Category Archives: Latest News

Five Cool Tools Every Legal Marketing Rock Star Needs to Understand

The legal industry faces a number of marketing challenges. Setting your firm apart, doing something interesting or innovative, or finding ways to engage current and potential clients is tough in the law business. But, legal marketing doesn’t have to be “boring” or uninteresting, and there are a number of nifty marketing tools that will not only make your legal practice stand out for the right reasons, it will make the marketing of your firm faster, simpler and far more effective.

At leading legal marketing firm, The Eisen Agency, we thrive on being successful leaders in today’s fast moving global marketplace, and have the time, energy and expertise to focus on individual industries and great marketing tools to marry those strategically and tactically to the benefit of our clientele. Each of our executive’s knowledge and expertise span across a wide variety of industries – from travel to accounting – so our team’s expertise is our client’s advantage. Here are five cool tools every legal marketing rock star needs to understand in 2016.

  1. Buffer

This simple analytics platform is the best way to decrease social media time, increase engagement and drive traffic to your organization’s website. This interface allows you to share content across multiple social media platforms and accounts. Buffer uses data specific to the legal industry to analyze and distribute your published post during the best times of the day. The platform also allows you to add photos and videos or use their new tool, Pablo to visualize your post. Pablo creates social media images, allowing users to choose different templates and fonts. So, save yourself a few hours each week and purchase Buffer.

bufferBuffer saves legal marketers time by housing their social media accounts.
  1. Scoop.it

Scoop.it allows businesses and professionals to discover, curate and publish a wide array of content to increase visibility and drive visitors to their website. This platform not only allows you to collect articles on specific content, but search millions of users and topic boards related to the legal industry. And, this tool integrates with Facebook and Twitter, sharing
your curated content with the click of your mouse.

scoop-itWith Scoop.it legal marketers can share and create curated content.
  1. Klear

Klear is a social intelligence platform that serves as a sophisticated influencer search engine. This platform can connect you to the right people around the world and become a very successful networking tool. It will also analyze your engagement, performance, benchmark your landscape and provide insight so you can stay ahead of the curve.

Klear connects legal marketers to influential leaders.
  1. Canva

Producing engaging content and producing it consistently are two large obstacles when it comes to implementing a marketing plan effectively. If you are looking for an easy-to-use tool, loaded with features to create visually engaging content to share with your audience, you have found it. From magazine covers to social media ads, Canva has you covered.

Canva allows legal marketers to produce visually engaging content.
  1. Lexicata
Lexicata allows legal marketers to analyze customer’s data.

This platform serves as a hybrid between a customer relationship management and client intake software. It allows legal marketers to capture and intake lead information, sign and create documents, and track your progress until the deal is closed. Lexicata also integrates with the favored cloud-based software for lawyers, Clio, making this platform a valuable asset to your organization.

And, while this is by no means an exhaustive list of every “cool” tool out there, it’s a good sampling of some of the whiz bang tools our team uses to the advantage of our clientele. As in in house marketing executive or small business owner, having an outside agency that is dedicated to constantly finding better ways to share your message and grow your business efficiently is a tremendous competitive advantage. Just like having your law firm, our team can comprise a specific strategy and tactical plan to assist in your growth.

 

https://www.canva.com

Aspects to Consider when Closing a Merger in Venezuela

Venezuela is currently going through a very complex situation in which the climate for doing business has become difficult for all parties involved in any part of the economic process. The regulatory burden for entities doing business in the country is very high, and companies are required to be registered, keep in place records and processes in a vast amount of governmental entities, a fact that requires the commitment of a substantial amount of resources and time for each entity that exists and operates in the country. As a consequence of the foregoing, many businesses that were structured with various legal entities for different reasons, including tax and liability mitigation, have opted to downsize their operations by merging their subsidiaries into one or some few entities, in order to have fewer structures to operate.

The reality described above also permeates into the complexities of successfully completing a merger in Venezuela, where a number of filings must be made in order to perform the legal steps required to close a merger. In such regard, the process  of completing a merger will require proper organization,  planning and will typically  last for approximately 6 months  before it will be completed.

From a legal  standpoint, the decision to merge two companies shall be adopted  in the  shareholders’ meeting, a meeting that would discuss how both entities should be merged. The Articles of Incorporation of the companies often contain special quorum and voting requirements in order to approve a merger, but if the Articles of Incorporation are silent, the decision shall be adopted in a meeting where 75% of the shares representing the total capital is present and with the affirmative vote of at least, half of the shareholders attending the meeting[1].

The companies to be merged shall enter into a “merger agreement” which shall be executed by authorized representatives of both parties. The merger agreement must set forth the terms and conditions of the merger, such as specifications  that could lead to the survival of the entity,  and conditions that could cease the entities’ existence, as well as any other matter that may be relevant. Even though the law does not specifically require it, commercial registries require that the merger agreement  should be notarized.[2]

Financial statements of both companies dated on the date of the merger shall be prepared and presented to the commercial registry together with the notarized merger agreement and the shareholders meetings of both companies approving the merger.

It is important to point out that the registration processes before the Commercial Registries are frequently delayed for many reasons, including the fact that Commercial Registries often request changes to be made  on the documentation that has been presented, to the form in which documents are presented or in the supporting documents that shall be filed. These requirements changes from one Commercial Registry to another. Therefore,  the timing of the merger is an important issue and so, it is very  crucial to go beforehand  to the Commercial Registry  with much anticipation as possible,  so as to understand the requirements established by the Commercial Registry  in which the specific merger documentation will be registered.

Once the shareholders meetings are registered in the Commercial Registry or registries the merger agreement shall be published in an authorized legal publication. In practice, the shareholders meetings approving the merger are also published.

The merger will not be effective until a 3-month period  which will be counted from the date on which the publication previously indicated has been made. The Commercial Code establishes that the merger may be closed before such period if evidence of  payment of the  company’s debts or the approval of all creditors is evidenced. However, this is very unusual since in practice, there are just too many potential creditors for any given company, and the 3-month period is seen in practice as almost mandatory without exception.

During the 3-month period indicated before, any creditor can oppose the merger, which if done, will suspend the merger until the suspension is lifted through a definitive judicial decision.

Once the 3-month period elapses without any opposition from the creditors of the merging companies, the merger may become effective and the surviving company shall assume all rights and liabilities of the company that ceases to exist. In such manner, most practitioners and authors assume the position that the surviving company is the universal successor of the company  which ceases to exist.

Once the merger becomes effective, many notices to all kind of governmental entities shall be made. In such regard, the Tax administration shall be notified of the merger within one month from  the date  the merger became effective. Also, an income tax return shall be filed for the “short” fiscal period of the entity that is extinguished and that will end on the date the entity  ceases to exist.

In addition, all governmental entities in which the company that ceases to exist is registered (such as the social security administration, apprenticeship programs, housing and other parafiscal entities) shall be notified of the merger  so that their records may be properly updated to reflect the surviving entity as successor of the entity that  ceased to exist.

Another matter that shall be dealt with much care is the labour situation of employees of the company that ceases to exist. In such regard, prior to the merger, a strategy and plan shall be decided and implemented setting forth the steps and timing that will be taken vis a vis the employees of the company that will cease to exist. The company shall determine if it will carry out a procedure of notification of “change of employer” where notices of the change of employer are given to both employees of the company that will cease to exist and labour administrative authorities, indicating that the surviving company shall be the new employer of the employees of the company that will cease to exist. Employees that do not wish to continue as employees of the new surviving company may as well leave the company and request severance payment as if the company terminated them.

[1]Article 280 of the Venezuelan Code of Commerce.

[2] Based on an Article 23 of Resolution Number 19 of the Ministry of Interior, Justice and Peace dated January 13, 2014

Banking Regulation in India – In The Midst of A Paradigm Shift or Regulator Interrupted?

