The Introduction to the Trade Secret Management System Standard

The Introduction to the Trade Secret Management System Standard

2024/02/06

The “Trade Secret Management System”, released by the Science & Technology Law Institute of Institute for Information Industry on March 1, 2023, is a standard to guide organizations developing a systematic trade secret management system in alignment with relevant regulations and their operation objectives. Its aim is to assist the organizations reducing the risks of trade secret leakage while improving organizational competitive advantages.

 

The Trade Secret Management System standard provides a framework for organizations to design, implement, and continuously improve their trade secret management performance. As defined in Article 2 of the Trade Secrets Act, "trade secret" could be any method, technique, process, formula, program, design, or other information that may be used in the course of production, sales, or operations, meeting following requirements:

 

1. It is not known to persons generally involved in the information of this type;
2. It has economic value, actual or potential, due to its secretive nature; and
3. Its owner has taken reasonable measures to maintain its secrecy.

 

The Trade Secret Management System standard comprises a total of 10 chapters. The following is a brief overview of each chapter:

 

Chapter 1: This chapter indicates the standard is applicable to all organizations regardless of their types, sizes, and the products or services they provide. It mentions that the organization can determine their management approached to meet the requirements of the standard.

Chapter 2: This chapter provides the definitions of specific terms used in the standard.

Chapter 3: This chapter introduces the top management’s responsibility to ensure the establishment, continuous appropriateness, completeness, and effectiveness of the trade secret management system.

Chapter 4: This chapter requires the organization to define the scope of its trade secrets and ensure the defined trade secrets can be identified. This chapter also requires organization set up the permission to restrict access to personnel who need to know or use the trade secrets.

Chapter 5: This chapter introduces the organization shall control the use of trade secrets, including actions such as copying, destruction, etc. Additionally, organization shall preserve the records of the aforementioned use of trade secrets and detect if any abnormal usage exists.

Chapter 6: This chapter discusses measures the organization shall take for internal personnel control. These measures include regular training on trade secret-related requirements, signing of confidentiality agreements, and various management actions the organization should take throughout the processes of personnel recruitment, employment, and departure.

Chapter 7: This chapter demonstrates the organization’s management of environments, equipment and internet involving its trade secrets. It requires the implementation of access control measures for places where trade secrets are stored or processed. It also stipulates controls on the use of record media and devices which can access trade secrets, as well as controlling the transmission of trade secrets via network.

Chapter 8: This chapter introduces the management measures the organization shall take when interacting with other parties. These measures include signing non-disclosure agreement (NDAs) with the party who will access trade secrets and requiring such party not to hold the trade secrets once the corporation ends.

Chapter 9: This chapter introduces that the organization shall establish a trade secret dispute resolution procedure to prevent or mitigate damages to the organization caused by disputes.

Chapter10: This chapter outlines the supervision and the improvement of the trade secret management system of the organization.

 

Organizations can follow the standard to build their own trade secret management system based on the Plan-Do-Check-Act (PDCA) concept. The trade secret management system would include defining trade secrets to be managed, establishing protocols for the use of trade secrets, managing employees, controlling of internet, devices and environment related to trade secrets, regulating external activities, developing trade secret dispute resolution procedure, and regularly monitoring the effectiveness to improve trade secret management performance. This standard could serve as a benchmark for the organization or third parties to evaluate compliance with expected trade secret managements.

※The Introduction to the Trade Secret Management System Standard,STLI, https://stli.iii.org.tw/en/article-detail.aspx?no=105&tp=2&i=171&d=9123 (Date:2024/04/28)
Quote this paper
You may be interested
Recent Federal Decisions and Emerging Trends in U.S. Defend Trade Secrets Act Litigation

