19 April 2013

Death and cyberspace

Posted by Tony Kelly and Paul Kallenbach

An estate plan is a plan formulated to deal with a person's assets which are owned or controlled by them during their lifetime.

We all know that making a will is a critical part of this estate planning process. Ideally, a separate document, usually referred to as the asset register, should also be prepared and updated on an ongoing basis by the will maker. This document acts as a road map to assist the executor to identify assets or entitlements that will need to be accessed, so that they can be held in accordance with the estate plan. An obvious example is a life insurance policy. Not only should details of the policy and the risk advisor be specified on the asset register, but the policy document, birth certificate and anything else needed to make a claim on the policy should be readily to hand.

But what does this have to do with cyberspace?

Our ever increasing use of and reliance on the internet requires that details of online banking accounts websites, domain names as well as social media accounts such as Facebook, Twitter and blogs, together with their passwords, access codes and details of relevant service providers, be added to the asset register. Although a deceased's social networking accounts may not be 'assets' in the traditional sense, the information they contain may be extremely valuable to the deceased and his family – particularly as more and more aspects of our lives are uploaded, in digital form, to cyberspace.

Unfortunately, legislative complexities in America, caused by the lack of interaction between US State and Federal legislation, as well as the privacy policies of social networking providers, have demonstrated that being appointed as someone's executor (or their administrator if they die without a will) may not be sufficient to gain access to the deceased's digital assets.

Facebook, for example, recently refused to give a mother access to her deceased 23 year old son's account following his death in a motorcycle accident, citing corporate policy. Even though she subsequently discovered the password, Facebook changed it without obtaining her consent. And after she sued for access and was successful, Facebook took the page down. A costly pyrrhic victory!

Although the terms and conditions governing social media sites usually contain a prohibition on the account holder making their passwords available to third parties, if the mother had had access to the password in the first place, the death of the account holder would likely never have come to Facebook's notice.

Depending on the scale and complexity of a person's cyberspace activities, it may be advisable to prepare a more detailed document, which not only contains the details of their various digital assets and how to access them, but also includes the content of the 'posting' to be made subsequent to their death, so that they can have the cyberspace funeral of their choice.

The document may also appoint someone more internet savvy than the executor (or executors) to access and manage the deceased accounts and social media sites (including by deleting sensitive information or data where appropriate).

The need to provide for how we want our digital assets to be handled after our death simply reflects the ever increasing role of the internet in our day-to-day activities. And the lack of a cyber 'road map' may well make access to digital assets impossible, not only for our legal representatives, but also for our loved ones.

28 March 2013

ASX requires listed companies to monitor social media

Posted by Nicole Reid and Alberto Colla

Directors and senior executives of companies listed on the Australian Stock Exchange (ASX) have another reason to play close attention to what is being said about their company on the internet. The ASX's recently released updates to its guidance note 8, which deals with listed entities' continuous disclosure obligations, make it clear that the ASX expects companies to monitor social media for certain content. The updates are expected to come into effect around 1 May 2013.

ASX Listing Rule 3.1 requires a listed entity to immediately notify ASX once it becomes aware of 'any information concerning it that a reasonable person would expect to have a material effect on the price or value of the entity's securities'. There are a number of exceptions to this rule, including where the information is (and has not ceased to be) confidential. Listed companies sometimes request trading halts where they are not in a position to 'immediately' disclose market sensitive information, so as to prevent uninformed trading in the market prior to the disclosure being made. This is a practice that the ASX continues to support, where appropriate, to ensure compliance with the spirit of Listing Rule 3.1.

The updated guidance note relating to this Rule 'strongly encourages' an entity that has not yet disclosed existing market sensitive information to monitor 'any investor blogs, chat-sites or other social media it is aware of that regularly include postings about the entity… for signs that the information in the announcement may have leaked'. In the ASX's view, such monitoring should take place both while the company is awaiting board approval for an announcement, and where it is relying on the exception for confidential information. If the monitoring identifies that the market sensitive information has been leaked online, in the ASX's view the company should either immediately request a trading halt or provide the required notification to the ASX.

