Professional Documents
Culture Documents
Copyright Project
Copyright Project
Patent Strategy.............................................................................................................................5
Ownership of Data.......................................................................................................................6
Copyright.....................................................................................................................................6
Trade Secrets...............................................................................................................................7
Domain Names......................................................................................................................10
Background................................................................................................................................12
CONCLUSION..............................................................................................................................14
REFERENCES..............................................................................................................................15
2
INTRODUCTION – DATA PROTECTION AND INTELLECTUAL PROPERTY
Data collection is without a doubt the most important and pervasive phenomenon in the age of
technology. Government bodies, educational institutes, hospitals and businesses are constantly
engaged in collecting data from individuals for various reasons, and sometimes, for no apparent
reason at all. This data needs to be very well protected
The rise of technology has made data collection and processing extremely easy which in turn
makes it convenient for organizations of all kinds to function optimally. As a result, personal
data such as address, phone number, medical record, travel plans etc. of majority of the world
population can be easily accessed/ tampered with in the absence of a stringent data protection
legislation. Data protection, as the name suggests, refers to the strategic framework for protection
of sensitive data. Data privacy ensures that sensitive data is accessible only to the authorized
parties and a strong data protection mechanism in turn strengthens data privacy, prevents data
loss and reduces damage in case of breach.
Data sharing is no longer optional for the public – it is quintessential to conducting any
transaction online. In the absence of data protection laws people live in a constant state of worry
about their data. If a proper legislation is not brought about soon the government might as well
be forcing people to give up their right to privacy. Therefore, the need for a well-coded
legislation for data protection is the most pressing need in India and many other nations.
The impact of the growing digital transformation on the global IP landscape is not very clear yet
and our understanding of it is preliminary, to say the least. There is no doubt however, that it will
have a profound bearing on administration of IP systems and IP policy. Majority of the IP laws at
present had been laid down during the industrial revolution to accommodate the tremendous
growth in production. In my opinion, a technological revolution is soon to bring an overhaul to
the existing system. The question then becomes if the existing system provides enough
incentives to promote innovation in the digital age and how much will we need to adapt our
existing laws.
At present, there is no reason to say that the classical IP system is out-of-date but the data-driven
digital technology is clearly the dominant factor in economic production and distribution within
the digital economy. How effective the classical IP system will be in addressing all of the issues
3
arising from the data-driven technologies that dominate in the digital economy remains unclear.
Undoubtedly, these will pose significant challenges for IP policymakers.
Under the classical IP system, any non-public data that an economic agent has taken reasonable
steps to keep confidential, and which have perceived economic value, may constitute a trade
secret. Within the digital economy, trade secrets have become a dominant means of protecting
unpublished data of economic significance. But do trade secrets adequately protect such data?
Trade secrets are not a property right in the classical sense, they are relational rights in the sense
that individuals do not have the right to intrude on or abuse another’s trade secret. For example,
if a company gives data to a sub-contractor for a specific purpose, the subcontractor cannot use
them in any other way. Policymakers will need to examine whether trade secrets adequately
address or regulate all of the issues that may arise in relation to data protection in the digital
economy.
1
According to EMC, by 2020 the world will generate 50 times the information it generated in 2011.
http://www.emc.com/leadership/programs/digital-universe.htm
2
http://www.ibmbigdatahub.com/sites/default/files/infographic file/4-Vs-of-big-data.ipg
4
PATENT STRATEGY
Patent strategies can be quite different from one industry to another. However, there are some
common elements to consider, and they can be summed up in two observations. The
observations are that both obtaining and using patents will become much harder. As a
consequence, the business value of patents is likely to drop significantly. The observation is
straightforward, but very important: if the amount of available information doubles every 18
months, the amount of prior art also doubles every 18 months. If the amount of existing
information grows exponentially, this means that in principle, the rejection rate of patents must
also grow exponentially, to the point where it will reach 100%. What causes problems in this
field is that granting of patents does not occur very fast – the number of patents granted
worldwide has grown from slightly less than 400,000 to more than 900,000 in 2010 3 – and will
fail miserably in comparison to the rise in information that will soon form part of prior art. So,
unless the granting of patents also grows exponentially, the area of technology that is patentable
will shrink accordingly4.
One of the key reasons why the impact of the Big Data explosion of accessible information is not
very visible at the moment in the way patents are being granted, is because the patent offices
don't actually look at prior art in a way that takes into account the exponential growth of non-
patented technology information. It is not clear to me whether patent offices realize the
exponentially growing insignificance of their traditional data-approach. Once they do, though,
they only have two options. The first is to reject most, and eventually almost all, patent
applications. The second option is to ignore reality, and grant patents on non-novel inventions.