Since 2014, India has seen a spate of changes centred on improving the banking regulatory environment in India and trimming the proverbial “fat” in the system. To its credit, the Reserve Bank of India (RBI) identified the upcoming crisis on non-performing assets (NPAs) in the banking system, and compelled Indian banks to recognise and to provide for faulty loans – bitter medicine which initially hurt banks’ profit margins, but which markedly strengthened their ability to absorb losses from bad loans. The RBI has also made various moves to diversify the pool of financial sector entities – some of its measures include allowing diversified bank licensing for the first time in the form of payment bank licenses (banks which cannot provide loans, have restrictions on accepting deposits, and whose primary function is to enable processing of payments) and small finance bank licenses (banks which provide basic banking services and which are intended to improve penetration of banks into the unbanked portions of India). In a departure from a previously unsaid and uncodified understanding, the RBI has also issued guidelines allowing granting of universal bank licenses “on tap” as opposed to previous instances where banking licenses were granted only once every few years. The RBI has also taken steps to reduce the dependence of providing finance on the banking system and has taken steps to improve the bond market in India (which is still at a nascent stage of development). The measures taken include allowing foreign portfolio investors (FPIs) to invest in unlisted debt securities, issuing a discussion paper on partial credit enhancements of bonds (followed by guidelines on partial credit enhancements and an amendment to these guidelines to increase limits for participation by banks), and issuing a discussion paper on making borrowing by large borrowers more expensive thus incentivising such borrowers to access the bond market. This article will consider some of the regulatory measures taken by the RBI to improve India’s banking regulatory environment.

Framework for Revitalising Distressed Assets

One of the first regulatory moves that signaled a change in the approach of the RBI was the issuance of the “Framework for Revitalising Distressed Assets in the Economy” (the Framework). The Framework was issued on 30 January, 2014 and  followed the issuance of a discussion paper in December 2013 on tackling the growing incidence of NPAs in the Indian financial system. The measures prescribed by the Framework include continuous monitoring and classification of accounts at various levels of “stress”, and the formation of a joint lenders’ forum (JLF) for early resolution of a stressed account before it turns into an NPA. As part of banks’ continuous monitoring obligations under the Framework, banks’ now have to identify accounts that show “incipient stress” as special mention accounts (SMAs), and also classify such accounts as: (a) SMA-0, where principal or interest payment is not overdue for more than 30 days, (b) SMA-1, where principal or interest payment is overdue between 31 and 60 days, and (c) as SMA-2, where principal or interest is overdue between 61 and 90 days.

As soon as a borrower’s account is classified as SMA-2, its lenders will need to come together to form a JLF if the aggregate exposure to the borrower exceeds INR 1 billion (USD 14.97 million approx.). Banks also have the option of forming a JLF when the aggregate exposure is below INR 1 billion (USD 14.97 million approx.) and the account is not reported as SMA-2. Borrowers too can request that lenders form a JLF on the grounds of “imminent stress”.

The aim of constituting a JLF is to explore various options to resolve a stressed account and to formulate a corrective action plan (CAP). The resolution options for a CAP formulated by a JLF include obtaining specific commitments from the borrower to regularise its account so that it does not become an NPA, restructuring the borrower’s account, and initiating recovery proceedings against the borrower.

Timelines for Regulatory Approvals

The Financial Sector Legislative Reforms Commission (FSLRC) was constituted under the chairmanship of retired Supreme Court justice BN Shrikrishna, to comprehensively review, rewrite and clean up the laws governing India’s financial system “to bring them in tune with current requirements“. The FSLRC submitted its report to the Central Government in March 2013. One of the non-legislative recommendations of the report of the FSLRC was that all financial sector regulators should move to a time-bound approvals process for providing permissions to conduct business as well as for the launch of new products and services.

Following this recommendation, and in a bid to demystify the inner workings of the RBI and to increase transparency, on  23 June 2014, the RBI released timelines within which its approval could be expected for matters such as licences for private banks, the issuance of licences to non-banking financial companies (NBFCs) and external commercial borrowings (ECBs) not covered under the automatic route. In parallel, the RBI also placed a “Citizens’ Charter” on its website, providing timelines within which various departments would be able to provide services for matters such as permission for waiver of forms for exports and overseas investment not covered under the automatic route. The timelines provided vary from seven days for trade credits under the approval route, to one hundred and eighty days for compounding of contraventions under the (Indian) Foreign Exchange Management Act, 1999.

Partial Credit Enhancements

In the Second Quarter Review of Monetary Policy 2013-14, the RBI observed that the lack of depth and liquidity in India’s corporate bond market is leading to “significant dependence on bank financing“. The review proposed the issuance of guidelines to allow banks to offer partial credit enhancements (PCEs) to corporate bonds by way of credit facilities and liquidity facilities (and not by way of a bank guarantee). On 24 May, 2014, the RBI issued draft guidelines allowing banks to provide PCEs to corporate bonds issued by companies and special purpose vehicles for financing infrastructure projects. On 24 September, 2015, the RBI issued guidelines on banks providing PCEs for corporate bonds issued for a project. These guidelines allow banks to offer PCE (in aggregate) up to 20% (twenty percent) of the bond issue size in the form of a non-funded irrevocable contingent line of credit. This limit has been raised to 50% of the bond issue subject to a limit of 20% for each bank. The providing of PCEs (together with the enhancement of limit) is intended to increase the credit ratings of lesser rated issuers and special purpose vehicles, and make bonds offered by them more attractive for bond market investors.

Overhauling NBFC Regulations

The global financial crisis of 2008 turned a stark spotlight on “shadow banking”. Minimisation (if not removal) of the risk posed by these entities to the financial system came into sharp focus. Shadow banking, in rudimentary terms, can be described as the exposure of non-regulated financial entities to the financial system. In India, the activities of NBFCs which traditionally enjoyed “light touch” regulatory oversight became an increasing cause for concern. The regulatory advantages enjoyed by NBFCs over banks also led to concerns of “regulatory arbitrage”. For instance, while banks had to declare an asset as “non-performing” at the end of 90 days, for NBFCs this period was 180 days and 12 months in certain cases. Similarly, guidelines for the restructuring of advances by NBFCs were only issued in January 2014.

In November 2014, the RBI overhauled the regulatory framework for NBFCs bringing about many seminal changes in the way NBFCs conduct business. While some are transitional – for instance, the declaration of assets as non-performing after 90 days will only commence from 2018 – others had earlier application, such as 31 March, 2015 for the tightening of the application of the “fit and proper criteria” for directors of systemically important NBFCs. Enhanced corporate governance disclosures, such as registrations/licences obtained from other financial sector regulators, penalties levied by any regulator, extent of financing of parent company products, and details of securitisation and assignment transactions, are now required from all non-deposit-taking systemically important NBFCs and all deposit-taking NBFCs.

While criticised in some circles as disadvantaging NBFCs, the overhaul of the regulatory regime for NBFCs was largely welcomed in industry circles. The alignment to a large extent of regulations applicable to NBFCs and banks has markedly reduced the possibility of regulatory arbitrage that may have led to systemic financial instability.

Strategic Debt Restructuring

As a follow-up to the Framework and the JLF-CAP mechanism, through its circular of 8 June, 2015, the RBI introduced the “Strategic Debt Restructuring” (SDR) scheme, to allow banks to convert a part of their debt to a delinquent borrower into equity so as to facilitate a change in management and exit from exposure to such borrower. The intent behind the SDR scheme is to resolve borrowers which cannot be turned around due to inherent operational and managerial inefficiencies.

The SDR scheme requires the scheme of a JLF to include provisions in the agreement with a borrower for conversion of the restructured debt into equity if prescribed conditions are not fulfilled. The JLF must obtain all appropriate authorisations for such conversion upfront at the time of restructuring of the borrower. Further, conversion of debt into equity must result in the JLF holding at least 51% of the shareholding of the borrower and such conversion must take place within 30 days of the review being conducted by the JLF for the borrower’s non-compliance with the conditions prescribed by the JLF. The detailed prescriptions of the SDR scheme also include the price at which conversion of the debt into equity must take place.