In the course of the ASX's consultations after the draft updated guidance note 8 was released in October 2012, ASX received a number of comments about this new monitoring requirement. Some respondents were particularly concerned about the breadth of the requirement, and advocated limiting it to 'credible' sites or by taking into account the resources of the listed entity. However, the ASX did not take up these suggestions. In its consultation response, the ASX stated that:
  • the requirement to monitor social media is limited to where market sensitive announcements are pending or are being delayed for reasons of confidentiality;
  • listed entities would be aware of any 'shareholder action' blogs that exist for that entity which may post content including leaked market sensitive information, and many larger listed entities also monitor certain sites as part of their investor relations activities; and
  • accordingly, 'where a market sensitive announcement is pending and where a listed entity is most likely already monitoring the site in question, ASX does not believe it is unreasonable or imposes an undue burden on the entity to expand that monitoring to look for signs that information in the pending announcement may have leaked.'
Although the ASX guidance does not expressly require ongoing monitoring of social media sites, it will be necessary for listed companies to look at their policies and processes before any market sensitive information arises that could be affected by the monitoring requirement. These policies and processes need to be adequate to ensure that appropriate persons are aware of the social media sites on which content about the company may be posted and how those sites may be effectively monitored for relevant information. Even if a company is already carrying out some monitoring of social media for its own purposes, as the ASX suggested, this does not mean that the individuals carrying out that work are best placed to quickly identify information that may indicate early disclosure of market sensitive information. Members of team monitoring social media for reputational and other issues may not even be aware of market sensitive information that has not yet been publicly disclosed, in which case they would not be in a position to identify content that could give rise to a disclosure obligation and accordingly may need to be internally escalated.

Listed entities may also need to ensure that their social media monitoring is sufficient to detect any rumours that may be circulating about the entity and affecting the price of its securities. In such a situation, according to the updated guidance note, the ASX expects that the entity will confirm an accurate rumour or correct a false one, so that the market can trade on an informed basis. As the reach of social media sites expands ever further, rumours circulating on those sites are more likely to be widely disseminated and thereby affect a company's share price if they are perceived to be credible. It will therefore become increasingly important for companies to ensure that social media monitoring is not simply left to marketing personnel but treated with due weight. Failure to comply with continuous disclosure obligations can give rise to penalties, infringement notices and the potential for class actions, so companies need to ensure that their compliance processes are rigorous.

22 March 2013

NZ infringer ordered to pay up

Posted by Genevieve Watt and Paul Kallenbach

Image courtesy of renjith krishnan
In late January, in Association of New Zealand Inc v Enforcement Number: Telecom NZ 2592 [2013] NZCOP 1, the New Zealand Copyright Tribunal issued orders against a copyright infringer under New Zealand's "three strikes" anti-piracy legislation for the first time. The respondent had uploaded musical works via peer-to-peer file sharing protocol BitTorrent, in breach of the copyright holder's exclusive right to communicate the works to the public.

Facts

The respondent in this case was an individual owner of an IP address from which the uploading of music had been detected on three occasions. The applicant was the Recording Industry Association of New Zealand (RIANZ), who filed the application to the Tribunal as representative of the two copyright owners, Island Def Jam Music Group (Universal Music Group New Zealand Limited) and RCA Records (Sony Music Entertainment New Zealand Limited).

The respondent first received a Detection Notice in November 2011, alleging that she had infringed copyright in the Rihanna song Man Down by uploading it via BitTorrent, thereby communicating it to the public in breach of section 16(1)(f) of the Copyright Act 1994 (NZ) (Copyright Act), which grants the copyright owner the exclusive right to communicate copyrighted work to the public. A Warning Notice was subsequently issued to the respondent in June 2012 in respect of a further alleged upload of the same song and finally an Enforcement Notice was sent on 30 July 2012 alleging that the respondent had uploaded the song Tonight Tonight.

The legislation

Section 122 of the Copyright Act creates a graduated response regime for taking enforcement action against people who infringe copyright through file sharing. Under the system, infringers receive a series of three infringement notices of increasing seriousness (Detection, Warning and Enforcement notices) if copyright infringement by file sharing is detected, before a Copyright Tribunal hearing can be held. The first two notices are designed as warnings, and the next notice in the series will be issued if a later, separate infringement occurs after the previous notice has been issued.

