EIP Corporate Training
You need to know
You need to know
Select a collection to view available courses. Click “Unlock” to request a full demo.
Showing all 6 results
Intellectual Property | ||||
15 | Intellectual Property and Innovation | 51 Videos | ||
Modules (~3 to 18 minutes) | Info | Duration | ||
15-1 | Intellectual Property General Awareness | This module will provide users with a high-level overview of patents, copyrights, trademarks, trade secrets, and confidentiality. It is generally intended as an introduction to more detailed programs for each. | 13:30 | |
15-31 | Importance of Lab Notebooks Post America Invents Act (AIA) | A look at five good reasons for maintaining lab notebooks after the passage of the American Invents Act. | 8:03 | |
15-32 | Importance of Lab Notebooks | A look at five good reasons for maintaining lab notebooks. | 6:05 | |
15-33 | IP Contamination | A look at IP contamination. What is it, how is it harmful, and how can you avoid it? | 4:53 | |
15-34 | Product Contamination | What is product contamination? How does it occur, what are the risks, and how can you avoid it? | 5:07 | |
15-35 | Why Should Everyone Care About Intellectual Property? | A look at intellectual property. Why is it important, and how can it help your business to succeed? | 3:45 | |
15-36 | Why Should Sales Professionals Care About IP? | A look at intellectual property. Why is it important to sales professionals, and how can it help them to succeed? | 4:32 | |
15-37 | What to Do with Unsolicited Business Ideas | A look at intellectual property. Why is it important to sales professionals, and how can it help them to succeed? | 4:51 | |
15-38 | Considerations for IP Decisions in Connection with Innovative Ideas | What are the common considerations for IP decisions in connection with innovative ideas? A look at the four main options are: a patent application. a trade secret, a defensive publication, fourth, nothing. | 12:55 | |
15-39 | IP Risks and Opportunities Touch Every Part of a Business | 8:13 | ||
15-40 | IP Risks Associated with Copying Competitive Products | 6:40 | ||
15-41 | German Act on Employees' Inventions and the German Patent Act Part 1: Rights and Obligations | 16:28 | ||
15-42 | German Act on Employees' Inventions and the German Patent Act Part 2: Inventorship | 4:48 | ||
15-43 | German Act on Employees' Inventions and the German Patent Act Part 3: Compensation | 10:35 | ||
15-45, 240-16 | Intellectual Property in Connection with Services Agreements | 9:12 | ||
15-46, 240-17 | Intellectual Property Provisions of Supply Agreements | 3:43 | ||
15-47 | IP Enforcement: If You See Something, Say Something | 4:07 | ||
15-48, 115-02 | The Impact IP Has On Product Value with Customs Bureaus | 4:44 | ||
15-49, 115-03 | IP Valuations in Connection with Transfer Pricing | 8:57 | ||
15-50, 115-04 | Process Steps for Three IP Valuation Approaches | 11:18 | ||
15-52, 115-06 | Overview of the Cost Approach to IP Valuation | 4:33 | ||
15-53, 115-07 | Overview of the Income Approach to IP Valuation | 3:41 | ||
Micro Modules (~2 minutes) | Duration | |||
15-2 | What is Intellectual Property? | A clarification of what IP is not, and a breakdown of types of IP. | 0:44 | |
15-3 | What Types of Intellectual Property Are there? | An explanation of the relationship between different kinds of IP. | 2:10 | |
15-4 | Can a Product or Process be Protected by More than One Kind of Intellectual Property? | A rundown of the options business owners have for IP protections. | 0:59 | |
15-5 | What is the Difference Between a Patent and a Trade Secret? | An explanation of the pros and cons of trade secrets and patents. | 0:54 | |
15-6 | What is the Difference Between a Patent and a Trademark? | An explanation of the pros and cons of trademarks and patents. | 1:10 | |
15-7 | Who Owns the Intellectual Property in a Joint Development Relationship? | An explanation of the importance of joint development agreements in IP ownership issues. | 1:29 | |
15-8 | Who Owns the Intellectual Property in a Services Relationship? | An explanation of the importance of services agreements in IP ownership issues. | 1:14 | |
15-9 | Why Do You Need an IP Strategy as an Embedded Part of Your Business Strategy? | An explanation of the importance of the preventive power of IP protections. | 1:09 | |
15-10 | Why is Being Religiously Tied to a "Not Invented Here" Mentality Dangerous? | A discussion of the pros and cons of developing new components within your business versus purchasing components made by other firms. | 1:11 | |
Vignettes (~1 to 6 minutes) | Duration | |||
15-11 | Introduction to IP Ownership Issues | An introduction to the scenarios. | 3:38 | |
15-12 | When Should You Start Thinking About Intellectual Property? | A discussion of when you should begin to think about IP protection in connection with product development. | 2:39 | |
15-13 | What is a Patent? | A discussion about patents. | 2:31 | |
15-14 | What is a Patent Claim? - Example | A discussion of patent claims. | 2:28 | |
15-15 | What is the Process when Dealing with Patent Examiners? | A discussion of the process in dealing with patent examiners. | 0:56 | |
15-16 | What is Prior Art? | A discussion of prior art. | 3:27 | |
15-17 | Involve IP Counsel as Early as Possible | A discussion of the need to contact IP counsel as early as possible. | 1:57 | |
15-18 | Do You Have to Be an Inventor to Be Listed as an Inventor on a Patent? | A discussion of the need to be an inventor to be listed as an inventor on a patent? | 1:44 | |
15-19 | Careful Communications | A discussion of being careful in emails and other written exchanges. | 3:16 | |
15-20 | What Are Your Options if You Are Potentially Infringing a Patent? | A discussion of options if you are potentially infringing a patent. | 4:43 | |
15-21 | What is a Product Clearance Search? | A discussion of product clearance searching. | 0:56 | |
15-22 | What is a Trade Secret? | A discussion of trade secrets. | 3:45 | |
15-23 | What is a Trademark? | A discussion of trademarks. | 3:09 | |
15-24 | What is a Copyright? | A discussion of copyrights. | 3:53 | |
15-25 | Open Source and Free Software | A discussion of Open Source & Free Software. | 1:29 | |
15-26 | Confidential Information and NDAs | A discussion of Confidential information and NDAs. | 4:53 | |
15-27 | IP Ownership Issues | A discussion of IP Ownership Issues. | 6:08 | |
15-28 | Categories of IP Ownership in Contracts | A discussion of Categories of IP Ownership in Contracts. | 7:12 | |
15-29 | How to Avoid Invisible Risks with Indirect Contractors | A discussion of How to avoid Invisible Risks with indirect contractors. | 2:22 | |
15-30, 120-1 | IP: The Movie | A movie describing all aspects of IP fundamentals. | 1:11:45 | |
20 | Patent Fundamentals | 131 Videos | ||
Modules (~3 to 19 minutes) | Info | Duration | ||
20-1 | What is a Patent? | What is a patent? What are savvy companies doing with patents? Why should you be concerned about competitive patents or patents owned by non-practicing entities? Where is the power in the patent? As a general matter, what is a claim, and how does it work? | 5:49 | |
20-2 | What is Patent Infringement? | How do you infringe a patent? How do you design around a patent? We will use a simple product example to show this; a chair. A chair is a useful product example because it is well known, it has obvious components, and with a chair, executives will be able to easily understand the concept of infringement and designing around patents. | 8:16 | |
20-3 | How Can You Have a Patent and Still not be Able to Make Your Patented Product? | A brief description of the concept that a patent does not give the assignee or patentee the right to make, use, or sell, but only the right to exclude others from making, using, and selling. We will continue with the with chair example and describe situations where you can own a patent on a chair, and can still infringe another, more broad chair patent by making your own patented chair. And, we will discuss the value of having a narrow patent. For example, even though the owner of the broader patent can block you, with your narrower patent, you can also block that broad patent owner from making your patented chair. | 3:24 | |
20-4 | What is a Patent Fence and What Can You Do About it? | A brief description of the patent fence concept using simple examples with our chair. Our core patent claim will be an apparatus for sitting comprised of a back, a seat, and one or more legs. We will demonstrate a patent fence by having a competitor invent and patent a chair with the various extra features such as a footrest, a headrest, and wheels on the base. And we will demonstrate how that competitive patent fence can devalue our broad patent. | 5:12 | |
20-5 | What Are Patent Trolls and Why Should they Scare You to Death? | The worldwide landscape is covered with predators. Who is coming after you? What is a troll or non-practicing entity? Where does the term come from? Can they legally do what they do? What are their strengths? What are their weaknesses? What are some basic defenses that can be used to block trolls? | 12:18 | |
20-6 | Publishing and Defensive Publications | This module will briefly respond to the following Questions: What is publication and why can it result in the loss of your own patent rights? Trade Secret rights? What is publication clearance and why is it useful? What is defensive publishing? How can it help to block competitive patents? How can it reduce worldwide patent costs? What are the best practices for defensive publishing? | 7:54 | |
20-7, 60-1 | What is Prior Art and Why is it Important to My Business? | What is prior art searching and competitive landscaping, and how do these functions relate to your business? We will discuss Freedom to Operate (FTO), Invalidity, Patentability, patents for competitive intelligence, and general reports for these functional needs. | 6:44 | |
20-8 | What is a Design Patent? | What is a design patent? How do design patents overlap with trademarks? A comparison of design patents with utility patents. What are some examples of design patents? What are the Key differences between copyrights and design patents? | 9:58 | |
20-9 | Inventorship | We will talk about your status as an inventor on a patent; a topic some people call inventorship. Who should be listed as an inventor on a patent? We will use several examples to illustrate the appropriate inventorship designation. | 6:31 | |
20-10 | What You Put in Writing Could Adversely Impact Litigation | In this module, we will discuss how putting your thoughts and ideas in writing can adversely impact an outcome of litigation (pending or future). We will also discuss terms you should avoid in memos, emails, or other written communications. | 7:38 | |
20-11 | Software Patents | In this module, we describe the state of software patents; what typically can and cannot be patented related to software, and what you can do to increase your chances of securing patent protection. | 10:05 | |
20-12 | Provisional Patent Applications | In this module, we will discuss provisional patent applications in terms of both what they are and what they are not, including risks associated with using provisional patent applications to seek patent protection | 5:32 | |
20-72 | Patent Marking in the US | A discussion of the importance of marking patented products for infringement litigation. This module also briefly discusses the proper method for marking patented products and the pros and cons of marking said products. | 5:50 | |
20-73 | Patent Marking | A discussion of the purpose of patent marking laws and several methods for marking patented products. This module also briefly discusses the risks associated with false patent marking. | 5:11 | |
30-3, 20-81, 37-1 | What is a Patent Claim? | A discussion of the importance of the claims in a utility patent application. This module also briefly explains dependent and independent claims. | 3:34 | |
20-83 | Why You're Needed for PTO Office Actions | A discussion of patent-office office actions and their role in the patent application process. This module also explains why inventors' IP counsel frequently require input from the inventors in order to respond to office actions from the patent office and to complete the application process. | 5:51 | |
20-84 | Why You're Needed to Support Patent Application Review | A discussion of why it is critical for inventors to review patent applications before these applications are filed. This module also discusses the importance of avoiding overly-broad claims and why inventors' cooperation with IP counsel is vital throughout the application process. | 6:01 | |
20-85 | How Does Claim Deletion Impact Inventorship | A discussion of why patent claims are often deleted during the application process and the significance of deletion on inventorship. This module also briefly discusses a potential remedy to claim deletion to restore inventor status. | 3:03 | |
20-86 | Divisional Patent Applications | An explanation of divisional patent applications and how they can be used to apply for patent protection for multiple inventions. This module also briefly discusses the pros and cons of filing divisional patent applications. | 5:04 | |
20-87 | Continuation and Continuation-in-Part Patent Applications | An explanation of continuation and continuation-in-part patent applications and their connection to conventional patent applications. This module also briefly discusses the pros and cons of filing continuation and continuation-in-part patent applications. | 7:22 | |
20-88 | Continuation Patent Applications | A discussion of continuation patent applications, their connection to regular patent applications, and the importance of avoiding new information in continuation patent applications. This module also briefly discusses the pros and cons of filing a continuation patent application and provides an example of when to use such an application. | 6:08 | |
