio-technology after Mayo and Myriad). Indeed, the more advanced the software technology—the more it takes over the cognitive work once done exclusively by humans, the more seamless it becomes in the fabric of our daily lives—the less patent eligible it is deemed to be by the courts and the USPTO. What technologies will not be funded, what discoveries will not be made, what products will never come to market we do not know. What we do know is this: there is only one law that governs human affairs and that is the law of unintended consequences.

Categories
Commercialization High Tech Industry Innovation Intellectual Property Theory Internet Inventors Law and Economics Patent Law Patent Licensing Patent Theory Software Patent Uncategorized

The Commercial Value of Software Patents in the High-Tech Industry

In CPIP’s newest policy brief, Professor Saurabh Vishnubhakat examines the important role patents play in commercializing software innovation and supporting technology markets. He explains how a proper understanding of this commercial role requires a broader view of patents in software innovation than the all-too-common focus on a small handful of litigated patents and legal questions of patentability and patent quality. He concludes that the flexibility and efficiency of the patent system fosters the emergence of new markets for the exchange of technology and knowledge.

Read the full brief: The Commercial Value of Software Patents in the High-Tech Industry

Categories
Antitrust Commercialization DOJ FTC High Tech Industry Injunctions Innovation Intellectual Property Theory International Law Patent Law Patent Licensing Patent Theory Reasonable Royalty Remedies Software Patent Uncategorized

Curbing the Abuses of China’s Anti-Monopoly Law: An Indictment and Reform Agenda

The following is taken from a CPIP policy brief by Professor Richard A. Epstein.  A PDF of the full policy brief is available here.

Curbing the Abuses of China’s Anti-Monopoly Law:
An Indictment and Reform Agenda

Executive Summary

There are increasing complaints in both the European Union and the United States about a systematic bias in China’s enforcement of its Anti-Monopoly Law (AML).  In an extensive report on China’s abuse of its antitrust laws in advancing its own domestic economic policies, for instance, the U.S. Chamber of Commerce noted among many examples a recent action against Microsoft in which Chinese antitrust authorities used a “speculative possibility of licensor hold-up” following Microsoft’s acquisition of Nokia to justify a decree under the AML to “cap license fees for domestic licensees of mobile handset-related software.”

Although the biases in the enforcement of the AML against foreign companies are rooted in systemic problems in China’s political and legal institutions, the abuses are particularly evident in the patent space.  FTC Commissioner Joshua Wright has recognized the “growing concern about some antitrust regimes around the world using antitrust laws to further nationalistic goals at the expense of [intellectual property rights] holders, among others.” He specifically mentioned China as one such antitrust regime that may be finding encouragement or at least rationalization in recent FTC and DOJ actions that presume that “special rules for IP are desirable . . . and that business arrangements involving IP rights may be safely presumed to be anticompetitive without rigorous economic analysis and proof of competitive harm.”

This same theme has been recently echoed by FTC Commissioner Maureen Ohlhausen, who explained that recent American decisions on standard essential patents (SEP), such as the FTC’s use of its merger review power to enforce settlement agreements on SEPs against Bosch and Google, have “created potentially confusing precedent for foreign enforcers.”  This concern was brought home to her when she witnessed Chinese officials invoke these recent FTC actions against Bosch and Google to justify their per se claim under the AML that “an ‘unreasonable’ refusal to grant a license for a standard essential patent to a competitor should constitute monopolization under the essential facilities doctrine.”

Such broad propositions pave the way for Chinese officials to favor domestic, state-run companies who incorporate foreign patented innovation in their own domestic products and services.  These unfettered notions of “unreasonable” conduct become weapons that let Chinese officials force down prices of foreign goods to promote their own nationalist economic policies. Unfortunately, as Commissioner Ohlhausen observed just this past September, recent U.S. antitrust enforcement actions are giving Chinese officials grist for their industrial policy mill.