Notices are issued by an internet protocol address provider (IPAP) at the request of, and at a cost of $25 per notice to, the copyright owner.

If an infringement is found to have occurred, the Tribunal can require the respondent to pay various sums to the applicant under heads of relief including compensatory damages for infringement, a contribution towards the fees paid by the rights owner to the relevant IPAP, reimbursement of the Tribunal application fee paid by the applicant, and a deterrent sum. The total amount the respondent is ordered to pay cannot exceed NZ$15,000.

The decision

While the respondent claimed she had only downloaded, and not uploaded, the music, she had downloaded the file sharing software to her computer and the Copyright Tribunal accepted that uploading and downloading can occur simultaneously. In this case, the Copyright Tribunal accepted that uploading did occur regardless of the respondent's intentions.

In any case, under the legislation it is also possible to issue infringement notices in respect of downloading, although this has yet to occur.

The respondent was ordered to pay a total of NZ$616.57, based on:
  • the cost of purchasing the songs (a total of $6.57);
  • a contribution of $50 towards the $75 cost of issuing the three notices (calculated as the whole cost of the Enforcement notice, two-thirds of the cost of the Warning Notice, and one-third of the cost of the Detection Notice);
  • $200 for the cost of applying to the Copyright Tribunal; and
  • $120 for each of the three infringements as a deterrent sum.
The deterrent sum was in this case relatively low as the Copyright Tribunal accepted that the respondent had not intended to break the law and found that the infringing acts were not in this instance flagrant.

Is it logical to pursue individuals who download a small amount of music?

While it may seem somewhat inequitable that this particular individual (who the Tribunal noted had not 'flagrantly' broken the law) was pursued when countless others get away with engaging in copyright infringement by file sharing on a daily basis, the 2012 Australian High Court iiNet decision shows that the idea of pursuing the infringers themselves may be the logical (though perhaps not the most practicable) option.

The iiNet decision, in which the applicant copyright holders unsuccessfully argued that internet service provider (ISP) iiNet was liable for the actions of its customers in unlawfully downloading copyrighted content (on the basis that the ISP had authorised their downloads) highlights the difficulty in seeking to address the issue of piracy by pursuing intermediary entities other than individual infringers (see our summary of this decision here). 

Would this approach work in Australia?

Similar 'three strikes' or graduated response systems are in place in other jurisdictions including France and the USA. While there is currently no graduated response system in Australia, there was some discussion about introducing one following the iiNet decision. At this stage, however, the terms of reference for this year's Australian Law Reform Commission (ALRC) copyright inquiry do not address the issue of piracy and enforcement, although the ALRC states that it is watching for any developments in these areas.

Graduated response systems are of course not without their drawbacks.  Critics point to the high cost involved in pursuing individual infringers, a criticism which may be given some weight by the low deterrent amount levied in the RIANZ case.  In the area of unlawful downloading of copyrighted content, it seems that no enforcement option has yet adequately addressed the problem.

An alternative solution may, of course, lie in giving consumers more options to access and download copyrighted content legally.  In an interesting development (given the continued prevalence of unlawful downloading), the International Federation of the Phonographic Industry (IFPI) announced last month that the music industry experienced growth in 2012 for the first time since 1999, thanks in no small part to digital sales. While the overall industry growth was a modest 0.3%, digital sales recorded stronger growth of 9%.  Some industry commentators have suggested that subscription-based services such as Spotify and Pandora (which allow users to legally stream and listen to music) have contributed to this result.

If the 2012 industry growth can be taken as an indication that the tide is to some degree turning against infringing downloads, it may be that creating new ways for users to quickly and legally access copyrighted content will do more to combat piracy than a program of enforcement action.  Watch this space.

08 March 2013

US Supreme Court rejects challenge to warrantless surveillance laws

Posted by Tarryn Ryan and Paul Kallenbach

Last month the United States Supreme Court put a definitive end to a challenge of the constitutionality of laws which allow the US Government to conduct warrantless surveillance of non-US citizens, by finding that the plaintiffs lacked standing to bring the action.[i]  The challenge was brought by human rights groups including Amnesty International, lawyers and journalists, all of whom claimed that their communications were likely to be caught up in surveillance activities carried out under the laws introduced by the FISA Amendment Act.[ii]

What is the FISA Amendment Act?