However, this will (and arguably, already does) create huge problems in enforcing or using
patents, as explained further below. Since patent is not a guaranteed right and can be challenged
and revoked at any moment, even if patent is granted the likelihood of it being either revoked
later on or being infringed will increase rapidly. Once the infringer is brought in court all they
need to do is reference prior art and the patent will stand threatened.
OWNERSHIP OF DATA
Data is a non-rivalrous commodity. That means that one person's use of data does not necessarily
prohibit or reduce the value of use of that data by another person, or by another 10,000 persons.
3
Source: httn://www.wino.int/instats/en/statistics/patents/
4
http://www.mckinsey.com/insights/business technologv/oven data unlocking innovationand performance with
liquid information
5
Data ownership is an interesting, and developing area of law. In most countries, it is theoretically
possible to "own" data under the law. The legal principle applied will differ, but is typically
based on some kind of protection of the effort to create or gather the data, and will allow to block
or charge for access or use of such data. Data serves as more useful when it is opened up to
public for use and can potentially create innumerable business opportunities. However, with the
rise in data protection and importance of data privacy, it is anyone’s gamble whether data should
be protected strictly or whether it should be allowed to create business opportunities.
One example is the way algorithms work for online shopping and streaming websites. Using
consumer data allows such companies to deliver the best product in the most efficient manner. In
the past also data has been subjected to various researches which have led to breakthrough
inventions by understanding how consumer behavior works. Data sharing could be stifling for
business, economy and invention if seen from this perspective.
COPYRIGHT
Copyright is a remarkably inept system for the Information Society. Its nominal goal is to reward
authors and other creators. In real life, it mainly benefits content distributors. Originally,
copyright was typically granted for the expression of creative activity: writing a book or a blog,
creating or playing music, making a film, etc. However, copyright also applies to software code,
based on the observation that code is like language, and therefore subject to copyright. As such,
copyright covers the code, but not the software functionality expressed through the code.
However, copyright does not protect a particular text based on the message but on how it is
written and if only one possible formulation is there copyright will not apply. This automatically
brings majority of Big Data outside of the copyright perspective. However, it is still possible for
circumvent the existing requirements of copyright and try to register data under copyright law.
Another large subset of Big Data is, in theory, covered by copyright, but in practice, the
copyright approach does not work. This subset relates to all user generated data. Any picture,
video or other creation posted by any social media user online is, in theory, covered by
copyright. But that copyright is never actually used. More importantly, the value of all that user
generated content lies in using it in ways that copyright is structurally unable of handling. User
generated content, in order to have value, must be freely available to copy and paste, tag, adapt,
create derivatives of, and, fundamentally, share without limitation. It is the opposite of what
copyright tries to achieve (a system of limited and controlled distribution and copying).
6
Therefore, in time the existing copyright law will also need to be overhauled to adapt to the data
revolution.
TRADE SECRETS
Secrecy and know-how protection can be a very valuable asset of businesses. The most classic
example is of course the secret formula of Coca-Cola. It's not actually protected by a formal
Intellectual Property Right (anyone is free to copy cooking recipes), but it has significant
business value, and it is protected by other legal instruments. Typically, contract law, with
confidentiality agreements, will play a big role in protecting business secrets and know-how, and
most legal systems allow businesses to bring legal claims against competitors, business partners
or employees who disclose or use secret information in unauthorized ways. Businesses that open
up their data are more likely to retrieve value from those data, and those that do, will retrieve
more value from the data that is most open and accessible. These developments will change
habits within businesses, which will be pushed by market forces and the need to be more
efficient, to open up more and more data sets and data sources. Inevitably, this will clash with
strategies to keep information secret.
From an IP Strategy point of view, this means that understanding and selecting those intangible
assets that have more value as a secret than as an open, accessible intangible asset will become
more difficult, but, arguably, also more important. On the other hand, businesses that reject the
knee-jerk reaction to keep as much as possible hidden or secret, may find that they evolve faster
and generate more new business opportunities. It is not a coincidence that Open Innovation has
become such a tremendous success. Big Data is likely to reinforce that evolution.
7
GDPR AND CCPA
5
Commission Regulation 2016/679, (2016) O.J. (L 119) 1
6
GDPR Is an Evolution in Data Protection, Not a Burdensome Revolution, Info. Commissioner’s Off. (Aug. 25,
2017), https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2017/08/blog-gdpr-is-an-evolution-in-data-
protection-not-a-burdensome-revolution/.