20-89 | Why is it Critical to File Patent Applications Before Engaging Suppliers, Vendors, and Customers? | A discussion of the legal risks of disclosing sensitive information about your product or service before that product or service is patented. This module includes legal risks specific to the United States. | 2:09 | |
20-90 | Contributory Infringement | An explanation of the offense of contributory patent infringement, a.k.a. indirect infringement (a.k.a. infringement by supply). This module includes a brief example of a contributory patent infringement scenario. | 4:15 | |
20-91 | Willful Patent Infringement | An explanation of the offense of willful patent infringement and why the penalties for willful infringement are typically harsher than those for non-willful infringement. This module also provides tips for avoiding willful infringement. | 5:20 | |
20-92 | Benefits of a Provisional Patent Application (US) | A discussion of the six primary benefits of filing a provisional patent application, as opposed to only filing a regular patent application. | 3:15 | |
20-93 | How Does Plant Variety Protection (PVP) Compare to a Patent in the US? | A discussion of plant variety protections in the United States. This includes a discussion of the similarities and differences between PVP and utility patents in terms of the application processes and the scope of protections offered by both. | 18:49 | |
27-7, 20-94 | How Does an EU community Design Compare to a US Design Patent | A discussion of the similarities and differences between American design patents and European Union community designs. This includes an explanation of different types of EU design protections, the length of the different types of protection, and differences in the application processes. | 4:53 | |
20-95 | What is a Standard Essential Patent (SEP)? | A discussion of Standard Essential Patents (SEPs), Standard-Setting Organizations (SSOs), pools, FRAND terms, and related topics. | 10:44 | |
20-96 | Can I Talk Publicly About My Patent Pending or Patented Technology? | A discussion of the public nature of patents. This module also includes two main risks associated with the public disclosure of patent applications and/or granted patents, as well as some ways to mitigate these risks. | 5:55 | |
20-97 | Who Owns the Patent for an Employee's Invention in France? | A discussion of the three types of employee inventions provided under French law. This module also includes some tips for French employers for securing invention ownership. | 3:20 | |
20-98 | Who Owns the Patent for an Employee's Invention in Germany? | A discussion of two types of employee inventions under German law. This module also includes some tips for German employers for securing invention ownership. | 4:06 | |
20-99 | Who Owns the Patent for an Employee's Invention in the United Kingdom? | A discussion of the two possible conditions in which, under UK law, an employer would own an invention created by an employee. This module also includes some tips for British employers for securing invention ownership. | 2:56 | |
20-100 | Who Owns the Patent for an Employee's Invention in the Netherlands? | A discussion of the two conditions in which, under Dutch law, an employer would own an invention created by an employee. This module also includes some tips for Dutch employers for securing invention ownership. | 2:39 | |
20-101 | Who Owns the Patent for an Employee's Invention in Belgium? | A discussion of the three types of employee inventions under Belgian law and the corresponding rules regarding ownership. This module also includes some tips for Belgian employers for securing invention ownership. | 3:53 | |
20-102 | Who Owns the Patent for an Employee's Invention in Switzerland? | A discussion of the three types of employee inventions and the corresponding ownership rules under Swiss law. This module also includes some tips for Swiss employers for securing invention ownership. | 4:33 | |
20-103 | Who Owns the Patent for a Contractor's Invention in France? | A discussion of French laws on ownership of an invention resulting from a contractor-commissioner relationship. This module also includes tips for French commissioners for pursuing invention ownership. | 1:16 | |
20-104 | Who Owns the Patent for a Contractor's Invention in the United Kingdom? | A discussion of British laws on ownership of an invention resulting from a contractor-commissioner relationship. This module also includes tips for British commissioners for pursuing invention ownership. | 1:15 | |
20-105 | What is a Foreign Filing License? | A discussion of the rules on foreign filing licenses, a.k.a. foreign filing permits, in the UK, the US, Spain, Japan, and India. This module also discusses five "red flags" indicating when a foreign filing license may be necessary. | 8:37 | |
20-106 | Selling Products with Patented Features | 9:37 | ||
20-107 | What is the Prior Use Defense in Patent Infringement Actions? | 8:14 | ||
20-108 | What Is a European Unitary Patent? | 6:24 | ||
20-109 | What is an Ex-Parte Patent Reexamination? | 12:23 | ||
20-110 | Why Are Claims Decisions Different Depending on Where You File? | 2:33 | ||
20-111 | Do Not Fear the Non-Obvious Inventive Step Patentability Requirement | 6:24 | ||
20-112 | Beware of Patent Co-Ownership | 7:42 | ||
20-113 | What Are the Basic Requirements for Patentability? | 5:16 | ||
20-114 | Right to Repair / Replace Parts of Patented Products | 3:17 | ||
20-115 | Design Patents for Replacement Parts | 3:08 | ||
20-117 | Experimental Use Exemption to Patent Infringement | 10:58 | ||
20-122 | Patentability vs Patent Infringement: Two Examples | 3:26 | ||
20-123 | Considerations for Where to File Patent Applications | 3:14 | ||
20-124 | De Minimis Patent Infringement | 6:34 | ||
20-126 | Patentability of Selection Inventions | 5:53 | ||
20-127 | Software Implemented Inventions Throughout the World | 9:06 | ||
20-128, 60-14 | Is There Value in Expired Patents? | 4:48 | ||
20-129 | Necessary Alignment of USPTO and FDA Disclosures | 3:55 | ||
20-133 | What is a Patentability Evaluation? | 6:22 | ||
20-134, 60-15 | What is a Patent Infringement Opinion? | 4:17 | ||
20-135 | How Does a Patent Priority Date Differ From a Patent Filing Date? | 8:16 | ||
20-135 | How Does a Patent Priority Date Differ From a Patent Filing Date? | 8:16 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
20-13 | What is a Patent? | A discussion of the patent protections and their limitations. | 0:58 | |
20-14 | What Are the Basic Requirements of Patentability? | A discussion of what it means for an invention to be new and non-obvious. | 1:32 | |
20-15 | How Can Patents Benefit Your Business? | A discussion of the ways patent protections can provide new sources of income. | 1:22 | |
20-16 | What is the Life of a US Utility Patent? | A discussion of the importance of the date of issuance in determining the lifespan of a patent. | 0:57 | |
20-17 | How Much Does it Cost to Prepare, File, and Maintain a US Utility Patent? | A breakdown of the various expenses involved in obtaining and maintaining a patent. | 1:23 | |
20-18 | How Expensive is it to Enforce Your Patent? | A discussion of the specific costs, in dollars, of obtaining a US patent. | 0:53 | |
20-19 | What is a Patent Fence? | A discussion of how to both block competitors from obtaining a patent and avoid being blocked from obtaining a patent. | 2:20 | |
20-20 | How Do You Prevent a Patent Fence? | A discussion of how publishing can be used to block competitors from patenting their inventions. | 1:04 | |
20-21 | What is a Patent Troll? | A discussion of how non-practicing entities make money through patents without inventing anything. | 1:03 | |
20-22 | What is Patent Infringement? | An explanation of patent infringement. | 0:47 | |
20-23 | Who Are the Plaintiff and Defendant in a Patent Infringement Litigation? | An explanation of the parties involved in patent infringement litigation. | 0:29 | |
20-24 | What is an Invention Disclosure? | A discussion of the role of the invention disclosure in the patent process. | 0:50 | |
20-25 | What Are the Main Defenses to a Patent Infringement Action? | A discussion of invalidity and non-infringement defenses in patent infringement litigation. | 1:18 | |
20-26 | Does Having a Patent Give Me the Right to Make and Sell My Patent Product? | An explanation of how a patent proprietor can be blocked from making, using, and/or selling the technology the proprietor patented. | 1:17 | |
20-27 | How Do You Decide Who Should be Named as an Inventor on a Patent Application? | A discussion of the significance of determining who qualifies to be a named inventor in a patent application. | 2:08 | |
20-28 | How is Patent Ownership Determined? | A discussion of the two ways someone can be the owner of an invention. | 0:38 | |
20-29 | What is the Difference Between Ownership and Co-Ownership of Patent Rights? | A discussion of the potential pitfalls of co-owning patent rights and the importance of ownership agreements. | 1:07 | |
20-30 | What is a Patent Assignment? | A discussion of patent assignments and the circumstances in which they typically occur. | 0:58 | |
20-31 | What is a Patent License? | A comparison of patent assignments and patent licensing. | 0:55 | |
20-32 | What is the Difference Between an IP Licensor and an IP Licensee? | An explanation of parties to a licensing agreement. | 0:22 | |
20-33 | What is a Patent Royalty? | An explanation of what royalties are and how they can be structured. | 0:29 | |
20-34 | What is the Difference Between Patent In-Licensing and Out-Licensing? | An explanation of in-licensing and out-licensing and associated terms. | 0:27 | |
20-35 | How Can Rights be Licensed Under a Patent? | An explanation of the rights individuals and companies secure through licensing agreements. | 1:11 | |
20-36 | What is the Difference Between an Exclusive and non-Exclusive Patent License? | An explanation of the rights a non-exclusive licensee possesses compared to the rights an exclusive licensee possesses. | 1:16 | |
20-37 | What is a Design Patent? | An explanation of designs in the patent context and the protections provided by design patents. | 1:15 | |
20-38 | How Do Design Patents Compare with Utility Patents? | An explanation of the purposes and features of design patents versus those of utility patents. | 1:27 | |
20-39 | How Do Design Patents Compare with Copyrights in the US? | An explanation of the three main differences between design patents and US copyrights. | 1:43 | |
20-40 | How Can Publications Harm Your Potential Patent Rights? | An explanation of how any type of publication by anyone anywhere in the world can destroy patent rights. | 1:16 | |
20-41 | Where is the US Patent Office? | A brief discussion of the locations of the United States Patent and Trademark Office. | 0:25 | |
20-42 | What Kinds of Things Do Patents Protect? | A brief discussion of the three types of patents provided by the USPTO and the types of inventions they protect. | 4:11 | |
20-43 | Are there Different types of US Patents? | A brief discussion of the three types of patents provided by the USPTO and what they protect. | 0:52 | |
20-44 | What is the Difference Between a Patent Application and a Patent? | An explanation of the distinction between a patent and a patent application, and the benefits provided by patent applications. | 0:53 | |
20-45 | What Are the Requirements for Getting a Patent? | A brief discussion of the three requirements for getting a patent and what each requirement means. | 1:47 | |
20-46 | What Happens if I Publicly Disclose My Invention Before I File a Patent Application on the Invention? | A brief discussion of the potential legal consequences of disclosing inventions before filing the patent applications for those inventions. | 0:51 | |
20-47 | Can I Get a Patent for My Invention with no Intention of Making or Selling Products Covered by My Patent? | A brief discussion of why inventors may seek patents for their inventions without intending to make or sell those inventions. | 0:35 | |
20-48 | Can a Product be Protected by More than One Patent? | A brief discussion of how an invention can be covered by multiple patents. | 0:49 | |
20-49 | When Can an Owner of a US Patent Sue Someone for Patent Infringement in the US? | A brief discussion of the circumstances in which a US-based patent proprietor may sue another party for patent infringement. | 1:03 | |
20-50 | How Much Does it Cost to Get a US Patent? | A brief accounting of the expenses typically associated with the patent application process. | 1:47 | |
20-51 | How Long Does it Take to Get a Patent? | A brief discussion and explanation of the timeline for obtaining a patent. | 0:55 | |
20-52 | What is the Process for Getting a US Utility Patent? | A brief discussion of the steps for obtaining a US utility patent. | 1:33 | |
20-53 | How Do I Know if I Should be Named as an Inventor on a Patent? | A brief discussion of the criteria for being named as an inventor in a patent application. | 0:57 | |
20-54 | How Do I Know if My Invention is Patentable as a Utility Patent in the US? | A brief discussion of the required attributes of a patentable invention. | 1:35 | |
20-55 | Who Are US Patent Attorneys and what Do they Do? | A brief discussion of the necessary qualifications to be a patent attorney. | 1:17 | |
20-56 | Who Are US Patent Agents and what Do they Do? | A brief discussion of the work of patent agents and how to become a patent agent. | 0:44 | |
20-57 | What is the Difference Between a US Patent Attorney and a US Patent Agent? | A brief discussion of the similarities and differences between patent attorneys and patent agents. | 0:52 | |
