Intellectual Property Strategy is Integral to Business Development Plan-Lessons for India

Intellectual property (IP) simply refers to any creation that can be leveraged for its innovation, ingenuity and monetary value. It typically includes patents, trademarks, copyright, which are the more commonly understood terms. Patents are the staple of the competitive advantage of businesses. If you look at your everyday use gadgets, the cellphone for instance, each one of them out there is protected by at least 400-800 patents. IP has been a ‘protection’ tool for companies for many years. However, the focus has now shifted from simply ‘protecting’ your IP assets to monetising these assets by licencing IP rights to third parties or by selling assets that are no longer core to the business. As per the current Merger & Amalgamation trends and the intense patent litigation between the biggest players in the smartphone field, it is evident that IP assets are at the core of both. The effective commercialization of inventions, creative ideas and innovations is going to lead economies of the world in coming future.

As per US commerce Dept. IP-intensive industries support at least 40 million jobs in the country and contribute more than $5 trillion (34.8%) to US gross domestic product (GDP). European nations aren’t far behind. Asia Pacific too is forging ahead with Korea, Taiwan and China paving the way. Intellectual-property based sectors in both developed and developing countries are substantial drivers of GDP and employment growth. The effective management of IP assets requires not to just managing the business but also more importantly to expand the business. To realise the commercial value of assets is the essence of the IP business today. That’s why you see that the world’s biggest and most successful businesses have one thing in common—their IP strategy has become integral part to their business development plans.

A typical IP strategy has three key steps like getting IP protection, managing IP and then maintaining IP. It looks like as three simple steps, but in-fact a way more complex business than that does an innovation need to be patented. The challenging economic climate of recent years has brought with it a sharper need for innovation in order for businesses to be able to differentiate themselves in the marketplace. Investment in IP will undoubtedly bring with it new technologies, that will eventually lead to fast economic growth.

In 2012, China received a total of 652,777 patent applications, the highest ever received by any single IP office. Among the top 10 IP offices, China’s IP office saw the fastest annual growth in filings received [+24%]. China topped the ranking for both the source (filings by China) and the destination (filed in China) for patents, utility models, trademarks and industrial designs. It recorded a double digit growth of 24%, making its share in the mentioned IPs the largest worldwide. This offers a glimpse into the IP supporting strategy that China has developed viz. a less restrictive R&D tax regime, reduced corporate income tax rate, big deductions for R&D costs, duty exemptions for R&D equipment and concessions for technology transfers. Recognising how critical IP is to economic growth, the Chinese government has incorporated IP into their national policies involving R&D and innovation. As a result, Chinese business investment in R&D remains strong with expenditure in 2012 exceeding $160 billion together with double-digit annual increases in R&D spend.

Apparently, in 2011-2012, intellectual property was responsible for driving close to $25 billion worth of M&A activities globally. In the US alone, 10 million jobs have been created with a need for three million more IP skilled graduates. India too is trying to develop and progress in the area of IP.

To quote a few statistics, in 2012-13, 43,955 patent applications were filed in India—a rise from 8954 in 2008. Out of this, the number of applications filed by Indian applicants in 2011 and 2012 were 8841 and 9553 respectively, an 8% increase from the previous year.

Indian government and Indian MNCs should realize the monetary importance of IP and take lessons from Japan, USA and China to upgrade and reformulate its strategy accordingly. The following steps are sine-qua-non like to upgrade the existing system for online filing of applications and update all IP records to benefit the IP stakeholders and to facilitate the retrieval of data from IP offices. Revision and enactment of IP laws to create a research culture to turn India into an innovation conglomerate. This will help India to get an edge and extract the real benefit of IP-Commercialization, monetization and maintain its claim of future economic power.


1. WIPO IP Statistics Data Center.



S L Bhojegowda now Vice-Chairman of Bar Council of India

Mr. Bhojegowda, an advocate from Karnataka, has been elected as the Vice-Chairman of Bar Council of India, New Delhi.

