A Preliminary Study on The Legal Effect of the Blockchain-Generated Data in Taiwan

A Preliminary Study on The Legal Effect of the Blockchain-Generated Data in Taiwan

I. Preface

  Governments around the world have set various regulations and guidelines to deal with the increasing application of blockchain technology, trying to keep the law up to date with technological development and the latest trends. Among them, the application of blockchain technology to regulations has become a hot topic. Because of its features, such as immutable, easy to verify and transparently disclosed, it can improve the efficiency of law enforcement and reduce cost. Moreover, decentralization and the verification mechanism generated by mathematical computation can avoid the disputes arising from the existing system, in which the mechanism is set up and controlled by independent institutions, and thus the credibility could be universal. The international trend also shows the importance attached to the application of blockchain technology in the legal field. In 2017, the “Legal Services Innovation Index”, a study conducted by the Michigan State University College of Law and Google evaluated the level of innovation of law firms according to the search data on innovation indicators of the world’s major law firms. Blockchain has the highest number of clicks among all indices, and the average number of clicks of blockchain is more than twice that of AI.[1] In addition, there are international cases regarding the connection between the blockchain technology and legal provisions as well as the real cases that used blockchain technology to handle legal matters.[2] An organization, such as the Global Legal Blockchain Consortium (GLBC), work with enterprises, law firms, software development units, and schools to study the standards formulation and application methods of the application of blockchain technology to law-related matters. [3] This article will first discuss the legal enforceability of data generated by the blockchain technology through international cases, then review Taiwan’s current status and the legal enforceability of the data generated by the blockchain technology and to explore possible direction for regulatory adjustment if the government intends to ease the restriction on the application of blockchain in the fields of evidence authentication and deposition.

II. International cases

1. US case: adjust the existing regulations and recognize the enforceability of blockchain technology

  The amendment HB2417[4] to the Arizona Electronic Transactions Act (AETA) signed by Arizona in April 2017 defines the blockchain technology and smart contracts and recognizes their legal effect on signatures, records and smart contracts. HB2417 defines “blockchain technology” as a “distributed, decentralized, shared and replicated ledger, which may be public or private, permissioned or permissionless, or driven by “tokenized crypto economics or tokenless” and provides that the “data on the ledger” is protected with cryptography, is immutable and auditable and provides an uncensored truth.” It’s worth noting that although, by definition, the data is true, it is uncensored truth in nature, which emphasizes the originality of the data. A “smart contract” is an “event driven program, with state, that runs on a distributed, decentralized, shared and replicated ledger that can take custody over and instruct transfer of assets on that ledger.” Under the original AETA regulations, records or signatures in electronic form cannot be deprived of legal validity and enforceability merely because they are in electronic form. To eliminate the legal uncertainty of any blockchain related transactions and smart contracts related to digital assets, HB 2417 states that a signature that is secured through blockchain technology is considered to be in an electronic form and to be an electronic signature, and a record or contract that is secured through blockchain technology is considered to be in an electronic form and to be an electronic record.  The statute also provides that smart contracts may exist in business, and a contract relating to a transaction may not be denied legal effect, validity or enforceability solely because that contract contains a “smart contract term.” This makes the enforceability of electronic signing and electronic transactions made by Arizona’s blockchain technology equivalent to that of the signature and contract made by the traditional written format. In the following year, the Ohio governor signed the amendment SB220[5] to the Uniform Electronic Transactions Act (UETA) in August 2018, which took effect from November. The focus of the amendment is the same as that in Arizona. Although, unlike HB 2417, SB220 does not define blockchain technology, the added content can still guarantee the enforceability of electronic signatures and contracts made by the blockchain technology. The focus of the two amendments in the US is to supplement and revise the laws and regulations made in the past so that they are applicable to the transaction method under blockchain technology and have the same effect as other recognized methods. This reduces the uncertainty related to blockchain technology at the regulatory and commercial application level, and is expected to attract the blockchain related companies, investors and developers.

2. Case of China: The enforceability of blockchain technology in evidence deposition is recognized in line with courts’ new type of judgment.

  In September 2018, the Supreme People's Court implemented “The Provisions on Several Issues Concerning the Trial of Cases by Internet Courts,”[6] in which Paragraph 2 of Article 11 mentions that where the authenticity of the electronic data submitted by a party can be proven through electronic signature, trusted time stamp, hash value check, blockchain or any other evidence collection, fixation or tamper-proofing technological means, or through the certification on an electronic evidence collection and preservation platform, the Internet court shall make a confirmation. It shows that the Internet court can recognize the evidence deposited by blockchain technology, and its enforceability is equivalent to that of other technologies if its authenticity can be proved. Paragraph 1 of the same article also proposes the basis for review and judgment on the relevant standards for the broad definition of electronic evidence recognition. “The authenticity of generation, collection, storage and transmission process of the electronic data shall be examined and judged, and the items to be reviewed include whether the hardware and software environments such as the computer system based on which electronic data is generated, collected, stored and transmitted are safe and reliable; whether electronic data originator and generation time are specified, and whether the contents shown are clear, objective and accurate; whether the storage and safekeeping media of electronic data are definite, and whether the safekeeping methods and means are appropriate; whether electronic data extractor and fixer, and electronic data extraction and fixation tools and methods are reliable, and whether the extraction process can be reproduced; whether the contents of electronic data are added, deleted, modified or incomplete, or fall under any other circumstance; and whether electronic data can be verified in specific methods.” The judgment is based on a clear review. It is a supplement to the notarization process, which was the solo judgment basis for the enforceability of digital evidence. In addition, the rules on proof are clearly set out in Article 9, which covers two situations: online and offline. For offline evidence, the parties can convert it into electronic materials by scanning, re-shooting and duplicating, and then upload it to the litigation platform. For online evidence, it can be divided into two situations. One is the online electronic evidence possessed by the party, which can be imported to the litigation platform by providing links or uploading materials. The other is that the Internet court can obtain the structural information of the relevant cases from the e-commerce platform operators, Internet service providers and electronic data deposition and retrieve platform, and import it to the litigation platform to directly provide the information to both parties so that they can select and prove their claims. In this way, the court can use technical means to complete the migration and visual presentation of information. Before the Supreme People's Court enforced the provisions, the Hangzhou Internet Court of China recognized the enforceability of electronic evidence under the blockchain technology when hearing a copyright dispute in June 2018. The court's judgment pointed out that after reviewing the impartiality, technical level and evidence preservation methods of the blockchain evidence deposit service provider, the enforceability of the evidence is recognized, and thus the case was deemed infringement.[7] Beijing Dongcheng District Court also reviewed the blockchain deposition technology in an infringement of information network communication in September of the same year, including data generation, deposition, preservation, and recognized the enforceability of electronic evidence made by the blockchain technology. The court adopted the electronic evidence[8]. The Beijing Internet Court allows evidence deposition of the litigation files and evidence uploaded to the electronic litigation platform through the Balance Chain of evidence deposition established by the blockchain technology when handling the litigation cases online. This can prevent tampering and ensure the safety of litigation while keeping possible litigation evidence to facilitate verification in the future. While the Balance Chain is going online, the supporting standards, including the Beijing Internet Court Electronic Evidence Platform Access and Management Standards, the Enforcement Rules of the Beijing Internet Court Electronic Evidence Platform Access and Management Standards, the Application Form for Beijing Internet Court Electronic Evidence Deposition Access and the Instruction on the Beijing Internet Court Electronic Evidence Deposition Access Interface, are released simultaneously. These supporting standards prescribe the requirement of receivers, the requirement for the electronic information system of the receiver and the requirement for the juridical application of the evidence platform in details from the practical point of view so that the potential receivers can interconnect in a compliant manner while ensuring the quality of the connected data.

III. Taiwan’s current situation

  In the above cases, the United States amended the laws and regulations related to the electronic transaction by increasing the scope of the terms, such as electronic forms of records, signatures and transactions so that the records, signatures and transactions made by the blockchain technology is as effective as that of other technologies. According to Article 9 of the Taiwanese Electronic Signatures Act, the enforceability of the data generated by blockchain technology shall still be judged case by case in terms of the technology for electronic documents, signature and transaction formation, and its applicability or exclusion shall be determined by laws or administrative agencies. In China, the role of electronic data is discussed in the relevant standards used by the Internet Court to examine the cases. Regarding the definition of electronic materials, electronic records and electronic documents, Paragraph 1 of Article 2 of the Taiwanese Electronic Signatures Act defines electronic document as a record in electronic form, which is made of “any text, sound, picture, image, symbol, or other information generated by electronic or other means not directly recognizable by human perceptions, and which is capable of conveying its intended information.”[9] In addition, Article 4 states “With the consent of the other party, an electronic record can be employed as a declaration of intent. Where a law or regulation requires that information be provided in writing, if the content of the information can be presented in its integrity and remains accessible for subsequent reference, with the consent of the other party, the requirement is satisfied by providing an electronic record. By stipulation of a law or regulation or prescription of a government agencies, the application of the two preceding paragraphs may be exempted, or otherwise require that particular technology or procedure be followed. In the event that particular technology or procedure is required, the stipulation or prescription shall be fair and reasonable, and shall not provide preferential treatment without proper justifications.” [10] The electronic records, regardless of the type of technology, are given the same effect as paper documents with the consent of both parties. In litigation, electronic records, electronic evidence or similar terms are not found in the Criminal Code of the Republic of China, the Civil Code, the Code of Criminal Procedure and the Taiwan Code of Civil Procedure. The adoption of electronic records often refers to Paragraph 2 of Article 220 of the Criminal Code of the Republic of China[11]. An audio recording, a visual recording, or an electromagnetic recording and the voices, images or symbols that are shown through the computer process and are sufficient evidence of intention shall be considered a document. The content that is considered meaningful is that the identity of the person expressing the content is identifiable according to the content and can be used to prove legal relationship or fact in social life. The relevant standards for proof under the electronic evidence follow Article 363 of the Taiwan Code of Civil Procedure[12]. For non-documentary objects which operate as documents, including those are accessible only through technological devices or those that are practically difficult to produce their original version, a writing representing its content along with a proof of the content represented as being true to the original will be acceptable. However, the way of proof or recognition standards are not sufficiently described. Or according to Paragraph 2 of Article 159-4 of the Code of Criminal Procedure, “documents of recording nature, or documents of certifying nature made by a person in the course of performing professional duty or regular day to day business, unless circumstances exist making it obviously unreliable. In addition”, and Paragraph 3 “ Documents made in other reliable circumstances in addition to the special circumstances specified in the preceding two Items.” [13] In fact, the Juridical Yuan started to promote the electronic litigation platform (including online litigation) in 2016, and has launched the online litigation business by gradually opening the application for different types of applicants and litigation.[14] However, there is no description on the technical type and inspection standards of electronic evidence. Moreover, only the litigation evidence is uploaded. There is no evidence deposition before litigation for comparison during litigation.

  Under Taiwan’s laws and regulations, electronic evidence and its proving method is not significantly different from other types of evidence. The judgment of evidence shall still depend on judges’ recognition on the evidence. Taking the practice of criminal litigation as an example, it can be viewed at three levels[15]: 1. The submission of the evidence. If the evidence is collected illegally, not following a statutory method or is not logically related to the pending matters, it will be excluded. This is the way to determine whether the evidence is eligible to enter the evidence investigation process. 2. In the investigation of evidence, the method of investigation (e.g., whether it is legal), the determination of relevance and the debate on evidence (e.g., to confirm the identity of the person producing the electronic evidence, whether the electronic evidence is identical to the original version without addition, deletion or alteration) are investigated during the investigation procedure. 3. The debate on evidence is to determine the power of the evidence by considering the relationship among the elements that constitute the whole and whether the evidence can prove the connection among all elements.  In addition, whether the electronic evidence is consistent with the original version is often based on Article 80 of the Notary Act, "When making notarial deeds, notaries shall write down the statements listened to, the circumstances witnessed, and other facts they have actually experienced. The means and results of the experience shall also be stated in the notarial deeds.” [16] A notary shall review the electronic evidence and record the inspection process and the inspection results to demonstrate its credibility.

VI. Conclusions and recommendations

  According to the latest 2050 smart government plan[17] announced in the Executive Yuan’s 3632nd meeting held on December 27, 2018, the government is planning to connect the database of each government agency through blockchain technology, and the plan also includes establishment of digital identification. It is foreseeable that there will be more and more electronic materials, documents and records connected by blockchain technology in the future. When it comes to improve management efficiency and reduce the barriers to introduce this technology to various sectors, it is necessary to adjust the related regulations. At present, there are no statutory provisions for the technology that assist the use of the electronic evidence involved in traditional litigation channels or online platforms, including using blockchain for evidence deposition and authentication . This also poses uncertainty to the judges when they make judgments. If we consider the continuous development and breakthrough of technology, which is relatively faster than the legislative process, and the traditional tangible transactions and contracts are still the majority in life, Taiwan has defined electronic materials, electronic records and electronic documents in the Electronic Signatures Act to ensure and strengthen the legal rights and benefits under the adoption of the technology. In addition, the Electronic Signatures Act also reserves the right to determine whether the technology is applicable to the laws and regulations or administrative agencies. In other words, the technology behind electronic materials, records and documents are not specified, and the aforementioned electronic materials have the same effect as the contracts and signature as the traditional written format. However, there are no standards to specify which standards are valid for evidence deposition and authentication for electronic materials on the level of deposition and authentication. In the future, when improving the relevant functions of the online litigation platform, the Juridical Yuan can also consider using technologies, such as blockchain or timestamps to provide evidence deposition service, which is expected to enhance the efficiency of evidence verification for online litigation in the future and prevent wasting review resources on invalid evidence for a better operation mode. This is in line with the government's policy direction. By providing support and demonstration of emerging technologies, not only limited to blockchain, on the legal level, it can reduce the public’s uncertainty and risk on introducing or applying the technology to legal process. This is very helpful in realizing a large scale application of the technology.


[1] Legal Services Innovation Index, Phase 1, Version 1.0, https://www.legaltechinnovation.com/law-firm-index/ (last visited on Jan. 11, 2019).

[2] For example, Arizona's Arizona Electronic Transactions Act (AETA) and Ohio’s Uniform Electronic Transactions Act (UETA) described the electronic signature and the enforceability of contracts under blockchain technology; in China, Beijing Internet Court provides litigation files and litigation evidence deposition service based on blockchain technology for future litigation.

[3] The Global Legal Blockchain Consortium website, https://legalconsortium.org/ (last visited on Jan. 11, 2019).

[4] H.B. 2417, 53th Leg., 1st Regular. (AZ. 2017).

[5] S.B. 220, 132ND General Assembly. (OH. 2017-2018).

[6]“The Provisions on Several Issues Concerning the Trial of Cases by Internet Courts,” the Supreme People's Court of the People’s Republic of China http://www.court.gov.cn/zixun-xiangqing-116981.html
(last visited on Jan. 11, 2019).

[7] Tencent Research Institute, <The era of judicial blockchain has arrived? ——from the two cases of blockchain electronic deposition>, October 23, 2018, https://ek21.com/news/1/132154/ (last visited on Jan. 11, 2019).