The FISA Amendment Act was introduced by the Bush administration in 2008.   It expanded the surveillance powers that already existed under the Foreign Intelligence Surveillance Act of 1978 which was designed to facilitate electronic surveillance of foreign powers for foreign intelligence purposes.

The original Act established the Foreign Intelligence Surveillance Court (FISC) which could authorise surveillance where it found there was probable cause to believe that the target was a foreign power or an agent of a foreign power, and that the facilities targeted were being used by that foreign power or an agent of the foreign power.   The Foreign Intelligence Surveillance Court of Review was also established and given jurisdiction to hear appeals of decisions where authorisation had been refused.  Of course all of this went on behind closed doors.

Since 9/11, the US Government has made a series of amendments to the original Act, enabling it to cast a wider net in its surveillance activities.   The FISA Amendment Act is the most recent of those amendments.   It enables the US Government to carry out surveillance of any non-US citizen located outside of the United States for the purpose of acquiring 'foreign intelligence information' - a term that is given an expansive definition, and goes so far as to include information that is 'relevant' to US foreign relations.

Under these amendments, the FISC's powers of oversight have also been whittled down so that the US Government is no longer required to show probable cause or even give the FISC any specific details on who is being targeted or how.   All the US Government need show is that 'a significant purpose of the acquisition is to obtain foreign intelligence information' and that it has targeting and privacy intrusion minimisation procedures in place.   In some circumstances the US Government can proceed with the surveillance without even going before the FISC.

Originally the FISA Amendment Act had a sunset clause of five years.   However, just before Christmas last year, the US Congress, with the support of the Obama administration, extended its operation until 2017.

What happened in the Amnesty International case?

On the day the FISA Amendment Act was passed in 2008, a group of human rights activists, lawyers and journalists launched a challenge to the new laws on the basis that they were unconstitutional. However before the plaintiffs even got to mount their case, the District Court for the Southern District of New York (an original jurisdiction federal court) found that they did not have standing to bring the action.   The United States Court of Appeals for the Second Circuit reversed this decision, which was then appealed to the United States Supreme Court.

In a 5-4 decision, the majority held that the plaintiffs did not have standing to bring their claim because they could not show that their communications had been subject to surveillance.   The plaintiffs' argument was that their lines of work required them to be in communication with individuals that were likely to be targeted under the new laws.   As a result, they said there was 'an objectively reasonable likelihood' that their communications would be intercepted.   In the alternative they argued that the risk of being subject to surveillance required them to take onerous and costly measures to avoid interception.   A number of the plaintiffs were lawyers who represented individuals suspected of terrorism offences.   They submitted that in order to prevent surveillance of their privileged communications with their clients, they had to either not engage in these communications or travel outside of the United States to have them.

Nevertheless the majority held that that the plaintiffs' case was based on a series of assumptions and that they could not show the required likelihood of injury to give them standing.   This decision was staunchly criticised by the minority which said that the Court had often found plaintiffs to have standing where the risk of injury was far less likely than in the present case.

What does this mean?

As the ultimate US appellate court, the US Supreme Court's decision brings an end to the plaintiffs' challenge.  Following the passing of the FISA Amendment Act there were a number of parties who sought to challenge the laws on various grounds.  This was one of the few cases that was still on foot.  Commentators are now pessimistic about whether the laws (which many consider to be unconstitutional) will ever be able to be effectively challenged.   The majority of the Court essentially found that only individuals who could actually show that their communications had been intercepted would be able to make the challenge - which will be difficult seeing as these surveillance activities are, by their very nature, carried out in secrect.

While the existence of these powers is concerning for those in the United States, it is of greater concern to non-US citizens who could potentially be a target of, or even just caught up in, FISA's far reaching surveillance net.