I. Introduction   The enactment of the Defend Trade Secrets Act of 2016[1] (the “DTSA”) marks a milestone in the recent development of trade secret law in the United States (“U.S.”).[2] Recent federal decisions and emerging trends in DTSA litigation regarding the following issues deserve the attention of Taiwanese companies who might be involved in DTSA litigation in U.S. federal courts (“federal courts”): (1) whether the DTSA displaces any other civil remedies provided by the existing trade secret laws; (2) whether a plaintiff should pay attention to any pleading standard when bringing a DTSA claim in federal court; (3) whether a federal court will easily grant an ex parte application for seizure order under the DTSA (an “ex parte seizure order”); and (4) whether the DTSA applies to trade secret misappropriations that occurred before the DTSA came into effect. This article provides insights into these developments and trends, and concludes with their implications at the end. II. The DTSA does not displace any other civil remedies provided by the existing trade secret laws, and federal courts may nonetheless turn to pre-DTSA laws and decisions for guidance   The DTSA states that it does not “preempt” or “displace” any other civil remedies provided by other federal and state laws for trade secret misappropriation.[3] Prior to the enactment of the DTSA, the civil protection and remedies of trade secrets in the U.S. have traditionally been provided under state laws.[4] The DTSA provides federal courts with original jurisdiction[5] over civil actions brought under the DTSA, giving trade secret owners an option to litigate trade secret claims in federal courts.[6] As a result, the DTSA adds a layer of protection for trade secrets and creates a federal path for plaintiffs to pursue civil remedies.[7]   Some commentators point out that federal courts, when hearing DTSA claims, construing DTSA provisions or analyzing DTSA claims, oftentimes turn to state laws and decisions existing prior to the enactment of the DTSA for guidance.[8] Various decisions show that federal courts tend to look to local state laws and pre-DTSA decisions when hearing DTSA claims or making decisions.[9] This suggests that pre-DTSA trade secret laws and prior decisions remain an indispensable reference for federal courts. III. A plaintiff should pay careful attention to the plausibility pleading standard when bringing a DTSA claim in federal court   A plaintiff's pleading in his complaint must satisfy the plausibility pleading standard when the plaintiff brings a DTSA claim in federal court.[10] Otherwise, the plaintiff's complaint may be dismissed by the federal court.[11] Filing a motion requesting dismissal of the plaintiff's complaint[12] on the grounds of the plaintiff's failure of stating plausible claims for relief is thus a defense that a defendant may employ to defeat the plaintiff's claim in the early stage.[13]   The DTSA opens the door of federal courts to trade secret plaintiffs to pursue civil remedies,[14] but the DTSA does not “guarantee unfettered access to the federal courts.”[15] When filing a DTSA lawsuit in federal court, a plaintiff must state “the grounds for the court's jurisdiction,” the plaintiff's claims (entitlement to relief), and the plaintiff's “demand for the relief sought” in his complaint.[16] The claim and statement pled by the plaintiff in his complaint must meet the “plausibility” threshold.[17] In other words, at the pleading stage, a plaintiff should plead facts sufficiently demonstrating that all prerequisites of his claim (e.g., jurisdiction and venue,[18] elements of a claim required by the DTSA,[19] etc.) are satisfied when bringing a DTSA claim in federal court.[20] For instance, in addition to claiming the existence of his trade secret, a plaintiff should state how his trade secret was misappropriated through improper means.[21] However, in the context of trade secrets, the plausibility pleading standard can be challenging to a plaintiff because it is never easy to balance between “satisfying the required pleading standard” and “avoiding disclosing too much information about the trade secret in a pleading.”[22]   Let's take pleading the existence of a trade secret as an example. Under the plausibility pleading regime, a plaintiff is required to plead all relevant facts of trade secret (elements)[23] defined by the DTSA to affirmatively prove the existence of his trade secret.[24] In other words, a plaintiff needs to state sufficient facts indicating that the information in dispute has economic value while not being known to the public, and reasonable steps have been taken to maintain the secrecy of that information,[25] all of which plausibly suggest that the information in dispute qualifies as a trade secret.[26] Federal courts do not require a plaintiff to disclose his trade secret in detail in his complaint.[27] Nevertheless, a plaintiff should be able to provide the “general contour” of the alleged trade secret that he seeks to protect.[28] Federal courts would be reluctant to see that a plaintiff, merely “identify[ing] a kind of technology” or “point[ing] to broad areas of technology,” or barely asserting that the misappropriated information is confidential, then “invit[ing] the court to hunt through the details in search of items meeting the statutory definition.”[29] Instead of simply alleging that the subject matter at issue involves a trade secret, a plaintiff's complaint should contain descriptions identifying the plaintiff's trade secret.[30] For instance, in his pleading, a plaintiff has to tell what information is involved and what efforts have been made to maintain the confidentiality of such information.[31] For further example, a plaintiff should provide documents or information constituting the alleged trade secret rather than merely listing general topics or categories of information.[32] IV. Obtaining a DTSA ex parte seizure order is challenging as federal courts tend to take a conservative approach to prevent abuse of this ex parte seizure remedy   Since the DTSA came into effect, federal courts rarely grant an ex parte application for seizure order under the DTSA.[33] The provision for ex parte seizure orders is a controversial part of the DTSA[34] as it allows a court, upon ex parte application and if all DTSA requirements are met, to issue a civil order “for the seizure of property necessary to prevent the propagation or dissemination of the trade secret.”[35] So far federal courts have been hesitant to order DTSA ex parte seizures and are giving great deference to the statutory text of the DTSA seizure order provision.[36] Only when a federal court finds it “clearly appears from specific facts” that certain requirements are met[37] and only in “extraordinary circumstances”[38] may a federal court issue an ex parte seizure order.[39] When being confronted with an ex parte application for seizure order under the DTSA, federal courts tend to favor a conservative approach to prevent the abuse of this ex parte seizure remedy.[40] If any alternative equitable relief is available to achieve the same purpose, federal courts will likely find it unnecessary to issue an ex parte seizure order.[41] In addition, a plaintiff's mere assertion that the defendant, if given notice, would destroy evidence or evade a court order, but without showing that the defendant “had concealed evidence or disregarded court orders in the past,” will likely be insufficient to persuade the court to issue an ex parte seizure order.[42] Furthermore, federal courts will decline to order an ex parte seizure if a plaintiff fails to meet his burden demonstrating that the information in dispute constitutes a trade secret.[43] All of the foregoing suggests that one will likely face an uphill struggle in federal court when seeking to obtain an ex parte seizure order under the DTSA.[44]   Though federal courts sparingly order DTSA ex parte seizures, to date at least one federal court did issue a published DTSA ex parte seizure order, which appeared in Mission Capital Advisors, LLC v. Romaka.[45] In Romaka, the defendant allegedly downloaded the plaintiff's client and contact lists to the defendant's personal computer without the plaintiff's authorization; the plaintiff filed an ex parte motion seeking to seize some properties containing the plaintiff's trade secrets or enjoin the defendant from disclosing that information.[46] During the trial, the defendant neither acknowledged receipt of the court's prior orders[47] nor appeared before the court as ordered,[48] all of which together with other facts in Romaka convinced the court that other forms of equitable relief would be inadequate and the defendant would likely evade or otherwise disobey the court order.[49] After reviewing the facts of this case along with DTSA requirements item by item, the Romaka court found it clearly appears from specific facts that all requirements for an ex parte seizure order under the DTSA are met,[50] and thus, issued a said seizure order as requested by the plaintiff.