{"id":5516,"date":"2017-05-11T09:10:31","date_gmt":"2017-05-11T09:10:31","guid":{"rendered":"https:\/\/cpip.gmu.edu\/?p=5516"},"modified":"2026-02-03T20:56:31","modified_gmt":"2026-02-03T20:56:31","slug":"explaining-efficient-infringement","status":"publish","type":"post","link":"https:\/\/blogs.uakron.edu\/ualawip\/2017\/05\/11\/explaining-efficient-infringement\/","title":{"rendered":"[Archived Post] Explaining Efficient Infringement"},"content":{"rendered":"<p><strong><em>By <a href=\"https:\/\/cip2.gmu.edu\/about\/our-team\/adam-mossoff\/\" target=\"_blank\" rel=\"noopener\">Adam Mossoff<\/a> &amp; <a href=\"https:\/\/cip2.gmu.edu\/about\/our-team\/bhamati-viswanathan\/\" target=\"_blank\" rel=\"noopener\">Bhamati Viswanathan<\/a><\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-5144 size-full\" src=\"https:\/\/cip2.gmu.edu\/wp-content\/uploads\/sites\/31\/2017\/03\/patents_200x200.png\" alt=\"files labeled as &quot;patents&quot;\" width=\"200\" height=\"200\" srcset=\"https:\/\/blogs.uakron.edu\/ualawip\/wp-content\/uploads\/sites\/1670\/2017\/03\/patents_200x200.png 200w, https:\/\/blogs.uakron.edu\/ualawip\/wp-content\/uploads\/sites\/1670\/2017\/03\/patents_200x200.png?resize=150,150 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>In a recent <em>New York Times<\/em> <a href=\"https:\/\/www.nytimes.com\/2015\/10\/24\/opinion\/the-patent-troll-smokescreen.html?_r=0\" target=\"_blank\" rel=\"noopener\">op-ed<\/a>, \u201cThe Patent Troll Smokescreen,\u201d Joe Nocera used in print for the first time the term, \u201cefficient infringement.\u201d This pithy phrase quickly gained <a href=\"https:\/\/cip2.gmu.edu\/2017\/04\/28\/an-ever-weakening-patent-system-is-threatening-the-future-of-american-innovation\/\" target=\"_blank\" rel=\"noopener\">currency<\/a> if only because it captures a well-known phenomenon that has been impossible to describe in even a single sentence. Unfortunately, some <a href=\"https:\/\/twitter.com\/ProfGReilly\/status\/858840458348441600\" target=\"_blank\" rel=\"noopener\">commentators<\/a> are confused about the validity of this term. This is understandable, because no one has yet described exactly what it means, especially in comparison to the similar commercial practice of \u201cefficient breach\u201d in contract law.<\/p>\n<p>In a nutshell, efficient infringement occurs when a company deliberately chooses to infringe a patent given that it is cheaper than to license the patent. The reason it is cheaper is what makes it hard to explain briefly: a slew of legal changes to the patent system by <a href=\"http:\/\/www.ipwatchdog.com\/2013\/04\/15\/aia-the-major-cause-for-rise-in-patent-litigation\/id=39118\/\" target=\"_blank\" rel=\"noopener\">Congress<\/a>, <a href=\"http:\/\/innovationalliance.net\/from-the-alliance\/innovation-alliance-report-tilting-balance-decade-supreme-court-case-law-makes-harder-enforce-u-s-patent-rights-easier-copy-u-s-innovations\/\" target=\"_blank\" rel=\"noopener\">courts<\/a>, and <a href=\"https:\/\/www.law360.com\/articles\/399236\/ftc-s-tough-message-on-standard-essential-patents\" target=\"_blank\" rel=\"noopener\">regulatory agencies<\/a> in the past ten years have substantially increased the costs and uncertainties in enforcing patents against infringers.<\/p>\n<p>Accused infringers now can very easily invalidate patents, either in <a href=\"http:\/\/www.bilskiblog.com\/blog\/2017\/04\/alicestorm-update-for-q1-2017.html\" target=\"_blank\" rel=\"noopener\">court<\/a> or at the \u201c<a href=\"http:\/\/www.iam-media.com\/blog\/detail.aspx?g=173a99d0-5374-416c-91ab-1b9dce4dc87c\" target=\"_blank\" rel=\"noopener\">patent death squad<\/a>\u201d known as the Patent Trial and Appeal Board. If a patent owner runs this gauntlet after several years of costly litigation and obtains a judgment in its favor, courts are <a href=\"https:\/\/ssrn.com\/abstract=2816701\" target=\"_blank\" rel=\"noopener\">increasingly refusing to award injunctions<\/a> for anyone other than manufacturing companies. What is left for the patent owner is only damages, but changes in the <a href=\"https:\/\/ssrn.com\/abstract=2835617\" target=\"_blank\" rel=\"noopener\">legal rules for awarding damages<\/a> have made damage awards very minimal compared to the actual economic harms suffered by a patent owner (a 2015 PricewaterhouseCoopers <a href=\"https:\/\/www.pwc.com\/us\/en\/forensic-services\/publications\/assets\/2015-pwc-patent-litigation-study.pdf\" target=\"_blank\" rel=\"noopener\">study<\/a> found that median damage awards in 2014 were at their second lowest level in the past 20 years).