[i] Clapper v Amnesty International USA, No 11-1025, slip op (Sup Ct, Feb 26, 2013)
[ii] The Foreign Intelligence Surveillance Act of 1978, which the FISA Amendment Act amends, is codified at 50 USC ch 36

21 February 2013

The Pirate Bay claims copyright infringed by anti-piracy group

Posted by Tarryn Ryan and Paul Kallenbach

Yes, you read it right.   In a move that has raised more than a few eyebrows, the operators of The Pirate Bay, a website that facilitates the downloading of copyright material, have lodged a complaint with Finnish police and are threatening legal proceedings against a Helsinki-based anti-piracy group for allegedly infringing their copyright in The Pirate Bay's website.

Recently the Copyright Information and Anti-Piracy Centre (CIAPC) launched a lookalike website which, instead of connecting users to links that would enable them to download illegally, directs them to information on how to legitimately download entertainment content.   CIAPC's 'Piraattilahti' website, meaning 'Pirate Bay' in Finnish, looks almost identical to The Pirate Bay website except that CIAPC has replaced the logo with the image of a sinking ship (just to make sure they really get their point across).

The Pirate Bay's website
 
The website launched by CIAPC
 

What is The Pirate Bay?

The Pirate Bay is a website that allows users to search for magnet links which, when opened in a BitTorrent program, start downloading the relevant content (such as a movie or TV show) via peer-to-peer networks.  Since being set up in Sweden in 2003, The Pirate Bay has been engaged in an ongoing game of cat-and-mouse with law enforcement agencies and copyright owners.[1]   In 2009 four men connected with the website faced trial for 'promoting other people's infringement of copyright laws'.  Each was convicted and sentenced to one year in prison in addition to being ordered to pay fines and damages.  Since then, The Pirate Bay has continued to operate but those who now run it have managed to remain anonymous.

Who is CIAPC?

CIAPC is a Finnish anti-piracy organisation that represents members including the Finnish Film Distributors Association and the Finnish division of the International Federation of the Phonographic Industry.

In recent years CIAPC has been active in fighting unauthorised downloads in Finland.  Since May 2011 the organisation has succeeded in obtaining court orders requiring the three largest ISPs in Finland to block The Pirate Bay.  All three ISPs have sought to fight these orders, arguing that making legal downloads more widely available is a preferable way to combat copyright infringement than to resort to censorship.  However the ISPs have been unsuccessful, and following the refusal of Finland's highest court to grant leave to the first ISP to appeal the order, it looks as though CIAPC has come out the winner.

Interestingly CIAPC is no stranger to employing controversial tactics.  In November last year it was widely reported that it had initiated a police raid on a nine year old Finnish girl who it said had illegally downloaded music via The Pirate Bay, resulting in the seizure of the girl's Winnie-the-Pooh laptop.   The father of the girl, who had received a notice from CIAPC informing him that it had traced illegal downloading activity to his account, had previously refused to pay a €600 fine and sign a non-disclosure agreement to settle the matter.

The Pirate Bay's allegations

In a statement issued by The Pirate Bay on its blog, those behind the website seemed to at least acknowledge the irony of their complaint, stating 'while The Pirate Bay may have a positive view on copying, it will not stand by and watch copyright enforcing organisations disrespect copyright'.

The Pirate Bay claims that CIAPC has copied the CSS file that underpins its website in order to set up the copycat site, without first obtaining permission as required by the website's terms of use.  A CSS file contains the coding information that determines the layout and formatting of a website and (at least under Australian copyright law) may be protected by copyright as an original literary work.

In some other countries, CIAPC's use of the copyright material may arguably fall within an exception to copyright infringement (such as the 'fair use' exception in the US, or perhaps the narrower parody and satire exception in Australia).  The Finnish Copyright Act, however, does not contain a parody or satire exception, despite an EU Directive that permits Member States to limit the rights of copyright owners in this manner if they so choose.[2]   This has been the subject of much debate in Finland, which has relatively strict copyright laws.

