Task Force Introductory Report and Background Considerations Model Intellectual Property Security Agreement Contents 1 Introduction .......................................................................................... 1.1 Purpose ......................................................................................... 1.2 Limited Scope ............................................................................... 1.2.1 Loan Agreement .................................................................. 1.2.2 Single Parties....................................................................... 1.2.3 Stand-Alone Agreement....................................................... 1.2.4 U.S. Intellectual Property Only ........................................... 1.2.5 Broad Grant ........................................................................ 1.2.6 Strict Representations and Covenants ................................. 2 Intellectual Property—Basic Concepts and Terminology ...................... 2.1 Overview....................................................................................... 2.1.1 IP Assets.............................................................................. 2.1.2 United States vs. Foreign Intellectual Property ................... 2.1.3 Registered vs. Unregistered Intellectual Property ................ 2.1.4 Value of Intellectual Property.............................................. 2.2 Copyrights..................................................................................... 2.2.1 What Law Governs?............................................................ 2.2.2 What Is a Copyright? .......................................................... 2.2.3 Registration ......................................................................... 2.2.4 Assignment and Transfer .................................................... 2.2.5 Duration.............................................................................. 2.3 Patents .......................................................................................... 2.3.1 What Law Governs?............................................................ 2.3.2 What Is a Patent?................................................................ 2.3.3 Obtaining a Patent .............................................................. 2.3.4 Assignment and Transfer .................................................... 2.3.5 Duration.............................................................................. 2.4 Trademarks ................................................................................... 2.4.1 What Law Governs?............................................................ 2.4.2 What Is a Trademark?......................................................... 2.4.3 Registration ......................................................................... 850 851 852 852 852 852 853 853 853 854 854 854 854 855 855 855 855 855 856 856 857 858 858 858 858 859 859 859 859 859 860 849 850 The Business Lawyer; Vol. 71, Summer 2016 2.4.4 Assignment and Transfer .................................................... 2.4.5 Duration.............................................................................. 2.5 Trade Secrets................................................................................. 2.5.1 What Law Governs?............................................................ 2.5.2 What Is a Trade Secret? ...................................................... 2.5.3 Maintaining a Trade Secret ................................................. 2.5.4 Duration.............................................................................. 2.6 Domain Names ............................................................................. 2.6.1 What Law Governs?............................................................ 2.6.2 What Is a Domain Name?................................................... 2.6.3 Registration ......................................................................... 2.6.4 Duration.............................................................................. 3 U.C.C. Article 9—Basic Concepts and Terminology ............................. 3.1 Overview....................................................................................... 3.2 Security Interests........................................................................... 3.3 Attachment and Title .................................................................... 3.4 Perfection ...................................................................................... 3.5 After-Acquired Collateral .............................................................. 3.6 Priority .......................................................................................... 3.7 Override of Anti-assignment Clauses ............................................ 3.8 Enforcement.................................................................................. 4 Intersection of Federal IP Law and U.C.C. Article 9............................. 4.1 Perfecting a Security Interest......................................................... 4.1.1 Which Law Applies? ........................................................... 4.1.2 Preemption.......................................................................... 4.2 Reasons for Dual Filing................................................................. 4.2.1 Copyrights........................................................................... 4.2.2 Patents and Trademarks...................................................... 4.3 Assignment Language vs. Granting Language ............................... 4.4 Federal Recording vs. U.C.C. Filing Systems ................................ 4.5 Security Interests in “Non-assignable” IP Licenses ........................ 4.6 IP License Considerations ............................................................. 4.6.1 Article 9 “Licensee in Ordinary Course” ............................. 4.6.2 Exclusive Copyright Licenses .............................................. 4.6.3 Nonexclusive Copyright Licenses........................................ 4.6.4 Patent and Trademark Licenses .......................................... 4.7 Enforcement of IP Security Interests ............................................. 5 Drafting Process .................................................................................... 