In order to increase the strength of addressing issues on the infringement of intellectual property for small and medium enterprises, Korean government launched Consultative Committee for Intellectual Property Policies, leading by Presidential Council on Intellectual property and conducting with Ministry of Culture, Sports and Tourism, Korean Intellectual Property Office and Ministry of Justice, to discuss how to reinforce efficiency on handling infringement of intellecual property and work on policy for intellectual property protection.
Korean government has considered trade secret as the core of corporations; however, corporations think little of it. For this reason, Korea Institute of Patent Information’s Trade Secret Protection Section, in charge of the Trade Secret Protection Center, works to avoid the outflow of business skills and trade secrets, to improve trade secret protection system, to raise awareness of trade secret protection and develops South Korea as an intellectual property power. This article aims to briefly introduce the standard management system, the diagnosis of corporate trade secret and the Trade Secret Certification Service which are schemed out by the Trade Secret Protection Center.
In an attempt to offer a diagnosis of current problems about trade secret management in corporations for drawing up suggestions for improvements, the Trade Secret Protection Center sets up a series of questions based on the five categories: organization policy management, document access management, staff management, physical management and information technology management. There are in total 32 questions with detailed sub-questions for knowing if corporations have set up regulations and if the regulations are followed; if the regulations are not followed, if they have strategy to tackle with violation. For example, the question for internet management is to examine on how corporation manages intranet and extranet. Some possible policies are to make them separated, to do authority control or to do nothing. Here is the procedure for diagnosis:
1.Preparation
Employees are asked to gather information regarding trade secret management and improvement opinions by a questionnaire.
2.Diagnosis
Get the result of how well corporation has done for trade secret management by analyzing the questionnaires.
3.Plan
Come up with solutions according to diagnosis.
4.Action
Provide suggestions with different levels of work.
Level |
Description |
---|---|
A |
Well-formed trade secret management and great operation |
B |
Limited strategy with law protection for trade secret outflow |
C |
Weak strategy with a lack of law protection for trade secret outflow, management needed |
D |
Poor law protection for trade secret outflow, management needed badly |
F |
High Risk of trade secret outflow |
The Trade Secret Protection Center will examine and offer staff training periodically in an effort to improve following aspects:
1.Corporation Management
(1)Avoid crucial information outflow
(2)Systemize issue handling and information authentication process
2.Organization Culture
(1)Convey the importance of information protection
(2)Decrease the incoordination among departments due to protecting key
information
(3)Build trade secret protection culture
3.Staff
(1)Provide long-term training for trade secret protection
(2)Build up ability of trade secret protection
The trade secret diagnosis is considered as a way to make trade secret the key intangible asset in corporations and even to increase the competitiveness and to create profits.
In addition to the trade secret diagnosis, the Trade Secret Protection Center further provides immature business with the standard management system which contains services with trade secret registration, level distinguishments, authority control, staff management, contract management and certification service. The primary goal of the standard management system is to help with production and maintenance of trade secret certification before issue occurs. When issue happens, the system is right here to submit certification of trade secret and guarantee to the court that nobody can access trade secrets except the possessor of the trade secret and the institution. In other words, the system is intended for following goals:
1.Efficientize Trade Secret Management
Save time, money and manpower. Manage trade secret and related information efficiently.
2.Raise Awareness of Trade Secret Protection Among Employees
Strengthen awareness and application of trade secret protection by using this system as daily work process
3.Link to the Trade Secret Certification Service
Prove the original document of trade secret with the time stamp of ownership for judicial evidences.
4.Link to Information Security Solution
Cooperate with various information security solutions, such as trade secret control and outflow block.
The Trade Secret Certification Service which is built to link to standard management system is put into practice in 2010 by Korean Intellectual Property Office. This service operates by taking the hash values from trade secret e-documents and combining them with authorized time values from trusted third-parties, thereby creating time stamps. Time stamps are then registered with the Korea Institute of Patent Information to prove the existence of original document of trade secrets, as well as and their initial dates of possession.