Bhojegowda, hailing from Chikmagalur, has been practicing law for the last two decades.

He was elected to Karnataka State Bar Council earlier and then in 2013 into Bar Council of India, New Delhi, thus creating history of being the first-ever advocate from Karnataka to be elected as the Vice-Chairman of Bar Council of India.


Renewable Energy and Sustainability a Commendable Step by Illinois

To protect the state’s natural resources and ensure a clean and healthy environment for future generations the Governor Pat Quinn on June 28, 2014 signed a legislation to promote the purchase of solar-produced electricity in Illinois. The law requires that a special existing fund be used to purchase solar power and emphasizes the development of distributed solar generation, such as the installation of solar panels on residential rooftops. Now this innovation has made Illinois in USA a national leader in clean energy production. The new law establishes a competitive procurement process to purchase energy from existing solar devices and from new solar installations, which could mean thousands of new solar panel installations on homes in Illinois. These panels help power homes in a clean, healthy way and reduce homeowners’ electric bills by allowing residents to sell excess power to the grid. Existing and new utility-scale solar projects will benefit from the legislation as well.

The enhanced investment in clean energy will definitely create jobs and protect the environment and will further reduce the dependence on fossil fuels. This is pertinent to mention that the Illinois Power Agency was established by law in 2007 to develop procurement plans to ensure adequate, reliable, affordable, efficient and environmentally sustainable electric service at the lowest total cost for residential and small commercial customers of Ameren and ComEd. The procurement plans include electricity generated from renewable sources and from traditional sources.

This will further support the President Barack Obama’s Task Force on Climate Change and Resilience and help the federal government on how to respond to the needs of individual communities affected by climate change. Now Illinois has become no. 1 among all states in the USA in purchasing green energy and its energy efficiency programs rank in the top ten in the U.S., the only non-coastal state to do so. Illinois is also fourth among states in wind production, largely due to Renewable Portfolio Standards (RPS). This will further help in utilizing less energy and water, LEED-certified spaces save money for families, businesses and taxpayers; reduce carbon emissions; and contribute to a healthier environment for residents, workers and the larger community.

Illinois’ $1 billion Illinois Clean Water Initiative expands funding for wastewater and drinking water projects for Illinois communities so all of Illinois has access to clean water. Govt. also funds for mass transit, electric vehicle infrastructure expansion, renewable fuels, high-speed rail as well as an ambitious state government construction and renovation plan that will save the state money and have a lasting environmental impact. It also funds the Governor’s highly successful Weatherization Assistance for Low Income Persons program that has helped 25,000 Illinois homes save energy and money through the winter.

I personally congratulate Governor Quinn in particular and Illinois State in general for this commendable work. I further suggest that the nations of the world should get lessons & inspiration from Governor Pat Quinn to promote the renewable energy resources and improve the quality of environment.

Source:For further details log on to


Dr. Tabrez Ahmad | Professor & Associate Director | University of Petroleum & Energy Studies (College of Legal Studies) | Dehradun, U.K, INDIA | Tel Off: +91 135-2770137 Extension 548, Linkedin , facebook , Conferencelex , technolexindia , Iplexindia , Energylex , Corpolex , Editor JPL ; Editor IJBS, Editor GRJHSS, Editor JCSL , Editor E-commerce for Future & Trends

Challenges of Privacy and Information Technology

As the accelerating speed of technological advances is now an unquestioning reality. It is fundamentally transforming every aspect of our personal and business lives, every industry, and every country across the globe. However, it also has the effect of fundamentally transforming the notion of privacy — what it means to affected stakeholders (individuals, regulators, organizations) and how each party can remain accountable in a world that technology has turned on its head.