[8] Securities Daily, <Beijing Dongcheng District Court confirmed the evidence collection by blockchain for the first time-- application of "blockchain + justice" for new opportunities in history> October 20, 2018, https://www.jinse.com/bitcoin/258170.html (last visited on Jan. 11, 2019).

[9] Paragraph 1 of Article 2 of the Electronic Signatures Act

[10] Article 4 of the Electronic Signatures Act

[11] Paragraph 2 of Article 220, “A writing, symbol, drawing, photograph on a piece of paper or an article which by custom or by special agreement is sufficient evidence of intention therein contained shall be considered a document within the meaning of this Chapter and other chapters. So shall be an audio recording, a visual recording, or an electromagnetic recording and the voices, images or symbols that are shown through computer process and are sufficient evidence of intention.”

[12] Article 363 of the Taiwan Code of Civil Procedure, “The provisions of this Item shall apply mutatis mutandis to non-documentary objects which operate as documents. Where the content of a document or an object provided in the preceding paragraph is accessible only through technological devices or it is practically difficult to produce its original version, a writing representing its content along with a proof of the content represented as being true to the original will be acceptable. The court may, if necessary, order an explanation of the document, object, or writing representing the content thereof provided in the two preceding paragraphs.”

[13] Paragraph 2 of Article 159-4 of the Code of Criminal Procedure

[14] Liberty Times, <The Juridical Yuan is promoting “E-litigation.”  Two new systems are on the road.” August 1, 2018, http://news.ltn.com.tw/news/society/breakingnews/2506118 (last visited on Jan. 11, 2019).

[15] Chih-Lung Chen, “Seminar on the Reform of the Code of Criminal Procedure 3: Revision Direction of Rule of Evidence,” The Taiwan Law Review, Issue 52, Page 71-73 (1999).

[16] Article 80 of the Notary Act.

[17] BlockTempo, <The Executive Yuan Announced the Smart Government New Plan: the Taiwan Government will Use Blockchain Technology to Establish Information Exchange Mechanism of Various Agencies>, January 2, 2019, https://www.blocktempo.Com/taiwan-gv-want-to-use-blockchain-tech-build-data/ (last visited on Jan. 11, 2019).

Links
※A Preliminary Study on The Legal Effect of the Blockchain-Generated Data in Taiwan,STLI, https://stli.iii.org.tw/en/article-detail.aspx?no=55&tp=2&i=171&d=8253 (Date:2024/12/11)
Quote this paper
You may be interested
Recent Federal Decisions and Emerging Trends in U.S. Defend Trade Secrets Act Litigation