However, The Pirate Bay may still have a problem with its terms of use, which it claims prevents organisations from using material from its website without permission.  The terms state:
Organisations (for instance, but not limited to, non-profit or companies) may use the system if they clear this with the system operators first. Permission for organisations/ companies is not needed for obvious "well meaning" usage, i.e. distributing works of cultural benefit for the end user. [emphasis added]
No doubt if CIAPC did find itself in court it would simply say that it was entitled to use the CSS file without first seeking permission because its use was 'well meaning'.   It may well be challenging for The Pirate Bay to argue that linking users to information on legal downloading was not a 'well meaning' use.

CIAPC has in fact welcomed The Pirate Bay's threat of legal action, as it would require the website's operators to step out from behind their current veil of anonymity.  This would, in turn, enable CIAPC (and possibly law enforcement agencies as well as other copyright enforcement bodies) to commence legal proceedings against these individuals.

What will the outcome be?

It remains to be seen whether The Pirate Bay's threats of legal action will amount to anything. Presumably the operators will not want to relinquish their anonymity, considering the potential consequences for them should their identities become public.  There have been suggestions that they may enlist a third party to bring the action against CIAPC on their behalf, but it seems unlikely that a court would have much patience for such tactics given the circumstances.

For now, all attention is focused on the Finnish police's next move.

[1] Over the years The Pirate Bay has been blocked by ISPs in a number of countries. Just last year the High Court of England and Wales ordered ISPs operating in its jurisdiction to block access to the site as it was held to facilitate copyright infringement.

[2] Directive 2001/29/EC, Article 4(2)(k).

20 February 2013

Federal Court rejects business method patents

Posted by Dennis Schubauer and John Fairbairn

On 13 February 2013, the Federal Court of Australia issued a decision relating to the patentability of business methods in Australia (Research Affiliates, LLC v Commissioner of Patents [2013] FCA 71). Emmett J held that the claimed inventions were business methods that were not eligible for patent protection. The patentability of business methods remains a vexed area of law in Australia (and many other countries). While this decision provides some guidance, it seems unlikely to resolve conclusively the uncertainty in this area of the law.

Background

Under the Patents Act 1990 (Patents Act) there is no express prohibition on patents covering business methods. Section 18(1)(a) of the Patents Act requires that, in order to be patentable, an invention must be 'a manner of manufacture within the meaning of section 6 of the Statute of Monopolies'. Historically, claims regarded as 'mere working directions' or 'mere schemes' have been regarded as unpatentable, and recent decisions have also interpreted the 'manner of manufacture' requirement in a way that rendered business methods unpatentable.

For example, in Grant v Commissioner of Patents [2006] FCAFC 120, the Full Court of the Federal Court of Australia held that, in order for there to be a patentable invention '[it] is necessary that there be some 'useful product', some physical phenomenon or effect resulting from the working of a method'. In that case, a patent directed to a method of asset protection was held not to be patentable. The Full Court applied the relevant principles as enunciated by the High Court in National Research Development Corporation v Commissioner of Patents (1959) 102 CLR 252, including that, in order to be patent eligible, the Court must be satisfied that the 'process belongs to a useful art as distinct from a fine art' and that the effect produced by a claimed invention exhibits the qualities of being an artificially created state of affairs that is of economic significance.

The patent office has not regarded the position to be any different where the claimed method involved a computer. In Invention Pathways Pty Ltd [2010] APO 10 the delegate reasoned that the patentability of a business scheme cannot 'arise solely from the fact that, in a general sense, [the method] is implemented in or with the assistance of a computer or utilises some part of a computer or other physical device in an incidental way'.

In the present case, Research Affiliates, LLC (Research Affiliates) owned two patent applications relating to methods for constructing and using passive portfolios and indexes in securities trading. Consistent with the approach in Invention Pathways, the patent office rejected both of the patent applications on the basis that they were not a 'manner of manufacture'. Research Affiliates appealed those decisions to the Federal Court of Australia.

The decision

Emmett J, in seeking to apply the NRDC test, stated the 'method of a claimed invention will not be patentable if it does not produce an artificial state of affairs, in the sense of a concrete, tangible, physical or observable effect. Even if there is not a physically observable end result, in the sense of a tangible product, a claimed invention that is a method may nevertheless be patentable if it applies the method in a physical device. In such a case, an artificial state of affairs is produced in the physical device by the claimed method. Thus, a physical effect, in the sense of a concrete effect or phenomenon or manifestation or transformation, is required. It is sufficient if there is a component that was physically affected or a change in state or information in part of a machine. They can be regarded as physical effects. However, if the claimed invention is a mere scheme, an abstract idea or mere information, it will not be patentable as there is no physical consequence...'