7
GDPR, supra, Article 4
8
The types of data considered personal under the existing legislation include name, address, and
photos. GDPR extends the definition of personal data so that something like an IP address can be
personal data. It also includes sensitive personal data such as genetic data, and biometric data
which could be processed to uniquely identify an individual8.
8
European Data Prot. Bd., Statement of the EDPB on the Revision of the ePrivacy Regulation and Its Impact on the
Protection of Individuals with Regard to the Privacy and Confidentiality of their Communications (May 25, 2018)
9
discriminated against based on their choice to exercise their rights). Failure to comply with the
CCPA can result in fines for businesses of $7,500 per violation and $750 per affected user in
civil damages for businesses. The power to enforce the CCPA lies with the office of the Attorney
General of California.
Direct Dealings with Data Subjects – The GDPR also empowers data subjects directly with
greater control over the personal data that businesses hold on them; for example, the right of
access under Article 15 entitles individual data subjects to obtain on request a copy of all the
personal data a data controller has collected about them. In the United Kingdom, there has been
recent media coverage regarding a data subject access request (DSAR) made to Tinder by a
journalist writing for the Guardian, which returned a staggering 800 pages of data she had herself
provided in the course of subscribing to and using the matchmaking service. However, what her
DSAR did not reveal was the detail of how Tinder was using all that information to personalize
9
See ICANN Temporary Specification for gTLD Registration Data app. A, § 4.1 (2018
10
her user experience and identify potential matches. When she requested this information,
Tinder’s response was reportedly that its “matching tools are a core part of our technology and
intellectual property, and we are ultimately unable to share information about these proprietary
tools10.”
Data subjects are entitled to receive their personal data in a structured, commonly used, and
machine readable format on request. However, as above for DSARs, it is conceivable that the
compilation and organization of data presented in that format could attract copyright protection
or form part of the business’s confidential know-how, which it would clearly not want disclosed
to competitors. In fact, the scope of this right is limited by GDPR Article 20 to personal data
which that data subject has himself or herself provided to the data controller. It does not
therefore include the controller’s (possibly more valuable) inferred and derived data or any
know-how or intellectual property that the controller has used to process the raw data supplied
by the data subject, but it may be difficult in practice to separate the two.
10
Judith Duportail, I Asked Tinder for My Data. It Sent Me 800 Pages of My Deepest, Darkest Secrets, Guardian,
Sept. 26, 2017
11
INDIAN SCENARIO – THE PDP BILL
BACKGROUND
Right to privacy is a fundamental right under Article 21 of the Constitution of India, which lays
down our fundamental rights. This was affirmed by a nine-judge bench of the Supreme Court in
Justice K.S. Puttaswamy vs Union of India11 in its historic judgment dated 24th August 2017
wherein they declared ‘the right to privacy’ as an integral part of Part III of the Constitution of
Constitution of India. It was important to establish right to privacy as a fundamental right
because of the rocky history of judicial interpretation on the matter. It had been recognized as a
right but not as a fundamental right before the Puttaswamy case wherein the broad interpretation
by the Supreme Court led to a stream of initiatives by the government towards Personal Data
Protection laws.
12
sensitive data in case of negligence and the punishment for the same. However, the scope and
coverage of the IT Act and Rules are limited. Majority of the provisions only apply to ‘sensitive
personal data and information’ collected through ‘computer resource’. The provisions are
restricted to corporate entities undertaking the automated processing of data and consumers are
only able to take enforcement action in relation to a small subset of the provisions. There is no
provision which was the major concern and reason for the government entities dealing in data in
India.
13
CONCLUSION
That traditional view of data and its use is based on making data and information artificially
scarce, and trying to charge for it. Intellectual Property Rights are the most obvious ways of
making non-rivalrous commodities such as ideas, technology and data artificially scarce. Yet, as
an inescapable consequence of the exponential growth of Big Data, that approach is now at risk
of causing more damage to businesses, rather than providing benefits. Big Data is like a river
system. The value of Big Data is not in its many sources, but in gaining access to the flow, and
using it for the strategic purposes of your business.
A traditional IP Strategy, focusing on ownership, is in our analogy akin to focusing on claiming
land a couple of miles from the river. It is looking in the wrong direction, and misses most of the
value of Big Data. While some ownership of a bit of river banks (the algorithms) may have
value, our Big Data River is more complex than a simple estuary it is like the Delta of the Nile -
overflowing regularly, where riverbanks and plots of land all of a sudden disappear or get
flooded. And a new Delta comes into existence every 18 months. Therefore, as a conclusion, IP
Strategies around Big Data should focus on the instruments to access and use the flow of data,
rather than using outdated models of artificial scarcity that will be overtaken by the exponential
growth of Big Data
14
REFERENCES
15
16