I. Introduction   The enactment of the Defend Trade Secrets Act of 2016[1] (the “DTSA”) marks a milestone in the recent development of trade secret law in the United States (“U.S.”).[2] Recent federal decisions and emerging trends in DTSA litigation regarding the following issues deserve the attention of Taiwanese companies who might be involved in DTSA litigation in U.S. federal courts (“federal courts”): (1) whether the DTSA displaces any other civil remedies provided by the existing trade secret laws; (2) whether a plaintiff should pay attention to any pleading standard when bringing a DTSA claim in federal court; (3) whether a federal court will easily grant an ex parte application for seizure order under the DTSA (an “ex parte seizure order”); and (4) whether the DTSA applies to trade secret misappropriations that occurred before the DTSA came into effect. This article provides insights into these developments and trends, and concludes with their implications at the end. II. The DTSA does not displace any other civil remedies provided by the existing trade secret laws, and federal courts may nonetheless turn to pre-DTSA laws and decisions for guidance   The DTSA states that it does not “preempt” or “displace” any other civil remedies provided by other federal and state laws for trade secret misappropriation.[3] Prior to the enactment of the DTSA, the civil protection and remedies of trade secrets in the U.S. have traditionally been provided under state laws.[4] The DTSA provides federal courts with original jurisdiction[5] over civil actions brought under the DTSA, giving trade secret owners an option to litigate trade secret claims in federal courts.[6] As a result, the DTSA adds a layer of protection for trade secrets and creates a federal path for plaintiffs to pursue civil remedies.[7]   Some commentators point out that federal courts, when hearing DTSA claims, construing DTSA provisions or analyzing DTSA claims, oftentimes turn to state laws and decisions existing prior to the enactment of the DTSA for guidance.[8] Various decisions show that federal courts tend to look to local state laws and pre-DTSA decisions when hearing DTSA claims or making decisions.[9] This suggests that pre-DTSA trade secret laws and prior decisions remain an indispensable reference for federal courts. III. A plaintiff should pay careful attention to the plausibility pleading standard when bringing a DTSA claim in federal court   A plaintiff's pleading in his complaint must satisfy the plausibility pleading standard when the plaintiff brings a DTSA claim in federal court.[10] Otherwise, the plaintiff's complaint may be dismissed by the federal court.[11] Filing a motion requesting dismissal of the plaintiff's complaint[12] on the grounds of the plaintiff's failure of stating plausible claims for relief is thus a defense that a defendant may employ to defeat the plaintiff's claim in the early stage.[13]   The DTSA opens the door of federal courts to trade secret plaintiffs to pursue civil remedies,[14] but the DTSA does not “guarantee unfettered access to the federal courts.”[15] When filing a DTSA lawsuit in federal court, a plaintiff must state “the grounds for the court's jurisdiction,” the plaintiff's claims (entitlement to relief), and the plaintiff's “demand for the relief sought” in his complaint.[16] The claim and statement pled by the plaintiff in his complaint must meet the “plausibility” threshold.[17] In other words, at the pleading stage, a plaintiff should plead facts sufficiently demonstrating that all prerequisites of his claim (e.g., jurisdiction and venue,[18] elements of a claim required by the DTSA,[19] etc.) are satisfied when bringing a DTSA claim in federal court.[20] For instance, in addition to claiming the existence of his trade secret, a plaintiff should state how his trade secret was misappropriated through improper means.[21] However, in the context of trade secrets, the plausibility pleading standard can be challenging to a plaintiff because it is never easy to balance between “satisfying the required pleading standard” and “avoiding disclosing too much information about the trade secret in a pleading.”[22]   Let's take pleading the existence of a trade secret as an example. Under the plausibility pleading regime, a plaintiff is required to plead all relevant facts of trade secret (elements)[23] defined by the DTSA to affirmatively prove the existence of his trade secret.[24] In other words, a plaintiff needs to state sufficient facts indicating that the information in dispute has economic value while not being known to the public, and reasonable steps have been taken to maintain the secrecy of that information,[25] all of which plausibly suggest that the information in dispute qualifies as a trade secret.[26] Federal courts do not require a plaintiff to disclose his trade secret in detail in his complaint.[27] Nevertheless, a plaintiff should be able to provide the “general contour” of the alleged trade secret that he seeks to protect.[28] Federal courts would be reluctant to see that a plaintiff, merely “identify[ing] a kind of technology” or “point[ing] to broad areas of technology,” or barely asserting that the misappropriated information is confidential, then “invit[ing] the court to hunt through the details in search of items meeting the statutory definition.”[29] Instead of simply alleging that the subject matter at issue involves a trade secret, a plaintiff's complaint should contain descriptions identifying the plaintiff's trade secret.[30] For instance, in his pleading, a plaintiff has to tell what information is involved and what efforts have been made to maintain the confidentiality of such information.[31] For further example, a plaintiff should provide documents or information constituting the alleged trade secret rather than merely listing general topics or categories of information.[32] IV. Obtaining a DTSA ex parte seizure order is challenging as federal courts tend to take a conservative approach to prevent abuse of this ex parte seizure remedy   Since the DTSA came into effect, federal courts rarely grant an ex parte application for seizure order under the DTSA.[33] The provision for ex parte seizure orders is a controversial part of the DTSA[34] as it allows a court, upon ex parte application and if all DTSA requirements are met, to issue a civil order “for the seizure of property necessary to prevent the propagation or dissemination of the trade secret.”[35] So far federal courts have been hesitant to order DTSA ex parte seizures and are giving great deference to the statutory text of the DTSA seizure order provision.[36] Only when a federal court finds it “clearly appears from specific facts” that certain requirements are met[37] and only in “extraordinary circumstances”[38] may a federal court issue an ex parte seizure order.[39] When being confronted with an ex parte application for seizure order under the DTSA, federal courts tend to favor a conservative approach to prevent the abuse of this ex parte seizure remedy.[40] If any alternative equitable relief is available to achieve the same purpose, federal courts will likely find it unnecessary to issue an ex parte seizure order.[41] In addition, a plaintiff's mere assertion that the defendant, if given notice, would destroy evidence or evade a court order, but without showing that the defendant “had concealed evidence or disregarded court orders in the past,” will likely be insufficient to persuade the court to issue an ex parte seizure order.[42] Furthermore, federal courts will decline to order an ex parte seizure if a plaintiff fails to meet his burden demonstrating that the information in dispute constitutes a trade secret.[43] All of the foregoing suggests that one will likely face an uphill struggle in federal court when seeking to obtain an ex parte seizure order under the DTSA.[44]   Though federal courts sparingly order DTSA ex parte seizures, to date at least one federal court did issue a published DTSA ex parte seizure order, which appeared in Mission Capital Advisors, LLC v. Romaka.[45] In Romaka, the defendant allegedly downloaded the plaintiff's client and contact lists to the defendant's personal computer without the plaintiff's authorization; the plaintiff filed an ex parte motion seeking to seize some properties containing the plaintiff's trade secrets or enjoin the defendant from disclosing that information.[46] During the trial, the defendant neither acknowledged receipt of the court's prior orders[47] nor appeared before the court as ordered,[48] all of which together with other facts in Romaka convinced the court that other forms of equitable relief would be inadequate and the defendant would likely evade or otherwise disobey the court order.[49] After reviewing the facts of this case along with DTSA requirements item by item, the Romaka court found it clearly appears from specific facts that all requirements for an ex parte seizure order under the DTSA are met,[50] and thus, issued a said seizure order as requested by the plaintiff.[51] Romaka gives us some hints about what circumstances would cause a federal court to order a DTSA ex parte seizure.[52] This case tells us that evading or disregarding court-mandated actions is likely demonstrating to the court a propensity to disobey a future court order and may probably increase the likelihood of meriting a DTSA ex parte seizure order.[53] Moreover, echoing other decisions rendered by federal courts, Romaka reveals that federal courts tend to approach ex parte seizure order applications in a gingerly way.[54]   Federal courts take a conservative approach toward ex parte seizure order to curtail abuse of such order[55] does not mean that no injunctive relief is available to victims of trade secret misappropriation. Injunctive relief provided by other federal laws or state laws[56] is nonetheless available to those victims.[57] As long as the facts of the case before the court meet all elements required for injunctive relief, it is not rare for federal courts to grant injunctive relief other than an ex parte seizure order.[58] V. The DTSA might apply to a pre-DTSA trade secret misappropriation that continues after the DTSA became effective   The DTSA expressly states that it applies to any trade secret misappropriation that “occurs on or after the date of the enactment” of the DTSA.[59] Therefore, the DTSA does not apply to trade secret misappropriations that began and ended before the effective date of DTSA.[60] In practice, it is possible that a federal court will dismiss a plaintiff's DTSA claim if the plaintiff fails to state that the alleged trade secret misappropriations (either in whole or in part) took place after the DTSA came into effect.[61]   Federal courts have begun addressing or recognizing that the DTSA might apply to trade secret misappropriations that occurred prior to and continued after the enactment date of the DTSA.[62] However, a plaintiff should “plausibly” and “sufficiently” plead in his claim that some parts of the alleged continuing misappropriation of trade secrets occurred after the DTSA became effective.[63] Some critics opine that, in the case of a continuing trade secret misappropriation that took place before and continued after the DTSA was enacted, the available recovery shall be limited to “post-DTSA misappropriation.”[64]   By being mindful of the foregoing, maybe someday a plaintiff will bring a DTSA claim for a pre-DTSA misappropriation of trade secrets that continues after the DTSA is in effect.[65] In this kind of litigation, one should pay attention to whether the plaintiff has plausibly and sufficiently alleged the part of misappropriation that occurred after the enactment date of the DTSA.[66] When a plaintiff fails to plausibly and sufficiently alleges the post-DTSA misappropriation part, the defendant stands a chance to convince the court to dismiss the plaintiff's claim.[67] VI. Conclusion   To sum up, recent federal decisions and emerging trends in DTSA litigation provide the following implications to Taiwanese companies who might be involved in DTSA litigation in federal court: 1. The DTSA does not preempt or displace any other civil remedies provided by other federal laws and state laws.[68] Rather, the DTSA adds a layer of protection for trade secrets and creates a federal path for plaintiffs to pursue civil remedies.[69] Federal courts tend to turn to local state laws and pre-DTSA decisions for guidance when hearing DTSA claims or making decisions.[70] Do not ignore pre-DTSA trade secret laws or prior decisions as they remain an indispensable reference for federal court. 2. A plaintiff's pleading must satisfy the plausibility pleading standard when the plaintiff brings a DTSA claim in federal court.[71] Whether the plaintiff's pleading satisfies the plausibility pleading standard is likely one of the hard-fought battles between the parties in the early stage of the litigation. The plausibility pleading regime does not require a plaintiff to disclose his trade secrets in detail in his complaint.[72] However, a plaintiff should be able to describe and identify his trade secrets.[73] 3. Seeking to secure a DTSA ex parte seizure order in federal court will likely face an uphill battle.[74] Obtaining alternative injunctive relief would be easier than obtaining a DTSA ex parte seizure. When being confronted with an ex parte application for seizure order under the DTSA, federal courts tend to favor a conservative approach to prevent the abuse of this ex parte seizure remedy.[75] Notwithstanding the foregoing, as long as the facts of the case before the court meet all elements required for injunctive relief, it is not rare for federal courts to grant injunctive relief other than an ex parte seizure order.[76] 4. The DTSA might apply to trade secret misappropriations that occurred prior to and continued after the enactment date of the DTSA.[77] When a DTSA litigation involves this kind of continuing misappropriation, one of those hard-fought battles between the parties during litigation will likely be whether the plaintiff has plausibly and sufficiently stated the part of misappropriation that occurred after the DTSA came into effect.[78] When a plaintiff fails to plausibly and sufficiently alleges the post-DTSA misappropriation part, the defendant stands a chance to convince the court to dismiss the plaintiff's claim.[79] [1] The Defend Trade Secrets Act of 2016, Pub. L. No. 114-153, 130 Stat. 376 (May 11, 2016) (mostly codified in scattered sections of 18 U.S.C. §§1836-1839 [hereinafter the “DTSA”]. [2] Mark L. Krotoski, Greta L. Burkholder, Jenny Harrison & Corey R. Houmand, The Landmark Defend Trade Secrets Act of 2016, at 3 (May 2016); Bradford K. Newman, Jessica Mendelson & MiRi Song, The Defend Trade Secret Act: One Year Later, 2017-Apr Bus. L. Today 1, 1 (2017). [3] 18 U.S.C. §1838. [4] S. Rep. No. 114-220, at 2 (2016) [hereinafter “S. Rep.”]; Kaylee Beauchamp, The Failures of Federalizing Trade Secrets: Why the Defend Trade Secrets Act of 2016 Should Preempt State Law, 86 Miss. L.J. 1031, 1033, 1045 (2017); Zoe Argento, Killing the Golden Goose: The Dangers of Strengthening Domestic Trade Secret Rights in Response to Cyber-Misappropriation, 16 Yale J. L. & Tech. 172, 177 (2014); James Pooley, The Myth of the Trade Secret Troll: Why the Defend Trade Secrets Act Improves the Protection of Commercial Information, 23 Geo. Mason L. Rev. 1045, 1045 (2016); John Conley, New Federal Trade Secret Act and Its Impact on Life Sciences, Genomics L. Rep. (Aug. 12, 2016), https://www.genomicslawreport.com/index.php/2016/08/12/new-federal-trade-secret-act-and-its-impact-on-life-sciences/; Newman, Mendelson & Song, supra note 2, at 1. [5] 18 U.S.C. §1836(c). [6] Krotoski, Burkholder, Harrison & Houmand, supra note 2, at 7; Beauchamp, supra note 4, at 1033, 1045, 1072; Lily Li & Andrea W. Paris, Help! What Are My (Immediate) Defenses to a Federal Trade Secret Claim?, 58-Sep Orange County Law. 52, 52 (2016); Newman, Mendelson & Song, supra note 2, at 1. [7] Conley, supra note 4. [8] William M. Hensley, Post-Enactment Case Law Developments under the Defend Trade Secrets Act, 59-Jul Orange County Law. 42, 44 (2017); Robert B. Milligan & Daniel Joshua Salinas, Emerging Issues In the Defend Trade Secrets Act's Second Year, Seyfarth Shaw LLP: Trading Secrets (June 14, 2017), https://www.tradesecretslaw.com/2017/06/articles/dtsa/emerging-issues-in-the-defend-trade-secrets-acts-second-year/; Jeffrey S. Boxer, John M. Griem, Jr., Alexander G. Malyshev & Dylan L. Ruffi, The Defend Trade Secrets Act – 2016 In Review, Carter Ledyard & Milburn LLP (Jan. 19, 2017), http://www.clm.com/publication.cfm?ID=5579; Rajiv Dharnidharka, Andrew D. Day & Deborah E. McCrimmon, The Defend Trade Secrets Act One Year In – Four Things We've Learned, DLA Piper (May 30, 2017), https://www.dlapiper.com/en/us/insights/publications/2017/05/defend-trade-secrets-act-four-things-learned/; Joshua R. Rich, The DTSA After One Year: Has the Federal Trade Secrets Law Met Expectations?, McDonnell Boehnen Hulbert & Berghoff LLP, Vol. 15 Issue 3 Snippets 6, 7 (Summer 2017). [9] HealthBanc International, LLC v. Synergy Worldwide, 208 F.Supp.3d 1193, 1201 (D.Utah 2016); Phyllis Schlafly Revocable Trust v. Cori, No. 4:16CV01631 JAR, 2016 WL 6611133, at *2-5 (E.D. Mo. Nov. 9, 2016); Panera, LLC v. Nettles, No. 4:16-cv-1181-JAR, 2016 WL 4124114, at *4 fn.2 (E.D. Mo. Aug. 3, 2016); Henry Schein, Inc. v. Cook, 191 F.Supp.3d 1072, 1077, 1079-1080 (N.D.Cal. 2016); Engility Corp. v. Daniels, No. 16-cv-2473-WJM-MEH, 2016 WL 7034976, at *8-10 (D. Colo. Dec. 2, 2016); M.C. Dean, Inc. v. City of Miami Beach, Florida, 199 F. Supp. 3d 1349, 1353-1357 (S.D. Fla. 2016); GTO Access Systems, LLC v. Ghost Controls, LLC, No. 4:16cv355-WS/CAS, 2016 WL 4059706, at *1 fn.1, *2-4 (N.D. Fla. June 20, 2016); Earthbound Corp. v. MiTek USA, Inc., No. C16-1150 RSM, 2016 WL 4418013, at *9-10 (W.D. Wash. Aug. 19, 2016); Kuryakyn Holdings, LLC v. Ciro, LLC, 242 F.Supp.3d 789, 797-800 (W.D. Wisc. 2017). [10] Michelle Evans, Plausibility under the Defend Trade Secrets Act, 16 J. Marshall Rev. Intell. Prop. L. 188, 190 (2017); Eric J. Fues, Maximilienne Giannelli & Jon T. Self, Practice Tips for the Trade Secret Holder: Preparing a Complaint Under the Defend Trade Secrets Act, Inside Counsel (June 14, 2017), https://www.finnegan.com/en/insights/practice-tips-for-the-trade-secret-holder-preparing-a-complaint.html; David R. Fertig & Michael A. Betts, The Defend Trade Secrets Act: Jurisdictional Considerations—Part I, 29 No. 7 Intell. Prop. & Tech. L.J. 3, 3-5 (2017) [hereinafter “Considerations—Part I”]. [11] M.C. Dean, 199 F. Supp. 3d at 1357; Chatterplug, Inc. v. Digital Intent, LLC, No. 1:16-cv-4056, 2016 WL 6395409, at *3 (N.D. Ill. Oct. 28, 2016); Raben Tire Co. v. McFarland, No. 5:16-CV-00141-TBR, 2017 WL 741569, at *2-3 (W.D. Ky. Feb. 24, 2017). [12] Fed. R. Civ. P. 12(b). [13] Jessica Engler, The Defend Trade Secrets Act at Year One, 12 No. 4 In-House Def. Q. 20, 22 (2017). [14] Conley, supra note 4. [15] Fertig & Betts, Considerations—Part I, supra note 10, at 3. [16] Pleading the grounds for the court's jurisdiction, the plaintiff's claim (entitlement to relief), and the plaintiff's demand for the relief sought are requirements for the pleading under Article 8 of the Federal Rules of Civil Procedure (the “FRCP”). Fed. R. Civ. P. 8(a). The FRCP applies to “all civil actions and proceedings in the United States district courts.” Fed. R. Civ. P. 1. Thus, the FRCP requirements also apply to DTSA civil actions brought in federal courts. Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-4. [17] In Bell Atlantic Corporation v. Twombly, the U.S. Supreme Court interpreted Article 8(a) of the FRCP, introduced the concept of “plausibility pleading,” and established the plausibility pleading standard. Bell Atlantic Corporation v. Twombly, 550 U.S. 544, 547, 570 (2007). Under the plausibility pleading standard, a plaintiff is not required to provide “detailed factual allegations” in his complaint, but he needs to state the grounds of his claim (entitlement to relief), which should be “more than labels and conclusions.” Id. at 555, 570. At least, the plaintiff's complaint should contain enough facts showing that the plaintiff's claim is “plausible on its face.” Id. Two years after Twombly, in Ashcroft v. Iqbal the U.S. Supreme Court expressly affirmed that the plausibility pleading standard established in Twombly applies to “all civil actions.” Ashcroft v. Iqbal, 556 U.S. 662, 684 (2009). Accordingly, the plausibility pleading standard applies to all DTSA claims brought in federal courts. Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. It is worth mentioning that some commentators are of the opinion that federal pleading stands are often higher than those required under state laws. Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [18] Gold Medal Prods. Co. v. Bell Flavors & Fragrances, Inc., No. 1:16-CV-00365, 2017 WL 1365798, at *5-8 (S.D. Ohio, Apr. 14, 2017). See also Fertig & Betts, Considerations—Part I, supra note 10, at 4; David R. Fertig & Michael A. Betts, The Defend Trade Secrets Act: Jurisdictional Considerations—Part II, 29 No. 8 Intell. Prop. & Tech. L.J. 12, 12 (2017) [hereinafter “Considerations—Part II”]. [19] McFarland, 2017 WL 741569, at *2-3; M.C. Dean, 199 F. Supp. 3d at 1357; Digital Intent, 2016 WL 6395409, at *3. See also Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. [20] Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 5; Fertig & Betts, Considerations—Part II, supra note 18, at 13-14. [21] Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [22] Id. [23] 18 U.S.C. §1839(3). [24] McFarland, 2017 WL 741569, at *2. [25] Fues, Giannelli & Self, supra note 10. [26] Engler, supra note 13, at 21-22. Providing help in identifying the trade secret in question by requesting as much detail as possible is a common point shared by the plausibility pleading standard in the U.S., and the “Case Detail Explanation Form” (to be filled out by the complainant or the victim) attached to Article 6 of the “Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority” in Taiwan. However, they apply to different circumstances: 1. The plausibility pleading standard in the U.S. sets forth the threshold requirements to be met by a plaintiff in his pleading when the plaintiff brings a civil claim in federal court and applies to all federal civil actions. On the other hand, the aforementioned Case Detail Explanation Form in Taiwan is a form to be filled out by the complainant or the complainant's agent. This Form provides a reference to prosecutors for the investigation of major trade secret cases (criminal cases), but it does not serve as the basis for a prosecutor to determine whether to prosecute a case. 2. The plausibility pleading standard is not only followed by those bringing a federal civil action but also adopted by federal courts when hearing civil cases. Contrarily, the aforementioned Case Detail Explanation Form in Taiwan is provided to prosecutors as a reference for investigation. A prosecutor is not bound to prosecute a case simply based on the information provided in this Form. Likewise, this Form and the information provided therein are not binding on any court in Taiwan. A commentator noted that the Ministry of Justice in Taiwan referred to the “Prosecuting Intellectual Property Crimes (Manual)” of the U.S. Department of Justice when adopting the “Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority” on April 19, 2016. “Article 6 indicates that the complainant or the victim should first fill out the Case Detail Explanation Form, which would help the prosecution authority not only figures out whether the allegedly misappropriated trade secret meets the elements of secrecy, economic value, and secrecy measures under law, but also evaluates whether it is necessary to resort to compulsive measures”. Ti-Chu Chen (陳砥柱), Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority, Louis & Charles Attorneys at Law (遠東萬佳法律事務所) (July 14, 2016), http://www.louisilf.com/zh-tw/posts/2016-07-14 (last visited Dec. 31, 2017). See also Prosecuting Intellectual Property Crimes (Manual) (4th ed. 2013), available at: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/03/26/prosecuting_ip_crimes_manual_2013.pdf. However, the cover of the “Prosecuting Intellectual Property Crimes (Manual)” expressly states that its contents are provided as “internal suggestion to Department of Justice attorneys.” Id. Therefore, the contents of this manual theoretically are not binding on any federal court. [27] Mission Measurement Corp. v. Blackbaud, Inc, 216 F.Supp.3d 915, 921 (N.D.Ill. 2016). [28] Digital Intent, 2016 WL 6395409, at *3. [29] McFarland, 2017 WL 741569, at *2; Blackbaud, 216 F.Supp.3d at 921; Ciro, 242 F.Supp.3d at 798. [30] Evans, supra note 10, at 191. Some federal court decisions show that requesting the plaintiff to provide sufficient facts describing the trade secret in question is not something newly developed following the enactment of the DTSA. Rather, it has been the position held by federal courts before the DTSA came into effect. AWP, Inc. v. Commonwealth Excavating, Inc., Civil Action No. 5:13cv031., 2013 WL 3830500, at *5 (W.D. Va. July 24, 2013); Events Media Network, Inc. v. Weather Channel Interactive, Inc., Civil No. 1:13–03 (RBK/AMD), 2013 WL 3658823, at *3 (D. N.J. July 12, 2013); Council for Educational Travel, USA v. Czopek, Civil No. 1:11–CV–00672, 2011 WL 3882474, at *4 (M.D. Pa. Sept. 2, 2011); DLC DermaCare LLC v. Castillo, No. CV–10–333–PHX–DGC, 2010 WL 5148073, at *4 (D. Ariz. Dec. 14, 2010). [31] Blackbaud, 216 F.Supp.3d at 921. [32] Ciro, 242 F.Supp.3d at 800. [33] Engler, supra note 13, at 21; Hensley, supra note 8, at 44. [34] Hensley, supra note 8, at 44; Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Engler, supra note 13, at 20. [35] 18 U.S.C. §1836(b)(2)(A). [36] Newman, Mendelson & Song, supra note 2, at 3. [37] Under the DTSA, a court may, only in “extraordinary circumstances,” issue an ex parte seizure order when “find[ing] that it clearly appears from specific facts that”: (1) “an order issued pursuant to Rule 65 of the Federal Rules of Civil Procedure or another form of equitable relief would be inadequate to achieve the purpose of this paragraph because the party to which the order would be issued would evade, avoid, or otherwise not comply with such an order;” (2) “an immediate and irreparable injury will occur if such seizure order is not issued;” (3) “the harm to the applicant of denying the application outweighs the harm to the legitimate interests of the person against whom seizure would be ordered of granting the application and substantially outweighs the harm to any third parties who may be harmed by such seizure;” (4) “the applicant is likely to succeed in showing that the information is a trade secret and the person against whom seizure would be ordered misappropriated the trade secret of the applicant by improper means or conspired to use improper means to misappropriate the trade secret of the applicant;” (5) “the person against whom seizure would be ordered has actual possession of the trade secret and any property to be seized;” (6) “the application describes with reasonably particularity the matter to be seized and, to the extent reasonable under the circumstances, identifies the location where the matter is to be seized;” (7) “the person against whom seizure would be ordered, or persons acting in concert with such person would destroy, move, hide, or otherwise make such matter inaccessible to the court, if the applicant were to proceed on notice to such person;” and (8) “the applicant has not publicized the requested seizure”. 18 U.S.C. §1836(b)(2)(A)(ii). [38] 18 U.S.C. §1836(b)(2)(A)(i). [39] Engler, supra note 13, at 21; Michael T. Renaud & Nick Armington, DTSA and Ex Parte Seizure – Lessons from the First Ex Parte Seizure Under The DTSA, Mintz Levin Cohn Ferris Glovsky and Popeo PC (Aug. 21, 2017), https://www.globalipmatters.com/2017/08/21/dtsa-and-ex-parte-seizure-lessons-from-the-first-ex-parte-seizure-under-the-dtsa; Matthew Werdegar & Warren Braunig, One Year On: the Federal Defend Trade Secrets Act, Daily J. (Apr. 26, 2017), available at: https://www.keker.com/Templates/media/files/Articles/Keker%20(DJ-4_26_17).pdf. [40] Newman, Mendelson & Song, supra note 2, at 3; Dharnidharka, Day & McCrimmon, supra note 8; Werdegar & Braunig, supra note 39. [41] OOO Brunswick Rail Mgmt. v. Sultanov, No. 5:17-cv-00017, 2017 WL 67119, *2 (N.D. Cal., Jan. 6, 2017); Magnesita Refractories Company v. Mishra, CAUSE NO. 2:16-CV-524-PPS-JEM, 2017 WL 365619, at *2 (N.D. Ind. Jan. 25, 2017). [42] Baleriz Carribean Ltd. Corp. v. Calvo, Case 1:16-cv-23300-KMW, at 7 (S.D.Fla. Aug. 5, 2016). See also Renaud & Armington, supra note 39. A commentator opines that federal courts are reluctant to issue an ex parte seizure order against someone who has never concealed evidence or disregarded court orders before. Engler, supra note 13, at 21. [43] Digital Assurance Certification, LLC v. Pendolino, Case No: 6:17-cv-72-Orl-31TBS, at *1-2 (M.D.Fla. Jan. 23, 2017). [44] Engler, supra note 13, at 21; Dharnidharka, Day & McCrimmon, supra note 8. [45] Mission Capital Advisors, LLC v. Romaka, No. 16-cv-05878-LLS (S.D.N.Y. July 29, 2016). Some commentators consider Romaka the very first case in which a federal court ordered a DTSA ex parte seizure after the DTSA became effective. Renaud & Armington, supra note 39. [46] Romaka, No. 16-cv-05878-LLS, at 1-3. [47] Id. at 2. [48] Id. [49] Id. [50] In Romaka, the federal district court found the followings after reviewing the facts of this case along with the requirements under the DTSA: (1) “[a]n order issued pursuant to Rule 65 of the Federal Rules of Civil Procedure or another form of equitable relief would be inadequate because [the defendant] would evade, avoid, or otherwise not comply with such an order;” (2) “[a]n immediate and irreparable injury to [the plaintiff] would occur if such seizure is not ordered;” (3) “[t]he harm to [the plaintiff] of denying the application outweighs the harm to the legitimate interests of [the defendant];” (4) “[the plaintiff] is likely to succeed in showing that the information at issue is a trade secret based on [the plaintiff's] averments;” (5) “[the plaintiff] is likely to succeed in showing that [the defendant] has misappropriated [the plaintiff's trade secret] by improper means;” (6) “[the plaintiff] is likely to succeed in showing that the [defendant] has actual possession of the [plaintiff's trade secrets]; (7) “[d]espit the risk that [the defendant] would make the [plaintiff's trade secret] inaccessible to the court, or retain unauthorized copies, [the plaintiff] is proceeding on notice;” and (8) “[the plaintiff] is likely to succeed in showing, and has represented, that it has not publicized the requested seizure.” Id. at 2-4. [51] Id. at 4. In Romaka, the plaintiff also applied for the seizure of its proprietary information other than its client and contact lists. However, the Romaka court denied the plaintiff's request for the seizure of other proprietary information because the plaintiff failed to describe “with sufficient particularity” such information and related facts, such as “confidentiality and irreparable harm.” Id. [52] Renaud & Armington, supra note 39. [53] Id. [54] Newman, Mendelson & Song, supra note 2, at 3; Engler, supra note 13, at 21; Renaud & Armington, supra note 39. [55] Newman, Mendelson & Song, supra note 2, at 3. [56] For instance, the injunctive remedies available under the DTSA. 18 U.S.C. §1836(b)(3). For further example, a preliminary injunction or a temporary restraining order available under the FRCP. Fed. R. Civ. P. 65(a), (b). [57] As stated above, the DTSA does not preempt or displace any other remedies provided by other federal laws and state laws for trade secret misappropriation. 18 U.S.C. §1838. [58] Cook, 191 F.Supp.3d at 1077, 1076-1077, 1079; Daniels, 2016 WL 7034976, at *10-11, 14; Nettles, 2016 WL 4124114, at *4. See also Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [59] DTSA §2(e), Pub. L. No. 114-153, 130 Stat. 376, 381-382. [60] Werdegar & Braunig, supra note 39; Krotoski, Burkholder, Harrison & Houmand, supra note 2, at 14; Engler, supra note 13, at 21. [61] Avago Technologies U.S. Inc. v. Nanoprecision Products, Inc., Case No. 16-cv-03737-JCS, 2017 WL 412524, at *9 (N.D.Cal. Jan. 31, 2017); Cave Consulting Group, Inc. v. Truven Health Analytics Inc., Case No. 15-cv-02177-SI, 2017 WL 1436044, at *5 (N.D. Cal. Apr. 24, 2017); Physician's Surrogacy, Inc. v. German, Case No.: 17CV0718-MMA (WVG), 2017 WL 3622329, at *8-9 (S.D. Cal. Aug. 23, 2017). See also Tara C. Clancy, April Boyer & Michael R. Creta, Emerging Trends in Defend Trade Secrets Act Litigation, National Law Review (Sept. 26, 2017), https://www.natlawreview.com/article/emerging-trends-defend-trade-secrets-act-litigation; Milligan & Salinas, supra note 8. [62] Cook, 191 F.Supp.3d at 1076-1079; Allstate Insurance Company v. Rote, No. 3:16-cv-01432-HZ, 2016 WL 4191015, at *1-5 (D. Or. Aug. 7, 2016); Syntel Sterling Best Shores Mauritius Limited v. Trizetto Group, Inc., 15-CV-211 (LGS) (RLE), 2016 WL 5338550, at *6 (S.D.N.Y. Sept. 23, 2016); Adams Arms, LLC v. Unified Weapon Systems, Inc., Case No. 8:16-cv-1503-T-33AEP, 2016 WL 5391394, at *6 (M.D. Fla. Sept. 27, 2016); Brand Energy & Infrastructure Services, Inc. v. Irex Contracting Group, CIVIL ACTION NO. 16-2499, 2017 WL 1105648, at *3-8 (E.D. Pa. Mar. 24, 2017); Sleekez, LLC v. Horton, CV 16–09–BLG–SPW–TJC, 2017 WL 1906957, at *5-6 (D. Mont. Apr. 21, 2017). See also Rich, supra note 8, at 8. [63] Unified Weapon Systems, 2016 WL 5391394, at *6; Horton, 2017 WL 1906957, at *5-6. See also Milligan & Salinas, supra note 8; Werdegar & Braunig, supra note 39. A recent federal court decision reveals that federal courts will likely dismiss a DTSA claim if a plaintiff makes no specific allegations other than a “conclusory allegation” of the continuing trade secret misappropriation. Hydrogen Master Rights, Ltd. v. Weston, 228 F.Supp.3d 320, 338 (D.Del. 2017). See also Engler, supra note 13, at 23. [64] Unified Weapon Systems, 2016 WL 5391394, at *6. See also Rich, supra note 8, at 8. [65] Engler, supra note 13, at 23. [66] Milligan & Salinas, supra note 8. [67] Engler, supra note 13, at 23. [68] 18 U.S.C. § 1838. [69] Conley, supra note 4. [70] Synergy Worldwide, 208 F.Supp.3d at 1201; Cori, 2016 WL 6611133, at *2-5; Nettles, 2016 WL 4124114, at *4 fn.2; Cook, 191 F.Supp.3d at 1077, 1079-1080; Daniels, 2016 WL 7034976, at *8-10; M.C. Dean, 199 F. Supp. 3d at 1353-1357; Ghost Controls, 2016 WL 4059706, at *1 fn.1, *2-4; MiTek USA, 2016 WL 4418013, at *9-10; Ciro, 242 F.Supp.3d at 797-800. [71] Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. [72] Blackbaud, 216 F.Supp.3d at 921. [73] Digital Intent, 2016 WL 6395409, at *3. See also Evans, supra note 10, at 191. [74] Engler, supra note 13, at 21; Dharnidharka, Day & McCrimmon, supra note 8. [75] Sultanov, 2017 WL 67119, at *2; Mishra, 2017 WL 365619, at *2; Calvo, Case 1:16-cv-23300-KMW, at 7; Pendolino, 2017 WL 320830, at *1-2. See also Newman, Mendelson & Song, supra note 2, at 3; Engler, supra note 13, at 21; Renaud & Armington, supra note 39; Werdegar & Braunig, supra note 39. [76] Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [77] Cook, 191 F.Supp.3d at 1076-1079; Rote, 2016 WL 4191015, at *1-5; Trizetto Group, 2016 WL 5338550, at *6; Unified Weapon Systems, 2016 WL 5391394, at *6; Irex Contracting Group, 2017 WL 1105648, at *3-8; Horton, 2017 WL 1906957, at *5-6. See also Rich, supra note 8, at 8. [78] Milligan & Salinas, supra note 8. [79] Engler, supra note 13, at 23.