It is critical that American legal authorities do not give aid and comfort to China’s discriminatory treatment of foreign companies under the AML by the way in which American regulators either speak about or take action on SEPs or other issues relating to patented innovation in this country.  The antitrust laws should not be applied so as to single out patents or any other intellectual property rights for special treatment; all property deployed in the marketplace should be treated equally under the competition laws.

The unfortunate situation in China is one example of a dangerous set of practices which could spread to other countries, motivated either by imitating what China has done or retaliating against its abuses.  The risk is that the disease can spread all too easily.  Until reforms are implemented in both the substance of the AML and the enforcement practices of the Chinese authorities, American policymakers and enforcement authorities should do everything they can to avoid aiding this misuse of antitrust as a domestic economic policy cudgel.


Curbing the Abuses of China’s Anti-Monopoly Law:
An Indictment and Reform Agenda

Richard A. Epstein

I. Introduction

There is a loud chorus of complaints from both the European Union and the United States about a systematic bias in China’s enforcement of its Anti-Monopoly Law (AML).  This bias is evident in a wide range of economic sectors and companies. The Economist reports that China has imposed extra-heavy antitrust penalties on foreign automobile manufacturers, such as Daimler, including a record $200 million penalty on a group of ten Japanese car-parts firms, and the New York Times reports that China has imposed another $109 million penalty on six companies selling infant milk formula.  China has also initiated antitrust enforcement actions against American high-tech companies, such as Microsoft and Qualcomm, and there is an ongoing Chinese probe of Qualcomm (a firm for which I have consulted unrelated issues), which is said to be done with an effort to force a reduction in the prices that it charges for its advanced wireless technology, which China needs to implement a new 4G system for mobile phones.  Similarly, in a wide-ranging report on China’s abuse of the AML to advance domestic industrial policy, the U.S. Chamber of Commerce noted many examples, including a recent action against Microsoft in which Chinese antitrust authorities used its acquisition of Nokia as a basis for a completely “speculative possibility of licensor hold-up” to justify a decree to “cap license fees for domestic licensees of mobile handset-related software.” It is no wonder that many commentators are repeatedly stressing the distinctive foreign focus of China’s recent antitrust activities.

Chinese public officials insist that their stepped-up enforcement of the AML  is even-handed.  “Everyone is equal before the law,” asserted Li Pumin, the head of the National Development and Reform Commission, which takes the lead in investigating foreign firms.  But others in China disagree.  More market-oriented Chinese writers have lamented how China’s commitment to market processes has reversed course since the adoption of the AML law, as China is now using this law as an industrial policy cudgel in promoting its own domestic firms at the expense of foreign ones. Its recent behavior, which provoked expressions of concern from American antitrust officials at both the Federal Trade Commission and the Department of Justice, suggests that this is indeed the case.

II. The Chinese Anti-Monopoly Law

The current situation is an unwelcome reversal of the initial optimism that surrounded the adoption of the AML in 2008, and so a quick overview of the AML’s provisions is necessary.  Hailed at the time as “a tremendous leap forward for China,” the law adopts, at least in the abstract, many of the standard categories of antitrust analysis found in the United States and in the European Union.  In Article 3, it contains the standard prohibitions against horizontal arrangements that raise prices, reduce output, or divide territories, subject to an exemption under Article 15 for agreements that improve technical standards or upgrade consumer products.  The AML also bans “abuse of dominant market positions by business operators,” which under Article 17 includes setting prices in “selling commodities at unfairly high prices or buying commodities at unfairly low prices;” or in selling goods at below costs, refusals to deal, and tie-in arrangements, all “without any justifiable cause.”[i]

In many ways what is most notable about the AML is the extent to which it imitates the major features, both good and bad, of the more developed competition law applied in the United States and the European Union.  But by the same token, it is quite clear that the Chinese law is embedded in a different set of institutional arrangements.  Two elements stand out.

First, the AML reflects the unique Chinese approach to “market socialism” that was first implemented by Deng Xiaoping’s reform policies in the late 1970s as “socialism with Chinese characteristics.”  Article 4 of the AML thus attempts to square the circle: “The State constitutes and carries out competition rules which accord with the socialist market economy, perfects macro-control, and advances a unified, open, competitive and orderly market system.”