Rupee Denominated Bonds

The report of the Committee to Review the Framework of Access to Domestic and Overseas Capital Markets submitted in February 2015 included a recommendation that the market for local currency denominated bonds should be encouraged as it provides an alternative source of debt financing for private and public sector borrowers which does not expose them to currency fluctuation risk. The report also rationalised that by reducing currency mismatches and lengthening the duration of debt, such bonds could also augment financial stability. In its bi-monthly monetary policy statement of 7 April, 2015, the RBI mentioned that it intended to allow Indian bodies corporate to raise ECBs through Rupee Denominated Bonds. This was followed up by the release of the draft framework for the issuance of Rupee Denominated Bonds on 9 June, 2015 for public comments.

The RBI notified the framework for the issuance of Rupee Denominated Bonds under the overall ECB framework on 29 September, 2015. While the draft framework had received a lukewarm reception, the notified framework received a warm welcome as it appeared to have rectified many shortcomings of the draft framework. For instance, the notified framework allows all bodies corporate including real estate investment trusts and infrastructure investment trusts to raise debt under the ECB policy by issuing rupee denominated bonds. The only end-use restrictions in the notified framework are that funds raised cannot be used for real estate activities (other than for development of integrated township/affordable housing projects), capital market and domestic equity investment, activities prohibited under the foreign direct investment policy, on-lending for any of the above, and the purchase of land. Further, the only all-in-cost restriction is that the all-in-cost should be “commensurate with prevailing market conditions“.

The framework on Rupee Denominated Bonds was further liberalised  by the RBI through its circular of 13 April, 2016, which reduced the minimum maturity for Rupee Denominated Bonds from 5 years to 3 years.

Conclusion

It is possible to attribute some of the steps that the RBI has taken since 2014 to the dynamism of former Governor Raghuram Rajan. However, due care should be taken on this count, as the RBI has previously shown itself to be proactive (albeit somewhat conservative). It is quite possible that these steps were already in the offing, and were merely accelerated due to the presence of Governor Rajan.

This article covers only a few regulatory moves that have been made by the RBI and is not exhaustive. There are also many background steps and relatively minor regulatory tweaks that the RBI has made to operationalise these steps. For instance, along with the government and the Securities and Exchange Board of India, the RBI is also considering measures for improving the secondary market for bonds (by making bond-trading easier) and also the tertiary market for bonds (by introducing/improving existing instruments such as the GMRA). Notably, as part of a shift in the regulatory rulemaking mindset, the RBI appears to be shifting from prescriptive rulemaking to a mix of principle-based and prescriptive rulemaking, thereby more closely aligning itself with regulatory rulemaking in more developed economies.

While these steps have stoked a quiet revolution in the banking regulatory environment in India, much still remains to be achieved. We watch and we wait.

It’s No Secret. Laws Combating Wage Secrecy Are Here to Stay

“Bob, don’t talk about your wages at work, please.”

“Fred, don’t ask about the wages of other employees, please.”

“John and Susan, don’t compare your salaries, please.”

Any of these statements by an employer could get the employer into deep legal trouble.  Telling employees not to discuss their wages can subject employers to lawsuits in several states.  The growing trend in wage secrecy laws, which typically include provisions forbidding employers from taking adverse employment actions against employees for discussing their wages, does not look like it will slow down anytime soon.

The Rising Tide

The rise in these laws began in the 1980s, when California and Michigan became the first states to enact wage secrecy laws.  Ten states—Colorado, Connecticut, Illinois, Louisiana, Maine, Minnesota, Oregon, New Jersey, Vermont, and New Hampshire—passed wage secrecy laws prohibiting employers from making adverse personnel decisions against employees, between 2000 and 2015.

Wage secrecy laws promote national and state legislation that require employers to equally compensate all employees for equal work, regardless of the employee’s gender.  According to the United States Department of Labor, in 2014, women who worked full time earned 79 cents to every dollar that a male earned.  One of the policy rationales behind wage secrecy laws is that if employees can freely discuss their wages and know what other employees are paid, employees can identify disparities in wages. 

In April 2016, Louisiana passed the Equal Pay for Women Act, a measure to eliminate pay inequality between men and women.  The Louisiana law does not allow employers to make an adverse employment decision against an employee for “inquiring about, disclosing, comparing, or otherwise discussing the employee’s wages or the wages of any other employee.”  Following suit, in August 2016, Massachusetts passed one of the country’s most robust equal pay laws, as the Massachusetts law bans employers from inquiring about job applicants’ salary history, as well as prohibits employers from taking adverse actions against employees for discussing their wages.

Like the Louisiana equal pay law, the Maryland Equal Pay for Equal Work Act, which went into effect on October 1, 2016, includes wage secrecy provisions that forbid an employer from taking adverse actions against employees for “inquiring about, discussing, or disclosing the wages of the employee or another employee; or requesting that the employer provide a reason for why the employee’s wages are a condition of employment.”  The law also bans Maryland employers from making adverse personnel decisions against employees for inquiring about another employee’s wages, among other provisions.  Several other states including, Ohio, Washington State, Virginia, South Carolina, Indiana, and Pennsylvania are currently considering similar wage secrecy legislation.

Violations Can Be Costly

Violating a wage secrecy law can be costly for an employer.  States impose various civil penalties for violations of its wage secrecy laws.  California employers may be required to reinstate an employee who has been terminated or suspended for discussing their wages as well as pay the employee for lost wages, including interest.  Colorado allows an employee who has prevailed in a lawsuit under its wage secrecy law to recover punitive and compensatory damages, if the employee can prove that the employer’s unlawful conduct was intentional. Violating Vermont’s wage secrecy law can require an employer to pay a prevailing employee compensatory damages, punitive damages, court costs, and attorney’s fees.

Although most states’ wage secrecy laws subject an employer to only civil liability, a Michigan employer can face criminal liability for violating the state’s law.  It remains to be seen whether more states will expand their wage secrecy laws to include criminal liability provisions.

Wage Secrecy Laws May Have Limited Exceptions

Several states do allow employers to limit discussion about wages in limited circumstances.  For example, some states such as New York and the District of Columbia do not allow persons with access to employees’ wage information as part of their job function, such as Human Resources personnel, to disclose those wages.  The exceptions to wage secrecy laws are limited, however.  As such, employer should tread with caution when limiting discussion about wages.

 Federal Trends in Wage Secrecy Laws

On the federal level, the National Labor Relations Act prohibits employers from taking adverse employment actions against employees for discussing the employee’s wages.  Several states’ wage secrecy laws track the language of the NLRA.  Further setting a national trend promoting wage transparency, in 2015, the Office of Federal Contractor Compliance Programs issued a Final Rule implementing President Obama’s Executive Order that forbade federal contractors from prohibiting their employees from discussing wages.  The Obama Administration introduced the Paycheck Fairness Act, which would ban an employer from taking an adverse action against an employee for discussing the employee’s wages.  However, Congress did not pass the legislation.

Congress’ failure to approve the Paycheck Fairness Act does not mean that the federal government will not be holding employers accountable for equally paying all employees.  In 2018, the EEOC will require covered employers to submit an updated EEO-1 form, disclosing the pay data of all employees.  The EEO-1 form currently requires covered employers to submit demographic information about employees, such as employees’ sex, race, and ethnicity.  The EEOC now requires disclosure of pay data in order to assist the EEOC in detecting discriminatory pay practices.

Wage Transparency is Here to Stay

There is no indication that the tide of wage secrecy laws is slowing down or even shrinking.  The District of Columbia currently has a wage secrecy law banning employers from penalizing employees for discussing wages.  Similar to the new Massachusetts law, the District of Columbia is considering legislation that would prohibit employers from asking applicants about their wage histories.