The Introduction to the Trade Secret Management System Standard

The Introduction to the Trade Secret Management System Standard 2024/02/06 The “Trade Secret Management System”, released by the Science & Technology Law Institute of Institute for Information Industry on March 1, 2023, is a standard to guide organizations developing a systematic trade secret management system in alignment with relevant regulations and their operation objectives. Its aim is to assist the organizations reducing the risks of trade secret leakage while improving organizational competitive advantages. The Trade Secret Management System standard provides a framework for organizations to design, implement, and continuously improve their trade secret management performance. As defined in Article 2 of the Trade Secrets Act, "trade secret" could be any method, technique, process, formula, program, design, or other information that may be used in the course of production, sales, or operations, meeting following requirements: 1. It is not known to persons generally involved in the information of this type; 2. It has economic value, actual or potential, due to its secretive nature; and 3. Its owner has taken reasonable measures to maintain its secrecy. The Trade Secret Management System standard comprises a total of 10 chapters. The following is a brief overview of each chapter: Chapter 1: This chapter indicates the standard is applicable to all organizations regardless of their types, sizes, and the products or services they provide. It mentions that the organization can determine their management approached to meet the requirements of the standard. Chapter 2: This chapter provides the definitions of specific terms used in the standard. Chapter 3: This chapter introduces the top management’s responsibility to ensure the establishment, continuous appropriateness, completeness, and effectiveness of the trade secret management system. Chapter 4: This chapter requires the organization to define the scope of its trade secrets and ensure the defined trade secrets can be identified. This chapter also requires organization set up the permission to restrict access to personnel who need to know or use the trade secrets. Chapter 5: This chapter introduces the organization shall control the use of trade secrets, including actions such as copying, destruction, etc. Additionally, organization shall preserve the records of the aforementioned use of trade secrets and detect if any abnormal usage exists. Chapter 6: This chapter discusses measures the organization shall take for internal personnel control. These measures include regular training on trade secret-related requirements, signing of confidentiality agreements, and various management actions the organization should take throughout the processes of personnel recruitment, employment, and departure. Chapter 7: This chapter demonstrates the organization’s management of environments, equipment and internet involving its trade secrets. It requires the implementation of access control measures for places where trade secrets are stored or processed. It also stipulates controls on the use of record media and devices which can access trade secrets, as well as controlling the transmission of trade secrets via network. Chapter 8: This chapter introduces the management measures the organization shall take when interacting with other parties. These measures include signing non-disclosure agreement (NDAs) with the party who will access trade secrets and requiring such party not to hold the trade secrets once the corporation ends. Chapter 9: This chapter introduces that the organization shall establish a trade secret dispute resolution procedure to prevent or mitigate damages to the organization caused by disputes. Chapter10: This chapter outlines the supervision and the improvement of the trade secret management system of the organization. Organizations can follow the standard to build their own trade secret management system based on the Plan-Do-Check-Act (PDCA) concept. The trade secret management system would include defining trade secrets to be managed, establishing protocols for the use of trade secrets, managing employees, controlling of internet, devices and environment related to trade secrets, regulating external activities, developing trade secret dispute resolution procedure, and regularly monitoring the effectiveness to improve trade secret management performance. This standard could serve as a benchmark for the organization or third parties to evaluate compliance with expected trade secret managements.

The Introduction to the Trade Secret Management Guidelines

The Introduction to the Trade Secret Management Guidelines 2024/09/09 Due to an open, collaborative culture and the need to balance knowledge sharing with protection, research academic institutions always face unique challenges in managing confidential information. However, trade secret protection is still essential for research academic institutions in order to safeguard their competitive advantages and valuable research results. Accordingly, the “Trade Secret Management Guidelines”, released by the Taiwan Intellectual Property Office (TIPO) on May 27, 2024, is specifically tailored for the trade secret protection in the research and academic circumstance. Taking into account the essential differences between research academic institutions and enterprises, these guidelines use a phased and scalable approach to implement trade secret protection measures. With these guidelines, each research academic institution can evaluate its own size, research field, available resources, etc., and establish an appropriate trade secret management system to effectively identify, protect and manage its trade secrets. The Trade Secret Management guidelines outline 13 measures for managing trade secrets, covering the entire life cycle of trade secret protection. In addition, these guidelines recommends that research academic institutions adopt a phased implementation strategy, starting from the "entry-level" stage focusing on basic measures, and gradually entering the "basic" and "enhanced" stages to improve each management measure. The following is an overview of each measure: 1.Distinguishing Trade Secrets In order to facilitate the protection of trade secrets, institutions should distinguish what is trade secret information at the entry stage, whether it is self-developed or obtained from others. As progressing to the basic stage, institutions should define and provide examples of trade secrets they produce or acquire. When entering the enhanced stage, institutions should develop a process for identifying whether an information is a trade secret. 2.Access Control To prevent unauthorized disclosure, institutions should control access to trade secrets. At the entry stage, institutions must set access permissions for trade secrets. As progressing to the basic stage, access should be granted based on the need for the information. When entering the enhanced stage, institutions need to adjust access permissions in response to job changes and personnel turnover. 3.Identification Identifying trade secrets helps ensure that those accessing the information are aware of its confidentiality. At the entry stage, institutions need to identify information considered to be trade secrets, but there are no restrictions on the identification method. As progressing to the basic stage, institutions need to clearly define how trade secrets will be identified. When entering the enhanced stage, the key is to ensure that all contacts know that the information they come into contact with is a trade secret. 4.External Disclosure Review In order not to affect subsequent research or applications, institutions should review the information that will be disclosed to the public. At the entry stage, institutions should ensure that information is reviewed by responsible personnel before it is disclosed to the public. As progressing to the basic stage, institutions need to identify which items should be reviewed. When entering the enhanced stage, institutions shall distinguish what should be reviewed based on the nature of the information disclosed to the public. 5.Circulation Control Controlling the circulation of trade secrets can prevent them from being arbitrarily disclosed. At the entry stage, institutions should ensure that responsible personnel have consent to the circulation of trade secrets. As progressing to the basic stage, the key is whether the behavior of circulating trade secrets is recorded. When entering the enhanced stage, institutions should take countermeasures to prevent trade secrets from being leaked during the circulation process. 6.Reproduction Control Controlling the reproduction of trade secrets can ensure that the use of trade secrets is limited to a controllable scope. At the entry stage, institutions should limit the reproduction of trade secrets. As progressing to the basic stage, the key is whether the behavior of reproducing trade secrets is recorded. When entering the enhanced stage, institutions should take measures to avoid the increased risk of leakage of trade secrets after the reproduction behavior. 7.Destruction At the entry stage, institutions should ensure that the consent of the responsible personnel is obtained when destroying trade secret. As progressing to the basic stage, institutions should consider the impact of destruction before destroying trade secrets and ensure that records of destruction are retained. When entering the enhanced stage, the key is whether the trade secrets are destroyed in an irrecoverable way. 8.Usage record retention Keeping the usage record of trade secrets can help provide evidence in litigation. At the entry stage, institutions should keep records of access and use of trade secrets. As progressing to the basic stage, institutions should further specify the items that need to be retained in the records. When entering the enhanced stage, institutions should ensure that the records retained are authentic and will not be arbitrarily tampered with. Therefore, if necessary, a third party agency can be entrusted with the preservation of evidence. 9.Designating Responsibility for Implementation Setting up responsible personnel can help ensure that the trade secret management mechanism is effectively implemented. At the entry stage, institutions simply need to ensure there is someone responsible for driving trade secret management. As progressing to the basic stage, institutions shall assign dedicated personnel to be responsible for trade secret management. When entering the enhanced stage, institutions must establish a dedicated unit to coordinate the protection of trade secrets through a clear division of powers and responsibilities. 10.Confidentiality and Ownership Arrangements Signing confidentiality and ownership agreements can ensure that internal personnel who may have access to trade secrets understand their confidentiality obligations. At the entry stage, institutions only need to sign a written confidentiality agreement with those who may have access to trade secrets. As progressing to the basic stage, institutions shall clearly define the items that must be included in the confidentiality and ownership agreement. When entering the enhanced stage, institutions need to further evaluate whether to adjust the contents of confidentiality and ownership agreements in response to job changes and personnel turnover. 11.Promotion and Training Through promotion and training, institutions can gradually improve personnel's awareness of confidentiality and help them understand the key points of trade secret management. At the entry stage, institutions can promote the importance of trade secret management and provide appropriate training to all personnel. As progressing to the basic stage, institutions should establish promotional materials, explain the management objectives and specific practices in the training, and conduct an evaluation of effectiveness. When entering the enhanced stage, institutions need to adjust the content required for training based on differences in units, objects, trade secret characteristics, etc. 12.Departure Management At the entry stage, institutions should remind departing personnel of their confidentiality obligations. As progressing to the basic stage, institutions shall further require the departing personnel to hand over the trade secrets they held during their tenure. When entering the enhanced stage, institutions need to conduct exit interviews with important departing personnel to ensure that they clearly understand their confidentiality obligations. 13.Confidentiality and Ownership Arrangements with External Parties Signing confidentiality and ownership agreements with external parties can help prevent institutions mired in unnecessary controversies. At the entry stage, institutions only need to sign confidentiality agreement with external parties before providing trade secrets to them. As progressing to the basic stage, institutions shall clearly define the items that must be included in the confidentiality and ownership agreement. When entering the enhanced stage, institutions needs to confirm with external parties and reach a consensus on the management measures that both parties need to take. The Trade Secret Management guidelines provide a comprehensive framework for research academic institutions in Taiwan to protect their trade secrets. Regardless of the size of the research academic institutions or the field it focuses on, as long as they follow the above-mentioned 13 measures and adjusts according to their current management situations, they can gradually establish a trade secret management system that meets their own needs.