A legal basis is built for the Trade Secret Certification Service in 2014. Amendments of Unfair Competition Prevention and Trade Secret Protection Act indicate registration and proof of the Trade Secret Certification Service and explain that an institution with more than 3 qualified staff and required facilities is eligible to be a Trade Secret Certification Service institution. The Trade Secret Certification Service is characterized by the following properties:
1.Block Trade Secret Outflow Radically
Instead of the trade secret itself, this service only asks for hash value of e-records and the authorized time of ownership which make it more secure for corporations to manage trade secrets rather than maintaining under a third-party.
2.Various Electronic Records Available
Various types of electronic records are available in this service, such as documents, pictures and video files which could contain production process, laboratory notebook, blueprint, marketing records, financial records, selling information and customer information and contracts.
3.Institution with Credibility
It is inevitable that any piece of information could be leaked out; hence trade secret management should be executed by credible institution. For example, corporation can ask the Trade Secret Certification Service Institution to register an original document for a blueprint and get a certification. Then, the corporation can ask for new registration for modified blueprint as well. When issue occurs, the certification would be the proof of original document and time of ownership. As the Trade Secret Certification Service Institution gets legalized, the evidence of original document of trade secrets and initial dates of possession would get more convincible in court.
The trade secret diagnosis plays an essential role in understanding the level of trade secret management in corporations. The standard management system further provides with improvement and solution for trade secret protection based on diagnosis. In addition, legalized Trade Secret Certification Service also levitates the burden of proof on corporation. South Korea’s experience in trade secret management could be a good example for Taiwan to follow.
The IP Strategy of Collaboration during COVID-19 Pandemic in Taiwan 1. IP strategy during COVID-19 pandemic Since the end of 2019, the coronavirus disease called “COVID-19” has become a global pandemic. World Health Organization (WHO) has announced that COVID-19 a Public Health Emergency of International Concern (PHEIC) on Feb. 12, 2020. WHO also announced that the new corona virus pandemic is requiring substantial efforts to enable regular information sharing and research, the global community should demonstrate solidarity and cooperation.[1] Dr. Mukhisa Kituyi, the Secretary-General of United Nations Conference on Trade and Development (UNCTAD), pointed out that Collaboration is the engine of global science under COVID-19 pandemic. Global community should take the experience of Ebola outbreak in 2014-15, through global collaboration can provide opportunities both to create new knowledge and to increase the impact of research by diffusing existing knowledge, quickly and at all levels. Both “openness on data” and “open science in real time” are the key factors of improving collaboration under the crisis.[2] Chesbrough (2020) noted that the pandemic stimulating innovation in management of intellectual property, such as initiatives like “Open COVID Pledge” encourages companies and universities to release intellectual property for fighting against COVID-19. The IP strategy based on “Open Innovation” concept can go much further, to play an important role in recovering after the crisis.[3] There are two international famous cases in Taiwan, “National face mask production team” and “Face mask map” helped Taiwanese people to overcome the crisis lack of masks during the pandemic. Both cases show the importance of open innovation in facing the crisis, and contain the concept of IP strategy based on collaboration. 2. National face mask production team Because over 80% of face masks rely on imports, Taiwanese government was aware of the lack of masks when the epidemic began. Since the first COVID-19 case in Taiwan was confirmed on Jan. 21, surgical face masks were sold out in a very short time. The government banned the export of masks on Jan. 24 for controlling the shortages, but it was still a big problem that the production lines at that time could not afford the demand of Taiwanese people. Therefore, how to obtain a large number of mask production lines in a short time and ensure the supply of raw materials had become the primary issue. The government invested NT$200 million (US$6.66 million) and recruited over 100 technicians to form the team named “National face mask production team”. The national team is composed of volunteers from industry and research institutions, especially from Taiwan Machine Tool and Accessory Builders' Association (TMBA). From Feb. 5 to Mar. 5, the national team completed an estimated half a year’s workload including 62 mask production lines. And the team immediately started the second phase of work to meet the extremely large domestic demand for masks, finally they completed 92 mask production line 6 weeks[4] and continue to assist the government in anti-counterfeiting masks. The key factor for the team to complete such a large amount of work in a very short time is not only the selfless dedication of team members but they effectively utilize and share their advantages in their own industrial field. These team members are “Hidden Champions” of global supply chain, after understanding the composition and principle of each part of the mask production line, they immediately began to assign the work and contributed their skill, know-how and experience of machine tools and accessories for mask-producing collaboration. 