The increase in wage secrecy laws means that employers who do not want to be hit with a lawsuit should carefully review their employment policies to ensure that they do not unlawfully limit their employees from sharing wage information. Confidentiality and social media policies that have not been reviewed in a while should be dusted off and examined as soon as possible, as these are typical places that could get employers into hot water if they include provisions unlawfully limiting employee speech.  Finally, employers should stay abreast of applicable local, state, and federal laws regarding wage transparency.  These laws are likely here to stay.

The Evidence of hackers

Most law firms believe the challenges they face set them apart from the industry at large – and this is largely correct.

The phrase ‘time is money’ perhaps doesn’t ring as true for other businesses as it does for the legal sector.  When every minute is clocked, it is important that business processes run smoothly and therefore, security controls in legal organisations need to be effective, yet lightweight as not to adversely impact the day to day running of the practice.

A further element is that often law firms are asked by key clients and prospects (particularly in finance) to implement specific security controls to achieve assurance or compliance. Rather than being helpful, this presents a significant problem, as the required controls are procured with no understanding of the specific attack paths and threat actor methodologies covered. At best, this is a budget spent to enable a firm to win business. At worst, it gives a false sense of security.

While the challenges may be different the reality is the same. In the world of information security, compromises are inevitable.

Effective detection controls

Legal firms need to face the fact that determined attackers will eventually get in.

It may be because of a vulnerability in the network perimeter, maybe a zero-day exploit, or a combination of phishing emails carrying custom malware and social engineering or maybe even through gaining physical access.

However, a single compromise doesn’t equate to game over for the organisation. With an understanding of the motivation and capability of the probable threat actors (as detailed in the first article in this series) effective detection controls can be chosen and deployed.

Here are five common compromise indicators and controls:

Phishing: Filtering email content may provide clues of an attack against the firm. For example, Sender ID or Sender Policy Framework (SPF) can be used to check for spoofed emails. Email content can also be inspected to look for typical phishing patterns and, in particular, for links and attachments. Such links and attachments can be automatically analysed within sandboxes to see if they expose suspicious behaviour and can be stopped before reaching the end user.

Anomaly analysis: In an organisation the majority of endpoints will have similar programs starting at boot time. By looking across the organisation to find the one or two computers that are starting something in addition to what all the others are starting, organisations might be able to spot malware for which no signatures exist.

Suspicious patterns: Look for connections to, or even from, odd places or at odd times; also be aware of any unusual user-agents in the proxy logs. A large number of failed logins to a server may indicate a brute force attempt.

Lateral movement: Behaviour to watch for includes suspicious Windows logon events, new services being installed, tasks being scheduled, and remote execution with legitimate Windows tools. All of these will be recorded in typical Windows event logs.

Data Exfiltration: There are several options an attacker might employ to exfiltrate data, from the basic (uploading files to webmail), to the advanced (DNS tunnelling), depending on the security controls in place. As part of this, volume based analysis can be particularly powerful as well. For example large unexpected transfers of data between hosts may indicate aggregation of files prior to an exfiltration.

Early detection is key

The ability to detect an attack largely depends upon two critical factors; first, having the right data available, and second, actually looking at it. Most organisations that fall victim to network intrusions have the evidence of compromise sitting in their logs all along, but the problem is that often nobody reviews logs until an incident occurs.

There is a choice when it comes to the output from a security control. It could be an unfiltered list of log events that require further manual investigation by in-house staff; or it could first be filtered to remove false positives, so that the only output is a confirmed security incident needing an immediate response. Law firms tend to prefer the latter category unless they have a large and hands-on security team, and that needs to change.

The application of prevention and hardening measures combined with effective intrusion detection and incident response can slow attackers down, forcing them down known paths and essentially making them ‘noisy’ and more easily caught.

Data exfiltration detection is too late

However, if you rely on the detection of data exfiltration alone, then you have already lost.

It is too late in the process to instigate an effective response and the costs of cleanup will be exponentially greater than if the initial compromise is detected as it occurs.

Furthermore, an advanced attacker will employ a stealthy exfiltration method to bypass security controls during this phase. Detection controls should be focused as early in the process as possible.

The best way to combat cyber threats is through 24/7 attack detection and response, which is capable of revealing the initial compromise early enough in the breach process and before any kind of control channel is opened to the attacker. Harking back to the motivations of attackers, it’s also imperative for legal firms to choose effective detection controls with an understanding of the motivation and capability of the probable threat actors.

The earlier the detection, the better chance the company has at making a full recovery and saving itself a lot of time, money and reputational damage in the process.

 

Countercept has written a whitepaper detailing how cyber security in law firms is misunderstood – and what can be done about it. This can be downloaded from: mwr.to/legalwhitepaper

Recreational Marijuana’s Economic Advantages

As Seattle City Attorney Pete Holmes has famously touted, marijuana prohibition and the war on drugs has failed.[1] Evidence does not suggest that the War on Drugs reduced drug-use rates or drug dependency.[2] At any given time, there are at least 137,000 men or women locked in prison or held in jail on drug possession charges, according to the ACLU and Human Rights Watch.[3] Additionally, the ACLU and Human Rights Watch report, citing FBI data, suggests that police and local law enforcement nationwide make more arrests for marijuana possession alone than for all violent crimes combined.[4] The local evidence suggests the same; in the first two years, law enforcement saw a decrease in work load anecdotally attributed to lack of those possession arrests, and now the Washington State courts are seeing the same.

The Washington recreational marijuana market has now been in effect for three years, and while the law has changed rapidly during that time, the economic benefits have clearly proven themselves. As the Washington and Colorado markets expanded, being the first two states to legalize adult and recreational use of marijuana products, other states began to take notice of how lucrative the legalized marijuana market could be, as both Washington and Colorado generated nearly 70 million dollars in tax revenue alone in each their first complete fiscal years.[5] It is clear that recreational marijuana turned the tide of the War on Drugs, and forced it to become an economic benefit that is becoming increasingly enticing to the rest of the nation.

Washington State’s Weed Economy

While Initiative 502 was voted for in November of 2012, the first Washington state producer and processor licenses were not issued until March 5, 2014.[6] In the 2014 fiscal year[7], a total of 279 producer/processor licenses were issued, and the Washington State Liquor and Cannabis Board (WSLCB) only generated 1.78 million dollars in total marijuana related income, which is impressive for how small the industry was, and for only 3 months of revenue generated during that fiscal year.[8]

The 2015 fiscal year, however, as the first complete fiscal year after legalization, showed real promise for the legalized marijuana industry:  total shelf price[9] sales generated nearly $260 million dollars, and generated $64.63 million dollars in tax revenue alone, as well as $1.08 million in just licensing fees and other related costs while the state was operating at only a 25% excise tax.

The 2016 fiscal year for Washington compounded on industry success, nearing $1 billion dollars of total shelf price sales, and created a total tax obligation of almost $186 million.[10] Much of this increased tax revenue can be attributed to the implementation of Senate Bill 5052 and House Bill 2136 in July of 2015, which, among other things, changed the state excise tax from 25% to 37% at the point of sale, and merged the less regulated medical marijuana market with the regulatory system established by I-502.