Antitrust Issue of Reasonable Royalty and Prohibition of Excessive Pricing in Taiwan

Antitrust Issue of Reasonable Royalty and Prohibition of Excessive Pricing in Taiwan A proposed antitrust framework to determine a reasonable royalty I. INTRODUCTION   “Can, and should antitrust laws and authorities step in market prices?” - It has long been a controversial antitrust issue, especially when an antitrust case is involved with allegedly unlawful monopolization (or called abuse of monopoly in some countries), Intellectual Property (IP) rights (IPRs), reasonable royalties, and the complex and fast-changing technologies behind. It thus constitutes the tricky and challenging antitrust issue of reasonable royalty - “if a monopolistic firm is charging reasonable royalties or abusing its monopoly power?” Since the goals and regimes of antitrust are very different between Asia, the United States (the U.S.), and Europe, there are consequently various ways to deal with such issue. A. China and its Per-Se Violation of Excessive Pricing   Several countries in East Asia aim to protect fair competition and social public interests via antitrust laws, including some other non-competition-based goals.[1] China, Japan, Korea and Taiwan’s goals of antitrust all include protection of fair competition. China also articulates its goals to maintain public interests and promote socialist market economy. Japan also aims to promote the employment rate and the level of national income which are not competition-based goals. Furthermore, South Korea expresses its antitrust goal to achieve balanced economic development which is somehow tricky to judge. As a result of the concepts of fairness and non-competition interests, the antitrust issue of reasonable royalty can possibly lead to the determination of unfairly high prices and thus constitutes an unlawful per se violation of excessive pricing in East Asia.   Take China as an example, China explicitly articulates the prohibition of charging unfairly high prices as a firm in dominant position.[2] Moreover, China has further stepped in determining “appropriate royalties” supposedly charged by licensors and has demanded foreign firms in China to charge lower royalty rates.[3] In Huawei v. InterDigital Technology Corporation (IDC), the court ruled that IDC charged Chinese firms unfairly high royalties and further held that the royalty rates of the Standard Essential Patents (SEPs) charged by IDC shall not exceed 0.019%. In the Qualcomm case in China, National Development and Reform Commission of China ruled that Qualcomm was charging unfairly high prices and demanded it to lower its royalty base.   Additionally, China’s Anti-Monopoly Guidelines on the Abuse of Intellectual Property Rights published by the Ministry of Commerce of the People's Republic of China (MOFCOM) in March of 2017 were passed in the end of 2018.[4] While already waiting to be formally executed, these Guidelines had received comments regarding reasonable royalties – especially the antitrust violation of licensing IPRs at unfairly high prices with 5 listed factors to consider whether there is abuse of dominant position.[5] By pointing out the dangers of regulating price following with potential harms to competition, one of the comments encourages the Guidelines to have the relevant factors in terms of determining unfairly high prices, such as the prices of comparable licenses instead of any other irrelevant indicators. B. European Commission (EC)[6] and its Per-Se Violation of Excessive Pricing   While embracing free market economy and achieving social and political goals at the same time, EC prohibits unfairly high prices as unlawful per se by articulating “directly or indirectly imposing unfair purchase or selling prices or other unfair trading conditions” as abuse of market dominance.[7] The test to it started from the case United Brands (1978) which stipulates the difference between cost and price.[8]   As the time came to the late 2000s, EC once said that “it takes no position on what a reasonable royalty is” in 2013 but later stated its option to act directly against excessive prices in 2016.[9] In 2017, the Copyright and Communication Consulting Agency/Latvian Authors Association (the AKKA/LAA case) was brought to the court for charging excessive fees for its exclusive right to license.[10] According to Article 267(a) of the Treaty on the Functioning of the European Union, the Court of Justice of the European Union (CJEU) shall have jurisdiction to give preliminary rulings concerning the interpretation of the Treaties. Given the questions referred to the CJEU in the AKKA/LAA case, the concept of excessive pricing therefore had the chance to be clarified further. [11] Three important principles established in this case are: (1) comparing the price at issue between the prices charged by other appropriate and sufficient comparators; (2) there is no threshold of what a royalty rate must be regarded as appreciably high, but a difference between rates must be both significant and persistent to be appreciable; (3) an analysis of fairness justification provided by the alleged dominant firm must be conducted.[12] The AKKA/LAA case reestablished and reaffirmed EC’s resolve to enforce prohibition of excessive pricing.   As for the recent times, the Danish Competition Council found that the Swedish pharmaceutical distributor - CD Pharma had abused its dominant position by charging excessive prices for Syntocinon, ruling the price increase of 2000% unjustified.[13] The appeal against this decision is now pending. Many more excessive pricing cases are still ongoing within EU jurisdictions. C. The U.S. and its Hands-Off Approach towards Pricing   U.S., on the other hand, never did and does not prohibit monopoly or excessive pricing, and has been warning the great dangers and potential harms to competition resulting from regulating price.[14] The long-established principle of not regulating price, however, was shaken by U.S. Federal Trade Commission (FTC)’s complaint against Qualcomm for conducting unfair methods of competition in 2017.[15]   U.S. FTC filed a complaint against Qualcomm in 2017, alleging Qualcomm violating the Federal Trade Commission Act.According to the complaint, customers accepted elevated royalties that a court would not determine fair and reasonable due to Qualcomm’s unlawful maintenance of monopoly. However, the complaint fails to explain what a reasonable royalty is and why Qualcomm charges more than it is supposed to be charging.[16] Furthermore, the dissenting statement of this case states that the theory adopted by FTC required proof of Qualcomm charging unfairly high royalties where there was failure of proving reasonable royalty baseline in the case.[17] In January of 2019, this case finally kicked off in a California courtroom and the outcome of it will definitely have tremendous impacts on every stakeholder. Later in May 2019, the United States District Court for the Northern District of California found that Qualcomm violated the FTC Act. The case is still ongoing. D. Taiwan and its Unclear Attitude towards the Antitrust Issue of Reasonable Royalty   So, where does Taiwan stand between prohibition of excessive pricing and the hands-off approach in the U.S.? In Taiwan, improperly setting, maintaining, or changing the price for goods or the remuneration for services as a monopolistic enterprise has long been unlawful per se since Taiwan’s Fair Trade Act (FTA) was enacted in 1991.[18] This unlawful per se violation is in fact Taiwan’s prohibition of excessive pricing. However, the attitudes of Taiwan Fair Trade Commission (TFTC) and the courts in Taiwan towards the antitrust issue of reasonable royalty can be switching. They have avoided the issue, left the issue for private contracting, resorted to Patent Act, and determined royalties for the involving parties.   Antitrust cases involving the issue of reasonable royalty can be a matter of billion-dollar fines, tremendous costs of litigation, negative impacts on innovation and competition, and harms to consumers. Such important issue can no longer be neglected by Taiwan anymore. By focusing on the antitrust issue of reasonable royalty in Taiwan, this paper will begin with the past attitude and the current antitrust framework of reasonable royalty in Taiwan. Further, because Taiwan has been looking up to the U.S. and its patent law in terms of calculating reasonable royalty in patent infringement cases; this paper will then turn to the reasonable royalty approach in Taiwan and the U.S. respectively. Even though this paper does not support prohibition of excessive pricing, we hope the antitrust issue of reasonable royalty in any excessive pricing case in Taiwan will be properly and carefully dealt with. Therefore, based on the proposed methodologies in a 2016 paper[19], the core of this paper will be proposing a framework for Taiwan in order to give clearer directions on how to face the antitrust issue of reasonable royalty along with the potential violation of Article 9 of FTA. II. THE PAST ATTITUDE AND THE CURRENT ANTITRUST FRAMEWORK OF REASONABLE ROYALTY IN TAIWAN A. The RCA, Catrick, and Microsoft case - 1995 ~ 2003   TFTC’s attitude towards the antitrust issue of reasonable royalty had long been unclear. In TFTC v. Radio of Corporation of America (RCA)(1995), RCA settled with TFTC for the accusation of charging improper royalties.[20]In TFTC v. Microsoft (2002-2003), Microsoft settled with TFTC after 10 months being accused of conducting excessive pricing. [21] However, the details of both settlements were never published. In the Catrick case (1998), a U.S. firm named Catrick was accused of improperly charging royalties.[22] TFTC attempted to resort to Patent Act but Patent Act at that time was silent on calculation of royalties. To play safe, TFTC did not interpret FTA or determine a reasonable royalty. Instead, TFTC left the issue to be solved under the principle of freedom of contract and closed the investigation.[23] B. The CD-R Patent Pool Case – 2001~2015 1. Summary of the case   Even being given 15 years of time, the antitrust issue of reasonable royalty still remained unsolved in the CD-R Patent Pool case (2001-2015). Upon the investigation from 1999, TFTC found that Philips Electronics NV (Philips) and other two companies had violated Article 10 of FTA with their unlawful concerted action and abuse of dominance in 2001.[24] Here is the background: The CD-R manufactures in Taiwan accounted for 80% of the global CD-R manufacturing output when the time the CD-R technologies were a worldwide industrial revolution. The price of CD-R was originally at around $60 per piece in 1990. It later went down to $0.20 per piece in 2000. However, the three enterprises in the case kept refusing to change the formula for calculating the license fee. Thus, the pricing issue here was that if the three monopolistic enterprises improperly maintained the formula for calculating the CD-R license fee by joint licensing and refusing to change the license fee even though the market conditions had changed drastically at that time.[25]   After a series of appeals and retrials, TFTC again ruled that Philips violated Section 2 of Article 10 of FTA by abusing its dominant position and improperly maintaining the price for its jointly licensed technologies in 2015.[26] To everyone’s disappointment, TFTC again left the determination of reasonable royalty unsolved. 2. Fights over reasonable royalty between courts and TFTC   The tricky thing is, administrative courts, TFTC, Intellectual Property Court of Taiwan (IP Court of Taiwan) held totally different positions in the CD-R case in terms of the antitrust pricing issue: a. Taipei High Administrative Court (2003) [27] The court reasoned that the license fees should be determined by competition and cost structure on principle. As a result, the determinants to reasonable royalties would be supply and demand in the market. b. TFTC Decision No.095045 (2006) [28] TFTC did not hold that the defendants’ pricing practice in violation of FTA. However, it stated its position in stepping in royalties - “Business value of patents varies due to maturity of technologies and market development. Therefore, patent holders should consider prices of final products, value of patents, and contributions made by licensees while determining reasonable royalties… It is inappropriate for the antitrust authority in Taiwan to step in royalties unless there is indication of illegal monopolization or cartel. “ c. Intellectual Property Court Appeal Case No.14 (2008) [29] IP Court of Taiwan incorporated the concept of fairness in its decision by saying – “courts could only adjust the royalty rates in consideration of fairness towards both parties and other relevant factors in the contract.” Further, the court also said that it was not within TFTC’s jurisdiction to determine the reasonableness of the license fee charged by Philips. d. TFTC Decision No. 098156 (2009)[30] By revealing the prices of CD-R output, shipment of CD-R, change of market conditions within 10 years, and the 60 times higher royalty revenues earned by Philips, Sony and Taiyo Yuden, TFTC found that the profits earned by the three defendants were beyond expectation and estimation. In conclusion, TFTC again held in its 2009 decision that the three defendants violated FTA by not giving opportunities to negotiate over the CD-R license fee upon the easily perceived market changes. e. Supreme Court of Taiwan, Case No.883 (2012) [31] After the long fights between courts and TFTC for 10 years, Sony and Taiyo Yuden had stopped fighting and their cases were affirmed in 2011. As for Philips, they enjoyed a huge turning point in 2012 because the Supreme Court of Taiwan abolished IP Court of Taiwan’s 2008 verdict and ruled that the governing laws of the contracts between the involving parties were Dutch laws. f. TFTC Decision No. 104027 (2015)[32] TFTC did not get defeated and reached another decision against Philips in 2015. In the reasoning, TFTC first clarified that market prices should be determined by competition and cost structure. Then it claimed to still have the role to rule that Philips had been improperly maintaining the license fee of CD-R through abuse of dominance, refusals to renegotiate and earning excessive profits. To everyone’s disappointment, TFTC still left the determination of reasonable royalty unsolved. C. TFTC v. Qualcomm Incorporated (Qualcomm) (2015 - 2018)[33]   In 2017, TFTC ruled that Qualcomm violated Article 9(1) of FTA[34] by refusing to license, imposing no license no chips policy, and conducting exclusive dealing. As for the pricing issue in this case, it was argued if the license fees charged by Qualcomm were unreasonably high and if the fees should be based on value of patents instead of net prices of manufactured phones. TFTC did point out the pricing issue in its reasoning but did not say much further. Instead, TFTC commented in the decision that Qualcomm had been enjoying excessive profits and stated that license fee was a matter of freedom of contract and negotiation.[35] After a series of fights between TFTC and Qualcomm, both parties agreed to settle in August 2018.[36] The Administrative Decision No. 106094 issued by TFTC was vacated with the replacement of the settlement[37] which Qualcomm agreed to invest hundreds of millions in Taiwan and on other matters.[38] D. The Current Antitrust Framework of Reasonable Royalty in Taiwan   The current antitrust framework of reasonable royalty in Taiwan in this paper is based on the latest version of Fair Trade Act of Taiwan which was amended in 2017 and the latest version of IP Guidelines of Taiwan which was amended in 2016.[39] There are three main steps in the current antitrust framework to deal with the reasonable royalty issue that suspiciously violates FTA in Taiwan. 1. Proper conducts pursuant to Intellectual Property Laws in Taiwan   First, and most importantly, Article 45 of FTA excludes the application of FTA to all “proper conducts” pursuant to all IP Laws in Taiwan where TFTC does not give quite clear explanation of.[40] The reason behind such exclusion stated in the legislative rationale of Article 45 of FTA is problematic - “Copyrights, Trademarks, and Patents are monopoly rights endowed by IP laws. Therefore, FTA shall not apply to them by nature.” [41] 2. Guidelines on Technology Licensing Arrangements (IP Guidelines of Taiwan)   Secondly, TFTC shall turn to review if IP Guidelines of Taiwan apply to any licensing practice in the case when it sees Article 45 of FTA not applicable.[42] IP Guidelines of Taiwan articulates a correct and fundamental principle while reviewing a technology licensing agreement – “TFTC does not presume market power resulted from owning a patent or know-how.”[43] Further, IP Guidelines of Taiwan do not articulate reasonable royalty or excessive pricing. Instead, the Guidelines make clear of the allowed and prohibited calculation methods for royalties. By recognizing the ease of calculation as efficiency, IP Guidelines of Taiwan basically allows the end product approach and the net sales approach to be applied in a technology licensing agreement as long as the licensed technology was indeed used by the licensee.[44] Notwithstanding, TFTC still has the power to find an antitrust violation upon finding of improper matters even if a licensor complies with Section C of Article 5 of IP Guidelines of Taiwan. [45] 3. Prohibited monopolistic conducts   When neither Article 45 of FTA nor IP Guidelines of Taiwan applies to the case, the last step TFTC shall take towards reasonable royalty issue is to review if Section 2 of Article 9 of FTA applies - ” Monopolistic enterprises shall not engage in improperly setting, maintaining or changing the price for goods or the remuneration for services.” [46] Basically, it is the prohibition of excessive pricing in Taiwan. To be noticed, Article 9 of FTA can only be applied when there is one or more monopolistic enterprises involved. 4. Some issues under the current antitrust framework of reasonable royalty in Taiwan a. Proper conducts pursuant to all IP laws in Taiwan. Article 45 of FTA excludes the application of FTA to what so called “proper IP conducts.” Such exclusion is based on the idea that IPRs are monopoly rights – which is problematic.[47] The fact is - IPRs are exclusive rights instead of monopoly rights. IPRs do not necessarily confer monopoly power or induce more anticompetitive behaviors than other types of property. Moreover, exercising an IPR can be engaging in improper market conducts that lessens competition. In other words, what should be kept in mind is that a proper IP conduct may still possibly constitute an antitrust violation. b. The maybe-violation in IP Guidelines of Taiwan. IP Guidelines of Taiwan are basically friendly towards the end product and the net sales approaches for calculating royalties. However, Article 5 of the Guidelines still gives TFTC the power to find a “maybe” antitrust violation upon any improper matters. Such maybe violation makes the protection under IP Guidelines shaky and even not that useful. c. No such thing as excessive profit. One of the legislative reasons behind the prohibition of excessive pricing in Taiwan is that - “when a firm does not price its products based on reflection of the costs but intends to gain exorbitant profits, such improper pricing conduct would be the most effective way to exclude competition.” [48] Firstly, there is no such thing as an excessive or exorbitant profit in a free market economy when a price is determined by supply and demand which results in profits you earn accordingly. Secondly, instead of the profits, it should be the price or the pricing practice to be evaluated due to the purpose of excessive pricing violation. d. Missing harms to competition. Most important of all in any excessive pricing case – where are the harms to competition? It should be clear that unjustified profits are not what antitrust laws aim to punish but the anticompetitive market conducts that harm competition. Which is to say – if a monopolistic enterprise has been charging excessive prices through abuse of monopoly that generates harms to competition? With the ultimate goal of protecting the overall competition and consumers, there must be potential or actual harms to competition proven in any excessive pricing case. Such as higher prices, lower outputs, exclusion of competition, entry barriers, negative impact on innovation, or so. E. The Reasonable Royalty Approach under the Patent Act in Taiwan 1. Damages as reasonable royalty   Article 97(1) of Patent Act of Taiwan lists three approaches for calculating damages in any event of patent infringement.[49] One of the approaches is the reasonable royalty approach.[50] The so-called reasonable royalty is the royalty the licensee would have paid if there had been a negotiation instead of an infringement. In practical, any profit earned by the licensee from the infringement is excluded from the damages while adopting such approach. Since the infringing licensee saved the costs of negotiation and the licensor spent extra costs on patent infringement litigation, it is also recognized that damages calculated by adopting the reasonable royalty approach can be more than the royalty the licensee would have paid.