3. Face mask map In additional to the national face mask production team case, the “face mask map” is another successful case of collaboration during the epidemic in Taiwan. In the beginning of the epidemic, Taiwanese people rushed to buy surgical face masks, resulting in insufficient supply of domestic masks. The government implemented face mask purchase controlling such as limiting three per day and later only two per week through the National Health Insurance Administration (NHIA). According to the rationing system, people can buy surgical face masks at NHIA-contracted pharmacies near their home. But in fact, due to the face mask distribution information was not disclosed, people often have to go to many pharmacies to buy masks. Thus, people spontaneously developed “face mask map”, combined with pharmacy locations on Google Maps and the data of inventory quantity in each pharmacies, to help people know where to buy surgical face masks. Taiwan’s Minister without Portfolio Audrey Tang was in collaboration with Taiwanese software engineers to develop a “real-time map” of local face mask supplies through connecting pharmacy locations on Google Maps and the data of mask inventory quantity in NHIA’s database. With the support of the NHIA database opened according to the license terms compatible with Creative Commons (CC) 4.0, the platform contains over 100 programs and applications was successfully created by public-private collaboration.[5] This platform is jointly maintained by the open community, each member of the community can actively report the updated version information of the applications. Even if the platform has retired due to the implementation of “Name-based Mask Distribution System 3.0”, the successful experience of public-private collaboration platform through “open data” and “open source software” becomes an important foundation of future development. 4. Collaborative IP strategy for crisis management In different from the traditional IP strategy that emphasizes on excluding others from implementing the patents, the collaborative IP strategy pays more attention to the potential of community co-creation. In the face of the crisis of the epidemic, people are willing to share their IP, know-how and experience to gain more time to fight the epidemic. The collaborative IP strategy can implement the concept of open innovation through knowledge sharing, and flexibly use various IP resources in the face of crisis. Especially in the face of a crisis like COVID-19 that has never been dealt with, the collaborative IP strategy can effectively collect the knowledge and creativity of the community. Cases of “National face mask production team” and “Face mask map” can be used as models for collaboration in the face of crisis, and even continue to be used for recovery after the epidemic. The open innovation theory supports open, flexible and highly interactional “creative networks”.[6] At the same time, the collaborative IP strategy serves as a means to implement the open innovation theory. Even though many open communities’ IP strategy such as “free and open source software” or “creative commons” do not originate from the open innovation theory, the theory can still provide guidance for collaborative IP strategies in times of crisis. The collaborative IP strategy should not be limited to the sharing of patents, copyrights or trademark rights but include the skill, know-how, experience and idea, which is able to effectively organize community collaboration and innovation in the face of crisis. [1]World Health Organization, Statement on the second meeting of the International Health Regulations (2005) Emergency Committee regarding the outbreak of novel coronavirus (2019-nCoV) (2020), https://www.who.int/news-room/detail/30-01-2020-statement-on-the-second-meeting-of-the-international-health-regulations-(2005)-emergency-committee-regarding-the-outbreak-of-novel-coronavirus-(2019-ncov) (last visited Oct. 19, 2020). [2]Mukhisa Kituyi, COVID-19: Collaboration is the engine of global science – especially for developing countries, World Economic Forum, May 15, 2020, https://www.weforum.org/agenda/2020/05/global-science-collaboration-open-source-covid-19/ (last visited Oct. 20, 2020). [3] Henry W. Chesbrough, To recover faster from Covid-19, open up: Managerial implications from an open innovation perspective, Industrial Marketing Management, Apr. 16, 2020, available at https://doi.org/10.1016/j.indmarman.2020.04.010 (last visited Oct. 26, 2020). [4]Central News Agency, How a team of technicians is helping Taiwan triple mask production, Taiwan News, Mar. 25, 2020, https://www.taiwannews.com.tw/en/news/3903970 (last visited Oct. 30, 2020). [5]Keoni Everington, Taiwan platform includes over 100 apps showing mask availability in stores, Taiwan News, Feb. 27, 2020, https://www.taiwannews.com.tw/en/news/3882111 (last visited Oct. 30, 2020). [6]Ali Jazairy, Impact of Collaborative Innovation on IP and Future Trends in IP, Les Nouvelles, 47, 224 (2012).