One of the most pressing privacy issues related to digital devices today is the increasing ubiquity of bring your own device (BYOD) policies. According to Gartner, by 2018 up to 70% of mobile professionals will be using their smartphone to conduct work. As enticing as BYOD is for an increasing number of organizations, it is apparent that there are two sides to the BYOD coin: heads represents increased efficiencies; tails results in increased risk. And the risks are substantial. In 2014, we expect to see organizations continue to deal with a number of privacy challenges related to BYOD. Organizations need to maintain ownership of their information. With BYOD, this information is stored on devices that now sit outside the organization’s immediate control. To keep an eye on their data, organizations tend to install monitoring tools on employee smartphones. However, when implementing these tools, organizations need to be very careful that they are only monitoring the company’s data and not collecting personal information about their employees and others such as friends and family who may use the device.

The organizations can only collect personal information for a stated reason – and can use it only for that purpose. Among others things that mean a company that supplies a service can’t sell its list of subscribers to another company’s marketing department. Individuals must be informed, and give their consent, before personal information is collected, used or disclosed. But most firms are unaware of the new law and very few are prepared to comply. For any organization that already sends commercial electronic messages, they presumably comply with the privacy law, that requires organizations to obtain user consent, allow users to withdraw their consent, and provide the necessary contact information to do so. Compliance with the new anti-spam law involves much the same obligations. While there are certainly some additional technical requirements and complications (along with tough penalties for failure to comply), the basics of the law involve consent, withdrawal of consent (ie. unsubscribe), and accessible contact information.

While privacy does create some new obligations, what is not new is the claims that business is unaware and unprepared to address their privacy law obligations. The IT Act 2000 of India defines a ‘computer resource’; expansively as including a “computer, computer system, computer network, data, computer database or software”. As is evident, this definition is wide enough to cover most intrusions which involve any electronic communication devices or networks — including mobile networks. Briefly, then IT Act provides for both civil liability and criminal penalty for a number of specifically proscribed activities involving use of a computer — many of which impinge on privacy directly or indirectly as follows: accessing; downloading/copying/extraction of data or extracts any data ; introduction of computer contaminant[3];or computer virus; causing damage either to the computer resource or data residing on it; disruption; denial of access; facilitating access by an unauthorized person; charging the services availed of by a person to the account of another person; destruction or diminishing of value of information; stealing, concealing, destroying or altering source code with an intention. The Act further provides for the civil remedy of “damages by way of compensation” for damages caused by any of these actions. In addition anyone who “dishonestly” and “fraudulently” does any of these specified acts is liable to be punished with imprisonment for a term of upto three years or with a fine which may extend to five lakh rupees, or with both.

In N G Arun Kumar case of November 2009, The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun Kumar, a techie from Bangalore to undergo a rigorous imprisonment for one year with a fine of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (hacking). Investigations had revealed that Kumar was logging on to the BSNL broadband Internet connection as if he was the authorised genuine user and ‘made alteration in the computer database pertaining to broadband Internet user accounts’ of the subscribers. The CBI registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected the unauthorised use of broadband Internet. The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’ sites from Bangalore as also from Chennai and other cities.

In 2014, as organizations begin to think about the endless possibilities associated with the “internet of things” — nanotechnology, product sensors, sensor-driven analytics and sophisticated tracking capabilities — they also need to think about the privacy risks. There is a strong possibility, for example, that when an organization embeds a tracking mechanism into a product or service, it has not first sought the permission, either implicit or explicit, of the consumers being tracked. And when consumers find out, chances are they’re going to be irate. These kinds of privacy gaffes erode the very trust many organizations are attempting to cultivate to create the ultimate customer experience.

There is no question that the internet of things holds huge promise for an organization to vastly improve its strategic trajectories and business models, generate efficiencies and lower costs. However, this promise needs to be balanced against the privacy that consumers innately expect, and the privacy that they will demand alongside their customized customer experience. In 2013, participants at the 35th International Conference of Data Protection and Privacy Commissioners continued their progress by adopting eight new declarations and resolutions that delved deeper into the issues raised the year before. Four resolutions focused on technology challenges (appification, profiling, digital education and webtracking), two addressed better coordination among jurisdictions (enforcement coordination and international law), and one urged greater transparency on what data organizations are collecting and why (openness).