Second, the socialist legacy reflected in Article 4 has resulted in an extensive system of state-owned industries in China, and Article 7 of the AML provides special controls, exemptions and protections for this sector of the Chinese economy:

Industries controlled by the State-owned economy and concerning the lifeline of national economy and national security or the industries implementing exclusive operation and sales according to law, the state protects the lawful business operations conducted by the business operators therein. The state also lawfully regulates and controls their business operations and the prices of their commodities and services so as to safeguard the interests of consumers and promote technical progresses.

The scope of Article 7 offers instructive clues toward understanding the current situation.  Its text refers to entire “industries,” not just individual firms, that are given special treatment under the AML. It still speaks in terms of constraining the ability of “industries” to engage in any abusive practices, which at least in principle serve as the basis for competition-focused anti-monopoly law.

Unfortunately, the odds of it remaining focused in this constructive way are necessarily reduced because of its dual operation with respect to both state-owned enterprises (SOEs) and foreign corporations.  The SOEs have a built-in preferential position that can manifest itself in two ways.  Either they can get gentle slaps on the wrist for offenses that prompt far harsher sanctions against private companies, especially foreign companies who are either suppliers or competitors with SOEs, or the SOEs could prod Chinese anti-monopoly enforcement authorities to take action against their foreign competitors.  The AML can all too easily function as a new form of protectionism by virtue of its differential application to foreign firms vis-à-vis SOEs doing business in China.

The difficulties here are increased, moreover, by the structural decision to parcel out enforcement of the AML to several agencies. The National Development and Reform Commission has the lead with respect to enforcement over monopoly agreements.  The State Administration of Industry and Commerce deals with abuses of dominant position.  The division of enforcement authority between these agencies makes it much harder to impose uniform standards on the overall operation of the system. This split in enforcement authority increases the risks of differential enforcement and, more worrisome, the misuse or discriminatory use of the AML.

Therefore, it is evident that no evaluation of the operation of the Chinese anti-monopoly system can be made solely on the basis of the statutory terms in the AML itself.  So much depends on the oft-concealed enforcement practices of the relevant public authorities, who are given very broad powers of inspection and investigation under AML Article 39, which empowers the AML enforcers to run investigations “by getting into the business premises of business operators under investigation or by getting into any other relevant place,” or by forcing them to respond to interrogatories “to explain the relevant conditions” to the public authorities.” Chinese officials also have the power to examine or duplicate all business papers and to seize and retain relevant evidence, and to examine bank records and accounts.  The only procedural protection contained in Article 39, if it can be called that, is that a “written report shall be submitted to the chief person(s)-in-charge of the anti-monopoly authority” before the investigation is approved.  What kind of report and how it is to be reviewed are not stated, even though these substantive and procedural issues are subjects of volumes of statutory, regulatory and decisional law on administrative procedure in the United States and Europe.  Even more significant, there is no mention anywhere in the AML of any probable cause or warrant requirement that must be demonstrated before any independent judicial body.

III. Rule of Law

At the root of the many complaints about the Chinese approach to competition law is the constant concern that its antitrust enforcement practices are inconsistent with the rule of law.  Its legal system invites arbitrary and differential enforcement of anti-monopoly standards.  In dealing with these rule of law issues, it is incumbent to note that they address a critical mix of concerns about both substantive standards and administrative enforcement.

As a general rule of thumb, the more precise the particular rules of conduct that receive government enforcement, the better the prospects to avoid both rule of law violations and the general perception of such government violations.  In this regard, it is worth noting that the ordinary rules of property, contract and tort score very well under this general standard.  As I have argued in my book Design For Liberty:  Private Property, Public Administration and the Rule of Law, these common law rules have several key structural features that facilitate rule of law values.

First, the basic norm with respect to private property is that all other persons need only follow the basic norm “keep off” to comply with the system.  The simplicity of this command means that anyone can follow it regardless of the size of the polity in which this rule operates.  The same command works as well in China with 1.4 billion people as it does in New Zealand with a population just under 4.5 million people.