[51] Romaka gives us some hints about what circumstances would cause a federal court to order a DTSA ex parte seizure.[52] This case tells us that evading or disregarding court-mandated actions is likely demonstrating to the court a propensity to disobey a future court order and may probably increase the likelihood of meriting a DTSA ex parte seizure order.[53] Moreover, echoing other decisions rendered by federal courts, Romaka reveals that federal courts tend to approach ex parte seizure order applications in a gingerly way.[54]   Federal courts take a conservative approach toward ex parte seizure order to curtail abuse of such order[55] does not mean that no injunctive relief is available to victims of trade secret misappropriation. Injunctive relief provided by other federal laws or state laws[56] is nonetheless available to those victims.[57] As long as the facts of the case before the court meet all elements required for injunctive relief, it is not rare for federal courts to grant injunctive relief other than an ex parte seizure order.[58] V. The DTSA might apply to a pre-DTSA trade secret misappropriation that continues after the DTSA became effective   The DTSA expressly states that it applies to any trade secret misappropriation that “occurs on or after the date of the enactment” of the DTSA.[59] Therefore, the DTSA does not apply to trade secret misappropriations that began and ended before the effective date of DTSA.[60] In practice, it is possible that a federal court will dismiss a plaintiff's DTSA claim if the plaintiff fails to state that the alleged trade secret misappropriations (either in whole or in part) took place after the DTSA came into effect.[61]   Federal courts have begun addressing or recognizing that the DTSA might apply to trade secret misappropriations that occurred prior to and continued after the enactment date of the DTSA.[62] However, a plaintiff should “plausibly” and “sufficiently” plead in his claim that some parts of the alleged continuing misappropriation of trade secrets occurred after the DTSA became effective.[63] Some critics opine that, in the case of a continuing trade secret misappropriation that took place before and continued after the DTSA was enacted, the available recovery shall be limited to “post-DTSA misappropriation.”[64]   By being mindful of the foregoing, maybe someday a plaintiff will bring a DTSA claim for a pre-DTSA misappropriation of trade secrets that continues after the DTSA is in effect.[65] In this kind of litigation, one should pay attention to whether the plaintiff has plausibly and sufficiently alleged the part of misappropriation that occurred after the enactment date of the DTSA.[66] When a plaintiff fails to plausibly and sufficiently alleges the post-DTSA misappropriation part, the defendant stands a chance to convince the court to dismiss the plaintiff's claim.[67] VI. Conclusion   To sum up, recent federal decisions and emerging trends in DTSA litigation provide the following implications to Taiwanese companies who might be involved in DTSA litigation in federal court: 1. The DTSA does not preempt or displace any other civil remedies provided by other federal laws and state laws.[68] Rather, the DTSA adds a layer of protection for trade secrets and creates a federal path for plaintiffs to pursue civil remedies.[69] Federal courts tend to turn to local state laws and pre-DTSA decisions for guidance when hearing DTSA claims or making decisions.[70] Do not ignore pre-DTSA trade secret laws or prior decisions as they remain an indispensable reference for federal court. 2. A plaintiff's pleading must satisfy the plausibility pleading standard when the plaintiff brings a DTSA claim in federal court.[71] Whether the plaintiff's pleading satisfies the plausibility pleading standard is likely one of the hard-fought battles between the parties in the early stage of the litigation. The plausibility pleading regime does not require a plaintiff to disclose his trade secrets in detail in his complaint.[72] However, a plaintiff should be able to describe and identify his trade secrets.[73] 3. Seeking to secure a DTSA ex parte seizure order in federal court will likely face an uphill battle.[74] Obtaining alternative injunctive relief would be easier than obtaining a DTSA ex parte seizure. When being confronted with an ex parte application for seizure order under the DTSA, federal courts tend to favor a conservative approach to prevent the abuse of this ex parte seizure remedy.[75] Notwithstanding the foregoing, as long as the facts of the case before the court meet all elements required for injunctive relief, it is not rare for federal courts to grant injunctive relief other than an ex parte seizure order.[76] 4. The DTSA might apply to trade secret misappropriations that occurred prior to and continued after the enactment date of the DTSA.[77] When a DTSA litigation involves this kind of continuing misappropriation, one of those hard-fought battles between the parties during litigation will likely be whether the plaintiff has plausibly and sufficiently stated the part of misappropriation that occurred after the DTSA came into effect.[78] When a plaintiff fails to plausibly and sufficiently alleges the post-DTSA misappropriation part, the defendant stands a chance to convince the court to dismiss the plaintiff's claim.[79] [1] The Defend Trade Secrets Act of 2016, Pub. L. No. 114-153, 130 Stat. 376 (May 11, 2016) (mostly codified in scattered sections of 18 U.S.C. §§1836-1839 [hereinafter the “DTSA”]. [2] Mark L. Krotoski, Greta L. Burkholder, Jenny Harrison & Corey R. Houmand, The Landmark Defend Trade Secrets Act of 2016, at 3 (May 2016); Bradford K. Newman, Jessica Mendelson & MiRi Song, The Defend Trade Secret Act: One Year Later, 2017-Apr Bus. L. Today 1, 1 (2017). [3] 18 U.S.C. §1838. [4] S. Rep. No. 114-220, at 2 (2016) [hereinafter “S. Rep.”]; Kaylee Beauchamp, The Failures of Federalizing Trade Secrets: Why the Defend Trade Secrets Act of 2016 Should Preempt State Law, 86 Miss. L.J. 1031, 1033, 1045 (2017); Zoe Argento, Killing the Golden Goose: The Dangers of Strengthening Domestic Trade Secret Rights in Response to Cyber-Misappropriation, 16 Yale J. L. & Tech. 172, 177 (2014); James Pooley, The Myth of the Trade Secret Troll: Why the Defend Trade Secrets Act Improves the Protection of Commercial Information, 23 Geo. Mason L. Rev. 1045, 1045 (2016); John Conley, New Federal Trade Secret Act and Its Impact on Life Sciences, Genomics L. Rep. (Aug. 12, 2016), https://www.genomicslawreport.com/index.php/2016/08/12/new-federal-trade-secret-act-and-its-impact-on-life-sciences/; Newman, Mendelson & Song, supra note 2, at 1. [5] 18 U.S.C. §1836(c). [6] Krotoski, Burkholder, Harrison & Houmand, supra note 2, at 7; Beauchamp, supra note 4, at 1033, 1045, 1072; Lily Li & Andrea W. Paris, Help! What Are My (Immediate) Defenses to a Federal Trade Secret Claim?, 58-Sep Orange County Law. 52, 52 (2016); Newman, Mendelson & Song, supra note 2, at 1. [7] Conley, supra note 4. [8] William M. Hensley, Post-Enactment Case Law Developments under the Defend Trade Secrets Act, 59-Jul Orange County Law. 42, 44 (2017); Robert B. Milligan & Daniel Joshua Salinas, Emerging Issues In the Defend Trade Secrets Act's Second Year, Seyfarth Shaw LLP: Trading Secrets (June 14, 2017), https://www.tradesecretslaw.com/2017/06/articles/dtsa/emerging-issues-in-the-defend-trade-secrets-acts-second-year/; Jeffrey S. Boxer, John M. Griem, Jr., Alexander G. Malyshev & Dylan L. Ruffi, The Defend Trade Secrets Act – 2016 In Review, Carter Ledyard & Milburn LLP (Jan. 19, 2017), http://www.clm.com/publication.cfm?ID=5579; Rajiv Dharnidharka, Andrew D. Day & Deborah E. McCrimmon, The Defend Trade Secrets Act One Year In – Four Things We've Learned, DLA Piper (May 30, 2017), https://www.dlapiper.com/en/us/insights/publications/2017/05/defend-trade-secrets-act-four-things-learned/; Joshua R. Rich, The DTSA After One Year: Has the Federal Trade Secrets Law Met Expectations?, McDonnell Boehnen Hulbert & Berghoff LLP, Vol. 15 Issue 3 Snippets 6, 7 (Summer 2017). [9] HealthBanc International, LLC v. Synergy Worldwide, 208 F.Supp.3d 1193, 1201 (D.Utah 2016); Phyllis Schlafly Revocable Trust v. Cori, No. 4:16CV01631 JAR, 2016 WL 6611133, at *2-5 (E.D. Mo. Nov. 9, 2016); Panera, LLC v. Nettles, No. 4:16-cv-1181-JAR, 2016 WL 4124114, at *4 fn.2 (E.D. Mo. Aug. 3, 2016); Henry Schein, Inc. v. Cook, 191 F.Supp.3d 1072, 1077, 1079-1080 (N.D.Cal. 2016); Engility Corp. v. Daniels, No. 16-cv-2473-WJM-MEH, 2016 WL 7034976, at *8-10 (D. Colo. Dec. 2, 2016); M.C. Dean, Inc. v. City of Miami Beach, Florida, 199 F. Supp. 3d 1349, 1353-1357 (S.D. Fla. 2016); GTO Access Systems, LLC v. Ghost Controls, LLC, No. 4:16cv355-WS/CAS, 2016 WL 4059706, at *1 fn.1, *2-4 (N.D. Fla. June 20, 2016); Earthbound Corp. v. MiTek USA, Inc., No. C16-1150 