Blockchain in Intellectual Property ProtectionBackground Blockchain is a technology with the ability to decentral and distribute information. It records encrypted information of the user’s behavior. Blockchain has disintermediate, transparency, programmable, autonomous, immutable and anonymous essential features. The first application of blockchain is to develop cryptocurrency and a payment system, Bitcoin, which has overturned traditional concept of the currency model we knew. So far, blockchain has been widely applied in many territories, such as the intellectual property protection system, called the Blockai, which is a website using blockchain to overcome the plight of piracy in the United States. Example The Library of Congress in the United States found that it had been lack of efficiency for the copyright management. Blockai provided a solution for the Library. Authors will benefit from having proof of publication and copyright monitoring by registering with Blockai. The Blockai system securely timestamps copyright claims in the distributed database based on the Bitcoin protocol. For each copyright claim, a proof file is made available through the footer of the certificate and can be verified by authors using this open source proof verification tool, and it is free of charge for everyone. Although the "Proof of Publication" does not constitute admissible evidence in a trial, it is still credible in its technical features. Conclusion In Taiwan, there is still no copyright registering system. Before a copyright infringement suit may be filed in court, the burden of proof is on the copyright owner. For it is difficult for the copyright owner to provide a credible evidence in trial. We may consider using the experiences of other countries for our reference, developing the intellectual property protection system based on blockchain technology in order to help authors preserve their rights, and provide legal services as a legal technology.
The Introduction to the Trade Secret Management GuidelinesThe Introduction to the Trade Secret Management Guidelines 2024/09/09 Due to an open, collaborative culture and the need to balance knowledge sharing with protection, research academic institutions always face unique challenges in managing confidential information. However, trade secret protection is still essential for research academic institutions in order to safeguard their competitive advantages and valuable research results. Accordingly, the “Trade Secret Management Guidelines”, released by the Taiwan Intellectual Property Office (TIPO) on May 27, 2024, is specifically tailored for the trade secret protection in the research and academic circumstance. Taking into account the essential differences between research academic institutions and enterprises, these guidelines use a phased and scalable approach to implement trade secret protection measures. With these guidelines, each research academic institution can evaluate its own size, research field, available resources, etc., and establish an appropriate trade secret management system to effectively identify, protect and manage its trade secrets. The Trade Secret Management guidelines outline 13 measures for managing trade secrets, covering the entire life cycle of trade secret protection. In addition, these guidelines recommends that research academic institutions adopt a phased implementation strategy, starting from the "entry-level" stage focusing on basic measures, and gradually entering the "basic" and "enhanced" stages to improve each management measure. The following is an overview of each measure: 1.Distinguishing Trade Secrets In order to facilitate the protection of trade secrets, institutions should distinguish what is trade secret information at the entry stage, whether it is self-developed or obtained from others. As progressing to the basic stage, institutions should define and provide examples of trade secrets they produce or acquire. When entering the enhanced stage, institutions should develop a process for identifying whether an information is a trade secret. 2.Access Control To prevent unauthorized disclosure, institutions should control access to trade secrets. At the entry stage, institutions must set access permissions for trade secrets. As progressing to the basic stage, access should be granted based on the need for the information. When entering the enhanced stage, institutions need to adjust access permissions in response to job changes and personnel turnover. 3.Identification Identifying trade secrets helps ensure that those accessing the information are aware of its confidentiality. At the entry stage, institutions need to identify information considered to be trade secrets, but there are no restrictions on the identification method. As progressing to the basic stage, institutions need to clearly define how trade secrets will be identified. When entering the enhanced stage, the key is to ensure that all contacts know that the information they come into contact with is a trade secret. 4.External Disclosure Review In order not to affect subsequent research or applications, institutions should review the information that will be disclosed to the public. At the entry stage, institutions should ensure that information is reviewed by responsible personnel before it is disclosed to the public. As progressing to the basic stage, institutions need to identify which items should be reviewed. When entering the enhanced stage, institutions shall distinguish what should be reviewed based on the nature of the information disclosed to the public. 