Second, the content of this simple rule is easily known and understood, so that no one need give special notice of what it requires to the many people who are bound by it.  It is no small deal to have a rule that is not promulgated by statute, which is thereafter interpreted by dense pages of administrative text to which the public has only imperfect knowledge, and which both small and large businesses are able to interpret and apply only with the aid of professional intermediaries such as trade associations and law firms.

Third, the simple rule in question works as well in poor countries as in rich ones, so that there is no awkward transition in rules with increasing development over time.  At this point, the property rules are complemented by the contract rules that allow people within broad limits to decide their own agreements for the provision of goods and services, so that in most cases the key function of the state is to enforce the agreement as designed, not to improve upon its terms with flights of legislative or judicial fancy.

The Chinese AML does not, and cannot, exhibit anything like the requisite level of overall clarity.  In order to determine whether a horizontal arrangement violates the antitrust law, for example, it is necessary to have some sense as to the scope of the market, and the nature of the agreement, to see whether it is or is not in restraint of trade.  It is also necessary to gather evidence about practices that can span both continents and years.  The AML’s standards for dealing with abusive practices are even looser; for example, there is no clear metric by which to determine whether prices are unfairly high or unfairly low. Another nagging question is what it means under the AML for goods to be sold at below cost, because it is completely unclear if the metric is average or marginal cost.  No matter which is chosen, the difficulties of estimation further the scope for abuse of administrative discretion.

This nagging uncertainty about the basic operating rules prompted the late Ronald H. Coase to quip to me long ago in a conversation only partly in jest: “If prices move up in any market, it is surely the result of monopolization. If they remain constant, it is surely the result of market stabilization arrangements.  If they go down, it is surely the result of predation” (quoting from memory).  Coase’s quip ruefully reflects the modus operandi of the Chinese AML.  Since any and all price movements could be associated with some violation of the AML, it follows that in principle no party, and no group of firms, is immune from investigation and criminal prosecution, regardless of how it conducts its own business.  And owing to the vastness of the multinational businesses who are targeted, these investigations can exert a large influence on the behavior of firms and on their key employees who bear the brunt of those investigations, where they are subject to the possibility of criminal sanctions in addition to emotional wear and tear.

IV. The Patent Dimension

The dangers of this system are apparent and easily understood. With respect to accusations of secret horizontal arrangements and price gouging arrangements, the risk comes in the form of extensive and exhaustive investigations that are intended to stifle and not promote competition in the marketplace.  In dealing with these issues, it is critical that our American legal authorities do not give aid and comfort to China’s aggressive regulation of foreign businesses enterprise by the way in which American regulators address similar issues in this country.  We live today in an intensely global environment, and any actions in the United States that overstate the role of the antitrust laws can easily be used as reasons to expand antitrust application overseas.

The point applies to all areas of law, but has especial importance in connection with patents, given that technology that is available in one country is instantly available in all. After the Supreme Court handed down eBay v. MercExchange in 2006, injunctive relief is no longer presumptively available for patent infringement in the United States.  As Professor Scott Kieff, now of the International Trade Commission, and I have written, eBay eased the way for Thailand to impose its regime of compulsory licensing for pharmaceutical patents, at far below market rates.

Evidently, decisions like eBay do not go unnoticed by foreign nations, where they set up a climate in which the weak enforcement of patent rights becomes par for the course.  That same development happens most emphatically in the crossover area between patent and antitrust law.  In general, the proper application of the antitrust law does not single out patents for special treatment of the antitrust laws.  A clear articulation of this principle was recently made by FTC Commissioner Joshua D. Wright in his 2014 Milton Handler Lecture:  “Does the FTC Have a New IP Agenda,”  which stressed the importance of the “parity principle” that states a central tenet in the Department of Justice/Federal Trade Commission 1995 Antitrust Guidelines for the Licensing of Intellectual Property:  “Agencies apply the same general antitrust principles to conduct involving intellectual property that they apply to conduct involving any other form of tangible or intangible property.”