RSM, 2016 WL 4418013, at *9-10 (W.D. Wash. Aug. 19, 2016); Kuryakyn Holdings, LLC v. Ciro, LLC, 242 F.Supp.3d 789, 797-800 (W.D. Wisc. 2017). [10] Michelle Evans, Plausibility under the Defend Trade Secrets Act, 16 J. Marshall Rev. Intell. Prop. L. 188, 190 (2017); Eric J. Fues, Maximilienne Giannelli & Jon T. Self, Practice Tips for the Trade Secret Holder: Preparing a Complaint Under the Defend Trade Secrets Act, Inside Counsel (June 14, 2017), https://www.finnegan.com/en/insights/practice-tips-for-the-trade-secret-holder-preparing-a-complaint.html; David R. Fertig & Michael A. Betts, The Defend Trade Secrets Act: Jurisdictional Considerations—Part I, 29 No. 7 Intell. Prop. & Tech. L.J. 3, 3-5 (2017) [hereinafter “Considerations—Part I”]. [11] M.C. Dean, 199 F. Supp. 3d at 1357; Chatterplug, Inc. v. Digital Intent, LLC, No. 1:16-cv-4056, 2016 WL 6395409, at *3 (N.D. Ill. Oct. 28, 2016); Raben Tire Co. v. McFarland, No. 5:16-CV-00141-TBR, 2017 WL 741569, at *2-3 (W.D. Ky. Feb. 24, 2017). [12] Fed. R. Civ. P. 12(b). [13] Jessica Engler, The Defend Trade Secrets Act at Year One, 12 No. 4 In-House Def. Q. 20, 22 (2017). [14] Conley, supra note 4. [15] Fertig & Betts, Considerations—Part I, supra note 10, at 3. [16] Pleading the grounds for the court's jurisdiction, the plaintiff's claim (entitlement to relief), and the plaintiff's demand for the relief sought are requirements for the pleading under Article 8 of the Federal Rules of Civil Procedure (the “FRCP”). Fed. R. Civ. P. 8(a). The FRCP applies to “all civil actions and proceedings in the United States district courts.” Fed. R. Civ. P. 1. Thus, the FRCP requirements also apply to DTSA civil actions brought in federal courts. Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-4. [17] In Bell Atlantic Corporation v. Twombly, the U.S. Supreme Court interpreted Article 8(a) of the FRCP, introduced the concept of “plausibility pleading,” and established the plausibility pleading standard. Bell Atlantic Corporation v. Twombly, 550 U.S. 544, 547, 570 (2007). Under the plausibility pleading standard, a plaintiff is not required to provide “detailed factual allegations” in his complaint, but he needs to state the grounds of his claim (entitlement to relief), which should be “more than labels and conclusions.” Id. at 555, 570. At least, the plaintiff's complaint should contain enough facts showing that the plaintiff's claim is “plausible on its face.” Id. Two years after Twombly, in Ashcroft v. Iqbal the U.S. Supreme Court expressly affirmed that the plausibility pleading standard established in Twombly applies to “all civil actions.” Ashcroft v. Iqbal, 556 U.S. 662, 684 (2009). Accordingly, the plausibility pleading standard applies to all DTSA claims brought in federal courts. Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. It is worth mentioning that some commentators are of the opinion that federal pleading stands are often higher than those required under state laws. Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [18] Gold Medal Prods. Co. v. Bell Flavors & Fragrances, Inc., No. 1:16-CV-00365, 2017 WL 1365798, at *5-8 (S.D. Ohio, Apr. 14, 2017). See also Fertig & Betts, Considerations—Part I, supra note 10, at 4; David R. Fertig & Michael A. Betts, The Defend Trade Secrets Act: Jurisdictional Considerations—Part II, 29 No. 8 Intell. Prop. & Tech. L.J. 12, 12 (2017) [hereinafter “Considerations—Part II”]. [19] McFarland, 2017 WL 741569, at *2-3; M.C. Dean, 199 F. Supp. 3d at 1357; Digital Intent, 2016 WL 6395409, at *3. See also Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. [20] Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 5; Fertig & Betts, Considerations—Part II, supra note 18, at 13-14. [21] Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [22] Id. [23] 18 U.S.C. §1839(3). [24] McFarland, 2017 WL 741569, at *2. [25] Fues, Giannelli & Self, supra note 10. [26] Engler, supra note 13, at 21-22. Providing help in identifying the trade secret in question by requesting as much detail as possible is a common point shared by the plausibility pleading standard in the U.S., and the “Case Detail Explanation Form” (to be filled out by the complainant or the victim) attached to Article 6 of the “Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority” in Taiwan. However, they apply to different circumstances: 1. The plausibility pleading standard in the U.S. sets forth the threshold requirements to be met by a plaintiff in his pleading when the plaintiff brings a civil claim in federal court and applies to all federal civil actions. On the other hand, the aforementioned Case Detail Explanation Form in Taiwan is a form to be filled out by the complainant or the complainant's agent. This Form provides a reference to prosecutors for the investigation of major trade secret cases (criminal cases), but it does not serve as the basis for a prosecutor to determine whether to prosecute a case. 2. The plausibility pleading standard is not only followed by those bringing a federal civil action but also adopted by federal courts when hearing civil cases. Contrarily, the aforementioned Case Detail Explanation Form in Taiwan is provided to prosecutors as a reference for investigation. A prosecutor is not bound to prosecute a case simply based on the information provided in this Form. Likewise, this Form and the information provided therein are not binding on any court in Taiwan. A commentator noted that the Ministry of Justice in Taiwan referred to the “Prosecuting Intellectual Property Crimes (Manual)” of the U.S. Department of Justice when adopting the “Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority” on April 19, 2016. “Article 6 indicates that the complainant or the victim should first fill out the Case Detail Explanation Form, which would help the prosecution authority not only figures out whether the allegedly misappropriated trade secret meets the elements of secrecy, economic value, and secrecy measures under law, but also evaluates whether it is necessary to resort to compulsive measures”. Ti-Chu Chen (陳砥柱), Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority, Louis & Charles Attorneys at Law (遠東萬佳法律事務所) (July 14, 2016), http://www.louisilf.com/zh-tw/posts/2016-07-14 (last visited Dec. 31, 2017). See also Prosecuting Intellectual Property Crimes (Manual) (4th ed. 2013), available at: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/03/26/prosecuting_ip_crimes_manual_2013.pdf. However, the cover of the “Prosecuting Intellectual Property Crimes (Manual)” expressly states that its contents are provided as “internal suggestion to Department of Justice attorneys.” Id. Therefore, the contents of this manual theoretically are not binding on any federal court. [27] Mission Measurement Corp. v. Blackbaud, Inc, 216 F.Supp.3d 915, 921 (N.D.Ill. 2016). [28] Digital Intent, 2016 WL 6395409, at *3. [29] McFarland, 2017 WL 741569, at *2; Blackbaud, 216 F.Supp.3d at 921; Ciro, 242 F.Supp.3d at 798. [30] Evans, supra note 10, at 191. Some federal court decisions show that requesting the plaintiff to provide sufficient facts describing the trade secret in question is not something newly developed following the enactment of the DTSA. Rather, it has been the position held by federal courts before the DTSA came into effect. AWP, Inc. v. Commonwealth Excavating, Inc., Civil Action No. 5:13cv031., 2013 WL 3830500, at *5 (W.D. Va. July 24, 2013); Events Media Network, Inc. v. Weather Channel Interactive, Inc., Civil No. 1:13–03 (RBK/AMD), 2013 WL 3658823, at *3 (D. N.J. July 12, 2013); Council for Educational Travel, USA v. Czopek, Civil No. 1:11–CV–00672, 2011 WL 3882474, at *4 (M.D. Pa. Sept. 2, 2011); DLC DermaCare LLC v. Castillo, No. CV–10–333–PHX–DGC, 2010 WL 5148073, at *4 (D. Ariz. Dec. 14, 2010). [31] Blackbaud, 216 F.Supp.3d at 921. [32] Ciro, 242 F.Supp.3d at 800. [33] Engler, supra note 13, at 21; Hensley, supra note 8, at 44. [34] Hensley, supra note 8, at 44; Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Engler, supra note 13, at 20. [35] 18 U.S.C. §1836(b)(2)(A). [36] Newman, Mendelson & Song, supra note 2, at 3. [37] Under the DTSA, a court may, only in “extraordinary circumstances,” issue an ex parte seizure order when “find[ing] that it clearly appears from specific facts that”: (1) “an order issued pursuant to Rule 65 of the Federal Rules of Civil Procedure or another form of equitable relief would be inadequate to achieve the purpose of this paragraph because the party to which the order would be issued would evade, avoid, or otherwise not comply with such an order;” (2) “an immediate and irreparable injury will occur if such seizure order is not issued;” (3) “the harm to the applicant of denying the application outweighs the harm to the legitimate interests of the person against whom seizure would be ordered of granting the application and substantially outweighs the harm to any third parties who may be harmed by such seizure;” (4) “the applicant is likely to succeed in showing that the information is a trade secret and the person against whom seizure would be ordered misappropriated the trade secret of the applicant by improper means or conspired to use improper means to misappropriate the trade secret of the applicant;” (5) “the person against whom seizure would be ordered has actual possession of the trade secret and any property to be seized;” (6) “the application describes with reasonably particularity the matter to be seized and, to the extent reasonable under the circumstances, identifies the location where the matter is to be seized;” (7) “the person against whom seizure would be ordered, or persons acting in concert with such person would destroy, move, hide, or otherwise make such matter inaccessible to the court, if the applicant were to proceed on notice to such person;” and (8) “the applicant has not publicized the requested seizure”. 