20-58 | Can there be More than One Inventor for a Patentable Invention? | A brief discussion of the requirements for being a named inventor of a patented invention. | 0:41 | |
20-59 | What is the Patent Cooperation Treaty and Why is it Important? | A brief explanation of the Patent Cooperation Treaty and its benefits. | 1:14 | |
20-60 | Does Every Country Have the Same Laws Regarding Patents? | A brief discussion of the key differences of patents laws of different countries and the significance of these differences. | 0:43 | |
20-61 | How Can I Determine the Value of a Patent? | A brief discussion of the three steps for determining the value of a patent. | 0:56 | |
20-62 | Can a Patent be Bought or Sold? | A brief discussion of how patents can be sold. | 0:29 | |
20-63 | Can a Patent Application be Bought or Sold? | A brief discussion of how patent applications can be sold. | 0:31 | |
20-64 | What is a Provisional Patent Application? | A discussion of the purposes, benefits, and potential risks of provisional patent applications. | 1:55 | |
20-65 | Can a Patent Infringe Another Patent? | A brief discussion of the limits of the limits of patent rights. | 0:58 | |
20-66 | Is there Value in Filing a Patent Application, Even if it Never Becomes a Patent? | A brief discussion of the four benefits of filing patent applications that do not lead to patents. | 1:15 | |
20-67 | Why Should You Become a Named Inventor on a Patent? | A brief discussion of the five primary reasons to become a named inventor on a patent and how to become a named inventor. | 1:50 | |
20-68 | Why Are Brainstorming Sessions and Patents Critical to Innovation? | A brief discussion of the benefits of collaboratively brainstorming patentable inventions. | 1:05 | |
20-69 | Why is it Critical to File Patent Applications Before Engaging with Suppliers, Vendors, and Customers? | A brief discussion of the potential legal pitfalls of engaging with suppliers, vendors, and customers before you have filed your patent application. | 1:11 | |
20-70 | Can You Obtain Valuable Knowledge from Patents? | A brief explanation of how patents facilitate the spread of information. | 1:24 | |
20-71 | Can Patents help You Find Hard-to-Find Competitors? | A brief explanation of how to use patents to find otherwise obscure competitors. | 1:08 | |
20-74 | First to File in the US | A brief discussion of the significance of the US change from first-to-invent to first-to-file and the importance of filing your patent application at the earliest opportunity. | 1:37 | |
20-75 | First to File International | A brief discussion of the importance of filing your patent application at the earliest opportunity. | 1:14 | |
20-76 | How Do You Properly Mark Your Patented Products? | A brief discussion of two approaches to marking patented products and potential legal pitfalls to each approach. | 1:50 | |
20-77 | What Are Pre-Issuance Damages for Patent Infringement in the US? | A brief discussion of the potential legal remedies inventors can pursue against entities that infringed on the inventors' patent applications. | 2:06 | |
20-78 | What if You Mark a Product with an Expired Patent Number in the US | A brief discussion of the purpose of laws against false patent markings and the two key elements of these laws common to numerous countries around the world. | 0:55 | |
20-79 | What Are the Key Elements of a False Patent Marking Claim | A brief discussion of a notable exception to the US law on false patent markings. | 0:41 | |
20-80 | What is Patent Marking? | A brief discussion of the purpose of patent markings and patent marking laws. | 1:07 | |
20-82 | Protecting Software Inventions | A brief discussion on how to obtain IP protections for inventions created by software. | 3:16 | |
Vignettes (~5 minutes) | Duration | |||
20-125 | Patented Products Can Infringe Other Products | 4:50 | ||
25 | EPO Patents and Oppositions | 7 Videos | ||
Modules (~2 to 8 minutes) | Info | Duration | ||
25-1 | Introduction to the European Patent Office | A discussion of the history of the European patent system, how the system works, and its limits. | 3:53 | |
25-2 | What is the Process for getting an EPO Patent | A discussion of the necessary steps and time frame for obtaining a European patent. | 9:08 | |
25-3 | Oppositions at the European Patent Office EPO | An explanation of oppositions at the European Patent Office (EPO) and the six grounds on which oppositions can be based. This module also discusses the impact of a successful opposition and how parties may join existing oppositions. | 4:13 | |
25-4 | Advantages of Filing an EPO Opposition | A discussion of eight potential advantages to filing an EPO opposition. | 2:09 | |
25-5 | Who May File an EPO Opposition? | A brief discussion of the EPO's liberal rules on who may file oppositions and why parties who file oppositions may remain anonymous. | 1:53 | |
25-6 | When Should You Avoid Filing an EPO Opposition? | A brief discussion of three reasons why parties may choose not to file EPO oppositions and the pros and cons of opting for an "observation" instead of an opposition. | 3:28 | |
25-7 | What is the Procedure for an EPO Opposition? | A discussion of the six general stages and time frame of the procedure for EPO oppositions. | 7:21 | |
25-9 | EPO Timelines and Cost | 7:18 | ||
25-10 | Problem Solution Approach | 7:56 | ||
25-11 | Excluded Subject Matter in Europe | 9:26 | ||
25-12 | Excluded Subject Matter in the Life Sciences | 7:11 | ||
25-13 | Oppositions and Appeals at EPO | 7:49 | ||
25-14 | Priority | 10:17 | ||
25-15 | Ownership and Assignments | 5:28 | ||
25-16 | Divisional Applications at the EPO | 5:12 | ||
25-17 | SPCs | 3:46 | ||
25-18 | Amendment Practices Before the EPO | 10:15 | ||
25-20 | UK Trade Marks | 12:47 | ||
25-23 | Registered UK Designs | 8:49 | ||
27 | EU Community Designs | 7 Videos | ||
Micro Modules (~2 to 7 minutes) | Info | Duration | ||
27-1 | What is a Community Design in the European Union? | 6:20 | ||
27-2 | Which Products Can You Protect with an EU Community Design? | 1:31 | ||
27-3 | What are Exceptions to EU Community Design Protection? | 3:51 | ||
27-4 | Who Owns the Rights to a Community Design in the EU? | 1:34 | ||
27-5 | What is a Registered Community Design in the EU | 4:21 | ||
27-6 | What is an Unregistered Community Design in the EU? | 3:07 | ||
27-7, 20-94 | How Does an EU community Design Compare to a US Design Patent? | 4:53 | ||
30 | How to Read a Patent | 9 Videos | ||
Modules (~3 to 9 minutes) | Info | Duration | ||
30-1 | The Front Page of a Utility Patent | A look at the front page of a utility patent. What information is there, and how is that information useful? | 3:25 | |
30-2 | Between the Front Page and Claims of a Utility Patent | A look at the components of a patent specification between the front page and the claims. What information is found there? | 3:28 | |
30-3 | What is a Patent Claim? | We use visualizations and a simple example to provide training on patent claims, both independent and dependent. | 3:34 | |
30-4 | How to Read a Patent for Patentability | How can you read a patent to assess patentability? Why would you want to? | 3:27 | |
30-5 | How to Read a Patent for Invalidity | How can you read a patent for invalidity, and when would you want to? | 4:06 | |
30-6 | How to Read a Patent for Freedom to Operate | How can you read a patent for freedom to operate? When would you want to? | 4:00 | |
30-7 | Claim Drafting - A Girl and Her Trike | A discussion of how to properly draft patent claims, including steps and examples. Hosted by Bob Simpson. | 9:04 | |
30-8 | Anatomy of a Patent Claim | A discussion of the components of patent claims, as well as tips about sentence structure, claim structure, and punctuation. Hosted by Bob Simpson. | 9:53 | |
30-9 | Patentability and Infringement | Most legal rights give a person an affirmative right to do something. Such is not the case with patent rights. A patent gives you the right to exclude others from doing something. Specifically, a patent gives you the right to keep others from making, using, selling or offering the patented product for sale. | 7:40 | |
35 | Patent Cooperation Treaty (PCT) | 5 Videos | ||
Micro Modules (~1 to 3 minutes) | Info | Duration | ||
35-1 | What is a PCT Application? | A brief discussion of what a PCT application is, as well as of the PCT application process and its timeline. | 3:35 | |
35-2 | What Are the Key Steps in PCT Filing? | A brief discussion of the four to five steps involved in the PCT filing process. | 3:45 | |
35-3 | What Are the Typical Costs for PCT Filing? | A brief discussion of various fees involved in filing a PCT application. | 1:34 | |
35-4 | Why is a PCT Application Advantageous? | A brief discussion of five advantages PCT applications can provide businesses. | 2:36 | |
35-5 | Important Considerations with PCT | A brief discussion of three major problems the PCT system and the PCT application process can pose to applicants. | 1:41 | |
37 | Patent Claims | 6 Videos | ||
Modules (~3 to 9 minutes) | Info | Duration | ||
30-1 | What is a Patent Claim? | We use visualizations and a simple example to provide training on patent claims, both independent and dependent. | 3:34 | |
30-2 | Claim Drafting - A Girl and Her Trike | A brief discussion of the four to five steps involved in the PCT filing process. | 9:04 | |
30-3 | Anatomy of a Patent Claim | 9:53 | ||
30-4 | Patentability and Infringement | Most legal rights give a person an affirmative right to do something. Such is not the case with patent rights. A patent gives you the right to exclude others from doing something. Specifically, a patent gives you the right to keep others from making, using, selling or offering the patented product for sale. | 3:27 | |
Scenarios (~23 minutes) | Info | Duration | ||
37-5 | Chess Claims with Thomas Colson and Bob Simpson | 21:58 | ||
37-6 | Slider Claims with Thomas Colson and Bob Simpson | 22:58 | ||
40 | Trademarks | 46 Videos | ||
Modules (~3 to 13 minutes) | Info | Duration | ||
40-1 | What is a Trademark? | What is a trademark? Why is it useful for a company to have trademarks? How does a trademark compare to a business name? What are the practical distinctions between domain names and trademarks? | 8:16 | |
40-2 | What is Inherent Distinctiveness of a Trademark? | We start with the basic mentality of getting a trademark. What is distinctiveness and why is it important to getting a Trademark? How do we assess the distinctiveness of your mark? What is inherent distinctiveness and actual distinctiveness? What are Fanciful, Arbitrary, Suggestive, Descriptive, and Generic Trademarks? | 11:24 | |
40-3 | What is Actual Distinctiveness of a Trademark? | What is actual distinctiveness? How distinctive is your mark relative to other marks in the marketplace? What is the difference between a registered and non-registered mark? | 5:43 | |
40-4 | What is Trademark Infringement? | How do you infringe a trademark? What is likelihood of confusion to source? What are some basic steps you can take to avoid trademark infringement? | 13:31 | |
40-5 | Benefits of a US Federal Trademark Registration | In this module, we will discuss the benefits of obtaining a US federal trademark registration; such as the use of a Circle R, geographic enforceability, registration with US Customs and Border Protection, bringing actions in federal court, and inclusion in trademark databases. | 2:51 | |
40-35 | The Use of Trademarks in Marketing Material | A discussion of how marketing trademarked products can decrease, or even eliminate, the value of the trademark on those products. This module also includes three tips for protecting your trademarks as you market your goods. | 6:18 | |
40-36 | Trademark Dilution | A discussion of trademark dilution. This includes why trademark dilution can only happen to particularly famous trademarks, the two ways trademark dilution happens, the difference between dilution and infringement, and the various costs of litigation. | 5:32 | |
40-37 | What is a Trademark Clearance Search? | A discussion of trademark clearance searches. This includes why trademark clearance searches are so important, the jurisdictional nature of trademarks, types of trademarks, and how to begin a trademark clearance search. | 4:54 | |
40-38 | Considerations for Trademark Usage in Multiple Languages | A discussion of trademarks. This includes what can be protected by trademarks, as well as notable examples of how language barriers can impede the commercial success of trademarked goods. | 3:01 | |
40-39 | Avoid Product Packaging that Diminishes Your Trademark | A discussion of do's and don'ts for the packaging and display of trademarked goods. This includes advice regarding what information to include on the packaging, avoiding the use of stickers, the importance of accuracy, focusing on target consumers, and ease of access. | 5:25 | |
40-40 | How to Keep a US Trademark Alive | A discussion of three steps for preventing trademark protections from expiring. This includes how to use your trademark, what documents to submit and when, and what fees to pay and when. | 3:01 | |
40-41 | When Is Non-Use of a US Trademark Excusable? | A discussion of the six circumstances in which US trademark protections can be kept in place even after the trademark is no longer used in commerce. In addition, this module covers the six circumstances in which non-use of a US trademark in commerce will result in the expiration of the trademark. | 4:54 | |
40-42 | How to Keep an EU Trademark Alive | A discussion of how to renew a trademark in the EU. This includes a timeframe, fees, late renewal, and goods deletion. | 3:01 | |