The parity principle is critical to successful antitrust enforcement because it places an important fetter on the arbitrary use of government power, which increases greatly if any government, China included, could use a wide catalogue of novel arguments to justify some deviation from the general rule.  Indeed, this parity principle is an extension of what I have termed elsewhere as the “carry over” principle, which means that intellectual property rights in general should be based on the rules that are applicable to other forms of property, subject only to deviations required by the distinctive features of property rights in information, which chiefly relates to their finite duration to allow for the widespread dissemination of information. But once that key adjustment is made, the standard rules for property used elsewhere, including the rules for injunctive relief, should continue to apply.

Yet as Commissioner Wright mentioned, recent FTC and DOJ actions presume that “special rules for IP are desirable . . . and that business arrangements involving IP rights may be safely presumed to be anticompetitive without rigorous economic analysis and proof of competitive harm.” Commissioner Wright has also recognized the “growing concern about some antitrust regimes around the world using antitrust laws to further nationalistic goals at the expense of [intellectual property rights] holders, among others.” He specifically mentioned China as one such antitrust regime that may be finding encouragement or at least rationalization in these recent actions against IP owners by American antitrust agencies.

This same theme has been recently echoed by FTC Commissioner Maureen Ohlhausen, who noted how foreign nations invoke “‘competition fig leaves’ to address other domestic issues or concerns.” More specifically, Commissioner Ohlhausen explained how this tendency has manifested itself in the debate over standard essential patents (SEPS), that is those patents that are incorporated in setting key technical standards that allow for the interoperability of various technical devices.  She also noted how recent American decisions on SEPs have “created potentially confusing precedent for foreign enforcers.”  That concern was brought home when Chinese officials invoked recent FTC enforcement actions against Bosch and Google SEPs to justify a per se claim under the AML that “an ‘unreasonable’ refusal to grant a license for a standard essential patent to a competitor should constitute monopolization under the essential facilities doctrine.” Such broad propositions pave the way for Chinese officials to favor domestic, state-run companies who incorporate foreign patented innovation in their own domestic products and services.  These unfettered notions of “unreasonable” conduct become weapons that let Chinese officials force down prices of foreign goods to promote their own nationalist economic policies. Unfortunately, as Commissioner Ohlhausen observed just this past September, recent U.S. antitrust enforcement actions are giving Chinese officials grist for their industrial policy mill, by insisting that their heavy-handed antitrust action against foreign patent owners “has support in U.S. precedent,” such as the Google and Bosh settlements.

V. Enforcement Abuses

The suppression of patent licensing rates charged to domestic Chinese firms is just one example of how the AML enforcers have a built-in invitation to run massively intrusive and expensive investigations into any firms. These investigations are unhampered by any clear legal definition of relevance and are undertaken without regard to the high costs incurred by firms seeking to comply with the officials’ edicts, both administrative and reputational.  In some cases, the charge falls within the yawning gap in the AML concerning limits on its enforcement practices.  For example, the European Union Chamber of Commerce has found  that China engages in administrative intimidation, which is intended to short-circuit formal hearings, and forces parties charged to appear before tribunal hearings without the assistance of counsel and without involving their own governments or chambers of commerce in the process.

It is of course impossible for any academic sitting in the United States to make any estimation of the actual level of abuse in any one individual case. But the simple point here is that the Chinese authorities are already low on credibility because of the way in which they conduct themselves in so many other areas.  It takes no great imagination to connect the dots between China’s anti-monopoly investigations of foreign companies doing business in China proper with the Chinese government’s hostile response to the Hong Kong protests against the high-handed way in which Chinese authorities are stifling homegrown democratic activities by insisting on government vetting of all candidates for public office to weed out those who might oppose China’s national agenda.   And it takes no great leap in imagination to realize that the same aggressive attitude that China now takes on territorial issues with Vietnam and Japan can spill over to these investigations. It is also well known that China blocks (censors) service supplied by the mainstays of the internet and social media, including Google, Facebook, Wikipedia, and Twitter, which would provide ample opportunity for information about government (and private) abuses to be widely spread.