18 U.S.C. §1836(b)(2)(A)(ii). [38] 18 U.S.C. §1836(b)(2)(A)(i). [39] Engler, supra note 13, at 21; Michael T. Renaud & Nick Armington, DTSA and Ex Parte Seizure – Lessons from the First Ex Parte Seizure Under The DTSA, Mintz Levin Cohn Ferris Glovsky and Popeo PC (Aug. 21, 2017), https://www.globalipmatters.com/2017/08/21/dtsa-and-ex-parte-seizure-lessons-from-the-first-ex-parte-seizure-under-the-dtsa; Matthew Werdegar & Warren Braunig, One Year On: the Federal Defend Trade Secrets Act, Daily J. (Apr. 26, 2017), available at: https://www.keker.com/Templates/media/files/Articles/Keker%20(DJ-4_26_17).pdf. [40] Newman, Mendelson & Song, supra note 2, at 3; Dharnidharka, Day & McCrimmon, supra note 8; Werdegar & Braunig, supra note 39. [41] OOO Brunswick Rail Mgmt. v. Sultanov, No. 5:17-cv-00017, 2017 WL 67119, *2 (N.D. Cal., Jan. 6, 2017); Magnesita Refractories Company v. Mishra, CAUSE NO. 2:16-CV-524-PPS-JEM, 2017 WL 365619, at *2 (N.D. Ind. Jan. 25, 2017). [42] Baleriz Carribean Ltd. Corp. v. Calvo, Case 1:16-cv-23300-KMW, at 7 (S.D.Fla. Aug. 5, 2016). See also Renaud & Armington, supra note 39. A commentator opines that federal courts are reluctant to issue an ex parte seizure order against someone who has never concealed evidence or disregarded court orders before. Engler, supra note 13, at 21. [43] Digital Assurance Certification, LLC v. Pendolino, Case No: 6:17-cv-72-Orl-31TBS, at *1-2 (M.D.Fla. Jan. 23, 2017). [44] Engler, supra note 13, at 21; Dharnidharka, Day & McCrimmon, supra note 8. [45] Mission Capital Advisors, LLC v. Romaka, No. 16-cv-05878-LLS (S.D.N.Y. July 29, 2016). Some commentators consider Romaka the very first case in which a federal court ordered a DTSA ex parte seizure after the DTSA became effective. Renaud & Armington, supra note 39. [46] Romaka, No. 16-cv-05878-LLS, at 1-3. [47] Id. at 2. [48] Id. [49] Id. [50] In Romaka, the federal district court found the followings after reviewing the facts of this case along with the requirements under the DTSA: (1) “[a]n order issued pursuant to Rule 65 of the Federal Rules of Civil Procedure or another form of equitable relief would be inadequate because [the defendant] would evade, avoid, or otherwise not comply with such an order;” (2) “[a]n immediate and irreparable injury to [the plaintiff] would occur if such seizure is not ordered;” (3) “[t]he harm to [the plaintiff] of denying the application outweighs the harm to the legitimate interests of [the defendant];” (4) “[the plaintiff] is likely to succeed in showing that the information at issue is a trade secret based on [the plaintiff's] averments;” (5) “[the plaintiff] is likely to succeed in showing that [the defendant] has misappropriated [the plaintiff's trade secret] by improper means;” (6) “[the plaintiff] is likely to succeed in showing that the [defendant] has actual possession of the [plaintiff's trade secrets]; (7) “[d]espit the risk that [the defendant] would make the [plaintiff's trade secret] inaccessible to the court, or retain unauthorized copies, [the plaintiff] is proceeding on notice;” and (8) “[the plaintiff] is likely to succeed in showing, and has represented, that it has not publicized the requested seizure.” Id. at 2-4. [51] Id. at 4. In Romaka, the plaintiff also applied for the seizure of its proprietary information other than its client and contact lists. However, the Romaka court denied the plaintiff's request for the seizure of other proprietary information because the plaintiff failed to describe “with sufficient particularity” such information and related facts, such as “confidentiality and irreparable harm.” Id. [52] Renaud & Armington, supra note 39. [53] Id. [54] Newman, Mendelson & Song, supra note 2, at 3; Engler, supra note 13, at 21; Renaud & Armington, supra note 39. [55] Newman, Mendelson & Song, supra note 2, at 3. [56] For instance, the injunctive remedies available under the DTSA. 18 U.S.C. §1836(b)(3). For further example, a preliminary injunction or a temporary restraining order available under the FRCP. Fed. R. Civ. P. 65(a), (b). [57] As stated above, the DTSA does not preempt or displace any other remedies provided by other federal laws and state laws for trade secret misappropriation. 18 U.S.C. §1838. [58] Cook, 191 F.Supp.3d at 1077, 1076-1077, 1079; Daniels, 2016 WL 7034976, at *10-11, 14; Nettles, 2016 WL 4124114, at *4. See also Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [59] DTSA §2(e), Pub. L. No. 114-153, 130 Stat. 376, 381-382. [60] Werdegar & Braunig, supra note 39; Krotoski, Burkholder, Harrison & Houmand, supra note 2, at 14; Engler, supra note 13, at 21. [61] Avago Technologies U.S. Inc. v. Nanoprecision Products, Inc., Case No. 16-cv-03737-JCS, 2017 WL 412524, at *9 (N.D.Cal. Jan. 31, 2017); Cave Consulting Group, Inc. v. Truven Health Analytics Inc., Case No. 15-cv-02177-SI, 2017 WL 1436044, at *5 (N.D. Cal. Apr. 24, 2017); Physician's Surrogacy, Inc. v. German, Case No.: 17CV0718-MMA (WVG), 2017 WL 3622329, at *8-9 (S.D. Cal. Aug. 23, 2017). See also Tara C. Clancy, April Boyer & Michael R. Creta, Emerging Trends in Defend Trade Secrets Act Litigation, National Law Review (Sept. 26, 2017), https://www.natlawreview.com/article/emerging-trends-defend-trade-secrets-act-litigation; Milligan & Salinas, supra note 8. [62] Cook, 191 F.Supp.3d at 1076-1079; Allstate Insurance Company v. Rote, No. 3:16-cv-01432-HZ, 2016 WL 4191015, at *1-5 (D. Or. Aug. 7, 2016); Syntel Sterling Best Shores Mauritius Limited v. Trizetto Group, Inc., 15-CV-211 (LGS) (RLE), 2016 WL 5338550, at *6 (S.D.N.Y. Sept. 23, 2016); Adams Arms, LLC v. Unified Weapon Systems, Inc., Case No. 8:16-cv-1503-T-33AEP, 2016 WL 5391394, at *6 (M.D. Fla. Sept. 27, 2016); Brand Energy & Infrastructure Services, Inc. v. Irex Contracting Group, CIVIL ACTION NO. 16-2499, 2017 WL 1105648, at *3-8 (E.D. Pa. Mar. 24, 2017); Sleekez, LLC v. Horton, CV 16–09–BLG–SPW–TJC, 2017 WL 1906957, at *5-6 (D. Mont. Apr. 21, 2017). See also Rich, supra note 8, at 8. [63] Unified Weapon Systems, 2016 WL 5391394, at *6; Horton, 2017 WL 1906957, at *5-6. See also Milligan & Salinas, supra note 8; Werdegar & Braunig, supra note 39. A recent federal court decision reveals that federal courts will likely dismiss a DTSA claim if a plaintiff makes no specific allegations other than a “conclusory allegation” of the continuing trade secret misappropriation. Hydrogen Master Rights, Ltd. v. Weston, 228 F.Supp.3d 320, 338 (D.Del. 2017). See also Engler, supra note 13, at 23. [64] Unified Weapon Systems, 2016 WL 5391394, at *6. See also Rich, supra note 8, at 8. [65] Engler, supra note 13, at 23. [66] Milligan & Salinas, supra note 8. [67] Engler, supra note 13, at 23. [68] 18 U.S.C. § 1838. [69] Conley, supra note 4. [70] Synergy Worldwide, 208 F.Supp.3d at 1201; Cori, 2016 WL 6611133, at *2-5; Nettles, 2016 WL 4124114, at *4 fn.2; Cook, 191 F.Supp.3d at 1077, 1079-1080; Daniels, 2016 WL 7034976, at *8-10; M.C. Dean, 199 F. Supp. 3d at 1353-1357; Ghost Controls, 2016 WL 4059706, at *1 fn.1, *2-4; MiTek USA, 2016 WL 4418013, at *9-10; Ciro, 242 F.Supp.3d at 797-800. [71] Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. [72] Blackbaud, 216 F.Supp.3d at 921. [73] Digital Intent, 2016 WL 6395409, at *3. See also Evans, supra note 10, at 191. [74] Engler, supra note 13, at 21; Dharnidharka, Day & McCrimmon, supra note 8. [75] Sultanov, 2017 WL 67119, at *2; Mishra, 2017 WL 365619, at *2; Calvo, Case 1:16-cv-23300-KMW, at 7; Pendolino, 2017 WL 320830, at *1-2. See also Newman, Mendelson & Song, supra note 2, at 3; Engler, supra note 13, at 21; Renaud & Armington, supra note 39; Werdegar & Braunig, supra note 39. [76] Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [77] Cook, 191 F.Supp.3d at 1076-1079; Rote, 2016 WL 4191015, at *1-5; Trizetto Group, 2016 WL 5338550, at *6; Unified Weapon Systems, 2016 WL 5391394, at *6; Irex Contracting Group, 2017 WL 1105648, at *3-8; Horton, 2017 WL 1906957, at *5-6. See also Rich, supra note 8, at 8. [78] Milligan & Salinas, supra note 8. [79] Engler, supra note 13, at 23.