40-43 | What is a TM Clearance Search, and How to Conduct One? | A discussion of trademark clearance searches. This includes when, why, and how to conduct a trademark clearance search, the country- and industry-specific aspects of trademark searches, as well as the importance of consumer confusion and common law rights. | 10:36 | |
40-44 | Trademark Fair Use | 4:56 | ||
40-45 | Insignias Under the Fastener Quality Act | 7:26 | ||
40-46 | When It Comes to Trademark Rights It’s Use It or Lose It | 4:56 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
40-6 | What is a Trademark? | A brief explanation of what trademarks are and what they can protect. | 0:30 | |
40-7 | What is the Duration of a US Trademark? | A brief discussion of how to ensure the longevity of a US trademark. | 0:42 | |
40-8 | What Are the Advantages of a US Trademark Registration Versus Common Law Trademark Rights? | A brief discussion of five key benefits proprietors of federally registered trademarks enjoy that owners of mere common law trademarks do not. | 1:16 | |
40-9 | Can Sounds be Protected as US Trademarks? | A brief discussion of examples of sounds protected by US trademarks. | 0:47 | |
40-10 | Can Colors be Protected by US Trademarks? | A brief discussion of the key step to obtain US trademark protection on colors. | 1:10 | |
40-11 | Can You Get a US Trademark on a Scent? | A brief discussion of the two legal requirements for obtaining US trademark protection on a scent. | 0:50 | |
40-12 | Can the Shape of a Product be the Subject of Trademark Protection? | A brief discussion and example of how shapes can be protected by trademarks. | 0:45 | |
40-13 | What's the Difference Between a Trademark and a Business Name? | A brief explanation of the distinction between the function and purpose of business names versus the function and purpose of trademarks. | 1:06 | |
40-14 | What's the Difference Between a Trademark and a Domain Name? | A brief explanation of the distinction between the function and purpose of domain names versus the function and purpose of trademarks. | 0:48 | |
40-15 | Is it Necessary to Use a Trademark in Commerce? | A brief explanation of why usage of a trademarked good is crucial for maintaining the trademark on that good. | 0:49 | |
40-16 | What is Trademark Distinctiveness? | A brief explanation of the legal definition and importance of trademark distinctiveness, and of actual and inherent distinctiveness. | 0:54 | |
40-17 | What Are the Categories of Inherent Distinctiveness for Trademarks? | A brief discussion of the five categories of inherent trademark distinctiveness, with examples. | 1:42 | |
40-18 | What is Actual Distinctiveness of a Trademark? | A brief explanation of actual trademark distinctiveness. | 0:33 | |
40-19 | What Are the Factors Typically Considered in Determining Actual Distinctiveness of a Trademark? | A brief discussion of the five most important factors for determining a trademark's actual distinctiveness. | 1:10 | |
40-20 | When Can You Use a Circle R in Connection with Your Trademark? | A brief explanation of when it is appropriate to mark your trademarked product with the Circle R versus when to mark your product with a TM. | 0:22 | |
40-21 | What Are the two Main Causes of Action for Trademark Infringement? | A brief discussion of the two main causes of action for trademark infringement. | 0:17 | |
40-22 | What is a Cause of Action for Trademark Infringement Based Upon Likelihood of Confusion? | A brief explanation and example of trademark infringement litigation based upon likelihood of confusion. | 0:55 | |
40-23 | What is a Cause of Action for Trademark Infringement Based Upon Dilution? | A brief explanation and examples of trademark infringement litigation based upon dilution. | 1:11 | |
40-24 | What Factors Are Typically Considered in a Trademark Infringement Analysis Based Upon Likelihood of Confusion? | A brief discussion of five factors that are typically considered in a trademark infringement analysis based upon likelihood of confusion. | 1:26 | |
40-25 | Why Are Trademarks Important to a Company? | A brief discussion of the various ways trademarks generate new value for their proprietors. | 0:53 | |
40-26 | How Expensive is Trademark Infringement Litigation? | A brief discussion of the various costs, economic and otherwise, associated with trademark infringement litigation. | 0:57 | |
40-27 | Who Are the Plaintiff and Defendant in a Trademark Infringement Litigation? | A brief explanation of the parties involved in trademark infringement litigation. | 0:25 | |
40-28 | What Kinds of Things Do Trademarks Protect? | A brief discussion of the various types of creations that can be protected by trademarks. | 0:39 | |
40-29 | What is the Difference Between a US Trademark Application and a US Trademark? | A brief discussion of the three main benefits of having a formal US trademark registration, rather than a common law trademark. | 1:12 | |
40-30 | What Are the Requirements for Getting a US Trademark? | A brief discussion of the requirements for obtaining and maintaining a US trademark. | 1:16 | |
40-31 | Can a Product be Protected by More than One Trademark? | A brief discussion and example of how a single product can be protected by multiple trademarks. | 0:43 | |
40-32 | What is a US Trademark License? | A brief discussion of trademark rights, the limits of these rights, and how licensing rights fit into this dynamic. | 1:23 | |
40-33 | Can a Trademark be Bought or Sold? | A brief discussion of how trademarks can be bought or sold, and how these sold rights can be lost. | 0:26 | |
40-34 | Can a Trademark Application be Bought or Sold? | A brief discussion of how trademark applications can be bought or sold, and how the rights stemming from these applications can be lost. | 0:29 | |
45 | Trade Dress | 8 Videos | ||
Micro Modules (~1 to 5 minutes) | Info | Duration | ||
45-1 | What is Trade Dress? | We provide a brief overview of Trade Dress in terms of their benefits and comparison with trademarks. | 5:18 | |
45-2 | The Trade Dress Functional Prohibition | We provide a breif description of the "Funcational" prohibition associated with Trade Dress with two examples. | 3:21 | |
45-3 | Look for Advertising to Support Trade Dress Enforcement | We provide a brief description of the importance of "Look For" advertising to establish Trade Dress rights. | 1:15 | |
45-4 | Trade Dress Examples | The best way to understand Trade Dress is with examples. So, we provide six examples of actual Trade Dress. | 5:11 | |
45-5 | What is the Difference Between Trade Dress and a Design Patent? | We provide a brief comparison of Trade Dress and Design patents. | 2:45 | |
45-6 | What is the Difference Between Trade Dress and Trademarks? | We provide a brief comparison of Trade Dress and Trademarks. | 1:11 | |
45-7 | Can Functional Aspects of Products be Protected by Trade Dress? | We provide a brief description of the functional prohibition in connection with Trade Dress. | 1:13 | |
45-8 | Acquired Distinctiveness in Trade Dress | A look at trade dress distinctiveness. When is it inherent, and when is it acquired or earned? | 5:18 | |
47 | Anti-Counterfeiting of Intellectual Property | 25 Videos | ||
Modules (~1 to 10 minutes) | Info | Duration | ||
47-1 | An Overview of Counterfeiting | A discussion of the differences between counterfeiting, pirating, and knocking-off. In addition, this module discusses three reasons why everyone should care about counterfeiting, as well as laws and treaties on pirating, counterfeiting, and knocking-off. | 9:15 | |
47-2 | Introduction to Counterfeiting | A discussion of the three main problems with counterfeit goods and why everyone should care about counterfeiting. In addition, this module briefly discusses some of the penalties for counterfeiting. | 3:05 | |
47-3 | Counterfeit Goods vs. Knockoffs | A discussion of some of the key differences between a knock-off good and a counterfeit good. This module also briefly discusses the adverse effects of both types of goods on the marketplace. | 2:11 | |
47-4 | Counterfeit Goods vs. Pirated Goods | A discussion of some of the key differences between a pirated good and a counterfeit good. This module also briefly discusses why pirated goods are generally less damaging to the marketplace than counterfeit goods can be. | 3:10 | |
47-5 | Counterfeiting vs. Trademark Infringement | A discussion of the differences between trademark infringement and counterfeiting. This includes an explanation of why counterfeiting has greater economic risks than trademark infringement does. | 2:35 | |
47-6 | Counterfeiting vs. Patent Infringement | An explanation of the differences between patent infringement and counterfeiting. This includes a breakdown of utility and design patents, as well as a hypothetical scenario of patent infringement. | 2:21 | |
47-7 | Counterfeiting vs. Copyright Infringement | A discussion of the differences between copyright infringement and counterfeiting. This includes a hypothetical scenario to show when counterfeiting can also become copyright infringement. | 2:47 | |
47-8 | Trafficking in Counterfeit Goods or Services (US) | A discussion of American laws on trafficking in counterfeit services or goods. This includes a listing of the four types of conduct that violate these laws, as well as a brief discussion of laws on conspiring or attempting to traffic in counterfeit goods or services. | 3:16 | |
47-9 | "Counterfeit Marks" under the US Offense of Trafficking in Counterfeit Goods or Services | A discussion of American laws on counterfeit trademarks. This includes a listing of the four criteria of spurious trademarks, the six types of spurious designations, and some exceptions to the rule on spurious designations. | 1:49 | |
47-10 | Penalties for Trafficking in Counterfeit Goods or Services (US) | A discussion of the potential legal penalties for violating US laws on trafficking in counterfeit services or goods. This includes penalties for both initial and subsequent offenses, as well as a discussion of three special categories that can lead to heightened penalties. Additionally, this module discusses circumstances in which violation of counterfeit trafficking laws can result in the forfeiture of offenders' personal property. | 1:59 | |
47-11 | Trafficking in Counterfeit Goods or Services | A discussion of victim impact statements related to the violation of American laws on trafficking in counterfeit goods or services. This includes when these statements should be submitted, what information should be contained in these statements, and what types of victims are permitted to submit these statements. | 2:18 | |
47-12 | "Trafficking" under the US Offense of Trafficking in Counterfeit Goods or Services | A discussion of the two types of conduct that violate American laws on trafficking in counterfeit goods or services. | 3:00 | |
47-13 | What is a Counterfeit Military Good or Service in the US? | A discussion of the two conditions for trafficking goods or services that violate American laws on trafficking counterfeit military goods or services. | 1:51 | |
47-14 | Transshipment and Exportation of Counterfeit Goods or Services under Section 42 of the US Lanham Act | A discussion of the United States Lanham Act as it applies to the transshipment and/or exporting of counterfeit goods. This includes a discussion of the five categories of goods that cannot be transshipped or exported under the Act, exceptions to this rule, methods the Act provides for the disposal of prohibited goods, and civil penalties for violating the Act. | 5:48 | |
47-15 | Civil Damages for Intentional Use of a Counterfeit Trademark under the US Lanham Act | A discussion of the potential civil penalties courts can impose on trademark infringers and the situations in which particularly harsh penalties may be imposed. This module also discusses the potential statutory damages plaintiffs in trademark infringement litigation may pursue. | 4:57 | |
47-16 | Trafficking in Counterfeit Labels, Illicit Labels, or Counterfeit Documentation or Packaging (US) | A discussion of the US law on trafficking in counterfeit or illicit labels, or counterfeit documentation of packaging. This module includes explanations of the two elements of this offense and the situations and circumstances that satisfy these elements. | 3:06 | |
47-17 | Penalties and Remedies for Trafficking in Counterfeit Labels, Illicit Labels, or Counterfeit Documentation or Packaging (US) | A discussion of the criminal and civil penalties for violating US laws on trafficking in counterfeit labels, illicit labels, or counterfeit documentation or packaging. This includes a breakdown of actual damages, statutory damages, and the potential forfeiture or destruction of offenders' property. | 2:21 | |
47-18 | Anti-Counterfeit Measures under EU Regulation 608-2013 | A discussion of the European Union's anti-counterfeiting Regulation, 608/2013. This module includes the purposes of the regulation, the five ways this regulation achieves its purpose, the three exceptions to this Regulation, and issues of national sovereignty. | 2:47 | |
47-19 | "Counterfeit Goods" under EU Regulation 608-2013 | A discussion of the three general categories of goods considered counterfeit under EU Regulation 608/2013 and the specific conditions in which each of these categories of goods violate the Regulation. | 3:16 | |
47-20 | "Geographical Indications" under EU Regulation 608-2013 | A discussion of the six designations or indications that are considered counterfeit under the geographical indication provisions of EU Regulation 608/2013. | 1:49 | |
47-21 | "Pirated Goods" under EU Regulation 608-2013 | A discussion of the two components EU Regulation 608/2013's definition of pirated goods. | 1:00 | |
47-22 | "Goods Suspected of Infringing an Intellectual Property Right" under EU Regulation 608-2013 | A discussion of the definition of goods suspected of infringing intellectual property rights under EU Regulation 608/2013. This module also discusses the three categories of goods that violate this aspect of the Regulation. | 2:18 | |
