Apple vs. Samsung highlights importance of IP for CIOs
- 19 October, 2011 12:57
CIOs and IT managers must closely examine contractual agreements when purchasing IT goods or services to ensure all bases are covered when it comes to intellectual property (IP), a legal expert has advised.
Apple recently won an interim Federal Court injunction to prevent the sale of Samsung’s Galaxy Tab 10.1 tablet device in Australia until the legal battle regarding two particular patents has been resolved.
Brisbane-based law firm, McCullough Robertson Lawyers’ partner, Malcolm McBratney, told Computerworld Australia that the case has highlighted the growing realisation companies now have about the importance of IP.
“As a CIO, imagine if you’d just placed an order for 10,000 of the Samsung devices and you had paid in advance and then this case comes along, what does the contract say about IP and IP infringement, can you get your money back and all of those types of issues,” McBratney said.
“Depending on the organisation, if your CIO is a purchaser of IT goods and services, the golden rule is not to sign the supplier’s contract without thinking about it and getting some legal advice,” he said. “That’s to look at issues like IP warranties and whether they are standing behind the IP, delivery obligations and some of the other commercial terms.
“That won’t always be appropriate. Sometimes for smaller purchases it’s a ‘sign these terms and conditions or not’, but if you’re a serious purchaser of goods and services in the IT space then there is the opportunity to negotiate those contractual terms.” According to McBratney, for the IT industry as a whole the days of developing a product and not worrying about what’s out there already are gone, and for emerging companies there are many issues to get through patent thickets and commercialise without “stepping on someone else’s toes”.
“If a company was ready to roll out a product and then has to do something else, what are their rights?" McBratney said.
“The big issue will be if you had a large contract, whether you can get alternate supply had you already set up your arrangements going down one route and now you have to go down the other,” he said. “So there’s potential loss of ability to cover the funds paid, there’s loss of opportunity and because things move so quickly maybe the horse has bolted on some other project you’re working on.
“If a company has signed up to the supplier’s terms then they’re going to have very limited rights against them, while if they’d actually thought about IP issues then maybe in the negotiation of the contracts they might have been in a better position.”
The worst case scenario, McBratney said, using the Apple versus Samsung example, would be Apple coming after Samsung’s customers, which he said is a regularly used tactic. This puts pressure on the infringing supplier as they have both the customer and the plaintiff “screaming at them”.
“The purchasers of IT products certainly do need to keep an eye on IP issues out there, you just can’t blindly assume that server or system or service isn’t stepping on someone else’s toes.”
“I think at the end of the day it does show the importance of IP and [make sure] that these suppliers are willing to protect that investment they’ve made in research and development.”
Should Apple win the case, Samsung will need to tread carefully in bringing out the follow-on product from the Galaxy Tab 10.1 tablet, ensuring it engineers around the patents already allegedly infringed upon as well as the wealth of other patents owned by Apple.
Samsung could win with a ruling that Apple’s patents are invalid or that the Galaxy 10.1 tablet does not infringe upon the patents, both of which would have an adverse impact on Apple.
Follow Chloe Herrick on Twitter: @chloe_CW
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.
A Holistic Approach to your BYOD Challenge
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
Enterprises and government agencies are under virtually constant attack today. It is clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Why are today’s security defenses failing? In this battle, your security teams are using outdated arsenal - download now to learn more.