Introduction to Essential Data Governance and Management System(EDGS)

Introduction to Essential Data Governance and Management System(EDGS) 2022/12/30 I. Background   Along with organizations face the industrial, social and economic level of Digital Transformation trend brought by the development of emerging technology or the occurrences of disasters or emergencies(such as COVID-19), and so on. Inducing the increasing demand for transformation of digital governance and management. Including the board of directors and the top managements’ decision making, supervision to internal audit, internal control etc. It is necessary to establish and implement the digitized management measure of content or process step by step. Strengthening the reality, integrity and full disclosure of data, in order to improve the efficiency of organizational decision making, execution, supervision and management.   Although implementing the digitization process, brings convenience and efficacy to the organization, accompanied by risks. Digital data has characters of being easy to modify and spread. This often results in difficulty for the original version owner in proving the originator’s identity and then impacts rights protect. Additionally, when cooperating with others, the organizations may provide essential digital data to others, or receive others’ essential digital data. When data breaches or controversies occur, it is required to have measures assisting in the identification or prove the origin of the data. In order to delineate the responsibilities and enhance mutual trust.   Essential Data Governance and Management System(hereinafter referred to as, EDGS) is a management model which is to be introduced at the discretion of each organization. Looking forward to improve the degree of the ability in organizations’ digital and governance level progressively. Starting to improve the protected process of the digital data in the first place, reinforcing the long-term preservation of validity of the essential digital data. In order to guarantee the evidence capacity and reinforce the probative value by the time litigations has been instituted or the related competent authority investigates. II. Setting Objectives   The purpose of EDGS is to help organizations consolidate with existing internal auditing, internal control or other management process and then implement tweaks that establish an organizations’ essential data governance and management system that meets the requirements of EDGS. In order to attain the following benefits(as shown in Figure 1 below): a. Improve the digitalization level of governance and management in internal control, internal auditing or surveillance. b. Improve organizations’ cooperation, trust and the chance of digital transformation. c. Reinforce organizations to identify and manage the self-generated, provided or received external digital data. d. Reinforce organizations’ validity of evidence presented in litigation or the inspection certification of competent authority. Figure 1: Setting Objectives of EDGS III. Scope of Application   EDGS is designed to be applicable to all organizations, regardless of their type, size, and the products or services they provide. In addition, the requirement of EDGS are centered on the organizations’ essential data governance and management system process (as shown in Figure 2 below). The so-called organizations’ essential data governance and management system process refers to from the digital data process of generation, protection and maintenance to the digital evidence preservation information process of acquisition, maintenance and verification by setting management objectives in accordance with the management policies established by the organization. Figure 2: The Conceptual Flow Chart for the Organizations’ Essential Digital Data Governance and Management System Process IV. Process of Application   EDGS encourages organizations to link and reinforce the existing “process management” approach and “PDCA management” cycle(as shown in Figure 3 below) in developing, implementing and improving their essential data governance and management system. Figure 3: The “PDCA management” Cycle of EDGS V. Table of Contents   Chapters 0 to 4 of EDGS are the description of the system structure, scope of application, definition of terms and consideration factors; Chapters 5 to 10 are important management items. 0. Introduction  0.1. General Description  0.2. Target  0.3. Process Management  0.4. Management Cycle  0.5. Setting Objectives  0.6. Compatibility with other management systems 1. Scope of Application 2. Version Marking 3. Definition of Terms  3.1 Organization  3.2 Digital record  3.3 Identification Technology  3.4 Metadata  3.5 Hash Function  3.6 Hash Value  3.7 Time-Stamp 4. Organization Environment  4.1 Internal and External Issues  4.2 Stakeholders 5. Management Responsibility of Digital Governance and Management  5.1 Management Commitment  5.2 Management Policy  5.3 Management Objective Planning  5.4 Management Accountability and Communication 6. System Planning  6.1 Basic Requirements  6.2 Response to Risks and Opportunities  6.3 Change Planning 7. Support  7.1 Resources  7.2 Personnel  7.3 Equipment or System Environment  7.4 Communication Channels 8. Practice Process of Essential Digital Data Governance and Management  8.1 Generation, Maintenance and Protection of Digital Data  8.2 Acquisition, Maintenance and Verification of Digital Evidence Preservation Information 9 Performance Evaluation  9.1 Basic Requirements  9.2 Data Analysis  9.3 Internal Audit  9.4 Management Review 10 Improvement For the full text of the EDGS(Chinese Version), please refer to: https://stli.iii.org.tw/publish-detail.aspx?d=7198&no=58