47-23 | Counterfeiting under the TRIPS Agreement | A discussion of the provisions of the TRIPS Agreement related to international counterfeiting and pirating. This includes an explanation of the three main features of the Agreement, as well as four concepts for combating copyright infringement. | 3:16 | |
47-24 | "Counterfeit Trademark Goods" under the TRIPS Agreement | A discussion of the four elements of the TRIPS Agreement's definition of counterfeit trademark goods. | 1:49 | |
47-25 | "Pirated Copyright Goods" under the TRIPS Agreement | A discussion of the two elements of the TRIPS Agreement's definition of pirated copyright goods. | 1:59 | |
50 | Copyrights | 46 Videos | ||
Modules (~3 to 8 minutes) | Info | Duration | ||
50-1 | Copyright Fundamentals | What are copyrights? What aren't copyrights? What materials are available for copyright protection? What does a copyright give you the right to do? What are the exceptions of those rights? What is Fair Use? Do you need a federal copyright registration to have a valid copyright? What's the life of a copyright registration? | 8:32 | |
50-2 | Beware of Copying Images from the Internet | This program describes IP risks associated with using digital images and videos from the web in connection with things like websites, presentations, publications, and brochures. Simply, just because you are able to copy an image or video from the web, it doesn't mean you are legally permitted to do so, and the penalties can be severe. | 6:42 | |
50-21 | Advantages of a US Federal Copyright Registration | A brief discussion of the four main incentives the US government has created to encourage people to file for copyright registration. | 3:04 | |
50-22 | Copyright Ownership in the US | A brief discussion on the rules for copyright ownership for independent authors, employees, and contractors. | 3:00 | |
50-24 | Copyright Issues in Connection With Software | A discussion of copyright issues relating to software. This includes an explanation of the limits of copyright protections, three steps for protecting software you own, what to do and avoid doing when working with software you do not own, and the jurisdictional nature of copyrights. | 2:43 | |
50-32 | Can You Infringe a Copyright by Sending or Posting a Hyperlink (US) | A discussion of US copyright law relating to hyperlinks. This includes an explanation and examples of the three types of secondary copyright infringement. | 4:02 | |
50-33 | Can You Infringe a Copyright by Sending or Posting a Hyperlink (EU) | A discussion of EU copyright law relating to hyperlinks. This includes an explanation of the four factors EU courts use to determine if hyperlinks to copyrighted works constitute copyright infringement, plus four hypothetical scenarios. | 7:47 | |
50-34 | Secondary Copyright Infringement (US) | A discussion of US law on secondary copyright infringement. This includes a breakdown of the three types of secondary copyright infringement, as well as the elements of each of these types. | 4:01 | |
50-35 | What is a Copyright? (UK) | A discussion of US law on secondary copyright infringement. This includes an explanation of the three main forms of secondary copyright infringement and the elements of each of these forms. | 4:13 | |
50-36 | Who Owns the Copyrights to an Employee's Work in France? | A discussion of UK laws regarding copyrights. This includes an explanation of the exclusive rights copyrights provide, types of copyright infringement, as well as exceptions to copyright protections. | 3:14 | |
50-37 | Who Owns the Copyrights to an Employee's Work in Germany? | 2:10 | ||
50-38 | Who Owns the Copyrights to an Employee's Work in the United Kingdom? | 2:18 | ||
50-39 | Who Owns the Copyrights to an Employee's Work in the Netherlands? | 4:13 | ||
50-40 | Who Owns the Copyrights to an Employee's Work in Belgium? | 3:03 | ||
50-41 | Who Owns the Copyrights to an Employee's Work in Switzerland? | 3:01 | ||
50-42 | Who Owns the Copyrights to a Contractor's Work in France? | 2:26 | ||
50-43 | Who Owns the Copyrights to a Contractor's Work in Germany? | 2:21 | ||
50-44 | Who Owns the Copyrights to a Contractor's Work in the United Kingdom? | 2:29 | ||
50-45 | Who Owns the Copyrights to a Contractor's Work in the Netherlands? | 1:46 | ||
50-46 | Who Owns the Copyrights to a Contractor's Work in Belgium? | 2:27 | ||
50-47 | Who Owns the Copyrights to a Contractor's Work in Switzerland? | 2:33 | ||
50-48 | Music Rights Clearance | 6:26 | ||
Micro Modules (~1 minutes) | Duration | |||
50-3 | What is a Copyright? | A brief explanation of what copyrights are and what they do and do not protect. | 1:06 | |
50-4 | How Long Does a US Copyright Last? | A brief discussion of the longevity of copyrights for copyrightable works from before January 1, 1978, joint works by two or more authors, works made for hire, and anonymous works. | 0:48 | |
50-5 | Do You Need a US Federal Copyright Registration to Have a Valid Copyright? | A brief discussion of copyright protection with and without a federal copyright registration. | 0:32 | |
50-6 | What Are the Advantages of a US Copyright Registration? | A brief discussion of the five main benefits proprietors of US copyright registrations enjoy that owners of copyrightable material without such registrations do not have. | 1:11 | |
50-7 | What is the Fair Use Exception to Copyright Laws? | A brief explanation of the Fair Use exception to copyright protections, including what this exception does and does not cover. | 1:00 | |
50-8 | How is Copyright Ownership Determined? | A brief discussion of the three ways copyright ownership is determined. | 0:51 | |
50-9 | What is a "Work Made for Hire" Under Copyright Law? | A brief discussion of the "work for hire" concept in copyright law and how it applies to works by employees compared to works by contractors. | 1:00 | |
50-10 | What is a Derivative Work Under Copyright Law? | A brief explanation of derivative works, the opportunities and risks associated with creating these works, and examples of such works. | 1:02 | |
50-11 | What Does a Copyright Give You the Right to Do? | A brief explanation of the rights enjoyed by copyright proprietors. | 0:26 | |
50-12 | How Expensive is Copyright Infringement Litigation? | A brief discussion of the costs, economic and otherwise, associated with copyright infringement litigation. | 0:55 | |
50-13 | Who Are the Plaintiff and Defendant in a Copyright Infringement Litigation? | A brief explanation of the parties involved in copyright infringement litigation. | 0:27 | |
50-14 | Can we Freely Use Images, Videos, and Documents We Find on the Internet? | A brief explanation of why content from the Internet cannot be freely used and the risks associated with improperly using content from the Internet. | 1:08 | |
50-15 | What Kinds of Things Do Copyrights Protect? | A brief discussion of what types of works copyrights do and do not protect, and how these protections can impact your business. | 1:06 | |
50-16 | What Are the Requirements for Getting a US Copyright? | A brief discussion of the two main requirements for obtaining a US copyright. | 1:19 | |
50-17 | What is Copyright Infringement? | A brief discussion of what copyright infringement is and tips on how to avoid committing copyright infringement. | 1:20 | |
50-18 | Does Every Nation Have the Same Laws Regarding Copyrights? | A brief discussion of the significance of differences in national copyright laws and the importance of the Berne Convention. | 1:03 | |
50-19 | What is a US Copyright License? | A brief discussion of the rights copyrights provide, and the ways licenses can sell those rights. | 0:57 | |
50-20 | Can a Copyright be Bought or Sold? | A brief discussion of how a copyright may be sold in its entirety. | 0:17 | |
50-25 | Secondary Copyright Infringement (UK) | A brief discussion of UK law on secondary copyright infringement. This includes a breakdown of the five forms of secondary copyright infringement. | 1:44 | |
50-26 | Secondary Copyright Infringement- Importing an Infringing Copy (UK) | A brief discussion of the four elements of importing an infringing copy under UK copyright law. | 1:00 | |
50-27 | Secondary Copyright Infringement- Possessing or Dealing with an Infringing Copy (UK) | A brief discussion of the four elements of possessing or dealing with an infringing copy under UK copyright law. | 1:20 | |
50-28 | Secondary Copyright Infringement- Providing Means for Making Infringing Copies | A brief discussion of the two general ways someone can be guilty of providing the means for making an infringing copy under UK copyright law, as well as the elements for both of these general ways. | 2:14 | |
50-29 | Secondary Copyright Infringement- Permitting the Use of Premises for an Infringing Performance (UK) | A brief discussion of the three elements of permitting the use of premises for an infringing performance under UK copyright law. | 1:17 | |
50-30 | Secondary Copyright Infringement- Provision of an Apparatus for an Infringing Performance (UK) | A brief discussion of the three general ways someone can violate UK copyright law on provision of an apparatus for an infringing performance. | 1:57 | |
50-31 | Secondary Copyright Infringement (Global) | A brief, general discussion of laws regarding secondary copyright infringement worldwide. | 2:46 | |
55 | Supplier Interactions | 8 Videos | ||
Modules (~3 to 8 minutes) | Duration | |||
55-1 | Reducing Risks Associated with Supplier Interactions | A discussion of best practices for protecting IP assets while hosting supplier representatives at your company's facilities. This includes a breakdown of the potential IP-related risks associated with hosting supplier reps, as well as things to do before and during the visit. | 8:30 | |
55-2 | Copyright Infringement Issues with Suppliers Drawings | A discussion of the do's and don'ts of reproducing copyrighted drawings created by your suppliers, as well as of the risks involved in replicating the products depicted in those drawings. | 2:52 | |
55-5 | How to Protect Supplier Proprietary Information, and What if You Don't? | 5:51 | ||
55-8 | Manage IP Assets Within Your Supply Chain | 6:35 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
55-3 | New Developments Under Build to Print Contracts Are Not Immune From Liability | A brief discussion of the potential legal risks of Build-to-Print contracts and how to avoid these risks. | 1:55 | |
55-4 | What is Proprietary Information? | A brief explanation proprietary information, including common examples of proprietary information. | 1:17 | |
55-6 | Beware of Suppliers with Patents | A discussion of six ways to protect a supplier's proprietary information, as well as of four potential consequences companies can face if they fail to protect their suppliers' proprietary information. | 2:09 | |
55-7 | Reducing Risks Associated With Receiving Suppliers at Your Facility | 2:31 | ||
60 | Prior Art | 12 Videos | ||
Module (~4- 12 minutes) | Info | Duration | ||
20-7, 60-1 | What is Prior Art and Why is Prior Art Important to My Business? | What is prior art searching and competitive landscaping, and how do these functions relate to your business? We will discuss Freedom to Operate (FTO), Invalidity, Patentability, patents for competitive intelligence, and general reports for these functional needs. | 6:44 | |
60-9 | What Do I Do About Patents Uncovered During an FTO Search | A discussion of Freedom to Operate, or FTO, searches. This module includes an explanation of what FTO searches are, why companies conduct them, and five options for what a company can do if its FTO search uncovers a patent that endangers the company's IP strategy. | 5:51 | |
60-10 | What is a Freedom to Operate Search and Why Are They Important? | 5:16 | ||
60-11 | Patent Landscaping | 10:22 | ||
60-12 | General Components of a Freedom to Operate Search | 11:47 | ||
Micro Modules (~1 minute) | Duration | |||
60-2 | What is Prior Art? | A brief explanation of prior art and how it impacts inventors' ability to obtain patent protection. | 0:59 | |
60-3 | What is a Patentability Search? | A brief explanation of patentability searches, including why they are conducted and what they can find. | 1:06 | |
60-4 | What is a Patent Invalidity Search? | A brief explanation of invalidity searches, including why they are conducted and what they can find. | 1:09 | |
60-5 | What is a Freedom to Operate (FTO) or Product Clearance Search? | A brief explanation of Freedom to Operate (FTO)/product clearance searches, including why they are conducted and what they can find. | 1:03 | |
60-6 | How Can Patent Information be Useful for Competitive Intelligence? | A brief discussion of how competitors' patents and patent applications can provide your company with valuable market insight. | 1:07 | |
60-7 | How Can Patent Information be Used to Find Patent Licensing Targets? | A brief discussion of how information from competitors' patents and patent applications can provide your company with new insights on potential licensing opportunities. | 0:55 | |
60-8 | What is a Defensive Publication? | A brief discussion of defensive publications and the pros and cons of adopting this practice into your business strategy. | 0:53 | |
70 | IP Ownership in Business Relationships | 7 Videos | ||
Modules (~3 to 13 minutes) | Info | Duration | ||
70-1 | Business Relationships and their Impact on IP Ownership | This module will briefly respond to the following Questions: What are the IP ownership risks that business and technical professionals should be concerned with in connection with relationships such as with universities, contractors, employees, joint development partners, and other like relationships? | 9:59 | |