It also looks as though the lack of any formal protections in the AML investigative process opens up the entire system to these forms of abuse.  The lack of any reliable reporting on these matters is consistent with wide-scale abuse because of this simple stylized threat: “Be silent and take your punishment and we shall reduce the penalties.  Speak about the matter in public and the penalties will increase.”  These threats are all too credible within a tightly run collectivist society.  The legal system may give little or no relief, and even if the courts were somehow attuned to the civil liberties and procedural issues, the lack of any clear standards for what counts as either a violation or an appropriate penalty reduces the chances that judicial intervention could be used to slow down an official juggernaut.

VI. Reforms

China needs to do more than make bland and predictable protestations that the AML applies on even terms for all players.  The question is how?  At the most basic level, one way to get rid of this problem is to spin off all SOEs into private hands, preferably by bona fide auctions, so that there is less risk of political influence displacing the rule of law.  That path is of course hampered by China’s explicit commitment to socialist principles in the AML and everywhere else.

There is, however, no reason why that has to create an insuperable barrier.  Socialist principles are also inconsistent with private ownership of the means of production, and with the belief that open competition in the marketplace will assure the highest level of social output for any given set of resources. In a sense, the 2007 adoption of the AML itself should be regarded as an implicit rejection of the principles of the socialist economy found in Article 4, because it assumes private companies and a functioning free market.  It should take only a little imagination to push the cycle one step further by privatizing key government industries with auctions or other schemes of devolution, and the Chinese government has already proven resourceful in finding ways to explain how such free market reforms are consistent with its preexisting socialist system.

Even if this approach is not undertaken, it should still be possible to make reforms internal to the AML itself that are not likely to reduce its economic benefits but could do much to control its adverse effects. Within the American system, a strong distinction is taken between the horizontal arrangements that are governed under Section 1 of the 1890 Sherman Act and the variety of vertical arrangements that are covered under the monopolization provisions of Section 2.  The argument in favor of this distinction turns on the anticipated rate of social return from the enforcement of these two provisions.

With the Section 1 prohibition on contracts in restraint of trade, the nature of the societal loss is generally easy to figure out.  The horizontal arrangements that restrict output, raise prices or divide territories do not result only in the transfer of wealth from consumers to producers, but also a reduction in overall social wealth by removing those transactions that could take place for mutual benefit at the competitive price, but which will be foreclosed when the cartel raises its price to the monopoly level. As noted earlier, the Chinese AML tracks that approach, at least on paper.  The enforcement questions here are not easy, but since there is a clear sense of what the wrong is, it should be possible to obtain evidence from examining evidence of cooperation, including from disgruntled employees of the given firms.  And the matter can be helped along immeasurably by rules that waive treble damages to the first cartel member that reports the cartel practices.  These rules apply with great force in the current American enforcement efforts, much of which has been directed toward international cartels.

The dynamics under Section 2 of the Sherman Act are quite different.  In these instances, it is hard to develop a simple explanation as to why various kinds of vertical arrangements are harmful to consumer welfare.  In many cases, the practices that are undertaken by the dominant firm are also undertaken by their smaller rivals that have no element of market power.  The clear implication of this simple point is that the practices that are routinely attacked as restrictive are also practices that have efficiency benefits.  Any effort to ban or punish these factors could both stifle useful innovations and distort the competitive balance between firms of different size.

The situation gets even worse when the only charge leveled under the AML is that prices are “unfairly high” or “unfairly low,” which is just asking for trouble.  At one level the impetus behind this claim is that certain products are sold at higher (or lower) prices in China than in the United States or the European Union. But these simple price comparisons miss so many of the relevant marketplace complications.  Higher prices could stem from higher costs in distribution or in compliance with local laws.  Lower prices could result from the simple fact that the fixed costs of producing these goods are allocated to the home market where demand is higher, such that the foreign sales at a lower price improve the welfare of both the firm (which gets a chance to expand markets and recover an additional fraction of its fixed costs) and its Chinese customers, who get the benefit of low prices that forces local firms to reduce their costs.  It follows therefore that the Chinese antitrust system could do well to narrow the class of offenses that are said to be practiced by dominant firms, avoiding confusing and unclear terms such as “unfair” prices.