At a more granular level, many government bodies at federal and state levels are continuing to update their breach notification laws. Unfortunately, the massive intelligence leak by former US intelligence contractor Edward Snowden has cast a pall on the goals of cooperation. In fact, the Snowden affair has so eroded trust among nations that the European Union is considering a motion to suspend the US–EU Safe Harbor Framework. Once a respected guideline for US organizations to provide satisfactory protection for personal data of EU residents as required by the European Union’s Directive on Data Protection, the Framework now lies in limbo. This leaves Binding Corporate Rules (BCR) as one of the few frameworks available for global organizations to adhere to when seeking to transfer data of EU residents across borders.

In 2013, a number of jurisdictions around the world improved or expanded their privacy regulations. We expect similar progress to occur around the world in 2014. With the emerging global digital economy and the increasing popularity of cloud computing services, legislation which reinforces trust in the market will be a key driver for business growth as follows:

Brazil: Brazil seeks to mandate that global internet providers store data gathered from Brazilian users within Brazil.

Canada: Bill C-475, working its way through Parliament, would unify and strengthen the country’s approach to breach notification.

US: Although US lawmakers continue to push for a federal data breach notification law, Congress continues to debate whether federal law should supersede state laws.

Australia: In late 2012, the Australian Parliament passed the Enhancing Privacy Protection Act. The Act is set to take effect in 2014.

China: In late 2012, China’s standing committee of the National People’s Congress approved a directive that strengthened online personal data protection. That directive came into force in February 2013.

Singapore: Singapore’s Personal Data Protection Act 2013 came into force in 2013.

EU: Under a policy implemented in August 2013, European communication services providers are now required to notify not only affected individuals but their respective national authority within 24 hours of detection. EU: Crafted in 2012 and expected to pass in 2014, the EU General Data Protection Regulation is designed to simplify and strengthen the European Union’s data protection framework. Instead of adhering to requirements from 27 individual data protection authorities, organizations will only have to address one set of data protection rules.

One solution, which is becoming more feasible as smartphones become more powerful, is the partitioning of the devices. This would allow employees to essentially operate two different desktops — one for work and one for personal. The other option is the use of a guest network that is separate from the main network. Organizations could create a “sandbox” where company data would reside, separated from any association with personal data, applications or online services. Organizations need to be vigilant when collecting data from social media. Consumers are voluntarily providing intimate details about themselves. Organizations need to respect their privacy, even when the consumers themselves aren’t, by anonymizing the data before using and sharing it. Anonymous data can still provide deep insights into trends and opportunities, but with a much smaller privacy impact.

Thanking You,
Best Regards.

Dr. Tabrez Ahmad | Professor & Associate Director | University of Petroleum & Energy Studies (College of Legal Studies) | Dehradun, U.K, INDIA | Tel Off: +91 135-2770137 Extension 548, Linkedin , facebook , Conferencelex , technolexindia , Iplexindia , Energylex , Corpolex , Editor JPL ; Editor IJBS, Editor GRJHSS, Editor JCSL , Editor E-commerce for Future & Trends

This e-mail is confidential and may also be legally privileged. If you are not the intended recipient, please notify me immediately; you should not copy, forward, disclose or use it for any purpose either partly or completely. If you have received this message in error, please delete it and all copies from your system and mail to tabrezahmad7 Internet communications cannot be guaranteed to be timely, secure, error or virus-free. Also, the Web/Email administrator might not allow emails with attachment. Thus the sender does not accept liability for any errors or omissions.

DrTabrez Ahmad is still waiting for you to join Twitter…

Top corners image
DrTabrez Ahmad is still waiting for you to join Twitter… loadimage
Accept invitation
You can stop getting these emails with people you may know (PYMK) suggestions at anytime. Learn more about PYMK suggestions or find other answers at Twitter’s Help Center.

Twitter, Inc. 1355 Market St., Suite 900 San Francisco, CA 94103