70-2 | Patent Assignment and Licensing | What is patent licensing; both patent in-licensing and patent out-licensing? What is an assignment of a patent? What is the difference between an exclusive and non-exclusive license? What is a field-of-use license? Can licensed patents be enforced; exclusive or non-exclusive? What is open innovation and how can it impact your business? | 13:26 | |
70-3 | Risks of Open Source Software | In this module, we will discuss the risks associated with open-source software such as costs of developing enhancements, deployment, and maintenance, as well as the Infection Effect related to license obligations. | 5:27 | |
70-4, 240-2 | Business Considerations and JDAs | In this module, we will discuss joint development agreements, including the objectives, the risks, and your goals in creating the right JDA such as getting the IP you need to advance your business goals. | 10:32 | |
70-7 | Data Ownership: The Internet of Things | In our world of Big Data and the Internet of Things, determining who owns the data produced by "things" can be confusing. We provide an overview of the ownership issues and tips on how to ensure you get the ownership rights you need to achieve your business goals. | 5:23 | |
70-8 | IP Rights In Connection with Consortia | 8:09 | ||
Micro Modules (~1 minute) | Duration | |||
70-5 | What is Open-Source Software? | A brief explanation of open-source software and the potential IP risk involved in using this type of software. | 1:12 | |
70-6, 240-5 | What is a Joint Development Agreement? | A brief discussion of Joint Development Agreements (JDAs): what they are and the five things you need in order to create a successful JDA. | 1:15 | |
75 | Monetizing Intellectual Property | 1 Video | ||
Modules (~9 minutes) | Info | Duration | ||
75-1 | Introduction to Monetizing Intellectual Property | A discussion of eight common ways companies can ensure returns on their investments in intellectual property. | 8:33 | |
80 | Interacting with Patent Counsel | 8 Videos | ||
Modules (~4 to 12 minutes) | Info | Duration | ||
80-1 | Interacting with Your Patent Department | This is important to you and your company. We will look at the final product; the patent. Then describe the basic pieces of information patent counsel typically need to produce a strong patent. | 6:22 | |
80-2 | When Should You Submit an Invention Disclosure? | This program describes the thought process of an innovator in connection with their decision to submit an invention disclosure to the IP department. Focus on Novelty and leave the question of Obviousness to the patent experts. | 7:28 | |
80-5 | Attorney-Client Privilege in US Intellectual Property Litigation | A discussion of attorney-client privilege in the context of intellectual property and related litigation. This module includes an explanation of the purposes of attorney-client privilege, seven situations related to IP where attorney-client privilege does not apply, and ten tips for protecting attorney-client communications. | 6:43 | |
80-6, 260-18 | How to Comport Yourself During Deposition | A discussion of depositions. This module includes what deponents should expect for a deposition, as well as twenty-one tips deponents should keep in mind during the deposition. | 11:55 | |
80-7 | How to Draft an Invention Disclosure | A discussion of what invention disclosures are, why they are made, and fourteen points to consider when drafting an invention disclosure. | 4:16 | |
Micro Modules (~1 to 3 minutes) | Duration | |||
80-3 | How "Finished" Does My Invention Have to Be Before I Submit to IP Counsel? | A brief discussion of how far along in the invention process inventors should be before submitting their inventions to IP attorneys. | 1:17 | |
80-4 | Why Should You Be Motivated to Interact With Patent Counsel | A discussion about why it is critical for inventors to actively assist patent counsel with the patent application process. | 1:40 | |
80-8 | What is an Invention Disclosure and How Should You Draft One? | 2:59 | ||
90 | Trade Secrets | 30 Videos | ||
Modules (~6 to 14 minutes) | Info | Duration | ||
90-1 | What Is a Trade Secret? | This first trade secret module is intended to help business and technical professionals understand proprietary information and trade secrets, how they are interrelated and why they are each valuable to a business. | 7:08 | |
90-2 | How Are Trade Secrets Lost and What Are the Consequences? | This second trade secret module describes the considerations for enforceability of trade secrets. How do you know if you have an Enforceable trade secret? How are trade secrets typically lost, and what are the consequences if your trade secrets and lost or stolen? | 12:42 | |
90-3 | Considerations for Trade Secret Decisions and Disclosures | This third trade secret module describes the steps in deciding if information should be kept as a trade secret, how to treat trade secrets, and how to disclose trade secret information to vendors, customers, contractors, and partners. | 13:57 | |
90-4 | Trade Secret Non-Disclosure Agreements (NDAs) and Enforcement | This fourth trade secret module describes the use of Non-Disclosure agreements in connection with trade secrets, and enforcement of trade secrets in the event of theft. | 12:50 | |
90-5 | Defend Trade Secrets Act | In this module, we describe the US Defending Trade-Secret Act in terms the Key protections for both employees and employers. | 6:32 | |
Micro Modules (~1 to 7 minutes) | Duration | |||
90-6 | What is a Trade Secret? | A brief, general discussion of trade secrets, including what they are and how to keep them legally enforceable. | 1:13 | |
90-7 | How Long Does a Trade Secret Last? | A brief discussion of the indefinite length of trade secrets and two common situations in which trade secrets are lost. | 0:49 | |
90-8 | What Are the Advantages of Trade Secrets over Patents? | A brief discussion of three major advantages trade secret protections enjoy over patent protections. | 1:00 | |
90-9 | What Are the Disadvantages of Trade Secrets Versus Patents? | A brief discussion of the main advantage patent protections have over those protections offered by trade secrets. | 0:56 | |
90-10 | What Questions Should be Asked when Considering Trade Secret Protection? | A brief discussion of the four questions inventors should ask when considering trade secret protection. | 1:17 | |
90-11 | Is there a US Trade Secret Office? | A brief discussion about whether there are offices where inventors can apply for trade secret protection. | 0:13 | |
90-12 | Is there a Trade Secret Registration? | A brief discussion about determining whether an inventor has a legally enforceable trade secret. | 0:43 | |
90-13 | What Are the Key Factors in Determining Whether You Have an Enforceable Trade Secret? | A brief discussion of the four factors courts use to determine whether inventors have enforceable trade secrets. | 1:13 | |
90-14 | Why Are Trade Secrets Valuable to a Company? | A brief discussion of the competitive advantages trade secret protections can provide. | 0:41 | |
90-15 | How Should You Typically Disclose Trade Secrets to Third Parties? | A brief discussion of eight tips for whether and how inventors should disclose their trade secrets to third parties. | 1:16 | |
90-16 | How Can You Enforce a US Trade Secret? | A brief discussion of four mechanisms for enforcing trade secret protections. | 1:09 | |
90-17 | How Expensive is it to Litigate a Trade Secret Misappropriation Suit? | A brief discussion of the various costs, financial and otherwise, associated with trade secret misappropriation litigation. | 0:59 | |
90-18 | What Factors Should You Consider in Deciding Between a Patent and a Trade Secret? | A brief discussion of five factors to consider when deciding whether to pursue trade secret or patent protection. | 1:30 | |
90-19 | How Are Trade Secrets Typically Lost? | A brief discussion of the three main ways inventors and companies lose trade secret protections. | 1:13 | |
90-20 | What Kinds of Things Do Trade Secrets Protect? | A brief discussion of the criteria for trade secrets, the various types of information that can be protected by trade secret, and how to maintain a trade secret. | 1:05 | |
90-21 | What Are the Requirements for Getting a Trade Secret? | A brief discussion of the five requirements for obtaining enforceable trade secret protection. | 0:51 | |
90-22 | What is Trade Secret Misappropriation? | A brief discussion of the two sides of trade secret misappropriation. | 0:55 | |
90-23 | Does Every Country Have the Same Laws Regarding Trade Secrets? | A brief discussion of the similarities and differences in how countries treat trade secrets. | 0:46 | |
90-24 | What is a Trade Secret License? | A brief discussion of the similarities and differences between patent licenses and trade secret licenses. | 1:04 | |
90-25 | Can a Trade Secret be Bought or Sold? | A brief discussion of trade secret licensing and its potential risks. | 0:32 | |
90-26 | EU Trade Secrets Directive - Purpose and Definitions | A brief discussion of the four key goals of the European Union's Trade Secrets Directive and of the three essential elements of the Directive's definition of trade secrets. | 2:49 | |
90-27 | EU Trade Secrets Directive - How Can Trade Secrets of Others be Lawfully Acquired? | A brief discussion of four ways companies may lawfully acquire their competitors' trade secrets under the EU Trade Secrets Directive. | 2:46 | |
90-28 | EU Trade Secrets Directive - Unlawful Acquisition, Use, and Disclosure | A brief discussion of the three conditions in which a trade secret may be unlawfully acquired, the five conditions in which trade secrets may be unlawfully used, and the four conditions in which trade secrets may be unlawfully disclosed under the EU Trade Secrets Directive. | 3:20 | |
90-29 | EU Trade Secrets Directive - Measures, Procedures, and Remedies for Unlawful Acquisition, Use, or Disclosure | A discussion of the EU Trade Secrets Directive's ten guidelines to its member-states for providing measures, procedures, and remedies for civil redress for trade secret misappropriation, as well as four exceptions when individuals or companies who acquire, use, or disclose a trade secret will not face legal consequences. | 7:44 | |
90-30 | EU Trade Secrets Directive - Best Practices | A brief discussion of the three steps every company should consider for protecting their trade secrets under the EU Trade Secrets Directive. | 1:55 | |
90-31 | Until You Know What It Is, Treat It as a Trade Secret | 3:06 | ||
100 | IP Rights with US Government Contracts | 12 Videos | ||
Modules (~3 to 12 minutes) | Info | Duration | ||
100-1 | Risks Associated with Improper Marking | This module describes some of the Key risks in failing to properly mark technical deliverables in connection with US government contracts, such as the loss of Trade Secrets. | 10:00 | |
100-2 | Categories of US Government Rights | This module describes the categories of US government rights including Unlimited, Limited Rights, Restricted Rights, Government Purpose Rights, and Specially Negotiated Rights. | 12:45 | |
100-3 | Key Terms when Marking | This module describes several Key terms associated with the marking rules such as Technical Data, Non-technical data, Deliverables, and Computer Software. | 6:20 | |
100-4 | Marking Best Practices | This module describes several Key terms and best practices associated with the marking such as Data Rights Assertion Table, Marking, and Portion Marking. | 11:57 | |
100-5 | Data Assertion Table- Tech Data & Software in USG DoD Contracts | A discussion of IP rights in the context of technology created pursuant to contracts with the US government. This module includes an explanation of the different levels of IP rights contractors may have under these contracts, the importance of Data Rights Assertion Tables, and examples of well-made and poorly made Assertion Tables. | 10:09 | |
100-6 | Contractors' Rights to Patent With US Government Contracts | A discussion of patent ownership and rights under US government contracts. This includes explanations of the general rule of ownership and its four exceptions, the most important disclosure requirement for contractors, the consequences of failing to make the right disclosures, the government's rights if the contractor retains ownership of their subject invention, four situations where the government can retain rights to inventions and patents, rules particular to contracts with Department of Energy and NASA, and the rights contracts retain if they do not elect to retain title to their invention. | 10:19 | |
100-7 | Patent Infringement Immunity for US government Contractors | A discussion of legal protections governments contractors enjoy. This module also mentions solutions for non-government contractors whose patents are infringed by the fruits of governments contracts, as well as situations where the government can and cannot sue contractors for indemnification. | 4:02 | |
100-8 | Record Keeping Requirements for Tech Data Software Deliverables | A discussion of the US government's policies and procedures for retention of records by contractors to meet their records review requirements under US government contracts. This module includes an explanation of the importance of delineating sources of funding, as well as of the timeline for document retention requirements. | 4:45 | |
100-9 | Situations where the US Government is Entitled to Unlimited Rights | A discussion of three situations where the US government will have unlimited rights to technical data or software developed under a government contract regardless of who funded the development of that technical data. This module also includes an explanation of what "unlimited rights" means, what constitutes technical data, and the importance of the ambiguous line between routine maintenance and detailed manufacturing information. | 4:45 | |