In refusing the appeal, his Honour held that:

(a) the only physical result generated by the method of the claimed invention is a computer file containing an index. 'However, the index generated is nothing more that a set of data. The index is simply information: it is a set of numbers. It is no more a manner of manufacture than a bank balance';

(b) '[while] the Specification appears to be intended to create the impression of detailed computer implementation, the Specification says almost nothing about how that is to be done';

(c) 'the claimed invention does not involve a specific effect being generated by the computer... The effect of the implementation is not to improve the operation of or effect of the use of the computer'; and

(d) the implementation of the claimed invention 'is no more that the modern equivalent of writing down the index on pieces of paper... The Specification asserts a patentable invention, not in the use of the computer, but in the particular series of steps that give rise to the generation of the index. Those steps could easily have been carried out manually. The aspect of computer implementation is nothing more than the use of a computer for a purpose for which it is suitable. That does not confer patentability.' (emphasis added)

Comment

The decision is timely given that over 7 years have passed since the last judicial consideration of the patentability of 'business methods' (ie. in the Grant case) and, in the intervening time, the uncertainty in this area of law has increased.

The decision does provide some practical guidance for patentees. In particular, his Honour made it clear that a specification must do more than merely recite the implementation of a method using a computer. It must describe how that invention is to be implemented by the computer. Further, there must be a specific effect on or generated by the computer that goes beyond its standard operation.

Emmett J's reasoning may be open to criticism. First, his Honour's distinction between a computer generated output of a 'curve, or a presentation of Chinese characters, or the writing of particular information on a smart card' as being patentable on the one hand but an 'unspecified index' as being unpatentable on the other, may prove to be illusory. It seems his Honour was drawing a distinction between an invention relating to application software and one that merely uses pre-existing software for a purpose for which it is suited. However, if the focus is on the physical consequence of such inventions, at a number of levels, they are indistinguishable.

Second, the reasoning appears to conflate issues of fair basis (ie. whether the specification discloses how to implement the method using a computer) and inventive step (ie. whether the invention was obvious) on the one hand and whether the invention is a 'manner of manufacture' for the purposes of section 18(1)(a) on the other. In Lockwood Security v Doric Products [2004] HCA 58, the High Court made it very clear that such grounds of invalidity should be treated separately. While threshold requirement of 'newness' and 'inventiveness' are relevant to an assessment of section 18(1) (per the High Court's reasoning in NV Philips Gloeilampenfabrieken v Mirabella International Pty Ltd (1995) 183 CLR 655), in the present case his Honour did not expressly adopt such an assessment in his reasons for judgment. They seem to have formed part of the assessment as to whether there was an 'artificial state of affairs, in the sense of a concrete, tangible, physical or observable effect.'

Business methods are potentially very valuable, particularly in the financial services sector. In the present case his Honour noted that Research Affiliates received a 'significant licence fee' for the use of its technology. Therefore companies wishing to protect business methods will need to consider carefully what strategies to use to protect their inventions (eg. confidentiality obligations and/or patent protection) and the extent to which they meet the requirements highlighted by Emmett J in this case.

18 February 2013

Federal Court confirms that isolated genetic material is patent-eligible

Posted by Dennis Schubauer and John Fairbairn

Image courtesy of net_efekt
On 15 February 2013, the Federal Court of Australia handed down its much anticipated decision in Cancer Voices Australia v Myriad Genetics Inc [2013] FCA 65 relating to whether human genetic material is patentable in Australia. In what is the first Australian judicial consideration of the issue, Nicholas J held that claims for isolated naturally occurring DNA and RNA are patentable subject matter. This decision (and any appeal) will be closely reviewed by the many interested bodies presently debating whether, as a matter of policy, patents covering genetic materials are appropriate.

Background

For present purposes it is sufficient to note that genes found in the human body are made of nucleic acids and that useful diagnostic and therapeutic tests can be developed by identifying particular genes (and variants of such genes) that are associated with certain diseases.