As of October 12, 2016, the WSLCB has issued 172 producer licenses, 894 producer/processor licenses, 131 processor licenses, and 445 retail licenses, which have combined to generate nearly $500 million dollars of total sales in less than four months.[11] It stands to reason, then, that the Washington market will generate well more than $1 billion dollars in total sales, leaving the state with (if sales in Washington remain on this course for the rest of the year), with around $300 million dollars of tax revenue for this year alone.[12]

Washington is not the only state that has had incredible success with regulated marijuana. Colorado has seen similar sales numbers creeping on $1 billion dollars a year and generating around $70 million in tax revenue in 2015. With five states voting on recreational legalization and 4 voting on medicinal legalization this November, it is clear that the legalized marijuana market will be a multibillion dollar industry nationwide, and the lure of tax revenue in the hundreds of millions seems to be convincing even the most historically conservative states that legalization is not only valuable economically, but is a better system than prohibition.[13]

A Better Way

With the plethora of tax money created by the legalization market, grander steps toward reducing youth access to drugs, education, and crime have occurred in the last three years than the strategies implemented by the war on drugs. According to the I-502 Fiscal Note[14] produced by the state, over the five years from the implementation of I-502 in 2012 to 2017, only $5 million dollars will be used by the WSLCB for program administration, whereas $44 million is to be dedicated to marijuana public health education, $68 million on youth drug prevention, and a staggering $244 million on health care. In fact, the state estimates that the funds generated could provide for services for up to 600,000 patients per year, and could cover a five-year average for insurance for 83,000 enrollees.”[15]

Legalization has also had significant impacts on the reduction of crime: According to Washington State Administrative Office of the Courts, court filings for low level marijuana offenses for adults over 21 has dropped 98% since the approval of I-502.[16] Additionally, according to the Crime in Washington Report compiled by the Washington Association of Sheriffs and Police Chiefs, marijuana law violations decreased 63%, and the number of marijuana related convictions has dropped 81%.[17] Legalization of marijuana has not merely freed up police enforcement and the courts however; violent crime declined by 10% statewide, and the murder rate decreased by 13%.[18] [19] Youth access and use rates have also remained steady, despite legalization, and traffic fatalities involving marijuana reported by Washington Traffic Safety Commission have seen a 4% decrease.[20] [21]

As regulation in Washington becomes increasingly robust and license standard enforcement becomes more effective, these numbers should continue to decline and profits from the industry should continue to rise. While the market may eventually level out, the sky seems to be the limit, as the WSLCB plans to continue to accept applications for new businesses.

Washington’s first three years of legalized marijuana has certainly had its struggles (Washington remains the most highly regulated of all the states that have legalized recreational marijuana) but above all else, it seems that Washington voters may be right; legalization is a better way than prohibition, and the Washington economy proves that recreational marijuana has turned the War on Drugs into a very convincing economic equation.

Anne van Leynseele, founder of NWMJ Law, led the evolution of what legal services were needed in the newly formed cannabis industry and identified how to best use her business and legal abilities. A critical step was partnering with noted cannabis trial lawyer, Aaron Pelley. Their complimentary practices brought together the power of both litigation and transactional law experience and diversified what NWMJ Law now provides.  Anne shares the responsibility with a great team of lawyers, each of them skilled in their own practice areas.

 

[1] Pete Holmes has been recorded claiming that the war on drugs has failed, and that Seattle and Washington generally has shown that legalized marijuana is a better way, both at Hempfest 2011, and more recently at the King County Bar Association new attorney Swearing-in ceremony in 2016.
[2] Tess Borden of Human Rights Watch: Interview
[3] http://www.nola.com/crime/index.ssf/2016/10/police_arrest_more_people_for.html
[4] https://www.hrw.org/report/2016/10/12/every-25-seconds/human-toll-criminalizing-drug-use-united-states
[5] http://lcb.wa.gov/marj/dashboard; https://www.colorado.gov/revenue
[6] http://www.liq.wa.gov/publications/annual_report/2014-annual-report-final-web.pdf
[7] Please note that the WSLCB’s fiscal year runs from July 1 to June 30.
[8] http://www.liq.wa.gov/publications/annual_report/2014-annual-report-final-web.pdf
[9] The WLSCB considers shelf price as sales price and tax combined
[10] http://lcb.wa.gov/marj/dashboard
[11] http://lcb.wa.gov/marj/dashboard; accessed October 14, 2016.
[12] http://lcb.wa.gov/marj/dashboard
[13] California, Arizona, Maine, Massachusetts and Nevada are voting on recreational use, and Arkansas, Florida, Montana and North Dakota are voting on medicinal marijuana provisions.
[14] The I-502 Fiscal Note uses projected numbers and estimations based on the data available at the time to project budgets through 2017, so based on the success of the industry, these numbers could be even larger at present.
[15] http://vote.wa.gov/guides/2012/I-502-Fiscal-Impact.html
[16] https://www.drugpolicy.org/sites/default/files/Drug_Policy_Alliance_Status_Report_Marijuana_Legalization_in_Washington_July2015.pdf
[17] https://www.drugpolicy.org/sites/default/files/Drug_Policy_Alliance_Status_Report_Marijuana_Legalization_in_Washington_July2015.pdf
[18] https://www.drugpolicy.org/sites/default/files/Drug_Policy_Alliance_Status_Report_Marijuana_Legalization_in_Washington_July2015.pdf
[19] It is important to note, however, that the data does not establish causation, but it is significant evidence that legalization of marijuana did not increase crime rates, as opponents to legalization seemed to believe it would.
[20] https://www.drugpolicy.org/sites/default/files/Drug_Policy_Alliance_Status_Report_Marijuana_Legalization_in_Washington_July2015.pdf; http://www.ofm.wa.gov/reports/marijuana_impacts_2015.pdf

How GCs can unlock IP asset value (and make friends with the CFO)

It’s a truism that a patent is only as valuable as the patent owner’s willingness and ability to enforce it. And therein lies the challenge faced by companies or institutions with substantial IP assets when they attempt to justify allocating resources to pursue claims.

By the time a patent exists to enforce, the company has likely already made a substantial investment to develop the asset. Protecting it through litigation will require still more money to be invested. The challenge is not only the very high price tag of that additional investment—it is also its high degree of risk, given the even more uncertain outcomes of IP litigation compared to other forms of commercial litigation. As a result, many companies, universities and other entities find themselves with untapped IP assets because of their inability to bear the additional cost and risk of protective litigation.

It gets worse. Companies that are able to overcome the hurdle of added cost and risk, and move forward with IP litigation, face a further challenge in the negative impact of litigation spending on corporate balance sheets. And although private practice lawyers tend not to think about balance sheets, GCs—and CFOs—think about them a lot, and they know that litigation impacts corporate balance sheets in ways that reduce profits and pull down earnings. Indeed, this was specifically cited by 23% of GCs surveyed as part of Burford’s 2016 Litigation Finance Survey as a reason their companies stopped pursuing a viable claim—because legal expenses were hitting the company’s bottom line. For the same reasons, many more choose not to pursue the claims at all.

To understand how negatively IP litigation impacts corporate balance sheets, one must understand how litigation is treated as an accounting matter.  A pending litigation claim to enforce IP rights is a corporate asset, similar in form to any other contingent receivable. However, spending to pursue that claim, and increase its asset value, is peculiarly not added to its asset value, or “capitalized”, and instead is immediately expensed, flowing through the P&L and reducing operating profits. Indeed, a pending litigation claim—despite having legal status as an asset, or a “chose in action”—is affirmatively not an asset for accounting purposes. It is found nowhere on financial statements. Finally, when a significant litigation claim succeeds, the associated income from the claim is often not treated as operating income on the P&L. Instead, it’s put “below the line” as a non-operating or one-off item.

In practical terms, the GC responsible for generating a lot of IP litigation expense and risk is likely going to be persona non grata in the CFO’s office because no matter the ultimate value of that IP litigation to the company, the immediate hit to earnings can be significant. Obviously, companies want to maximize their profits and minimize their expenses. Being hit with expenses as a litigation matter goes forward and then not later recognizing the income from the win is a bad outcome. The situation is even worse for publicly traded companies with significant IP litigation. When investors and stock market analysts look at the balance sheet and don’t see an asset, they don’t credit it; and when they see the kind of expenses associated with high value IP litigation, they may take an overly negative view of the company’s risk factors and value.