100-10 | Sub-Contractor's IP Ownership | A discussion of the intellectual property rights of subcontractors in connection with US government contracts. This module also discusses subcontractors' obligations under US government contracts, the importance of confidentiality between prime- and subcontractors, and what prime contractors and the US government may and may not do to have subcontractors transfer their ownership rights. | 4:08 | |
100-11 | Can Different Rights be Granted for Different Components of Software and Technical Deliverables | A discussion of how to mark complex technical deliverables comprised of components derived from different funding sources. This module includes a breakdown of the basic categories of government rights, as well as two hypothetical examples of deliverables with different funding sources. | 3:17 | |
100-12 | Types of Government Rights and How They Arise | A discussion of the main types of government rights and how they arise in connection with government contracts. This module includes situations where the US government will always get unlimited rights, as well as what contractors must do to avoid granting the government unlimited rights in other circumstances. | 4:56 | |
100-13 | The Data Rights Assertion Table | A discussion of data rights assertion tables in connection with government contracts. This module also explains the importance of exercising caution in deciding which information to include in the table and who should be consulted when populating the table. Additionally, this module provides examples of well- and poorly made data assertion tables. | 6:13 | |
105 | False Advertising and Puffery | 4 Videos | ||
Micro Modules (~1 to 5 minutes) | Info | Duration | ||
105-1 | False Advertising vs Puffery | We compare False Advertising and Puffying with several examples. | 4:52 | |
105-2 | What is the Difference Between False Advertising and Puffery? | We compare False Advertising and Puffying with one example. | 1:20 | |
Scenarios (~1 minute) | Info | Duration | ||
105-3 | TropiCana's Puffery | We provide an overview of the Tropicana/Campbell's Soup False Advertising action. | 1:03 | |
105-4 | Shark Ninja | We provide an overview of the Shark Ninja/Dyson False Advertising action. | 1:40 | |
110 | IP and Social Media | 2 Video | ||
Module (~6 minutes) | Info | Duration | ||
110-1 | IP and Social Media | In business today you would be a dinosaur if you weren't leveraging social media to advance your objectives. But, nothing is free in this world, and with the benefits of social media comes substantial IP risks. This series provides an overview of the risks and what to do about them. | 6:36 | |
Micro Module (~1 minute) | Duration | |||
110-2 | Beware of Using Social Media to Broadcast Vacation Highlights | 1:15 | ||
111 | Right of Publicity | 8 Videos | ||
Micro Modules (~1 to 2 minutes) | Info | Duration | ||
111-1 | Introduction to Right of Publicity | We provide a brief overview of Publicity Rights, including a comparison with Copyrights and Trademark rights. | 2:36 | |
111-2 | Don't Forget to Get the Release | We dicusss the importance of securing releases when using people in advertising programs. | 0:57 | |
111-3 | Michael Jordan | We brieflly discuss the Right of Publicity action involving Michael Jordan and Jewel Food Stores. | 1:55 | |
111-4 | Bette Midler | We brieflly discuss the Right of Publicity action involving Bette Midler and an automobile company. | 1:39 | |
111-5 | Bus Driver in Milan | We brieflly discuss the Right of Publicity action involving a bus driver in Milan. | 1:37 | |
111-6 | College Football and EA Sports | We brieflly discuss the Right of Publicity action involving Ryan Hart and Electronic Arts. | 0:58 | |
111-7 | Michael Jordan in China | We brieflly discuss the Right of Publicity action involving Michael Jordan in China. | 0:55 | |
111-8 | Beware of Tweets | We brieflly discuss the Right of Publicity action involving Katherine Heigl and Duane Reade. | 1:01 | |
115 | IP Valuations | 5 Videos | ||
Modules (~4 to 12 minutes) | Info | Duration | ||
15-48, 115-02 | The Impact IP Has On Product Value with Customs Bureaus | 4:44 | ||
15-49, 115-03 | IP Valuations in Connection with Transfer Pricing | 8:57 | ||
15-50, 115-04 | Process Steps for Three IP Valuation Approaches | 11:18 | ||
15-52, 115-06 | Overview of the Cost Approach to IP Valuation | 4:33 | ||
15-53, 115-07 | Overview of the Income Approach to IP Valuation | 3:41 | ||
20-130, 135-01 | Why Academia and RTOS Should Obtain Patents | 4:33 | ||
20-137, 135-03 | What is a Blocking Patent? | 3:35 | ||
20-138, 135-04 | Patent Infringement Misunderstandings | 4:48 | ||
20-139, 135-05 | Should Universities and RTOs Oppose Patents? | 7:45 | ||
120 | Executive IP: The Movie | 1 Video | ||
120-1-15-30 | IP: The Movie | Intellectual property is changing everything for businesses. Massive IP opportunities and equally massive IP risks are everywhere. We all need to speak the language of IP. This movie will help you to do that. Watch as Imagine Enterprises realizes the importance of IP almost too late as they race to get to market. | 1:11:45 | |
125 | Standard Essential Patents | 2 Videos | ||
Modules (~8 minutes) | Info | Duration | ||
125-02 | Responsibilities of Corporate Roles in Connection with Standards-Setting Organizations | 7:09 | ||
125-03 | The Balance of SSO Benefits with SSO IP Rights Obligations | 8:00 | ||
135 | Academia and RTO’s | 5 Videos | ||
Modules (~8 minutes) | Info | Duration | ||
20-130, 135-01 | Why Academia and RTOs Should Obtain Patents | 4:33 | ||
20-136, 135-02 | What Does it Mean to Say a Patent is Strong? | 6:01 | ||
20-137, 135-03 | What is a Blocking Patent? | 3:35 | ||
20-138, 135-04 | Patent Infringement Misunderstandings | 4:48 | ||
20-139, 135-05 | Should Universities and RTOs Oppose Patents? | 7:45 | ||
360 | Artificial Intelligence | 2 Videos | ||
Modules (~8 minutes) | Info | Duration | ||
360-01 | Risks and Best Practices Associated with Using AI Tools in the Workplace | 8:16 | ||
130 | Confidential Information | 12 Videos | ||
Modules (~3 to 15 minutes) | Info | Duration | ||
130-1 | Trade Secrets and Confidentiality | This module will briefly respond to the following Questions: What is confidential information, why is it important to keep it confidential, and what are the general steps in keeping it confidential? What is a trade-secret? Why are trade secrets valuable? What are the basic steps in turning secret information into a trade secret? How does a trade secret compare with a patent? | 11:08 | |
130-2 | Confidential Information of Current and Former Employers | In this module, we will discuss your general obligations in connection with confidential information of current and former employers. | 5:22 | |
130-3 | Exit Interview | This is a video that can be used with Exiting Employees to ensure they understand their obligations with respect to confidential information. | 2:51 | |
130-7 | Confidentiality in the World of Ubiquitous Video Conferencing | A discussion of eight tips for maintaining confidentiality and professionalism while conducting virtual work meetings. | 7:55 | |
130-30 | Keeping Confidentiality of Big Prototypes | 7:13 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
130-4 | What is Confidential Information? | A brief discussion of confidential information: a broad definition, common examples, and how easily confidentiality can be lost. | 0:58 | |
130-5 | What is Proprietary Information? | A brief explanation of proprietary information. | 0:16 | |
130-6 | What is the Difference Between Confidential Information and Proprietary Information? | A brief discussion of the distinction between confidential and proprietary information, and examples when information can be confidential but not proprietary or proprietary but not confidential. | 1:14 | |
Vignettes (~4 to 5 minutes) | Duration | |||
130-26 | Disclose Cautiously, Even Under NDA | 5:26 | ||
130-27 | Never Misappropriate the Trade Secrets of Former Employers | 4:03 | ||
130-28 | Patent Versus Trade Secret | 5:40 | ||
130-29 | Considerations When Your Trade Secrets are Misappropriated | 4:58 | ||
140 | Non-Disclosure Agreements | 36 Videos | ||
Modules (~4 to 15 minutes) | Info | Duration | ||
140-1 | Key Components to a Typical NDA | We need to understand the purpose of NDAs and why they must be used with every disclosure of confidential information. In this module, we will discuss the Key components of a typical NDA. | 11:49 | |
140-2 | Common NDA Mistakes to be Avoided | If you understand what you need to do to enforce an NDA in the future, you'll have a better understanding of what you need to do throughout the process. This course will provide an overview of the common mistakes that can be avoided with an NDA. | 4:59 | |
140-28 | The NDA Drift | We provide a description of the risk associated with the parties of an NDA "drifting" into technical discussions that may lead to joint development when there is no Joint Development Agreement (JDA) in place (or any other document that defines the IP rights of the parties). | 3:23 | |
140-29 | If You Don't Need an NDA, Don't Sign One | What are the differences between 1-way, 1.5-way, and 2-way Non-Disclosure agreements? When would you want to use which type of NDA? | 4:12 | |
140-30 | Should You Use a 2-way, 1-way, or 1.5-way NDA? | Why is it best not to sign a Non-Disclosure agreement unless you absolutely need to? What should you do if someone insists upon an unnecessary NDA? | 4:00 | |
140-32 | What If the Other Party Refuses To Sign an NDA? | 6:36 | ||
140-33 | How to Increase the Comfort of Third Party Disclosers of Confidential Information | 4:43 | ||
140-34 | What to Do With Oral Disclosures of Confidential Information | 5:08 | ||
140-36 | Have a Minimalist Mentality When Making Confidential Disclosures | 4:39 | ||
Vignettes (~1 to 3 minutes) | Duration | |||
140-3 | Introduction to Non-Disclosure Agreements | We provide a brief overview of Non-Disclosure agreements as a lead-in to a series of vignettes which describes NDA scenarios. | 2:42 | |
140-4 | Summary of Non-Disclosure Agreements | We provide a summary of the Key points related to NDAs. | 3:14 | |
140-5 | Never Disclose Without an NDA | Vignette describing the importance of having an NDA in place before making a confidential disclosure. | 1:58 | |
140-6 | Be Ethical in Handling Confidential Information | Vignette describing the importance of ethical handling of Confidential Information. | 1:22 | |
140-7 | Take Need-to-Know Seriously | Vignette describing the importance of limiting internal disclosures of third-party confidential information to co-workers with a need-to-know. | 2:08 | |
140-8 | When Legal Issues Arise, Call Legal | Vignette describing the importance of immediately contacting your legal department when legal issues arise. | 2:14 | |
140-9 | Mark Your Confidential Disclosures | Vignette describing the importance of properly marking confidential disclosures. | 1:22 | |
140-10 | Oral Disclosures Must be Marked | Vignette describing the proper way to deal with oral disclosures made under NDA. | 1:34 | |
140-11 | Have Confidential Information Returned or Destroyed | Vignette describing the importance of requiring the return or destruction of your confidential information at the end of the disclosure period. | 2:16 | |
140-12 | Keep an NDA File | Vignette describing the importance of maintaining an NDA file for a recording both what you have disclosed and what has been disclosed to you...and when. | 2:45 | |
140-13 | Review Your NDA Before You Disclose | Vignette describing the importance of actually reviewing your NDA before each confidential disclosure to ensure that your disclosures will be covered. | 2:25 | |
140-14 | What to Do About Subpoenaed NDA Files | Vignette describing actions in response to a subpoena for confidential information. | 1:38 | |
140-15 | Shred Confidential Records | Vignette describing the importance of shredding confidential information. | 1:31 | |
140-16 | Beware of Reverse Engineering NDA Samples | Vignette describing the typical prohibition against reverse engineering confidential samples delivered under NDA. | 2:20 | |
140-17 | One-Way Versus Two-Way NDAs | Vignette describing the difference between a one-way and two-way NDA. | 2:19 | |
140-18 | Know Your Dates | Vignette describing the important dates associated with NDAs. | 3:42 | |
140-19 | NDA Overview (Vignettes with Quiz) | This is a full program containing all NDA vignettes. | 36:30 | |
140-35 | The Difficult NDA | 4:04 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
140-20 | What is a Non-Disclosure Agreement (NDA)? | A brief explanation of what non-disclosure agreements (NDAs) are and different types of NDAs. | 1:01 | |
140-21 | Which Dates Are Important in a Non-Disclosure Agreement? | A brief discussion of the three most important dates related to NDAs. | 1:08 | |
140-22 | Are Oral Disclosures Covered by Non-Disclosure Agreements? | A brief discussion of the ways different types of NDAs treat oral disclosures. | 1:16 | |
140-23 | Do All NDA's Protect the Confidential Disclosures of Both Parties? (Two-way Versus One-way) | A brief discussion of protections for oral disclosures under "two-way" NDAs versus protections for oral disclosures under "one-way" NDAs. | 0:49 | |
140-24 | How Should Confidential Material Received from a Party Under an NDA be Protected? | A brief discussion of how NDAs generally require parties to protect confidential material. | 0:48 | |
140-25 | Should I Sign the Other Party's NDA? | A brief discussion on why it pays to carefully read another party's NDA before you sign it. | 0:47 | |
140-26 | What isn't a Non-Disclosure Agreement or NDA? | A brief discussion of some of the risks and limits of NDAs. | 1:37 | |