860 861 861 861 862 862 863 863 863 863 863 864 864 864 864 865 865 866 866 867 868 868 868 868 869 871 871 872 873 875 875 877 878 878 879 880 880 881 I. INTRODUCTION Once a kind of collateral handled only by specialists, intellectual property (IP) now occupies a significant position in commercial finance arrangements. Almost Model IP Security Agreement Introductory Report 851 every business has IP1 rights, whether as an owner or as a licensee, ranging from off-the-shelf software products to patents on the next big advance in biotech. The business name or website address can function as a trademark, and copyrights can exist in just about any written text or artwork, including marketing materials, employment manuals, and computer code. A business will often use its intellectual property as collateral for loans and other financing arrangements. In venture capital financing, intellectual property such as a software program or a patent application may be the debtor’s only valuable asset. Film financing may be based on the value of the copyrighted script or film treatment. In other contexts, a loan may finance the debtor’s acquisition, development, or commercialization of particular IP assets. In almost all syndicated credit facilities, a debtor’s intellectual property is included as a matter of course in an all-assets collateral package, often without particular reliance on the value of the intellectual property or its usefulness in the debtor’s business. Although these financing arrangements are not unusual, they may still present hurdles for the parties’ counsel. Many lawyers who regularly represent lenders and secured parties are familiar with Article 9 of the Uniform Commercial Code (U.C.C.)2 but have only a vague understanding of the laws applicable to intellectual property. On the other hand, many IP lawyers are knowledgeable about the laws covering their clients’ IP assets but have avoided dealing with the U.C.C. since law school. U.C.C. lawyers and IP lawyers speak different languages; negotiation of IP collateral arrangements can be treacherous without a translation manual. 1.1 PURPOSE The accompanying Model Intellectual Property Security Agreement (the Model Agreement) attempts to bridge the gap between U.C.C. and IP lawyers by offering—and explaining—provisions the lawyers should consider in documenting a secured loan when the collateral includes intellectual property. The Model Agreement was produced by a task force (the Task Force) organized by the Commercial Finance and Uniform Commercial Code Committees of the American Bar Association Business Law Section. Some model agreements can be used as forms, with only minimal changes to adapt them for particular transactions. The types of intellectual property and their importance for any transaction are so varied, however, that a one-size-fits-all approach will not work. The Model Agreement is therefore largely a teaching tool, supplying basic provisions for an idealized hypothetical transaction that involves solely 1. In this report and the footnotes to the Model Agreement, we generally use “IP” as an abbreviation for “intellectual property” when used as an adjective. 2. Unless otherwise indicated, all references to the “U.C.C.,” the Uniform Commercial Code, or any Article of the U.C.C. are to the Official Text approved by the American Law Institute and the Uniform Law Commission most recently before the date of this report. References to earlier versions of the Uniform Commercial Code mean the Official Text most recently approved and in effect in the year stated. References to “Former Article 9” refer to the Official Text as approved and in effect immediately prior to July 1, 2001. 852 The Business Lawyer; Vol. 71, Summer 2016 IP collateral. The footnotes address issues that often arise in practice and suggest modifications that may be negotiated to fit the needs of the parties in various real-world situations. To assist users of the Model Agreement, this report summarizes some basic U.C.C. and IP concepts and terminology, and briefly discusses some issues that often arise when the two bodies of law interact. We have tried to explain, or at least identify, some of the most relevant legal issues, but neither the Model Agreement nor this report is intended as an exhaustive treatise on IP law or U.C.C. Article 9, “Secured Transactions.” The summaries in section 2 (IP basics) and section 3 (U.C.C. basics) merely point out the most salient and topical issues. The Model Agreement should be used with care; particular transactions may raise legal or practical issues making some provisions inappropriate or incomplete. 1.2 LIMITED SCOPE For simplicity and clarity, the Task Force decided to limit the scope of the Model Agreement and to make certain assumptions about the hypothetical secured transaction. The most important of these limitations and assumptions are: 1.2.1 Loan Agreement The Model Agreement assumes that the IP assets are being pledged as collateral for loans made under a separate loan agreement that will provide most of the substantive terms of the parties’ agreement. The Model Agreement focuses on the IP collateral, and defers to the loan agreement for more general terms to be negotiated by the parties, such as the matters that will be treated as “material” and the events and circumstances that will constitute events of default. 1.2.2 Single Parties The Model Agreement contemplates a single U.S. borrower that owns the collateral and a single lender (which could be a single collateral agent acting on behalf of a group of lenders). 1.2.3 Stand-Alone Agreement The Model Agreement deals solely with IP collateral and the directly associated rights and property. We do not, however, intend to perpetuate the historical practice of using both a “regular” security agreement and a separate IP security agreement for a single transaction. We believe that the historical bifurcated practice grew in part from the U.C.C. lawyer’s limited knowledge of IP law and the IP lawyer’s limited understanding of U.C.C. Article 9. To promote efficiency, eliminate inconsistent language, and conform terminology, we recommend including non-IP and IP assets in a single security agreement. Model IP Security Agreement Introductory Report 853 If the transaction documents include a single security agreement for all types of collateral, then the IP-specific provisions of the Model Agreement can be folded into it, replacing or supplementing the general terms. 1.2.4 U.S. Intellectual Property Only Intellectual property is recognized under local law on a country-by-country basis. In light of the global nature of many businesses, lenders usually want to include foreign IP assets owned by the debtor, such as counterparts of U.S. patents issued in other nations or trademarks registered in other countries, in the collateral package. However, the legal regimes for establishing, protecting, and enforcing liens on intellectual property vary widely by country. While the Model Agreement includes foreign IP assets in the collateral package (through broad granting language covering all the debtor’s IP assets), the Task Force decided to leave for another day contractual provisions to establish, protect, and enforce the lender’s rights in foreign intellectual property. Lenders should consult with local counsel as to the requirements for liens on foreign intellectual property. 