[51] 2. Determinants and principles in a hypothetical negotiation over royalty   After all, the reasonable royalty approach assumes a hypothetical negotiation over royalty between the licensee and licensor. There are still controversies over the determinants and principles to be applied while adopting such approach. Various considerations would possibly lead to drastically different reasonable royalties just like the NT$10 million and NT$1 billion damages in the Philips v. Gigastorage case. [52] Koninklijke Philips NV (Philips) brought a patent infringement lawsuit against Gigastorage Corporation (Gigastorage, a Taiwan-based manufacturer) at the IP Court of Taiwan in 2014, alleging that Gigastorage had been infringing their Taiwanese patent from 2000 through 2015 by manufacturing and selling DVD related products. The pricing issue here is how to calculate the damages and compensation of unauthorized utilization of the patent involved where the calculation methods and considerations would make big differences. IP Court of Taiwan awarded NT$10.5 million as damages based on reasonable royalty approach in the first trial. However, the same court of different judges later ruled that the damages should be over NT$1 billion according to unjust enrichment. The case was brought to the Supreme Court of Taiwan in 2017. In September 2018, the NT$1 billion judgement was remanded and now the IP Court of Taiwan is thus responsible for a retrial.[53]   Nevertheless, the two most common determinants to a reasonable royalty under this approach are – licensing history and comparable patents. Interestingly and importantly, these two determinants are also taken into consideration by several antitrust jurisdictions in the world while dealing with the issue of reasonable royalty. III. WHETHER TO REGULATE EXCESSIVE PRICING AND THE MONDERN REASONABLE ROYALTY APPROACH IN THE U.S. A. Whether to regulate excessive pricing?   Supply and demand are two key factors that determine a price in a free market. Profits are usually what encourage innovation and attract firms doing businesses in the first place. There is no doubt that a firm sets a price it believes to maximize its profits – which is profit maximization rule in economics. When a monopoly tries to manipulate or disturb the market by setting a lower or higher price that does not go along with profit maximization rule, here are some possible consequences: (1) new entries in the market trying to share the profits; (2) consumers might switch to substitutes of the product in order to pay less; (3) monopoly might lose profits that it would earn otherwise. Simply saying, a free market usually responds to market changes quite well and can function accordingly without too much disruption. Regardless of the free market mechanism, there are still many voices discouraging the prohibition of excessive pricing due to the inherent dangers of regulating prices – such as discouraging investment in research and development activities, impairing innovation, and ultimately harming consumers.[54]   Along with the antitrust jurisdictions that prohibit excessive pricing by law, there are studies showing that prohibition of excessive pricing may benefit the market or – the consumers. A 2015 research finds that: “when economies of scale and entry barriers imply a great likelihood of dominant firms not subjecting to regulation but capable of charging supra-competitive prices, excessive pricing regulation is then important for smaller markets.”[55] A study in 2017 further examines the competitive effects of the prohibition of excessive pricing by applying two competitive benchmarks – retrospective benchmark and contemporaneous benchmark to assess the price charged by a dominant firm excessive or not. The study finds that the two benchmarks restrain the dominant firm’s behavior but soften the firm’s behavior when its competing with a rival. By setting certain factors homogeneous, a retrospective benchmark for excessive pricing benefits consumers. While under different circumstances, consumers are worse off and inefficient entries are created. Overall, the study indicates that the competitive effects of prohibition of excessive pricing vary as we consider various factors – such as the nature of competition, the expected fines, incentive to invest in research and development (R&D), cost of litigation and more. [56]   As a whole, there are still a great number of concerns about potential dangers of regulating price. However, whether to regulate excessive pricing or not, the fundamental question to ask is still – “how to determine a reasonable price to assess if the price at issue is excessive?” B. The Modern Reasonable Royalty Approach in the U.S.   U.S. antitrust agencies do not prohibit excessive pricing. An IPR holder is free to charge a monopoly price just as a monopoly is free to earn its monopoly profits as long as the monopoly price and profits are not resulted from anticompetitive conducts that violate antitrust laws in the U.S. While saying that, U.S. still has a reasonable royalty approach developed under its patent law which is the law Taiwan has copied a lot from. [57]   There are different methodologies for the reasonable royalty approach in the U.S., the most common one would be the hypothetical negotiation which was matured from Georgia-Pacific Corp. v. United States Plywood Corpin 1971 (Georgia-Pacific case), ruling that the proper damages in a patent infringement case as – “the amount that a licensor and the infringer would have agreed upon.” By adopting this hypothetical negotiation framework, the case eventually developed a list of 15 determinants as to a reasonable royalty: [58] (1) The royalties received by the patentee for the licensing of the patent in suit, proving or tending to prove an established royalty. (2) The rates paid by the licensee for the use of other patents comparable to the patent in suit. (3) The nature and scope of the license, as exclusive or non-exclusive; or as restricted or non-restricted in terms of territory or with respect to whom the manufactured product may be sold. (4) The licensor's established policy and marketing program to maintain his patent monopoly by not licensing others to use the invention or by granting licenses under special conditions designed to preserve that monopoly. (5) The commercial relationship between the licensor and licensee, such as, whether they are competitors in the same territory in the same line of business; or whether they are inventor and promotor. (6) The effect of selling the patented specialty in promoting sales of other products of the licensee; the existing value of the invention to the licensor as a generator of sales of his non-patented items; and the extent of such derivative or convoyed sales. (7) The duration of the patent and the term of the license. (8) The established profitability of the product made under the patent; its commercial success; and its current popularity. (9) The utility and advantages of the patent property over the old modes or devices, if any, that had been used for working out similar results. (10) The nature of the patented invention; the character of the commercial embodiment of it as owned and produced by the licensor; and the benefits to those who have used the invention. (11) The extent to which the infringer has made use of the invention; and any evidence probative of the value of that use. (12) The portion of the profit or of the selling price that may be customary in the particular business or in comparable businesses to allow for the use of the invention or analogous inventions. (13) The portion of the realizable profit that should be credited to the invention as distinguished from non-patented elements, the manufacturing process, business risks, or significant features or improvements added by the infringer. (14) The opinion testimony of qualified experts. (15) The amount that a licensor (such as the patentee) and a licensee (such as the infringer) would have agreed upon (at the time the infringement began) if both had been reasonably and voluntarily trying to reach an agreement; that is, the amount which a prudent licensee who desired, as a business proposition, to obtain a license to manufacture and sell a particular article embodying the patented invention would have been willing to pay as a royalty and yet be able to make a reasonable profit and which amount would have been acceptable by a prudent patentee who was willing to grant a license.   The U.S. reasonable royalty approach and the calculation of reasonable royalty have been evolving since then. The Federal Circuit in a 2011 case held that the long-used and criticized 25 percent rule of thumb is fundamentally flawed for determining a baseline royalty rate in a hypothetical negotiation.[59] The rule suggests that 25% of the expected profits for the product that incorporates the IP at issue as a baseline royalty rate. Practically, the profits earned by the licensee and the revenues of the product are still often taken into consideration nowadays while applying the U.S. reasonable royalty approach.   Further, the Ninth Circuit modified some factors in Microsoft Corp. v. Motorola Inc. (2012) which was a case involved with reasonable and non-discriminatory (RAND) commitment, standard essential patents (SEPs), and patent pool. [60] This case raised some important factors to determine a RAND royalty, such as RAND commitment and its purposes, SEPs’ contribution and importance, alternatives of SEPs to the adopted standard, and so on. Comparable patents play a very critical factor in this case in terms of calculating a RAND royalty. Also, it is important to notice that the function of a RAND commitment limits a SEP licensor to royalties that reflect their ex ante values instead of the incremental monopoly power provided by the standard.[61]   In Ericsson, Inc. v. D-Link Systems, Inc. (2014), a modified version of the 15 factors was adopted after the Federal Circuit held that – not every factor from the 15 factors in Georgia-Pacific will apply to every case, and courts must instruct the jury on factors that are relevant in the case. Also, the burden of proof is on the implementer (or, the antitrust authority in an excessive pricing case) to establish a baseline royalty with evidence. That royalty then must be assessed to determine if it is excessive. [62]By adopting incremental value approach and incorporating apportionment, the Federal Court here provides a more complete guidance on how to calculate royalties for patents on RAND terms:[63] (1) Importance of RAND commitment; (2) Apportionment of patented features: the royalty for the patented technology must be apportioned from the value of the standard as a whole; (3) Incremental value approach: the royalty must be based on the incremental value of the invention, instead of any value added by the standardization of the invention or the standard itself.   Lastly, two factors that were not often discussed while determining a reasonable royalty were applied inPrism Technologies LLC v. Sprint Spectrum L.P. (2017) - previous settlement agreements and cost savings though infringement.[64] In conclusion, the modern reasonable royalty approach under U.S. patent law was evolved from the adopted 15 factors in Georgia Pacific case. The approach then has been developing along with changes of law, development of technology, adoption of SEPs, RAND and FRAND commitments, and more other relevant factors. IV. A PROPOSED ANTITRUST FRAMEWORLK OF REASONABLE ROYALTY FOR TAIWAN   Having articulated the past attitude and the current antitrust framework of reasonable royalty in Taiwan, we have pointed out some misunderstandings in the current framework. Having addressed the reasonable royalty approaches under the patent laws in Taiwan and the U.S., we also have found similarities in between – the hypothetical negotiation framework and relevant determinants. Even though there are concerns against prohibition of excessive pricing due to potential dangers of regulating price and supports towards ultimate protection of free competition, TFTC and the courts in Taiwan are still required by law to apply the prohibition of excessive pricing against IPRs for the current time being. Therefore, the most important section and the core of this paper now has come forward – which is a proposed antitrust framework composed of possible methodologies and clearer guidance for Taiwan to deal with the antitrust issue of reasonable royalty in an excessive pricing case.   The proposed framework is based on the proposed methodologies in a 2016 paper[65] - which is to apply the hypothetical negotiation framework under U.S. patent law to determine a reasonable royalty or a competitive benchmark in an excessive pricing case. By applying the most relevant factors and adhering to important and correct principles in the case, a reasonable royalty as a baseline is thus determined to evaluate if the price at issue is excessive.   Before articulating the proposed framework in a more detailed way, it is important to notice some basic differences between reasonable royalty in a patent infringement case and an excessive pricing case: Table 1 Reasonable Royalty in between a Patent infringement Case and an Excessive Pricing Case Reasonable Royalty in an Excessive Pricing Case Reasonable Royalty in a Patent Infringement Case Base Country Countries that prohibit excessive pricing. U.S. Case Type Antitrust case Patent infringement case Governing Law Antitrust (competition) law Patent law Prohibited Action A prohibited act of charging unfairly high price through abuse of monopoly. A prohibited act of unauthorized making, using, offering, or selling any patented invention. The Reasonable Royalty Issue Through determining a reasonable royalty to evaluate if a firm is charging excessive royalty through abuse of monopoly. Through determining a reasonable royalty to establish damages/compensation for the act of patent infringement. Proof of Harm Having found excessive pricing, competitive harms should be proved to establish an excessive pricing violation. Harm is proved after determining the reasonable royalty. Having proven the act of patent infringement, damages will then be determined based on reasonable royalty. Harm is proved to exist before calculating the damages. Negotiation There was negotiation over royalty before the lawsuit starts. There sometimes had no negotiation over royalty. Reasonable Royalty Approach Apply relevant factors to determine a reasonable royalty, then compare it with the price at issue to decide if the firm is charging excessive price through abuse of monopoly. Apply hypothetical negotiation framework to determine the royalty the licensor and the infringer would have agreed upon if there had been a negotiation instead of an infringement. Relevant Factors There are multiple and various factors applied in different countries, often not systematic or relevant. The 15 factors evolved from Georgia-Pacific, and some modified and new factors developed later on. A. Step 1 – Important Principles to Keep in Mind Regarding the Antitrust Issue of Reasonable Royalty. 1. No presumption of monopoly power: Ownership of IPRs does not necessarily confer monopoly power. 2. IP conducts may possibly constitute antitrust violations: Enforcing IPRs or any seemingly proper IP conduct may still possibly constitute an antitrust violation, so that they shall not be excluded from the application of FTA. 3. No such thing as excessive profit in free market economy: It is the pricing practice conducted by a monopolistic enterprise that should be evaluated in an excessive pricing case, instead of the profits the enterprise earns. 4. Harm to competition is and should be the key to establish an antitrust violation under Article 9 of FTA: Simply charging a perceived excessive price or earning some unjustified profits does not automatically constitute an antitrust violation. It is the competition and consumers that we should protect in terms of any excessive pricing case. Thus, harms to competition and consumers should be proved – such as lower outputs, entry barriers, and negative impacts on innovation or R&D activities. B. Step 2 – Compliance with Article 45 of FTA & IP Guidelines of Taiwan. 1. Firstly, all proper conducts pursuant to all IP laws in Taiwan are excluded to the application of FTA even though there is no clear explanation of what would be proper IP conducts. 2. If Article 45 of FTA does not apply in the case, we should turn to IP Guidelines of Taiwan to see if the involved market conducts or pricing practices would violate the Guidelines. If the Guidelines do not apply here, then we shall turn to Step 3 of the proposed framework. C. Step 3 – If it is a Potential Excessive Pricing Case?   Section 2 of Article 9 of FTA articulates - “Monopolistic enterprises shall not engage in improperly setting, maintaining or changing the price for goods or the remuneration for services.[66]” 1. There must be a monopolistic enterprise. 2. The prices of goods or services or the pricing practices involved are reasonably challenged by the implementers or TFTC. [67] D. Step 4 – When would a hypothetical negotiation have taken place?   When it is a potential excessive pricing case under Section 2 of Article 9 of FTA, it is time to apply the hypothetical negotiation framework under patent law to determine a reasonable royalty within antitrust framework. While the first thought we come up with is usually “how much the parties would have agreed upon,” what we often ignore is that – “when would a hypothetical negotiation have happened? “The timeframe of the hypothetical negotiation is in fact highly related to what relevant factors we should consider in terms of determining a reasonable royalty. Such timeframe issue thus could cause huge impacts on the amount of damages in a patent infringement case and affect the competitive benchmark in an excessive pricing case. More clarifications are as follows: 1. In a patent infringement case:[68] a. Pure ex ante approach: By assuming the parties would have negotiated over the royalty before the infringement began, such approach reflects an ex ante negotiation in the absence of infringement based on the information available before the infringement. Two supporting reasons are: (1) preservation of incentives; (2) avoidance or lowering the cost of patent holdup.[69] b. Pure ex post approach: This approach sets the negotiation reached on some later date, such as the date of judgement or any time after the infringement. Such approach could possibly provide more available and provable information to determining a royalty but could also give the patentee more bargaining power when the patentee is holding an injunction against the infringer. Figure 1 Timeframes of the Hypothetical Negotiation Applying Pure Ex Ante Approach and Pure Ex Post Approach c. Contingent Ex Ante Approach: Pros and concerns when applying pure ex ante and pure ex post approaches are out there to be noted. While a proposed approach claims to address the issues of patent holdup and bargaining power at the same time – which is called contingent ex ante approach. This approach sets the negotiation prior infringement reached contingent on the ex post information, arguing that ex post information provides a better measure for the true value of the patented technology. Further, it is said to be able to take new and changed circumstances into account in every individual infringement case. Here is a simple example presented in the paper:[70] (1) A $500,000 royalty might be agreed upon based on the parties’ expectation that the infringer would earn $1 million above what it would earn if it used the next-best available non-infringing patent. (2) At the date of judgement, the infringer is proven to earn $1.5 million instead of $1 million. This $1.5 million earning would be the ex post information applied in an ex ante negotiation. On the other hand, if the proven earning is only $500,000, then the royalty the parties might have agreed upon would be lower. (3) By applying contingent ex ante approach, it is argued that the patent hold-up would be avoided and the bargaining power between the parties would be balanced. Figure 2 Timeframes of the Hypothetical Negotiation Applying Contingent Ex Ante Approach 2. In an excessive pricing case: Applying the hypothetical negotiation framework under patent law in an excessive pricing case is much more difficult on one matter – the timeframe discussed above. Some important reasons are as follow: (1) Excessive pricing cases involve comparing a competitive benchmark with the price at issue, yet the prices in a case could be changing over time. (2) There were already negotiations over royalty before an excessive pricing lawsuit starts. (3) Involvement of FRAND and SEPs only make it more complicated to determine a reasonable royalty while facing the timeframe issue. E.g. the timing of a patent’s incorporation into a standard is critical and affects the value of the invention. Figure 3 Excessive Pricing Case and the Timeframe Issue E. Step 5 – If there are FRAND or RAND terms?   Royalties negotiated on FRAND or RAND terms (FRAND royalties) can be and are usually different from those without. FRAND royalties may involve the following factors which often consequently affect royalties in real world: 1. FRAND obligations and terms: such as fairness, royalty free, grant back provision, exclusivity and other reciprocal terms. 