Korea “Strategies for an Intellectual Property Powerhouse to Realize a Creative Economy” Overview

Background Since 1990, many countries like United States, Japan and EU understand that intellectual properties create higher value added than tangible assets do so these countries respectively transformed their economic types to knowledge-based economy so as to boost economic growth and competitiveness. For example, Japan has legislated “Intellectual Property Basic Act” in 2002 and established “the Intellectual Property Strategy Headquarters” in 2003. United States legislated “Prioritizing Resources and Organization for Intellectual Property Act (PRO-IP Act)” in 2008. China also announced “National Intellectual Property Strategic Principles” in June, 2008. Following the above international tendency of protecting intellectual properties, Korea government has promoted intellectual property related policies and legislated related acts since 2000, such as “Technology Transfer Promotion Act” in 2000, policy of supporting patent disputes settlements and shortened the length of patent examination procedure in 2004. Besides, on June 27, 2006, the Presidential Advisory Council on Education, Science and Technology (PACEST) announced “Strategy for Intellectual Property System Constructing Plan.” However, these policies or acts mainly focus on the protection and application of patent rights, not relate to other kinds of intellectual property rights such as trademark right, copyright etc. Until 2008, in order to advance the ability of national competition, Lee Myung-bak government had established “Presidential Council on National Competitiveness (PCNC)”. For the vision of transforming to the intellectual property based economy, the PCNC held its 15th meeting on July 29, 2009. The meeting, held at the Blue House, was attended by the president, the Chairman, and members of the Council. One of the agenda of the meeting is strategies for an intellectual property (IP) powerhouse to realize a creative economy. Three goals of the strategies includes being IP Top 5 nations (U.S., Japan, EU, Korea and China), improving technology balance of payments deficits, and enhancing the scale of copyright industry. Next, this study will introduce details of Korea IP related strategies for our nation’s reference. Introduction Korea IP strategy consists of 3 aspects (creation and application, law and regulation, infrastructure) and 11 missions. And the contents of 11 missions cover the creation, protection and application of intellectual property rights (patent, copyright, trademark, plant variety etc), namely the whole life cycle of intellectual property rights. Through announcement of IP Strategies, Korea hopes to protect intellectual property rights from every aspect and makes IP as essential driving force for national economic growth. 1. Creation and Application Aspect First, although the quantity of intellectual property rights (IPRs) of Korea is rapidly increased in recent years, the quality of intellectual property rights is not increased equally. Also, most of researchers do not receive appropriate rewards from R&D institutions, and then it might reduce further innovation. As above reasons, Korea IP strategy indicated that the government will raise “invention capital” to exploit, buy researchers’ new ideas, and make those ideas get legal protection. That is, the government will set up non-practicing entities (NPEs) with private business. The NPEs would buy intellectual properties from R&D institutions or researchers, and then license to enterprises who have need. After licensing, NPEs will share royalty which obtained from enterprises (licensees) with researchers appropriately. Besides, in order to encourage university, public R&D institutions to set up “technology holdings”, Korea government had amended “Industry Education and Corporation of Industry, Academic and Research Promotion Act”. The amendments are loosening establishment conditions of technology holdings, such as minimum portion of investment in technology has been lowered from 50% to 30%, and broadening the scope of business of technology holdings. 2. Law and Regulation Aspect Secondly, in aspect of law and regulation, in addition to encouraging creation of good quality of IP, Korea considers that intellectual property rights are needed to be protected legally. Therefore, the IP strategy especially pointed out that Korea would follow the example of Japan to legislate their own “Intellectual Property Basic Act”. According to Korea “Intellectual Property Basic Act”, it should establish a “Presidential Council on Intellectual Property”. The main work of this Council is planning and promoting intellectual property related policies. There are 5 chapters and 41 articles in Korea “Intellectual Property Basic Act”. The Act like Korea IP strategy is divided into three parts, that is, “creation and application”, “protection” and “infrastructure”. In fact, the legislation of Korea “Intellectual Property Basic Act” embodies the policies of IP strategy. Further, according to Korea “Intellectual Property Basic Act”, “Presidential Council on Intellectual Property” is to integrate IP related affairs of the administrations into one action plan and promote it. Moreover, according to Korea “Intellectual Property Basic Act”, the government should make medium-term and long-term policies and basic plans for the promotion of intellectual properties every 5 years and adjusts policies and plans periodically as well. Through framing, enacting and adjusting policies and plans, Korea expects to create a well-living environment for the development of intellectual property. 3. Infrastructure Aspect Thirdly, even if good laws and regulations are already made and more government budget and human resource are invested, Korea is still deficient in well-prepared social infrastructure and leads to the situation that any promoting means of intellectual properties will be in vain. With regard to one of visions of Korea IP strategy,” being IP Top 5 power (U.S., Japan, EU, Korea and China)”, on the one hand, Korea domestic patent system should harmonize with international intellectual property regulations that includes loosening the conditions of application and renewal of patent and trademark. On the other hand, the procedure of patent application conforms to the international standard, that is, the written form of USA patent application becomes similar to the forms of world IP Top 3 power (U.S., Japan and EU) and member states of Paten Law Treaty (PLT). At the same time, Korea would join “Patent Prosecution Highway (PPH)” to enable Korea enterprises to acquire protection of patent rights around the world more rapidly. In addition, about the investigation of infringement of intellectual property rights, Korea IP strategy stated that it would strengthen control measures on nation border and broaden IP protection scope from only patent to trademark, copyright and geographical indications. Besides, Korea uses network technology to develop a 24-hour online monitoring system to track fakes and illegal copies. In addition to domestic IP protection, Korea enterprises may face IP infringement at overseas market, thus Korea government has provided supports for intellectual property rights disputes. For this sake, Korea choose overseas market such as Southeast Asia, China, and North America etc to establish “IP Desk” and “Copyright Center” for providing IP legal consultation, support of dispute-resolving expenses and information services for Korea enterprises. Korea IP strategy partially emphasizes on the copyright trading system As mentioned above, one of visions of Korea IP strategy is “enhancing the development of copyright industry”. It’s well-known that Korea culture industries like music, movie, TV, online game industries are vigorous in recent years. Those culture industries are closely connected to copyright, so development of copyright industry is set as priority policy of Korea. In order to enhance the development of Korea copyright industry, a well-trading environment or platform is necessary so as to make more copyrighted works to be exploited. Therefore, Korea Copyright Commission has developed “Integrated Copyright Number (ICN)” that is identification number for digital copyrighted work. Author or copyright owners register copyright related information on “Copyright Integrated Management System (CIMS)” which manages information of copyrighted works provided by the authors or copyright owners, and CIMS would give an ICN number for the copyrighted work, so that users could through the ICN get license easily on “Copyright License Management System (CLMS)” which makes transactions between licensors and licensees. By distributing ICN to copyrighted works, not only the licensee knows whom the copyright belongs to, but the CLMS would preserve license contracts to ensure legality of the licensee’s copyright. After copyright licensing, because of characteristic of digital and Internet, it makes illegal reproductions of copyrighted works easily and copyright owners are subject to significant damages. For this reason, Korea Ministry of Culture, Sports and Tourism (MCST) and Korea Intellectual property Office (KIPO) have respectively developed online intellectual property (copyright and trademark) monitoring system. The main purpose of these two systems is assisting copyright and trademark owners to protect their interests by collecting and analyzing infringement data, and then handing over these data to the judiciary. Conclusion Korea IP strategy has covered all types of intellectual properties clearly. The strategy does not emphasize only on patent, it also includes copyright, trademark etc. If Taiwan wants to transform the economic type to IP-based economy, like Korea, offering protection to other intellectual property rights should not be ignored, too. As Taiwan intends to promote cultural and creative industry and shows soft power of Taiwan around the world, the IP strategy of Taiwan should be planned more comprehensively in the future. In addition to protecting copyrights by laws and regulations, for cultural and creative industry, trading of copyrights is equally important. The remarkable part of Korea IP strategy is the construction of copyright online trading platform. Accordingly, Taiwan should establish our own copyright online trading platform combining copyright registration and source identification system, and seriously consider the feasibility of giving registered copyright legal effects. A well-trading platform integrating registration and source identification system might decrease risks during the process of licensing the copyright. At the same time, many infringements of copyrights are caused because of the nature of the modern network technology. In order to track illegal copies on the internet, Taiwan also should develop online monitoring system to help copyright owners to collect and preserve infringement evidences. In sum, a copyright trading system (including ICN and online intellectual property monitoring system) could reinforce soft power of Taiwan cultural and creative industry well.

