trends

Unintended Consequences

A recent opinion from the U.S. Court of Appeals for the Sixth Circuit (Cincom Systems Inc. v. Novelis Corp, 92 U.S.P.Q.2d 1085 (6th Cir. 2009)), serves as a strong reminder to those web-based businesses that have licensed code, scripts, and other software, to carefully consider the impact of federal intellectual property laws on the transferability of these items when selling or purchasing your business.

The curious result in the Cincom case was an award of almost $500,000 to a software vendor as damages for copyright infringement, despite a state merger statute that allowed assets held by a party to automatically vest in a successor company. The vendor succeeded in being paid twice for the same software, on the same machine, in the same building, essentially because the name over the customer's door had changed. A complete copy of the Court's decision may be found online.

The facts in Cincom involve Alcan Rolled Products Division (Alcan Ohio), an Ohio corporation wholly owned by Alcan, Inc., that licensed certain software from Cincom Systems, Inc. pursuant to the terms of a license agreement. The agreement provided that the license was "non-exclusive and non[-] transferable" and did not permit Alcan Ohio to "transfer its rights or obligations under [the license agreement] without the prior written approval of Cincom." The license agreement also required that the software be used only on one specific computer in Alcan Ohio's Oswego, New York, facility. It also indentified Ohio law as controlling the matter.

After completion of the internal reorganization, the software remained on the same computer in New York, but in a plant now owned by the successor company, Novelis. Alcan Ohio/Novelis never attempted to obtain Cincom's written approval to continue to use the software before or after the restructuring, presumably assuming that such approval was unnecessary in the context of an internal reshuffling that did not change the physical location or expand the use of the software.

Ohio's merger statute provided that "[t]he surviving or new entity possesses all assets and property of every description, and every interest in the assets and property ... all of which are vested in the surviving new corporation without further act or deed." Notably, the merger law had been changed before creation of the license agreement to replace language that all property shall be deemed "[t]ransferred to" the surviving corporation without further act or deed.

Cincom sued Novelis, alleging that Alcan Ohio had violated the Cincom license by transferring the license to Novelis without consent, making Novelis an infringer whose use of the copyrighted software was unauthorized by Cincom as the copyright owner. Novelis countered that the license contained no indication of intent to prohibit the license from moving between related parties as part of an internal corporate reorganization, and that Ohio's removal of the words "transferred to" from the merger statute required a finding that there had been no "transfer" of the license. The District Court disagreed, and determined that the series of mergers effected a prohibited transfer of the license. Novelis appealed.

The Court of Appeals characterized the zone of conflict between federal intellectual property law and state corporation law as one of the limited situations requiring "judicial creation of some federal rule of common law." It further observed that courts had previously articulated the need for a uniform rule that patent licenses are "personal" and "non-transferable" in the absence of agreement expressly authorizing the assignment, and extended that patent principle to Cincom's copyrights in the software. In short, despite the fact that Ohio state law would allow a successor to assume the license, like other assets of the predecessor company, without express authorization, the court determined that Ohio must yield to the "federal common law" that it found to prohibit such transfers.

After determining that a transfer without express authorization from Cincom would be impermissible, the court then determined that Alcan Ohio did make such a transfer when Novelis continued using the software — on the same computer in the same location — without first obtaining Cincom's permission to do so, and awarded damages for copyright infringement in an amount stipulated by the parties (based on standard fees for a new license).

This decision is only controlling within the 6th Circuit (comprising Ohio, Kentucky, Michigan, and Tennessee), however there are very few judicial opinions on this topic and other courts may find the Cincom holding persuasive. Right or wrong, however, it offers two cautionary lessons:

  • Assignment and permitted-user clauses in license agreements for software and other intellectual property must be drafted with particular care, because courts are likely to treat intellectual property as a unique asset category entitled to special federal protection.
  • Intellectual property due diligence, including a review of key software license and assignment provisions, is essential even in the context of a restructuring that may affect the corporate identity of the original licensee.

If your company is considering a merger, whether with a third party or for internal reorganization purposes, it is important that your intellectual property contracts be carefully reviewed and analyzed to determine if the merger may have an effect on the surviving entity's ability to use the intellectual property at issue. Without a clear understanding of that matter, you may find that you have inadvertently lost some of the benefits the merger was intended to provide.

Daniel Pepper is founder and managing member of Pepper Law Group, LLC, a boutique law firm in Somerville, New Jersey. For more information, visit www.adultwebsitelawyer.com.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Best Practices for Payment Gateway Security

Securing digital payment transactions is critical for all businesses, but especially those in high-risk industries. Payment gateways are a core component of the digital payment ecosystem, and therefore must follow best practices to keep customer data safe.

Jonathan Corona ·
opinion

Ready for New Visa Acquirer Changes?

Next spring, Visa will roll out the U.S. version of its new Visa Acquirer Monitoring Program (VAMP), which goes into effect April 1, 2025. This follows Visa Europe, which rolled out VAMP back in June. VAMP charts a new path for acquirers to manage fraud and chargeback ratios.

Cathy Beardsley ·
opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
opinion

The Need for Minimal Friction in Age Verification Technology

In the adult sector, robust age assurance, comprised of age verification and age estimation methods, is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
Show More