Yet despite all of this, the situation is far from dire. Companies have new options.  Litigation finance is growing rapidly in the IP space as part of a broader growth trend that saw a quadrupling of litigation finance use by leading U.S. law firms between 2013 and 2016, according to Burford’s latest research. Among the reasons for its growth in the IP space is its ability to neutralize the negative impact of IP litigation on corporate balance sheets and to shift the cost and risk of IP litigation to a third party. In simplest terms, outside finance enables GCs with significant IP assets to move the cost and risk of pursuing litigation off their corporate balance sheets—because the litigation financier assumes the cost and risk of the IP litigation. The financier provides capital to cover fees or expenses, or both, typically in exchange for a portion of the proceeds if the litigation is successful. Due to the risky nature of IP litigation, the more innovative finance providers will most often develop bespoke financing approaches including portfolio deals where risk is diversified across a pool of matters.

Moving litigation cost off the balance sheet immediately removes any concern about the negative accounting impact of litigation on earnings and profits. When a litigation financier pays the costs of proceeding, those costs do not flow through the company’s P&L, thus conserving the company’s profitability from its operations. Working with an outside financier also enables the company to husband its cash to use for other purposes—and to avoid having it flow out of the company’s coffers and thus reducing its asset value. As a result, when the company wins its claim, the very first time its financial statements are impacted by being a litigant is when it has a positive cash and income event. That obviously yields a far happier accounting outcome for clients.

In sum, outside capital gives GCs a dramatically de-risked platform to unlock the asset value of IP litigation claims—and it also provides longevity and the ability to commit to the long-term nature of IP litigation, whatever the business situation of the company.

Geographical Indications in Sri Lankan Law

Chapter XXXIII of the Intellectual Property Law No. 36 of 2003 makes provision for the protection of geographical indications.

Geographical Indications (GI) are off shoots of indications of source and appellations of origin which were first accorded recognition in the Paris Convention. Indications of source is a broad concept and designates a country or place situated in that country from where the particular product in question originates.  Accordingly expression such as made in Sri Lanka would fall into this category.

Appellations of origin is a geographical names of a country or place in that country. The product just necessarily have its characteristics and quality linked with the geography of the place by way of for instance agro climatic conditions and human factors.

Geographical indications are indications identifying a particular good as originating in a country or locality in that country.  The quality of characteristics or reputation of such goods must be essentially attributable to the geographic origin.  Definitions would include not only geographical names but also any non-traditional names which have acquired significance.  Ceylon Tea would fall into this category.

There are has been no uniform approach by various countries in respect of protection of geographical indications. Some countries have enacted specific “sui generics” to protect GI’s.  Other protect GI’s under existing laws and still others afford protection by a combination of both.  For protection of GI’s Unfair Competition, Consumer Protection Laws protecting tradenames and marks and passing off and laws relating to false and misleading trade practices would also be relevant.

As far as international treaties and agreements are concerned the protection of GI’s are concerned they began with the Paris Convention for the protection of industrial property in 1883 where protection was afforded to appellations of origin.  In the recent past the TRIPS Agreement the WTO afforded protection of GI’s by promoting a standard definition of GI’s and prescribing certain minimum standards by which they should be legally protected by all WTO member States.  Some of the more important international agreements relating to GI’s are –

  1. Convention for the protection of Industrial property 1883
  2. Madrid Agreement for the repression of false or deceptive indications of source on goods 1891
  3. General Agreement on tariffs and trade (GATT) 1947
  4. Lisbon Agreement for the protection of appellations of origin and their international registration 1958
  5. Agreement on trade related aspects of intellectual property right 1995.

Section 161 provides as follows –

“(1)     Any  interested  party shall be entitled to prevent –

  • the use of any means in the designation or presentation of goods that indicates or suggests that the goods including an agricultural product, food, wine or spirit in question originates in a geographical area other than the true place of origin in a manner which misleads the public as to the geographical origin of goods; or
  • any use of a geographical indication which constitute an act of unfair competition within the meaning of section 160;
  • the use of a geographical indication identifying goods including an agricultural product, food, wine or spirit not originating in the place indicated by the geographical indication in question or identifying goods not originating in the place indicated by the geographical indication in question, even where the true origin of the goods is indicated or the geographical indication is used in translation or accompanied by expression such as kind, type, style or imitation or the like.

(2)      The protection accorded to geographical indications under sections 103, 160 and 161 shall be applicable against a geographical indication which, although literally true as to the territory, region or locality in which the goods originate, falsely represents to the public that the goods originate in another territory.

(3)      In the case of homonymous geographical indications for goods including an agricultural product, food, wine or spirit, protection shall be accorded to each indication, subject to the provisions of subsection (2) of this section. The Minister in case of permitted concurrent use of such indications, shall determine by prescribed practical conditions under which the homonymous indications in question will be differentiated from each other, taking into consideration the need to ensure equitable treatment of the producers concerned and the protection of consumers from false or deceptive indications.

(4)      The Court shall have power and jurisdiction to grant an injunction and any other relief deemed appropriate to prevent any such use as is referred to in this section.  The provisions of Chapter XXXV of the Act shall mutatis mutandis, apply to such proceedings.

(5)      For the purposes of this section “geographical indications” shall have the same meaning as in section 101.

At present in Sri Lanka whilst there is a provision for the protection of GI’s including injunctive relief, the form of registration of GI’s is generally in the form of certification marks.  For instance as far as Ceylon Tea is concerned Sri Lanka Tea Board grants a certification mark subject to the provisions contained in the Intellectual Property Act in respect of certification marks.  However there are other produce of Sri Lanka which may not be eligible at present for the grant of certification marks because there is no authority to grant such rights under the provision of Chapter XXIX.

Several exporters have pointed out to the Government that when seeking protection of Sri Lanka produce in foreign countries they find it easier and more convenient if Sri Lankan authorities could certify that the mark is in fact registered in Sri Lanka as a GI.  The Spice Council of Sri Lanka representing the exporters of spices and Export Development Board have constantly drawn the attention of the authorities that early measurers must be taken in this regard.  Accordingly the authorities have agreed on principle to make interim provisions relating to Ceylon Cinnamon and certain other products taking into account the provisions of Section 204 of the Act which enables the Minister from time to time to make regulations for the purpose of carrying out or giving effect to the principles of the Act and sub-section 2 provides that without prejudice to the generality of the powers conferred by subsection 1 the Minister may make regulations in respect of the matters referred therein –

Subsection 2 refers to 8 such matters . In terms of section 2 (2) the Director General shall be vested with the powers of the implementation of the provisions of this Act control and superintendence of the registration and administration of industry designs, patents, marks and any other matters as provided by the Act and the supervision and control of all persons appointed for or engaged in the implementation of the provisions of this Act. As provisions relating to GI’s are contained in Part IX of the Act the regulations could be made in respect of GI’s as well.  Accordingly the Government is expected to make regulations for the better protection of Ceylon Tea and Ceylon Cinnamon. Consideration is also being given as to whether a new Act should be enacted in respect of registration of GI’s.  Meanwhile regulations as an interim measure referred to are expected to be enacted early and this would at least to some extent further protect the exporters of Ceylon Tea and Ceylon Cinnamon and other spices.

Legal firms in the Hackers Crosshairs

Despite a media backdrop of breaches and compromises, Legal organisations are not automatically a target for hackers. That does not mean they are exempt, just there needs to be sufficient motivation to threat actors enticing them to launch a virtual raid.

This first article, of a two-part series, looks at why some Legal firms may become a target and the hackers M.O. (modus operandi.)

What is the specific security challenge faced?

A law firm will only be targeted if there is sufficient motivation for attack. As, without motivation, there is no targeted threat.

As for any organisation, the nature of the firm’s business will determine which threat(s) it is at risk from. A large multi-national organisation that deals with the corporate interests of international businesses may find itself at risk from state-sponsored attack; in addition, firms specialising in M&A, IPO, High Net Worth Individuals or Intellectual Property may find themselves coveted by those seeking financial gain; a human rights lawyer or even those practicing criminal law may find hacktivists wishing to cause disruption.