The Taiwan Intellectual Property Awareness and Management Survey

The “National Intellectual Property Strategy Program” was announced by the Taiwan government in November 2011 in an effort to promote and raise the intellectual property capability of Taiwanese firms. As policy adviser to the Ministry of Economic Affairs in drafting the “National Intellectual Property Strategy Program,” the Science and Technology Institute under the Institute for Information Industry (STLI) conducted a survey in 2012 in order to gain a broad overview of the level of IP awareness and IP management and use among Taiwanese firms. The survey was distributed to 1,384 firms that are listed either on the Taiwan Stock Exchange or the Gre Tai Securities Markets. 281 companies responded to the survey, achieving a survey response rate of almost 20%. The content of the survey was divided into three parts: IP knowledge and understanding, current IP management within the companies and IP issues that companies face. The Importance of IP to Businesses Intellectual property has become a commonplace asset owned by firms. The growing significance of intellectual property to companies in general is undeniable, and firms are recognizing this as well. An overwhelming 93% of the respondents claim to own some form of intellectual property. The most common type of intellectual property owned by companies is trademarks, followed by patents and trade secret. Many companies are also actively seeking to obtain more intellectual property. Over 68% of the respondents indicated that they have submitted applications for formal intellectual property rights in the past two years. 84% of the respondents agreed with the statement that they believe intellectual property can bring added value for the firm. In addition, over 78% of the respondents also believe that intellectual property helps enhancing the company’s market position. It is clear that the majority of Taiwan firms already consider intellectual property to be a vital asset for their business and that building up and expanding their IP portfolio has become a top priority. This is also reflected in the annual spending that firms allocate for intellectual property. The survey respondents were asked whether a specific budget is allocated toward spending related to intellectual property every year, and the majority of the respondents, almost 70%, responded in the positive. Particularly, the respondents pointed out that they commit the most resources to obtaining and maintaining intellectual property rights every year. 10% of the respondents even indicated that they spent over NT$5 million annually on obtaining and maintaining intellectual property rights. The respondents were also asked about spending on inventor incentive, IP personnel, IP disputes and litigations and staff IP training. The results showed that companies commit the least spending on providing IP training for staff, with more than half of the respondents noting that they spend less than NT$500,000 on IP training each year and only 14% of the respondents noted that they will increase spending on IP training the following year. Weakness in Generating Value from IP As noted above, Taiwan firms are actively seeking to obtain more intellectual property and building up their IP assets. With almost 70% of the respondents noting that they have applied for intellectual property rights in the last two years shows that companies are generating quite a lot intellectual property, but whether all the intellectual property generated is being exploited and creating commercial and economic benefits remains doubtful. Most of the firms, almost 86% of the respondents, acquired their intellectual property through their own research and development (R&D). In contrast, the proportion of firms using other means of acquiring intellectual property is quite low, with only 17% of the respondents acquiring intellectual property through acquisition and 28% through licensing, while 41% percent of the respondents acquired their intellectual property by joint research or contracted research with others. With R&D being the major source of intellectual property for firms, firms are clearly putting in a lot of investment into acquiring intellectual property. However, the returns on these investments may not be proportionate. When asked whether the firm license out their intellectual property, only 13.5% of the respondents claimed to be doing so. This suggests that most Taiwanese firms are not using their intellectual property to generate revenue and commercial value. Instead, intellectual property is still mostly regarded and used as merely a defensive tool against infringement. Companies in Taiwan are also facing increasing risks of being involved in IP-related disputes and litigations. More than 30% of the respondents have already been involved in some kind of IP-related disputes and litigations in the past. The most common type of litigations faced by Taiwanese companies are patent infringement, followed by trademarks infringement, piracy and counterfeit, and disputes with (former) employees. Furthermore, more than 50% of the firms that have been involved in IP litigations noted that patent infringement and trademarks infringement pose the most detriment to the company’s business operations in general. It is evident that intellectual property has become a competitive weapon in businesses, and IP disputes and litigations are inevitable threats that most firms must face in today’s business world. Hence, it is essential for firms to have the necessary strategies and protection in place in order to minimize the risks created by potential legal disputes. With this in mind, it is worrisome to observe that most firms have not incorporated intellectual property into the company risk management program. Nearly 86.1% of the respondents claim to have some kind of risk management program in place within the company, but when asked what is included in the risk management program. Only 40.7% of the firms with risk management programs said that intellectual property is included, which is considerably lower than other types of risks generally seen in risk management programs. With IP disputes and litigations becoming an increasing threat that may bring negative impact for businesses, Taiwanese firms need to incorporate and strengthen IP risk management within the company. IP still not widely considered as business strategy With intellectual property being an important asset, firms should also have the necessary infrastructure and resources to manage IP accordingly and integrate IP into the company’s overall business operations. However, more than 50% of the respondents do not have designated personnel or department that is specifically responsible for managing the company’s intellectual property. Nearly 33% of the respondents indicated that the responsibility for managing IP is shared by other departments within the firm. When further asked about the tasks of the designated personnel or department that is responsible for IP, it is observed that the designated personnel/department mostly undertake routine tasks such as filing for patent applications and trademark registrations and maintaining relevant databases. Tasks such as patent mapping and competitive landscape analysis are the least performed tasks. The proportion of designated personnel/department for IP that are involved in the company’s business and research strategic decision making process is also quite low. This suggests that despite the importance of IP to firms, many Taiwanese firms still have not integrated IP into their overall research and business strategies and utilize their intellectual property as a strategic tool in their business operations. Low Levels of IP Awareness and Training within Firms In order to gauge the level of IP knowledge and understanding in Taiwanese firms, the survey also contained 10 very basic questions on intellectual property. Surprisingly, the respondents that answered all the questions correctly were less than 4%. The proportion of respondents that correctly answered 5 or less questions did not even reach 50%. This means that Taiwanese firms still lack fundamental IP knowledge and understanding in general. This is also reflected in the response to the question whether the company has an overall IP policy in place, which also serves as an indication of the level awareness and concern with intellectual property within the firm. An IP policy that is distributed to company staff means that IP awareness is promoted within the company. However, almost 40% of the respondents claimed that there is no overall IP policy within the company, and nearly 30% of the respondents noted that even if there is an IP policy, it is not made widely known to company staff. This reveals that many Taiwanese companies still need to undertake more IP awareness promotion within the firm. More IP awareness promotion is also justified by the results to the question as to whether the company provides IP training for company staff. The results showed that almost 44% of the respondents do not provide any form of training in IP to company staff at all. This also corresponds to the result noted earlier that most respondents commit the least funding to providing IP training each year. Providing regular IP training to staff is certainly still not the norm for most Taiwanese firms. Issues facing businesses and their policy needs Taiwanese firms still faces many difficulties and challenges in their intellectual property management and hope that the government could provide them with the assistance and resources needed to help them enhance their intellectual property capacity and capability. Some of the major difficulties that the respondents pointed out in the survey include the lack of IP experts and professionals. It is difficult for firms to find and hire people with adequate professional IP skills, as the education and training currently provided by universities and professional schools do not seem to meet the actual IP needs of companies. Another major difficulty faced by Taiwanese firms is the lack of information and knowledge regarding international technical standards and standard setting organizations. A significant portion of the respondents expressed the wish for the government to help them gain entry and participation in international standard setting organizations. Among the other difficulties, the regulatory complexity and lack of clarity with the ownership of intellectual property arising from government-contracted research, which poses as barrier for firms in obtaining licenses for use and exploitation, is also an issue that the majority of the respondents hope the government could improve. In addition to the difficulties mentioned above that Taiwanese firms hope the government would help them encounter, the respondents were also asked specifically what other resources and assistance they would like to seek from the government. 69.4% of the respondents hope that the government could provide more training courses and seminars on IP. Many respondents are also seeking a common platform that can unify all resources that could help enhance IP management. Expert assistance and consultation on obtaining intellectual property rights and providing information on international IP protection and litigation are also resources that Taiwanese firms desire. More than 50% of the respondents also indicated that they would like to receive assistance in establishing IP management system within their firms. Conclusion The results of the survey provided insight into the level of IP management among companies in Taiwan. Although the importance of intellectual property for businesses is undeniable and widely recognized by firms, the results of the survey revealed that there is still much room for improvement and for Taiwanese firms to put in more efforts into strengthening and enhancing their IP capabilities. In general, Taiwanese firms have not incorporated their intellectual property into their management strategies and derived adequate value. Intellectual property remains mostly a defensive tool against infringement. Furthermore, there is still need for greater promotion of IP awareness among firms and within firms. With these IP management difficulties and deficiencies in mind, it should be noted that the respondents of this survey are all listed companies that are already of a certain size and scale and should have greater resources in their disposal to commit to their IP management. It would be reasonable to assume that small and medium firms, with significantly less resources, would face even more difficulties and challenges. Using this survey results as reference, the “National Intellectual Property Strategy Survey” would seek to help Taiwanese companies address these IP issues and provide adequate assistance and resources in overcoming the challenges Taiwanese companies face with their IP management. It is also hoped that this survey would be carried out regularly in the future, and that the survey results from 2012 would serve as a baseline for future surveys that will assist in observing the progress Taiwanese businesses are making in IP management and provide a whole picture of the level of IP awareness and management within Taiwanese firms.

TOP