Once a sharper definition of monopolization activities is adopted, it reduces the pressure on the enforcement system to engage in overbroad and unfettered investigations or prosecutions, and thus the risks of massive abuse.  Nonetheless, it is a grim fact of life that the investigation of cartel-like behavior is always intrusive, precisely because these arrangements are always carried out in secret, which requires extensive government efforts to ferret them out.  But in this regard, it is imperative that China reform its antitrust system for the benefit of both its own citizens and foreign companies investing in China. It should adopt procedural protections that impose some definitive and clear checks on how investigators can behave in ways that avoid both massive human rights violations on the one hand and routine investigative abuses on the other.

At this point, it is necessary to add into Chinese law the same kinds of safeguards that are commonplace in most countries with respect to other forms of criminal investigation, whether crimes of violence or drug offenses, or simple cases of fraud and nondisclosure in financial circles and elsewhere.  The point here is that the most dangerous sentence in the English language—“trust me I am from the government”—translates perfectly into Chinese.  It is not enough that the abuse stops.  It is absolutely imperative that the appearance of abuse ceases as well.  Those reforms are not beyond the power of the Chinese legal system to implement, but it will take a long overdue switch from the inquisitorial types of system that socialist countries have found all too congenial in the political and economic sphere.

In urging these major antitrust reforms, it is imperative to put the Chinese position into global perspective. The Chinese government is not the only government that uses its anti-monopoly laws as a cudgel to achieve other political or economic objectives.  It has lots of company worldwide.  There are, more specifically, other illustrations of abuse in the United States and the European Union.  The American system is overly exuberant in its discovery processes, especially with respect to international operations under the 1995 guidelines of the United States Department of Justice and the Federal Trade Commission. It offers shameless protection to American export cartels under the Webb-Pomerene Act, passed in 1918 at the end of World War I, when the need for free trade could hardly have been greater. The European Union thrives on broad definitions of “abuse of dominant position” under Article 102 of its 2009 Treaty on the Functioning of the European Union.  The enforcement in many other nations, such as India, with its endless protectionist practices, is also in need of major reform.

In dealing with all these multi-national issues, the fundamental insight is that free trade across international borders offers the best hope for the amelioration of the human condition, especially in developing or underdeveloped countries.  It is widely understood that tariffs and other restrictions impede the flow of goods across international borders, which is why the World Trade Organization maintains global free trade as its primary objective.  The general attack on explicit entry restrictions by foreign firms and goods has borne much fruit in recent years, although there is still work to be done.  But it is precisely because tariffs and other barriers to entry are public and thus verifiable that it is (relatively) easy to control their abuse.

The success of the WTO in controlling these practices does not put to rest the protectionist impulses that have generated too many obstacles to free trade.  The differential enforcement of the anti-monopoly laws poses major dangers in this regard, for the same laws that protect against anticompetitive practices are all too often used to achieve the very abuse that they are intended to guard against.  Commissioner Ohlhausen bluntly puts the point: “Critics claim that China is using its antitrust law to promote industrial policy.” The unfortunate situation in China is but one example of that dangerous set of practices, which unchecked could spread to other countries, motivated either by imitating what China has done or retaliating against its abuses.  The risk is that the disease can spread all too easily.  Other nations can protest against these practices. But ultimately it is for China itself to throw aside the shackles that disadvantage foreign firms and the Chinese people alike.

 

Endnotes:

[i] The AML also contains a prohibition against mergers that lead to “concentration of business operators that eliminates or restricts competition or might be eliminating or restricting competition,” but this is not addressed in this brief essay.  These prohibitions cover only a few large transactions, none of which involve ordinary commercial practices that are the subject of the anti-monopoly and abuse of practice provisions at issue in the current applications of the AML.