2. Timing of the establishment of a standard: A patent may exist before the establishment of an industrial standard. As this patent is considered essential to a standard and also is included in such standard, the value of such patent – SEP usually goes up.[71] 3. Cooperation between SEP holders: the number of SEP holders and the number of SEPs included in a standard can be influential. 4. Other factors: standard setting organizations’ policies, threat of injunction, patent hold-up and hold-out, royalty stacking, other available and comparable technologies, and relationship between licensors and licensees. F. Step 6 – Consider the Most Relevant Factors.   No matter what approach or timeframe of hypothetical negotiation gets adopted in an excessive pricing case, the most relevant factors to consider in determining a reasonable royalty are as follow: 1. Comparable patents The best potential non-infringing alternatives should be the top determinant. What we usually consider as alternatives here are the existing patents in the marketplace since it would be impractical to include expired or invalid patents as comparable patents. But if we take the issue of the timeframe of a hypothetical negotiation into consideration, the status of the patents could be different – which means the hypothetical negotiation could have happened when there were more or less comparable patents. Undoubtedly, comparability is hard to judge. Loads of factors have been taken into account – technical and economic standpoints, the underlying technology, timing of the licensing, previous settlements or litigations, and other more. As noted here, comparable patents are provided as evidence to determining a reasonable royalty – not to its admissibility. Further, here are more difficulties while looking for comparable patents: a. Lots of technology-related royalties nowadays are negotiated on a patent portfolio basis using the end-user device as the royalty base. Both end-user based and portfolio based calculations make it harder to extract the value of an individual patent. b. Cross-licensing or business relationships are sometimes built in exchange of patent licensing. It means that there sometimes has no cash payment involved to know the values of patents. c. Should the allegedly comparable patents cover foreign patents? 2. FRAND royalties: a. FRAND or RAND commitment and its importance. b. Number of SEPs and number of SEP holders in a standard setting. c. Proper apportionment: By the reason that not all patents are created equal or of the same value, the value of an individual patent’s contribution to the standard and the end product is a critical factor when determining a FRAND royalty. As noted here for clarification, even though the Federal Circuit in the famous Ericsson v. D-Link case stated that a FRAND royalty should not include the value that a technology gains from simply being included in a standard, it should not be interpreted as a complete exclusion of any of a standard’s value. When a patented technology in fact creates values for a standard due to its inclusion, these values should definitely be considered as contribution and an important factor.[72] G. Step 7 – Consider Other Factors 1. Other factors may possibly be considered a. The terms and scope of the licensing agreement, as exclusive, non-exclusive, restrictive, or non-restrictive. b. The nature and benefits of the technology or invention. c. Licensor’s monopoly power, and its policies or programs to maintain or preserve such power. d. Licensing history between the parties, and between the licensor and other firms. e. Investments made to implement the technology or the standard. f. Barriers to entry, it could be legal barriers, exclusive agreements, economies of scale, or network effect.[73] As for antitrust of excessive pricing in Taiwan, a paper suggests that entry barriers should be one of the keys to determine if TFTC should step in. That is to say - when there are entry barriers delaying or barring new entries in a market, TFTC should possibly have jurisdiction and a case according to the types of the barriers. g. Royalty stacking and patent hold-up and hold-out. h. Smallest saleable component rule: Institute of Electrical and Electronics Engineers (IEEE) amended its patent policy in 2015 and included the smallest saleable Compliant Implementationas an important consideration in terms of determining a reasonable royalty.[74] 2. Factors not recommended to be considered. a. Profits earned from charging the allegedly excessive royalty. b. The profitability, commercial success, popularity, advantages, utilities, and the sales of the patented products. c. The value of the pure adoption of the standard. d. Commercial and business relationships involved. e. Other non-competition, non-patent-related, or pure business factors. H. Step 8– Compare the Reasonable Royalty to the Alleged Excessive Price 1. The determined reasonable royalty is a baseline or what we call a competitive benchmark. It should not be a minimal royalty a patent owner can charge. 2. As for practicality, it is allowed to be more than just reasonable royalty to be compensated to the patent owner in a patent infringement case. Just like a firm can charge a price more than the cost of its product. Therefore, the price at issue should not be necessarily excessive when the determined reasonable royalty is greater than the alleged excessive price. V. CONCLUSION   Excessive pricing cases involving the antitrust issue of reasonable royalty can be a matter of tremendous cost of litigation, fines of billion dollars, and unimaginable potential harms to competition. The great dangers involved through regulating price can lead to negative impacts on innovation, industries, and consumers - consequently to the ultimate failure of protection of competition. Putting aside the doubts about the prohibition of excessive pricing, I respectfully propose an antitrust framework of reasonable royalty in this paper with a sincere goal to help Taiwan with the issue of reasonable royalty in any excessive pricing case in the future. Lastly, I sincerely address the most essential and ultimate principle of antitrust here, again - it is and should always be the competition that antitrust laws and agencies aim to protect, not competitors, prices or only the consumers.[75] [1] Anti-Monopoly Law of the People’s Republic of China, Law Info China, http://www.lawinfochina.com/display.aspx?lib=law&id=0&CGid=96789 (last visited Aug. 6, 2019); The Antimonopoly Act, Japan Fair Trade Commission, http://www.jftc.go.jp/en/legislation_gls/amended_ama09/amended_ama15_01.html(last visited Mar.9, 2018); Monopoly Regulation and Fair Trade Act, Fair Trade Commission of Korea, http://www.moleg.go.kr/english/korLawEng?pstSeq=54772(last visited Aug. 6, 2019); Fair Trade Act, Fair Trade Commission of Taiwan, https://www.ftc.gov.tw/law/EngLawContent.aspx?lan=E&id=29 (last visited Mar.9, 2018). [2] Anti-monopoly Law of the People's Republic of China §17(1), available at http://www.china.org.cn/government/laws/2009-02/10/content_17254169.htm (last visited Mar.12, 2018). [3]Huawei Technologies Co. v. InterDigital Technology Co., Guangdong High Court Decision No.306 (2013), available at http://www.mlex.com/China/Attachments/2014-04-17_BT5BM49Q967HTZ82/GD%20verdict.pdf (last visited Mar.9, 2018);CLEARY GOTTLIEB STEEN & HAMILTON LLP, China’s NDRC Concludes Qualcomm Investigation, Imposes Changes in Licensing Practices (Mar. 16, 2015), https://www.clearygottlieb.com/-/media/organize-archive/cgsh/files/publication-pdfs/chinas-ndrc-concludes-qualcomm-investigation-imposes-changes-in-licensing-practices.pdf (last visited Mar.9, 2018). [4] THE MINISTRY OF COMMERCE OF THE PEOPLE’S REPUBLIC OF CHINA, Full text of the Draft of the Anti-Monopoly Guidelines on the Abuse of Intellectual Property Rights (2017), http://fldj.mofcom.gov.cn/article/zcfb/201703/20170302539418.shtml (last visited Mar. 12, 2018). [5]Bruce Kobayashi, Douglas Ginsburg, Joshua Wright & Koren Wong-Ervin,Comment of the Global Antitrust Institute, Antonin Scalia Law School, George Mason University, on the Anti-Monopoly Commission of the State Council's Anti-Monopoly Guidelines against Abuse of Intellectual Property Rights, GEORGE MASON LAW & ECONOMICS RESEARCH PAPER, No.17-19, available at https://ssrn.com/abstract=2952414 (last visited Mar.12, 2018). [6] European Commission is the competition authority within European Union. [7] TheTreaty on the Functioning of the European Union §102(a), available at https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:C:2016:202:FULL&from=EN (last visited Mar.12, 2018). [8] United Brands Company and United Brands Continentaal BV v Commission of the European Communities, Case 27/76 (1978). [9] Antitrust: Commission sends Statement of Objections to Motorola Mobility on potential misuse of mobile phone standard-essential patents- Questions and Answers, European Commission, http://europa.eu/rapid/press-release_MEMO-13-403_en.htm (last visited Mar.12, 2018); see also Protecting consumers from exploitation-Chillin’ Competition Conference, Brussels, 21 November 2016, European Commission, https://ec.europa.eu/commission/commissioners/2014-2019/vestager/announcements/protecting-consumers-exploitation_en (last visited Mar.12, 2018). [10] Autortiesību un komunicēšanās konsultāciju aģentūra / Latvijas Autoru apvienība v. Konkurences padome, C-177/16(2017). [11] TheTreaty on the Functioning of the European Union §267(a), available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:12008E267:en:HTML (last visited Mar.13, 2018). [12] Miranda Cole,Kevin Coates&Siobhan L.M. Kahmann, Welcome clarifications by the EU Court on the concept of excessive pricing, Covington & Burling LLP - Inside Tech Media (Sep. 15, 2017), https://www.insidetechmedia.com/2017/09/15/welcome-clarifications-by-the-eu-court-on-the-concept-of-excessive-pricing/ (last visited Mar.13, 2018). [13] Martin André Dittmer & Sofie Kyllesbech Andersen, Recent decisions on excessive pricing, abuse of dominance, cartel penalties and gun jumping (2018), https://www.internationallawoffice.com/Newsletters/Competition-Antitrust/Denmark/Gorrissen-Federspiel/Recent-decisions-on-excessive-pricing-abuse-of-dominance-cartel-penalties-and-gun-jumping (last visited Jan. 17, 2019). [14] Michal S. Gal, Monopoly Pricing as an Antitrust Offense in the U.S. And the EC: Two Systems of Belief About Monopoly? ANTITRUST BULLETIN, 49, 343-384 (2004), available athttps://ssrn.com/abstract=700863 (last visited Mar.14, 2018). [15] U.S. Federal Trade Commission v. Qualcomm Incorporated ( N.D. Cal. Filed Jan. 17, 2017), available at https://www.ftc.gov/system/files/documents/cases/170117qualcomm_redacted_complaint.pdf (last visited Mar. 14, 2018). [16] Federal Trade Commission v. Qualcomm Incorporated, Case No. 5:17-cv-00220-LHK (D. Northern District of California, filed Feb.1, 2017). [17] FAIR TRADE COMMISSION, Dissenting Statement of Commissioner Maureen K. Ohlhausen In the Matter of Qualcomm, Inc. (Jan. 17,2017), https://www.ftc.gov/system/files/documents/cases/170117qualcomm_mko_dissenting_statement_17-1-17a.pdf (last visited Mar. 2, 2018). [18] Taiwan Fair Trade Act §9(1) (2017), available at: http://law.moj.gov.tw/Eng/LawClass/LawAll.aspx?PCode=J0150002 (last visited Mar. 2, 2018). [19] Bruce H. Kobayashi, Douglas H. Ginsburg, Joshua D. Wright, and Koren W. Wong-Ervin, “Excessive Royalty” Prohibitions and the Dangers of Punishing Vigorous Competition and Harming Incentives to Innovate, CPI ANTITRUST CHRONOCLE, 4(3) (2016). [20] Kung-Chung Liu, Interface between IP and Competition Law in Taiwan, THE JOURNAL OF WORLD INTELLECTUAL PROPERTY, 8(6), 735–760 (2005). [21] Pei-Fen Hsieh, Antitrust Regulatory Measures Under the trend towards Bureaucratic Regulation- A Study on Consent Decree, FAIR TRADE QUARTERLY, 13(1), 166 (2005). [22] Taiwan Fair Trade Commission, Meeting Minutes No.352 (1998). [23] Hong Xuan, On principles in tackling technology license and market competition, 112-113 (2008). [24] TAIWAN FAIR TRADE COMMISION, Meeting Minutes No.480 of Taiwan Fair Trade Commission (2001), https://www.ftc.gov.tw/upload/upload-90R480_REC.txt (last visited Feb. 7, 2018). [25] Kung-Chung Liu & Vick Chien, Analysis of and Comments on CD-R-related Cases: Focusing on Competition Law and Patent Compulsory Licensing Issues, FAIR TRADE QUARTERLY, 17(1), 2 (2005). [26] Sony and Taiyo Yuden did not appeal against the administrative decisions in 2010; therefore their cases were affirmed before 2015. See TAIWAN FAIR TRADE COMMISSION, Administrative Decision No.104027 (2015), https://www.ftc.gov.tw/uploadDecision/269b6dff-a0fc-46a0-8512-ca5f716732bb.pdf (last visited Feb. 7, 2018). [27] Taipei High Administrative Court, Philips Electronics NV v. TFTC, Decision No. 00908 (2003). [28] TAIWAN FAIR TRADE COMMISSION, Administrative Decision No. 095045 (2006), https://www.ftc.gov.tw/uploadDecision/2005302-0950426_002_095d045.pdf (last visited Feb. 23, 2018). [29] Taiwan Intellectual Property Court Appeal Case No.14 (2008), https://law.judicial.gov.tw/FJUD/data.aspx?ro=10&q=cd8bdbb8d80f8d587805c863b2e64c55&gy=jcourt&gc=IPC&sort=DS&ot=in (last visited Aug. 6, 2019). [30] TAIWAN FAIR TRADE COMMISSION, Administrative Decision No. 098156 (2009) http://www.ftc.gov.tw/uploadDecision/faed94a8-34ce-4f8e-b59a-239a9eaece1d.pdf (last visited Feb. 23, 2018). [31] Supreme Court of Taiwan, Case No.883 (2012), https://law.judicial.gov.tw/FJUD/data.aspx?ro=0&q=033765ef814495b27d346fcbd9f38606&gy=jcourt&gc=TPS&sort=DS&ot=in (last visited Aug. 6, 2019). [32] TAIWAN FAIR TRADE COMMISSION, Administrative Decision No. 104027 (2015) https://www.ftc.gov.tw/uploadDecision/269b6dff-a0fc-46a0-8512-ca5f716732bb.pdf (last visited Feb. 26, 2018). [33] TAIWAN FAIR TRADE COMMISSION, Administrative Decision No.106094 (2017) https://www.ftc.gov.tw/uploadDecision/561633e4-42bd-4a4f-a679-c5ae5226966b.pdf (last visited Mar. 2, 2018). [34] Fair Trade Act of 2017 §9(1), available at: http://law.moj.gov.tw/Eng/LawClass/LawAll.aspx?PCode=J0150002 (last visited Mar. 2, 2018). [35] id, at Page 61-62. [36] Settlement between TFTC and Qualcomm, TAIWAN FTC NEWSLETTER, August 10, 2018, https://www.ftc.gov.tw/internet/main/doc/docDetail.aspx?uid=126&docid=15551 (last visited Nov. 30, 2018). [37] TAIWAN FAIR TRADE COMMISSION, Record of Commission Meeting No. 1396 (Nov. 2018), https://www.ftc.gov.tw/upload/b0aa3b61-d0e7-41c4-b6a0-b1e6a472ee04.pdf (last visited Nov. 30, 2018). [38] TAIWAN FAIR TRADE COMMISSION, Qualcomm’s Investment Plan under the Settlement, (Oct. 2018), https://www.ftc.gov.tw/upload/ee937bcf-68b9-4751-b2da-b636c46b0faa.pdf (last visited Nov. 30, 2018). [39] The latest amendment of the Fair Trade Act of Taiwan was proposed in the October of 2018, waiting to be reviewed. https://join.gov.tw/policies/detail/898e30a4-1ee8-491b-8c5a-5fbdbb5973f9 (last visited Jan. 18, 2019). [40] See Fair Trade Act of 2017 §45:”No provision of this Act shall apply to any proper conduct in connection with the exercise of rights pursuant to the provisions of the Copyright Act, Trademark Act, Patent Act or other Intellectual property laws.”; available at http://law.moj.gov.tw/Eng/LawClass/LawAll.aspx?PCode=J0150002 (last visited Mar. 5, 2018); also see FAIR TRADE COMMISSION, Administrative Statement No. 02678 (2000), https://www.ftc.gov.tw/internet/main/doc/docDetail.aspx?uid=225&docid=431 (last visited Mar.25, 2018). [41] Legislative Rationales of Fair Trade Act of 1991, available at https://www.ftc.gov.tw/law/LawContent.aspx?id=FL011898 (last visited Aug. 6, 2019). [42] Guidelines on Technology Licensing, Fair Trade Commission, https://www.ftc.gov.tw/internet/main/doc/docDetail.aspx?uid=163&docid=227 (last visited Aug. 6, 2019). [43] id, §3. [44] id, §5(C): “Stipulations that, for ease of calculation, fees for licensed technology that is part of a manufacturing process or that subsists in component parts are to be calculated on the basis of the quantity of finished goods manufactured or sold that employ the licensed technology, or the quantity of raw materials or component parts used that employ the licensed technology, or the number of times such materials or parts are used in the manufacturing process.”; see also §6(L): “Requirements that the licensee pay licensing fees based on the quantity of a particular type of good manufactured or sold irrespective of whether the licensee used the licensed technology.” [45] id, §5: “The following kinds of technology licensing arrangement stipulations do not intrinsically violate the provisions of the Act on restraint of competition or unfair competition, with the exception of those improper matters to be found after reviewed in accordance with Point 5(C) and 5(D)…” [46] Fair Trade Act §9(2): “Monopolistic enterprises shall not engage in any one of the following conducts… improperly set, maintain or change the price for goods or the remuneration for services,” available at http://law.moj.gov.tw/Eng/LawClass/LawAll.aspx?PCode=J0150002 (last visited Mar. 8, 2018). [47] Douglas H. Ginsburg & Joshua D. Wright, Whither Symmetry? Antitrust Analysis of Intellectual Property Rights at the FTC and DOJ, COMPETITIN POLICY INTERNATION, 9 (2) (2013). [48] Id. [49] id, Section 1-3 of § 97(1). [50] id, Section 3 of §97(1) :”the amount calculated on the basis of reasonable royalties that may be collected from exploiting the invention patent being licensed.”; see also The 2013 Amendment to Patent Act of Taiwan, List of Amendments to Patent Act of Taiwan, http://www.6law.idv.tw/6law/law2/專利法歷年修正條文及理由.htm#_%EF%BC%8E12%EF%BC%8E%E4%B8%80%E7%99%BE%E9%9B%B6%E4%BA%8C%E5%B9%B4%E4%BA%94%E6%9C%88%E4%B8%89%E5%8D%81%E4%B8%80%E6%97%A5%EF%BC%88%E5%85%A8%E6%96%87%E4%BF%AE%E6%AD%A3%EF%BC%89 (last visited Mar. 8, 2018). [51] id. [52] Intellectual Property Court of Taiwan Case No.38 (2014); see also Intellectual Property Court of Taiwan Case No.24 (2017); Chung-Lun Shen, Taiwan Supreme Court to Clarify Distinction between Patent Damages and Unjust Enrichment: Koninklijke Philips N. V. v. Gigastorage Corporation, IP OBSERVER, 18 (2017). [53] <與飛利浦專利訴訟 國碩扳回一城>,經濟日報UDN,https://money.udn.com/money/story/5607/3393179 (last visited Jan. 19, 2019). [54] Bruce H. Kobayashi, Douglas H. Ginsburg, Joshua D. Wright, and Koren W. Wong-Ervin, “Excessive Royalty” Prohibitions and the Dangers of Punishing Vigorous Competition and Harming Incentives to Innovate, CPI ANTITRUST CHRONOCLE, 4(3) (2016). [55] Reena Das Nair & Pamela Mondliwa, Excessive Pricing revisited: what is a competitive price?, Presented at Conference: 1st ANNUAL COMPETITION AND ECONOMIC REGULATION (ACER) WEEK, SOUTHERN AFRICA (2015), https://www.researchgate.net/profile/Reena_Das_Nair/publication/290440699_Excessive_Pricing_revisited_what_is_a_competitive_price/links/5698d5f408ae34f3cf2070dd/Excessive-Pricing-revisited-what-is-a-competitive-price.pdf (last visited June. 5, 2018). [56] David Gilo & Yossi Spiegely, The Antitrust Prohibition of Excessive Pricing, INTERNATIONAL JOURNAL OF INDUSTRIAL ORGANIZATION, Elsevier, vol. 61(C)(2018). [57] 35 U.S. Code § 284. [58] Georgia-Pacific Corp v. United States Plywood Corp, 318 F. Supp. 1116 (NY.S.D.N.Y. 1970). [59] Uniloc USA, Inc. v. Microsoft Corp., 632 F. 3d 1292 (Fed. Cir., 2011). [60] Microsoft Corp. v. Motorola Inc,696 F.3d 872 (9th Cir. 2012). [61] William H. Page,Judging Monopolistic Pricing: F/RAND and Antitrust Injury, TEXAS INTELLECTUAL PROPERTY LAW JOURNAL, 22, 181-208 (2014), available at http://scholarship.law.ufl.edu/facultypub/588 (last visited Mar. 28, 2018). [62] Ericsson, Inc. v. D-Link Systems, 773 F.3d 1201 (Fed.Cir. 2014). [63] Anne Layne-Farrar & Koren W. Wong-Ervin, An Analysis of the Federal Circuit's Decision in Ericsson v. D-Link,Competition Policy International, CPI Antitrust Chronicle, (1) (2015), available at https://ssrn.com/abstract=2669269 (last visited Mar. 29, 2018), see also Huntern Shu, Determination of royalties in Ericsson v. D-Link, Science & Technology Policy Research and Information Center (STPI) (2015), http://iknow.stpi.narl.org.tw/post/Read.aspx?PostID=10945 (last visited Mar. 29, 2018). [64] Prism Technologies LLC v. Sprint Spectrum L.P., No.16-1456 (Fed. Cir. 2017). [65] GINSBURG, KOBAYASHI, WONG-ERVIN & WRIGHT ET AL., supra note 19. [66] Id. [67] Fair Trade Act §7. [68] Norman V. Siebrasse &Thomas F. Cotter, A New Framework for Determining Reasonable Royalties in Patent Litigation, FLORIDA LAW REVIEW, 68 (2016), available at : http://scholarship.law.ufl.edu/flr/vol68/iss4/1 (last visited Mar. 29, 2018). [69] U.S. FEDERAL TRADE COMMISSION, The Evolving IP Marketplace: Aligning Patent Notice and Remedies With Competition (2011), https://www.ftc.gov/sites/default/files/documents/reports/evolving-ip-marketplace-aligning-patent-notice-and-remedies-competition-report-federal-trade/110307patentreport.pdf (last visited Jan. 23, 2019). [70] id. at 21. [71] Standard-essential patents, COMPLETION POLICY BRIEF, 5 (2014). [72] id. at Page17. [73] Ma, Tay-cheng,Regulation of the Exploitative Abuse: Policy Initiative and Practical Dilemma, Fair Trade Quarterly 17(1) (2009). [74] INSTITUTE OF ELECTRICAL AND ELECTRINICS ENGINEERS, IEEE-SA STANDARDS BOARD BYLAWS (2015),https://standards.ieee.org/about/policies/bylaws/sect6-7.html (last visited Jan. 22, 2019). [75] Douglas H. Ginsburg & Joshua D. Wright, The Goals of Antitrust: Welfare Trumps Choice, FordhamLAW REVIEW, 81 (2013), available at https://ir.lawnet.fordham.edu/flr/vol81/iss5/9 (last visited Mar. 11, 2018).

TOP