5.Circulation Control Controlling the circulation of trade secrets can prevent them from being arbitrarily disclosed. At the entry stage, institutions should ensure that responsible personnel have consent to the circulation of trade secrets. As progressing to the basic stage, the key is whether the behavior of circulating trade secrets is recorded. When entering the enhanced stage, institutions should take countermeasures to prevent trade secrets from being leaked during the circulation process. 6.Reproduction Control Controlling the reproduction of trade secrets can ensure that the use of trade secrets is limited to a controllable scope. At the entry stage, institutions should limit the reproduction of trade secrets. As progressing to the basic stage, the key is whether the behavior of reproducing trade secrets is recorded. When entering the enhanced stage, institutions should take measures to avoid the increased risk of leakage of trade secrets after the reproduction behavior. 7.Destruction At the entry stage, institutions should ensure that the consent of the responsible personnel is obtained when destroying trade secret. As progressing to the basic stage, institutions should consider the impact of destruction before destroying trade secrets and ensure that records of destruction are retained. When entering the enhanced stage, the key is whether the trade secrets are destroyed in an irrecoverable way. 8.Usage record retention Keeping the usage record of trade secrets can help provide evidence in litigation. At the entry stage, institutions should keep records of access and use of trade secrets. As progressing to the basic stage, institutions should further specify the items that need to be retained in the records. When entering the enhanced stage, institutions should ensure that the records retained are authentic and will not be arbitrarily tampered with. Therefore, if necessary, a third party agency can be entrusted with the preservation of evidence. 9.Designating Responsibility for Implementation Setting up responsible personnel can help ensure that the trade secret management mechanism is effectively implemented. At the entry stage, institutions simply need to ensure there is someone responsible for driving trade secret management. As progressing to the basic stage, institutions shall assign dedicated personnel to be responsible for trade secret management. When entering the enhanced stage, institutions must establish a dedicated unit to coordinate the protection of trade secrets through a clear division of powers and responsibilities. 10.Confidentiality and Ownership Arrangements Signing confidentiality and ownership agreements can ensure that internal personnel who may have access to trade secrets understand their confidentiality obligations. At the entry stage, institutions only need to sign a written confidentiality agreement with those who may have access to trade secrets. As progressing to the basic stage, institutions shall clearly define the items that must be included in the confidentiality and ownership agreement. When entering the enhanced stage, institutions need to further evaluate whether to adjust the contents of confidentiality and ownership agreements in response to job changes and personnel turnover. 11.Promotion and Training Through promotion and training, institutions can gradually improve personnel's awareness of confidentiality and help them understand the key points of trade secret management. At the entry stage, institutions can promote the importance of trade secret management and provide appropriate training to all personnel. As progressing to the basic stage, institutions should establish promotional materials, explain the management objectives and specific practices in the training, and conduct an evaluation of effectiveness. When entering the enhanced stage, institutions need to adjust the content required for training based on differences in units, objects, trade secret characteristics, etc. 12.Departure Management At the entry stage, institutions should remind departing personnel of their confidentiality obligations. As progressing to the basic stage, institutions shall further require the departing personnel to hand over the trade secrets they held during their tenure. When entering the enhanced stage, institutions need to conduct exit interviews with important departing personnel to ensure that they clearly understand their confidentiality obligations. 13.Confidentiality and Ownership Arrangements with External Parties Signing confidentiality and ownership agreements with external parties can help prevent institutions mired in unnecessary controversies. At the entry stage, institutions only need to sign confidentiality agreement with external parties before providing trade secrets to them. As progressing to the basic stage, institutions shall clearly define the items that must be included in the confidentiality and ownership agreement. When entering the enhanced stage, institutions needs to confirm with external parties and reach a consensus on the management measures that both parties need to take. The Trade Secret Management guidelines provide a comprehensive framework for research academic institutions in Taiwan to protect their trade secrets. Regardless of the size of the research academic institutions or the field it focuses on, as long as they follow the above-mentioned 13 measures and adjusts according to their current management situations, they can gradually establish a trade secret management system that meets their own needs.