Just as clients come and go so too does the hackers attention. If the firm acquires a new client or moves into a new area of interest, the threats facing the law firm can radically change in tandem, meaning the security strategy needs to evolve alongside the business strategy.

The key question the firm needs to ask itself is, ‘Is there any activity that my firm is involved in now, or planning for the future, that provides the necessary motivation for threat actors to attack?’

The Hackers M.O.

Recognising that they’re a target in the first place is a struggle for many organisations, not just those in the Legal sector. This is often accompanied by the misperception that threat actors need to utilise fully customised, expensively researched exploits to successfully target the infrastructure.

The evidence is that, rather than a ‘sophisticated’ attack, most firms are generally breached with a combination of reconnaissance, widely available commodity malware, and well known ex-filtration techniques.

That said, there are those more sophisticated threat actors who might deploy advanced techniques to facilitate their objectives either more ‘quietly’, or in a way that carries more impact.

The initial attack path

How a criminal may strike is the first stage to understanding, and mitigating, the attack path that the threat actor will aim to leverage.

The majority of the effort spent in a targeted attack is in early reconnaissance. There is nothing particularly advanced about this, other than the need for time, logic and discipline. Indeed, law firms tend to make it rather more straightforward than other industries by publishing the contact details of individual lawyers online, along with their practice area. This openness, combined with the constant clamour for publicity from marketing departments issuing articles and press statements, enables threat actors to determine three key pieces of information to assist in the attack:

1) To whom should I deliver my initial payload, and how can I make sure they open it?

This could be as straightforward as sending an HR administrator malware embedded in a CV (phishing). However, in an advanced case of reconnaissance, it’s more likely to take the form of a document sent to a lawyer, ‘spoofed’ to come from a known client or perhaps from a journalist, attaching a list of questions regarding a sensitive case.

Whichever the approach, thorough reconnaissance can all but guarantee an initial payload is opened somewhere within the infrastructure.

2) Who are the organisation’s System Administrators or security personnel?

IT staff are the highest-value target in law firms; if compromised, their credentials can be used to accomplish anything from standard data exfiltration, to hard drive wiping, to setting up legitimate remote access for a threat actor to come and go undetected.

Armed with the knowledge of their identities, an attacker will either target these staff from the outset (and in increasingly sophisticated ways), or make IT staff their first target when landing elsewhere on the network.

3) Who in the organisation has the credentials to access the information I want to steal?

This phase of reconnaissance is usually the trickiest requiring an initial foothold within a network to enable the further internal reconnaissance of such assets as the company intranet, which could well contain staff lists, groups and roles.

However, law firms tend to make this easier than most firms; once again, the company website, press releases and resources such as The Legal 500 enable attackers to map individual lawyers to practice areas and key accounts. This means that attackers can target law firms with both eyes open and a clear plan, rather than taking the usual ‘sit and observe’ approach that tends to be necessary once an initial foothold has been established.

Effective Security Controls

Once an attacker gains an initial foothold on one system inside a victim network he needs to work to expand his influence. This will typically involve gaining credentials and privileges which will enable him to move to other systems.

As an attack progresses, more systems are compromised and more credentials are gained along the way. Eventually the attacker will gain access to a high value, high privilege account and the victim network is now effectively ‘owned’ by the attacker.

So, what factors will hinder the progress of an attacker on his way to becoming domain admin and stealing all of the firm’s secrets? Here are five steps to consider:

  • The privilege level of the attacker when the first system is compromised. For this reason it is highly advisable to configure all users to run with the minimum level of privilege required to perform their job, and no more.
  • The design of the network itself. An attacker can only compromise those systems which he is able to communicate with over the network, so network segmentation will be a big factor in preventing lateral movement.
  • Attackers will use whatever tools are available to them to achieve their objective. If they discover network enumeration tools, port scanners or password cracking utilities on a system then they will likely use them against you. Many system administration tools (especially Sysinternals) can also be abused in this way, so best practice would be to remove such software if it is not required.
  • Implementing Software Restriction Policies or AppLocker will also cause a potential headache for any attacker trying to move around the network.
  • Multi-factor authentication for systems/applications of high value could prevent an attacker from reaching the firm’s crown-jewels if he is unable to authenticate.

Covering relevant attack paths is only half the equation. At some point an attacker may be successful in moving around the network, gaining access to sensitive data and ex-filtrating that data. In this event, the ability to detect and respond to the malicious activity is paramount.

The next article, in this two-part series, discusses effective detection controls focused around typical attack paths and will look at ways to achieve best practice in light of the legal sector’s specific challenges.

 

The Fate of Pharma Patents in U.S. Inter Partes Review Proceedings

As part of the 2011 America Invents Act,[1] the United States Congress created a new process for challenging the validity of issued U.S. patents in the Patent Office (before the Patent Trial and Appeal Board –“PTAB”).  Known as an Inter Partes Review (“IPR”), this process allows third parties to pursue a “mini-trial” against the validity of the patent at issue based solely upon prior art.

This article reviews the IPR process as compared with a federal district court trial on validity, surveys how pharma patents have been faring in the IPR realm, and highlights our team’s recent win before the PTAB regarding a pharmaceutical formulation patent that was challenged as allegedly obvious.

I. Background

The branded pharmaceutical industry relies on patents to provide a period of exclusivity for innovative medicines and thus justify their large and often risky expenditures on research and development.  As a result, the branded pharmaceutical industry has championed the importance of patents.  In contrast, the fast-moving technology and electronics industries have often expressed concerns about costly patent litigation.  These concerns have been magnified by the advent of “Non-Practicing Entity” litigants (otherwise known as “NPEs” or more colloquially “patent trolls”).  These trolls, who make no products, use patents they own to seek damages from alleged infringers as a business model.

In response to these concerns, Congress enacted the IPR process as a supposedly quick and inexpensive way for the public to challenge the validity of patents in the United States Patent Office.

A. Summary of The IPR Process

In broad overview, the IPR process provides, inter alia, for:

  1. an initial request for review from a “Petitioner” (who can be anyone) stating the reasons for alleged patent invalidity;[2]
  2. an optional preliminary response from the Patent Owner stating why a review should not be initiated;[3]
  3. a decision from the PTAB regarding whether to institute a review of the patent, which requires a determination that there is a reasonable likelihood that the petitioner would prevail with respect to at least one of the claims;[4]

And, if the review is initiated:

  1. a short period of limited “discovery” where experts may be deposed;[5]
  2. a more substantive response by the patent owner – which can include argument about the prior art, expert declarations and evidence of commercial success;[6]
  3. a short (half day or so) hearing (“trial”);[7] and
  4. an ultimate determination within a statutory period of one year.[8]

Although rare, the Patent Owner may amend its claims[9] in an attempt to avoid invalidity.

B. Differences From Federal Court Invalidity Proceedings

IPRs differ from federal district court cases on validity in several key aspects, including:

(a) who may attack the validity of the patent (anyone may petition for an IPR versus only those with “standing” in district court);

(b) the standard of proof required to invalidate the patent (a mere “preponderance of the evidence” in an IPR versus the higher standard of “clear and convincing evidence” in district court);[10] and

(c) the way the patent claims will be construed (“broadest reasonable construction” in an IPR versus a narrower construction in the district court).[11]

These differences arguably make the IPR a forum where patent invalidity is more likely to be found than in district court.

C. The New “IPR Patent Trolls”

Ironically, the IPR procedure that was created in part to tame patent trolls has engendered a whole new type of patent troll – those without standing in federal court that seek to use the IPR process to gain financial reward.  These new “IPR patent trolls” are not business competitors to the patent owner.  Instead, they are third parties (including hedge funds and related entities) that are empowered by the statute to initiate and pursue an IPR.  It has been speculated that they may be using that power to seek financial gain by either shorting the stock of the patent owner or obtaining some other financial settlement.