<\/p>\n<p>The result of all of this is that a company economically gains from deliberately infringing patents. It pays less in either legal fees or in court-ordered damages than it would have paid in a license negotiated with a patent owner. This is efficient infringement.<\/p>\n<p>As a term in the legal policy debates, efficient infringement draws some inspiration from the well-known economic model of \u201cefficient breach\u201d in contract law. But the two seem very different, at least superficially.\u00a0 Thus, efficient infringement needs further explanation by way of a more explicit comparison to efficient breach theory.<\/p>\n<p>The model of <a href=\"https:\/\/academiccommons.columbia.edu\/catalog\/ac:193230\" target=\"_blank\" rel=\"noopener\">efficient breach<\/a> posits an overall net gain in social welfare from a willful breach of contract. It supposes a scenario in which one contracting party has an opportunity to obtain a higher payment for its goods or services, producing a profit that exceeds any damages from a breach of contract that would be paid to the other contracting party. Thus, the contracting party breaches: it receives the higher payment, it pays the other contracting party its \u201cexpectancy interest\u201d (lost profits), and it pockets its net profits. Everyone wins and society is better off, at least according to this highly stylized and abstract economic model.<\/p>\n<p>In practice, though, one rarely finds cases in which this opportunistic breach of contract works. The losses suffered by a victim of a breach of contract easily exceed mere profits, and courts account for this by awarding reliance and restitution damages, as well as punitive damages for deliberate misconduct like opportunistic breach of contract. Other legal claims, such as tortious interference with a contract and equitable claims for rescission and restitution, provide additional sources of relief for victims of willful breaches of contracts. In fact, one reason contracting parties negotiate liquidated damages provisions in their agreements is to limit liability for these widely recognized costs that go beyond mere expectancy interests.<\/p>\n<p>These additional damages reflect the <em>total<\/em> <em>costs <\/em>created by strategic, opportunistic breaches of contract. These include institutional and systemic harms in eroding reasonable reliance on contractual commitments, lost investments made on the basis of contractual commitments, lost opportunities to pursue other commercial transactions, reputational harms, and so on. A victim of an opportunistic contract breach, for example, can seek the equitable remedy of rescinding the contract and seek restitution to disgorge the willful bad actor of his wrongful gains at the expense of the victim.<\/p>\n<p>This is why one usually finds successful efficient breach only in hypothetical examples in economic textbooks or in law review articles, and not in actual court cases. As one of the scholars who first coined this term in 1977 recently <a href=\"https:\/\/ssrn.com\/abstract=2628256\" target=\"_blank\" rel=\"noopener\">observed<\/a>, \u201cefficient breach is both a null set as well as an oxymoron.\u201d Or, as Professor Gregory Klass similarly <a href=\"https:\/\/blogs.harvard.edu\/nplblog\/2016\/03\/01\/efficient-breach-greg-klass\/\" target=\"_blank\" rel=\"noopener\">notes<\/a>, efficient breach is a \u201cdead letter,\u201d although he still believes it \u201cremains a great teaching tool.\u201d<\/p>\n<p>Recognizing this difference between theory and practice is key in understanding the parallels between efficient breach and efficient infringement.