Antitrust Liability to the Conduct of “Refusal to License” of the Standard Essential PatentAntitrust Liability to the Conduct of “Refusal to License” of the Standard Essential Patent 2022/07/19 The notion of Standard Essential Patent(SEP)emerges in the era when manufacturers seek ‘‘compatibility’’ and ‘‘interoperability’’ of their products. The concept of SEPs is proposed to help manufacturers ‘‘talk’’ to each other so the collective manufacturers enjoy the advantage of economies of scales. Meanwhile, the compatibility and interoperability derived from SEPs enhance the consumers’ valuation of the product which creates the ‘‘network effect’’ of the products. There is a long-debated issue in the field of SEP—to what extent shall the SEP holders license their patents in the various level of the supply chain. This issue has much to do with the ‘‘FRAND commitment’’, and is worthy of further analysis. I. SEP and FRAND Commitment The concept of SEP is—when any certain patented technology is selected by the ‘‘Standard Setting Organization’’(SSO)as the commonly used standard, such the patented technology is categorized as a SEP. The SEP holder therefore enjoys stronger ‘‘market power’’ because market participants have no choice but to use the SEP and are required to seek license from the SEP holders. Therefore, to prevent the SEP holders from abusing their market power, SSOs usually require SEP holders to make the FRAND commitment; that is, to license on ‘‘fair, reasonable and non-discriminatory’’ terms. Once the SEP holder breaches the commitment, the SSOs might exclude that technique from the standard. II. “License to all”or“Access to all”issues under FRAND Commitment The FRAND commitment, by textual reading incorporates the wording of ‘‘non-discriminatory’’, and can infer two co-related yet debatable concepts—the ‘‘License to all’’ or ‘‘Access to all’’ arguments. The ‘‘License to all’’ argument holds that all participants in the supply chain retain the access to the specified SEP, while the ‘‘Access to all’’ argument, on the contrary, contends that FRAND commitments don’t necessarily ask SEP holder to license to all practitioners, but when a SEP holder is going to license, he must license on FRAND terms. According to observations, there is a common phenomenon in the SEP licensing practice—most SEP holders tend to license only to the End-Product manufacturers rather than to the manufacturers of the ‘‘Smallest Saleable Patent Practicing Unit’’(SSPPU). What the SEP holders expect through ‘‘refusal to license’’ to the SSPPU manufacturers are to maximize the potential royalties. Cases inclusive of the Qualcomm case[1] and the Continental case[2] have shown such practical tendency, and only when the SSOs can well define the definitions of FRAND commitments might the issue be truly settled. There are some End-Product manufacturers that consider it ‘‘discriminatory’’ and against the FRAND commitments if the SEP holders refuse to negotiate with SSPPU manufacturers requesting to be the licensee. On the other hand, some consider it inappropriate for the End-Product manufacturers to refuse all negotiations when the SEP holder requests it to be the party to the licensing negotiations[3]. III. The ‘‘refusal to license’’ and the derived Anti-Trust Issue As generally admitted, a firm has no general duty to deal with others[4]; however, there are times when SEP holders’ ‘‘refusal to deal∕license’’ behaviors can constitute wrongful monopoly under Sherman Act section 2. The U.S. judicial practices have categorized three main ‘‘refusal to deal∕license’’ behaviors as wrongful monopoly under Sherman Act section 2; they are[5]: 1.dominant firm forces its customers not to do business