II. The Statistics

Since the AIA’s enactment, the Patent Office has received over 5,000 Petitions to review patents.[12]

As of August 2016, 3,529 petitions have been completed, with 1,807 of those instituted.  Of those instituted, Petitioners have invalidated around 70% of all challenged claims.[13]

With respect to biotechnology and pharmaceutical patents, there have been 331 petitions, 207 of which have been instituted.[14]  Among biotechnology and pharmaceutical patents, the invalidation rate has been approximately 45%.[15]

III. A Pharma IPR Win at the PTAB

Despite the statistics and the lower standard of proof for invalidity, patent owners can and do win IPRs.

Case in point: IPR No. 2015-00988, Coalition for Affordable Drugs II, LLC v. Cosmo Technologies Ltd.

In this IPR, an entity formed by hedge fund manager Kyle Bass and his associates – that otherwise would not have had standing in federal court – brought a petition to initiate an IPR and invalidate U.S. Patent No. 6,773,720 (“the ’720 patent”) in the Patent Office.

A. The Invention of the ’720 Patent

The ’720 patent is directed to an orally-administered, controlled release formulation of the drug mesalamine.  Mesalamine treats ulcerative colitis – an inflammatory condition of the large intestine.  Mesalamine provides its therapeutic benefit at the site of inflammation on the interior surface of the large intestine.  It does not provide therapeutic benefit when absorbed systemically into the bloodstream.

Thus, one challenge to making an effective mesalamine oral treatment is that it must release drug in and throughout the colon – bypassing the stomach and small intestine – and it must maintain relatively even or “controlled” drug release along the length of the large intestine.  An added dilemma for the formulator is that oral dosage forms of mesalamine must contain large amounts of the drug to be of benefit (over 1 gram) – leaving little space for excipients.  Yet, it is the excipients that are necessary to control the release of the mesalamine.

Working within these constraints, the inventors of the ’720 patent created a two-matrix formulation that uses minimal amounts of excipients to control the release of large amounts of mesalamine – slowly and in the right place in the colon.

B. The Petitioner’s Challenge

The Petitioner’s challenge to the validity of the ’720 patent turned on two prior art references – the Leslie reference from over 23 years before the invention of the ’720 patent that did not mention mesalamine and the Groenendaal reference from 10 years before the invention.  Although neither of these references referred to each other or spoke about a two-matrix formulation, Petitioner argued that there would have been a general motivation to combine the two references (simply because they both involved controlled release) and once combined the elements of the ’720 patent would be readily revealed.

C. The PTAB’s Analysis: No Invalidity

Although the PTAB did grant the initial request for review, after full consideration of the developed record, the PTAB concluded that the Petitioners had not proven invalidity by a preponderance of the evidence.

In coming to that conclusion, the PTAB considered numerous distinctions from the prior art, including whether the particular chemical class of “waxes”  called for in the challenged claims were disclosed in the prior art.  The Board rejected the Petitioner’s broad statements that the prior art disclosed “waxy” materials and distinguished those from the actual “waxes” recited in the claim.  The PTAB also found an absence of a motivation to combine the references; and also noted the complexity of formulation science – as conceded by Petitioner’s expert during deposition.  Further, the PTAB credited the commercial success of the patented invention as an objective indicia of non-obviousness.

D. Take Home Lessons

There are many take home lessons from the experience.

First and foremost, IPRs involving pharmaceutical patents can be won by patent owners.  In many ways that should not be a surprise.  The pharmaceutical and chemical sciences have repeatedly been recognized to be complex and unpredictable[16] – hallmarks of non-obviousness.

Second, identifying clear differences between the prior art and the claimed invention – and buttressing those differences with solid evidentiary proof in terms of literature and expert testimony – can help the PTAB understand why a claimed invention truly is different.

Third, although some IPR decisions seem to discount commercial success and other objective indicia of non-obviousness, this form of evidence should not be ignored by patent owners.  When presented to the PTAB, it can prove helpful.

Fourth, as the IPR process unfolds, patent owners should not recoil from reiterating arguments that were apparently rejected at the initiation stage.  The PTAB seems willing to reconsider its initial views when new information is presented.

Fifth, one of the complexities of an IPR proceeding is that the witnesses are not actually observed at trial by the PTAB judges.  While excerpts of deposition testimony are cited in briefs, there is no live testimony.  For this reason, deposition testimony should strive to elicit clear admissions and important points from the other side’s experts.

From the perspective of the petitioner, a claim of invalidity should be based upon prior art that is as close to the patented claim as possible.  Where one needs to stretch the prior art’s disclosure to simulate the claim, proof of invalidity is likely lacking.

IV. Parting Thoughts

As with many “solutions” to problems in the law, the IPR solution to supposedly “weak” patents and “patent trolls” has created concerns of its own.  A procedure that permits important issued patents to come under attack, under a lower standard of proving invalidity, has the very real potential to weaken the patent system and discourage investment in important new research.  Whether Congress should maintain the lower “preponderance of the evidence” standard for IPRs is a topic that should be discussed and debated.  However, as things currently stand, the Patent Office has the important task of balancing the concerns raised by so-called “weak” patents with the goals of the patent system itself – promoting research and innovation.

[1] Pub. L. No. 112-29, 125 Stat. 284 (2011) (also referred to as the “AIA”).
[2] 35 U.S.C. §§ 311 and 312.
[3] 35 U.S.C. § 313; 37 C.F.R. § 42.107.
[4] 35 U.S.C. § 314; 37 C.F.R. § 42.108.
[5] 35 U.S.C. § 316(a)(5); 37 C.F.R. § 42.51.
[6] 35 U.S.C. § 316(a)(8); 37 C.F.R. § 42.120.
[7] 35 U.S.C. § 316(a)(10).
[8] 35 U.S.C. § 316(a)(11).
[9] 35 U.S.C. §§  316(a)(9), 316(d); 37 C.F.R. 42.121.
[10] See 35 U.S.C. 316(e) (“In an inter partes review instituted under this chapter, the petitioner shall have the burden of proving a proposition of unpatentability by a preponderance of the evidence”) and Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 2131, 2144 (2016) (“the burden of proof in inter partes review is different than in the district courts: In inter partes review, the challenger (or the Patent Office) must establish unpatentability ‘by a preponderance of the evidence’; in district court, a challenger must prove invalidity by ‘clear and convincing evidence.’”).
[11] See Cuozzo Speed Techs., 136 S. Ct. at 2142 (claims interpreted in broadest reasonable manner for an IPR).
[12] Patent Trial and Appeal Board Statistics, last updated August 31, 2016, available at https://www.uspto.gov/sites/default/files/documents/2016-08-31%20PTAB.pdf.
[13] Id.  This excludes instituted IPRs that were terminated prior to a final decision from PTAB.
[14] Id.
[15] M. Grewal, J. Hill, and K. Zalewski, “Trends in Inter Partes Review of Life Sciences Patents,” 92 BNA’s Patent, Trademark & Copyright Journal 3 (June 17, 2016).
[16] See, e.g., Eisai Co. Ltd. v. Dr. Reddy’s Labs., 533 F.3d 1353, 1359 (Fed. Cir. 2008) (“To the extent an art is unpredictable, as the chemical arts often are, KSR‘s focus on [ ] ‘identified, predictable solutions’ may present a difficult hurdle because potential solutions are less likely to be genuinely predictable”);  Abbott Labs. v. Sandoz, Inc., 544 F.3d 1341, 1351 (Fed. Cir. 2008) (extended release formulation not obvious: “difficulties in predicting the behavior of any composition in any specific biological system.”);  Eli Lilly & Co. v. Generix Drug Sales, Inc., 460 F.2d 1096, 1104 (5th Cir. 1972) (paraphrasing Churchill, the court noted that chemical compounds present a “riddle wrapped in a mystery inside an enigma”).