\u00a0 In theory, efficient breach considers only the lost profits in a one-off case of contract breach, and it thus sounds like a gain in social welfare because everyone benefits. But, in practice, contracting parties and courts recognize the <em>total individual and systemic costs <\/em>caused by willful violations of legal rights, whether a contract right or a property right. The same is true for efficient infringement, in both theory and practice.<\/p>\n<p>Theoretically, efficient infringement posits a breach of a legal right that enhances both private and social welfare. The company benefits privately because it pays less via a patent infringement lawsuit in either legal fees (invalidating the patent) or in a compulsory license (court-awarded damages). Society is better off, too, because the company engaging in efficient infringement has more resources to put to productive endeavors, as opposed to paying for use of an invalid patent (a monopoly) or in making a larger wealth transfer payment on the basis of a negotiated license.<\/p>\n<p>In the real world, though, efficient infringement creates more costs than merely the lost licensing profits for the patent owner, or the lost patent itself. The more fundamental problem with efficient infringement is that it undermines the proper functioning of the patent system. It frustrates the promise of the reward to the innovator for one\u2019s inventive labors. Once inventors know that the deck of (legal) cards is stacked against them and that they will suffer efficient infringement, they will create less patentable innovation. Without legal security in stable and effective property rights, <a href=\"https:\/\/ssrn.com\/abstract=2941246\" target=\"_blank\" rel=\"noopener\">venture capitalists<\/a> will not invest in inventors or startups and the <a href=\"https:\/\/ssrn.com\/abstract=2776773\" target=\"_blank\" rel=\"noopener\">innovation economy<\/a> will suffer.<\/p>\n<p>The important point is that these negative dynamic efficiency effects from efficient infringement are <em>systemic <\/em>in nature. This is similar to the concern about systemic costs represented by such causes of action for willful breach of contract as restitution and disgorgement of wrongful gains. As a matter of real-world practice, the costs created by efficient infringement are similar to the broader private and systemic costs created by opportunistic breaches of contract\u2014both threaten the viability of legal institutions and the policies that drive them, such as incentivizing investments and promoting commercial transactions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Adam Mossoff &amp; Bhamati Viswanathan In a recent New York Times op-ed, \u201cThe Patent Troll Smokescreen,\u201d Joe Nocera used in print for the first time the term, \u201cefficient infringement.\u201d This pithy phrase quickly gained currency if only because it captures a well-known phenomenon that has been impossible to describe in even a single sentence. [&hellip;]<\/p>\n","protected":false},"author":3627,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[23,38],"tags":[83,193,225,489,490,510,697,698,1070,1077],"class_list":["post-5516","post","type-post","status-publish","format-standard","hentry","category-infringement","category-patent-theory","tag-adam-mossoff","tag-bhamati-viswanathan","tag-breach-of-contract","tag-efficient-breach","tag-efficient-infringement","tag-equitable-remedy","tag-infringement","tag-injunction","tag-patent-death-squad","tag-patent-infringement"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/posts\/5516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/users\/3627"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/comments?post=5516"}],"version-history":[{"count":1,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/posts\/5516\/revisions"}],"predecessor-version":[{"id":15793,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/posts\/5516\/revisions\/15793"}],"wp:attachment":[{"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/media?parent=5516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/categories?post=5516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/tags?post=5516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}