Myriad owns Australian patent no. 686004 (the Patent), which relates to a gene associated with human breast and ovarian cancer known as the 'BRCA1' gene. The Applicants, which included an organisation representing Australians affected by cancer, commenced proceedings to revoke the Patent. The primary basis of their case was that the claims in issue did not satisfy the requirements of s 18(1)(a) of the Patents Act 1990 (Patents Act) because each claim comprises 'isolated' nucleic acid (either DNA or RNA) that is not materially different to nucleic acid that occurs in nature. Importantly other typical grounds of invalidity, such as lack of novelty or inventive step, were not in issue.

Section 18(1)(a) of the provides that an invention is patentable if, amongst other things, it 'is a manner of manufacture within the meaning of section 6 of the Statute of Monopolies'. Nicholas J stated that this issue must be determined in accordance with the principles enunciated by the High Court in National Research Development Corporation v Commissioner of Patents (1959) 102 CLR 252 (the NRDC Case). The relevant test was summarised as being whether a substance consists of 'an artificial state of affairs, that has some discernible effect, and that is of utility in a field of economic endeavour'. The Applicants accepted the claimed invention was of economic significance.

The decision

His Honour held that:
  1. 'There is no doubt that naturally occurring DNA and RNA as they exist inside the cells of the human body cannot be the subject of a valid patent.'
  2. 'However, the disputed claims do not cover naturally occurring DNA and RNA as they exist inside such cells. The disputed claims extend only to naturally occurring DNA and RNA which have been extracted from cells obtained from the human body and purged of other biological materials with which they were associated.'
  3. The issue of whether this was an artificial state of affairs must be considered in context and 'does not turn upon what changes have been made to the chemical composition of such substances as a result of them having been isolated'.
  4. In this case there was an artificial state of affairs because 'in the absence of human intervention, naturally occurring nucleic acid does not exist outside the cell, and “isolated” nucleic acid does not exist inside the cell. Isolated nucleic acid is the product of human intervention involving the extraction and purification of the nucleic acid found in the cell'.
Nicholas J observed that '[it] would lead to very odd results if a person whose skill and effort culminated in the isolation of a micro-organism (a fortiori, an isolated DNA sequence) could not be independently rewarded by the grant of a patent because the isolated micro-organism, no matter how practically useful or economically significant, was held to be inherently non-patentable'.

Comment

The decision affirms the existing patent office approach that isolated genetic material can qualify as a 'manner of manufacture'. The result of the decision is also consistent with the position in much of Europe and in the United States. In the United States, the Court of Appeals for the Federal Circuit upheld the validity of similar claims covering isolated BRCA1 genes, although that case is the subject of an appeal to the Supreme Court.

Nonetheless, patents claiming isolated gene sequences are by no means safe from attack.

First, as noted above, there were several grounds of invalidity that were not argued (eg. novelty and inventive step) and his Honour expressly noted that his 'reasons have nothing to say about the possible invalidity of the disputed claims on any other grounds'. In the case, the patent at issue was relatively 'old', with a priority date of 12 August 1994. Since 1994, there have been considerable advances in genetic technology, including in techniques for isolating and sequencing genes, and in 2003 the Human Genome Project sequenced and mapped the complete human genome.

Second, the recent Intellectual Property Laws Amendment (Raising the Bar) Act 2012 (Amendment Act) means that higher standards (including inventive step, utility, sufficiency and disclosure) will apply to Australian patents and applications examined after 15 April 2013. Interestingly, Nicholas J even noted that new section 7A of the Patents Act (which requires a patent to disclose a 'specific, substantial and credible use for the invention') will 'make it more difficult for patent applicants to obtain patent protection for expressed sequence tags'. These higher patentability standards will provide further grounds for challenging patents.

In addition, various proposals have been and continue to be put to Parliament to reform this area of patent law. While the decision provides guidance on some of the underlying patent eligibility criteria, it remains a contested and developing area of the law and public policy. Regardless of whether the Australian decision is appealed, it seems unlikely that this case will settle the controversy regarding gene patents.