with new competitors of that firm, or the dominant firm will terminate business with the customer[6]; 2.dominant firm tries to abandon or alter an existing relationship[7]; 3.dominant firm refuses to provide access to ‘‘essential facility’’ (the equipment or techniques that is indispensable when others would like to compete in the relevant market with the dominant firm). As SEP can be categorized as an ‘‘essential facility’’, this paper will only focus on the third category. The ‘‘Essential Facility Doctrine’’ is—when any monopolist withholds an essential facility and refuses to provide his competitors with the access to the said essential facility, a wrongful monopoly due to the Facility holders’ ‘‘refusal to deal∕license’’ is constituted. According to the leading case—the MCI case[8], four factors are to be proved by the plaintiff when seeking resort to ‘‘Essential Facility Doctrine’’; they are:(1)the monopolist’s control of an essential facility;(2)the inability of a competitor to duplicate that essential facility;(3)the monopolist’s denial of access to that essential facility to a competitor;(4)the feasibility of providing the essential facility to the competitor by the monopolist. As we can shortly conclude here, if a SEP holder constitute wrongful monopoly because of his ‘‘refusal to license’’ behavior, the perquisite is that the SEP holder would like to join in the ‘‘competition’’ in the relevant market himself. IV. Conclusion—the commonly seen ‘‘refusal to license’’ behavior of SEP holders doesn’t constitute wrongful monopoly As mentioned before, ‘‘competition’’ serves as the prerequisite for the ‘‘Essential Facility Doctrine’’; thus, some SEP holders’ refusal to license to SSPPU manufacturers behaviors—such as Qualcomm in the Qualcomm case and Nokia in the Continental case—are not in accordance with ‘‘Essential Facility Doctrine’’ and do not constitute wrongful monopoly. Qualcomm and Nokia chose not to license to SSPPU manufacturers merely because they want to earn more royalties by licensing to End-Product manufacturers; they didn’t make this choice because themselves would like to compete in the SSPPU markets. However, since there is no clear definition of FRAND yet, whether the SEP holders have truly breached the FRAND commitment remains unsolved puzzle and shall retain to SSO’s clearer definition and the Court’s further rulings. [1]FTC v. Qualcomm Inc., 969 F.3d 974 (9th Cir. 2020). SEP holder Qualcomm would only like to license to the cellphone OEM manufactures rather than to other chips manufacturers. [2]Continental Automotive Systems, Inc. v. Avanci, LLC, et al, No. 20-11032 (5th Cir. 2022). SEP holder Nokia and a licensing platform—Avanci (that Nokia had joined) would only like to license to car manufacturers rather than to Telematics Control Unit(TCU)manufacturers. [3]Japan Patent Office [JPO], GUIDE TO LICENSING NEGOTIATIONS INVOLVING STANDARD ESSENTIAL PATENTS (2018), https://www.jpo.go.jp/e/support/general/sep_portal/document/index/guide-seps-en.pdf(last visited July 19, 2022). [4]See United States v. Colgate & Co., 250 U.S. 300 (1919);Pacific Bell Telephone Co. v. linkLine Communications, Inc., 555 U.S. 438 (2009); Aerotec Int'l v. Honeywell Int'l, 836 F.3d 1171 (9th Cir. 2016) [5]ANDREW I. GAVIL, WILLIAM E. KOVACIC & JONATHAN B. BAKER, ANTITRUST LAW IN PERSPECTIVE: CASES, CONCEPTS AND PROBLEMS IN COMPETITION POLICY 630-654 (2002). [6]See Lorain Journal Co. v. United States, 342 U.S. 143 (1951) [7]See Image Technical Services, Inc. v. Eastman Kodak Co., 504 U.S. 451 (1992); Aspen Skiing Co. v. Aspen Highlands Skiing Corp., 472 U.S. 585 (1985) [8]MCI Communications Corp. v. American Tel. & Tel. Co., 708 F.3d 1081 (7th Cir. 1983)