140-27 | Why Are Non-Disclosure Agreements Important? | A brief discussion of why businesses commonly use NDAs. | 1:22 | |
140-31 | NDAs Do Not Prevent Unlawful Disclosures | A brief discussion of why it matters that NDAs merely deter unlawful disclosures rather than prevent them. | 1:13 | |
240 | Contract Fundamentals | 14 Videos | ||
Modules (~2 to 10 minutes) | Info | Duration | ||
240-1 | Some Contract Basics You Need to Know | What do you need to know about contracts? When do you call in the experts? What is the difference between an oral and written contract? Why is an oral contract dangerous? What is significant about the signature on the contract? | 9:48 | |
70-4, 240-2 | Business Considerations and JDAs | In this module, we will discuss joint development agreements, including the objectives, the risks, and your goals in creating the right JDA such as getting the IP you need to advance your business goals. | 10:32 | |
240-3 | Secondment | In this module, we describe the fundamentals of Secondments to provide seconded employees with information they need to understand their new role and how that impacts their relationship with their employer. | 8:14 | |
240-6 | What to Consider When Dealing With a Contract | A discussion of five important things to think about when dealing with contracts. This module includes a short quiz. | 4:21 | |
240-7 | Damages Provisions in Contracts | A discussion of the significance of damages provisions in contracts. This includes an explanation of actual, direct, incidental, consequential, and punitive damages, an example of a provision that eliminates indirect damages, and how to avoid pre-determined penalties. This module also includes a short quiz. | 3:16 | |
240-8 | Contract Warranties and Remedies | A discussion of contract provisions related to warranties and remedies. This module includes an explanation of the significance of warranties and remedies and lists four factors to consider about warranties and remedies in the context of contracts related to your business. This module also includes a short quiz. | 3:15 | |
240-9 | Indemnity | A brief discussion of contract provisions related to indemnification. This includes an explanation of indemnification, the purpose of indemnification provisions, and when these provisions would come into effect. This module also includes a short quiz. | 1:44 | |
240-10 | Contract Provisions Related to Intellectual Property | A brief discussion of contract provisions related to the four types of intellectual property. This includes an explanation of the importance of including language establishing IP ownership rights in contracts. This module also includes a short quiz. | 2:11 | |
240-11 | Considerations Before Signing a Contract for the Sale of Goods or Services | A brief discussion of seven factors to consider before signing a contract for the sale of goods or services. This module also includes a short quiz. | 2:16 | |
240-12 | Battle of the Forms in Contract Negotiations | A discussion of the so-called "battle of the forms" in contract negotiations. This includes an explanation of the factors that determine whether a buyer's or seller's terms and conditions will govern interactions between the parties, the importance of master supply agreements, and some options for sellers to help their terms and conditions prevail over those of buyers. This module also includes a short quiz. | 2:14 | |
240-13 | What is a Material Transfer Agreement (MTA)? | 10:01 | ||
240-14 | Do I Need an MTA? | 7:01 | ||
240-15 , 260-15 | Joint Defense and Common Interest Agreements | 11:46 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
240-4 | Do I Need Contracts in Connection With My New Invention? | 1:08 | ||
70-6, 240-5 | What is a Joint Development Agreement? | A brief discussion of Joint Development Agreements (JDAs), including what they are and five things needed to create a successful JDA. | 1:15 | |
250 | Cyber Awareness and Risk Reduction | 42 Videos | ||
Full Course (1 hour 23 minutes) | Info | Duration | ||
250-43 | Cyber Security Awareness and Risk Reduction - Full Course | Cyber-crime is growing fast! More and more criminals are exploiting the speed, convenience, and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, neither physical nor virtual. There are no organizations or people in the world who are impervious to the threat of cyber-crime. The success of our cyber-defense depends upon what we do, or fail to do, with our computers and devices. It can happen to anyone at any time. And if it happens, victims can lose everything; business secrets, intellectual property, identities, life savings, and everything in between. With this course, we will provide you with an overview of online behaviors that can substantially reduce your risk of being victimized by cyber-criminals. | 1:23:14 | |
Modules (~5 to 15 minutes) | Info | Duration | ||
250-18 | Introduction to Cyber Security | An introduction to the various topics related to Cyber Security. | 5:40 | |
250-1 | Fundamentals of Cyber Awareness to Reduce Cyber Risks | Cyber-crime is growing fast! More and more criminals are exploiting the speed, convenience, and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, neither physical nor virtual. There are no organizations or people in the world who are impervious to the threat of cyber-crime. The success of our cyber-defense depends upon what we do, or fail to do, with our computers and devices. It can happen to anyone at any time. And if it happens, victims can lose everything; business secrets, intellectual property, identities, life savings, and everything in between. With this module, we will provide you with the right online behaviors to substantially reduce your risk of being victimized by cyber-criminals. | 12:42 | |
250-2 | Cyber Security and Business Travel | We are increasingly reliant on our portable electronic devices for timely access to digital information while travelling. But, at the same time, when we're on the road, we are more vulnerable than ever. And cyber-criminals know this. They rely upon our vulnerabilities as they stalk us through airports and hotels. All business and personal travelers need to appreciate the enhanced cyber risks they face on the road, and know what to do to reduce those risks. | 4:36 | |
Micro Modules (~1 to 4 minutes) | Info | Duration | ||
250-19 | Malware | What is malware? How does it effect us, and what can we do to avoid it? | 3:25 | |
250-20 | Social Engineering | How do hackers and cybercriminals use Social Engineering to cause us harm. | 4:42 | |
250-21 | Choosing Passwords for Cyber Security | What makes a good, secure password? | 2:01 | |
250-22 | Cyber Security and Your Computer | How can your computer become comprimised by cyber attacks and what can you do to prevent this from happening? | 3:01 | |
250-23 | Cyber Security and Email | How can your email become comprimised by cyber attacks and what can you do to prevent this from happening? | 1:33 | |
250-24 | Cyber Security and Your Mobile Devices | How can your mobile devices become comprimised by cyber attacks and what can you do to prevent this from happening? | 1:57 | |
250-25 | What to Do in the Event of a Cyber Breach | What are some guidelines for reacting to a cyber breach if you are affected? | 1:24 | |
250-39 | E-Skimming | What is e-skimming, and how can you avoid it from happening to you? | 1:11 | |
250-42 | Why Should we use Long, Complicated Passwords | Why are long, complicated passwords important for protecting yourself against hackers? | 2:30 | |
Scenarios (1 to 2 minutes) | Info | Duration | ||
250-3 | Free USB Drive | A Cyber Awareness scenario related to the Free USB Drive scam. | 0:53 | |
250-4 | Malware on Mobile Devices | A Cyber Awareness scenario related to Malware on Mobile Devices. | 0:31 | |
250-5 | Spear Phishing | A Cyber Awareness scenario related to Spear Phishing. | 0:54 | |
250-6 | USB Charging | A Cyber Awareness scenario related to malware that is delivered through USB ports. | 1:40 | |
250-7 | 7 Year Old Hacker | A Cyber Awareness scenario related to the dangers of using public WiFi. | 0:56 | |
250-8 | Ransomware | A Cyber Awareness scenario related to the dangers of Ransomware. | 0:58 | |
250-9 | Data Breach | A Cyber Awareness scenario related to data breaches. | 1:16 | |
250-10 | Child Predator Email | A Cyber Awareness scenario related to the Child Predator Email scam. | 0:58 | |
250-11 | Stolen Laptop | A Cyber Awareness scenario related to the risks associated with the stolen laptop. | 1:16 | |
250-12 | What is a Link | A Cyber Awareness scenario related to the how links can be used to dupe users. | 1:01 | |
250-13 | Capitalizing on Big Data Breaches | A Cyber Awareness scenario related to how cyber criminals capitalize on big data breaches. | 1:17 | |
250-14 | Fake IT Department | A Cyber Awareness scenario related to the fake IT department scam. | 1:03 | |
250-15 | IRS Scam | A Cyber Awareness scenario related to the IRS scam. | 1:19 | |
250-16 | Democratic National Committee Hacked | A Cyber Awareness scenario related to how the Democratic National Committee Hacked. | 1:28 | |
250-17 | Do Not Share Passwords | A Cyber Awarenss scenario involving protection of passwords | 2:36 | |
250-26 | Malware - Virus | A Cyber Awarenss scenario about viruses- a kind of malware. | 1:07 | |
250-27 | Malware - Worm | A Cyber Awarenss scenario about worms- a kind of malware. | 1:28 | |
250-28 | Malware - Trojan | A Cyber Awarenss scenario about trojans- a kind of malware. | 1:34 | |
250-29 | Malware - Ransomware | A Cyber Awarenss scenario about ransomware- a kind of malware. | 1:45 | |
250-30 | Malware - Adware | A Cyber Awarenss scenario about adware- a kind of malware. | 0:50 | |
250-31 | Malware - Spyware | A Cyber Awarenss scenario about spyware- a kind of malware. | 1:15 | |
250-32 | Malware - Rootkit | A Cyber Awarenss scenario about rootkit- a kind of malware. | 1:03 | |
250-33 | Malware - Scareware | A Cyber Awarenss scenario about scareware- a kind of malware. | 1:28 | |
250-34 | Social Engineering - Baiting | A Cyber Awarenss scenario about a form of social engineering called "baiting." | 2:21 | |
250-35 | Social Engineering - Tailgating | A Cyber Awarenss scenario about a form of social engineering called "tailgating." | 1:36 | |
250-36 | Social Engineering - E-mail Contact Spamming | A Cyber Awarenss scenario about a form of social engineering called "e-mail contact spamming." | 1:17 | |
250-37 | Social Engineering - Pretexting | A Cyber Awarenss scenario about a form of social engineering called "pretexting." | 1:17 | |
250-41 | The Stolen SnapChat Account | A Cyber Awarenss scenario about a password scam that led to a stolen snapchat account. | 1:49 | |
260 | IP Litigation | 11 Videos | ||
Module (~4 - 12 minutes) | Info | Duration | ||
260-1 | What is a Litigation Hold? | In this module, we describe litigation holds; what they are, why they are important, and main consequences for violating a litigation hold. | 3:54 | |
260-9 | Discovery in IP Litigation | 6:05 | ||
240-15, 260-15 | Joint Defense and Common Interest Agreements | 11:46 | ||
80-9, 260-17 | How to Comport Yourself During a Deposition | 5:47 | ||
80-6, 260-18 | How to Comport Yourself During a Deposition | 11:55 | ||
Vignettes (~2 to 3 minutes) | Info | Duration | ||
260-2 | Litigation Hold Means Hold | A scenario related to the definition of Litigation Hold. | 3:07 | |
260-3 | Document Retention Notices Are Not SPAM | A scenario describing the dangers of not taking document retention notices seriously. | 2:39 | |
260-4 | Do More Than Just Check a Box | A courtroom scene showing the penalties associated with violating litigation holds. | 3:31 | |
Micro Module (~1 - 3 minutes) | Duration | |||
260-5 | What is a Litigation Hold? | A brief discussion of litigation holds, including what they are, what they cover, and why it is crucial to comply with them. | 0:49 | |
260-10 | Disclosure of Confidential Information During Litigation Discovery | 3:42 | ||
260-11 | What are the Basic Types of Subpoenas in Connection with Civil Litigation? | 2:06 | ||
260-12 | Custodians in IP Litigation | 2:44 | ||
260-13 | What is the Work Product Doctrine? | 3:04 | ||
260-14 | What is a Privilege Log? | 1:37 | ||
20-119, 260-16 | Enforcing Patent Rights | 3:06 | ||
280 | Public Speaking (Pitching Innovation) | 5 Videos | ||
Full Course (~32 minutes) | Info | Duration | ||
280-6 | Public Speaking - Full Course | This is our full course on public speaking. The Pitching Innovation series is intended to teach professionals how to successfully present their innovative ideas to decision-makers. This full course covers our PDRA program; Preparation, Delivery, Response, and the Ask. | 32:38 | |
Micro Modules (~4 to 9 minutes) | Info | Duration | ||
280-1 | Introduction to Public Speaking (Pitching Innovation) | This is the introductory Pitching Innovation module. The Pitching Innovation series is intended to teach professionals how to successfully present their innovative ideas to decision-makers. This module introduces our general PDRA program; Preparation, Delivery, Response, and the Ask. | 4:17 | |
280-2 | Preparation | In this second Pitching Innovation module, we describe the Preparation component in terms of both its importance and the five Key steps for successful preparation. | 9:05 | |
280-3 | Delivery | In this third Pitching Innovation module, we describe the two main components of successful Delivery; Passion and Connection with your audience. | 8:26 | |
280-4 | Response | In this fourth Pitching Innovation module, we describe the five tools to give you an advantage in responding to Questions from your audience. | 5:26 | |
280-5 | The Ask | In this fifth Pitching Innovation module, we describe the final component of our PDRA program; the Ask. | 4:24 |