1.2.5 Broad Grant The Model Agreement covers virtually every kind of intellectual property that a debtor might have, regardless of the intellectual property’s value or its importance to the debtor’s business or the secured party’s credit decision. To the extent that certain types of intellectual property are not important for the transaction, parts of the Model Agreement can be deleted. For example, if patents form an insignificant part of the collateral, then provisions applicable to patents can be deleted or patents can be expressly excluded from the definition of “Intellectual Property.” The Model Agreement also permits the parties to list property (either by class or item-by-item) that is to be excluded from the collateral package.3 1.2.6 Strict Representations and Covenants The Model Agreement’s representations and warranties, scheduling obligations, and covenants are relatively strict, with few limitations. The result is a document that appears to read more favorably to the lender than the borrower, in the sense that the borrower will be more likely to breach a representation or covenant due to the absence of “wiggle room.” The Task Force took this approach for instructional purposes because it allows the Model Agreement to present straightforward provisions that highlight the issue being addressed, uncluttered by qualifications. The first draft in a loan transaction is likely to favor the lender in any event, because counsel for the lender generally drafts the loan agreement. The Model Agreement includes footnotes explaining how and when a 3. See section 1.2.1 (“Scheduled Excluded Property”) of the Model Agreement. 854 The Business Lawyer; Vol. 71, Summer 2016 borrower may want to delete particular provisions, or modify them to include materiality, knowledge, or other limitations. 2 INTELLECTUAL PROPERTY—BASIC CONCEPTS 2.1 OVERVIEW AND TERMINOLOGY 2.1.1 IP Assets “Intellectual property” is a catchall term for various types of intangible rights recognized under federal, state, or foreign law. Different types of intellectual property are created and obtained in different ways, have different characteristics, and are subject to different laws. The most common types of U.S. statutory intellectual property are copyrights, patents, and trademarks. Copyrights4 protect works of creative expression such as novels, motion pictures, music, or artworks; patents5 protect inventions; and trademarks6 and service marks protect the exclusive rights to use names, images, or slogans to identify products and services. Although trade secrets are not separately protected by statute, they also constitute intellectual property and can take many forms (such as customer lists, recipes, or production know-how). Some types of intellectual property are specialized, in that they pertain only to particular industries or particular assets, and may be subject to different or additional requirements.7 Such specialized types of intellectual property are not excluded from the granting language and are thus included in the collateral package, but for simplicity the Model Agreement does not contain any special representations or covenants for those assets or the industries in which they are used. Sections 2.2 to 2.6 below briefly summarize some of the basic characteristics of different types of intellectual property. 2.1.2 United States vs. Foreign Intellectual Property Intellectual property rights are territorial and protected on a country-by-country basis. U.S. patents, for example, are issued by the United States Patent and Trademark Office (PTO) and provide the right to exclude others from practicing the invention claimed in the patent in the United States only. Companies with worldwide businesses often have large IP portfolios consisting of registrations in multiple countries. U.S. companies can file for IP registrations in foreign IP filing offices and foreign corporations can register intellectual property in the United States. Local counsel is generally engaged to prosecute IP filings outside an applicant’s home jurisdiction.8 4. See infra section 2.2. 5. See infra section 2.3. 6. See infra section 2.4. 7. Examples are plant variety patents (patents for distinct and new varieties of asexually reproduced plants that are not tuber-propagated or found in an uncultivated state); “mask works” (semiconductor chip product designs, which are protected under copyright laws); and vessel hull configurations (original designs of vessel hulls, which are protected under copyright laws). 8. As noted in supra section 1.2.4, the Model Agreement includes foreign intellectual property in the collateral, but does not attempt to provide for protecting or enforcing that lien under non-U.S. Model IP Security Agreement Introductory Report 855 2.1.3 Registered vs. Unregistered Intellectual Property Copyrights and trademarks can be registered or unregistered. (U.S. patents can only arise upon issuance by the PTO.) Copyright protection arises automatically when the copyrightable work is fixed in a tangible medium of expression, but copyrights can be registered in the United States Copyright Office. Trademarks may also arise under common law through use of the mark in commerce. In the United States, trademarks can be registered nationally in the PTO or locally in most states, usually through the secretary of state’s office.9 While IP rights can exist in unregistered copyrights and trademarks, registration provides certain legal advantages, and registered intellectual property is often perceived as more valuable. (The benefits of registering copyrights and trademarks are discussed in sections 2.2.3 and 2.4.3 below.) 2.1.4 Value of Intellectual Property IP rights tend to be integral to the particular business in which they are used. Accordingly, their value apart from the business as a whole can be difficult to calculate. For these reasons, intellectual property may not be assigned much value in determining how much debt a company’s assets can support. Nevertheless, it is risky for a lender to leave intellectual property outside the collateral package if it hopes to sell the debtor’s business as a going concern in the event of a foreclosure. 2.2 COPYRIGHTS 2.2.1 What Law Governs? The genesis of copyright law in the United States is Article 1, Section 8 of the U.S. Constitution, which provides that “Congress shall have the power . . . [t]o promote the Progress of Science and Useful Arts, by securing for limited times to Authors and Inventors, the Exclusive Right to their respective Writing and Discoveries.” Copyright protection is provided under the U.S. Copyright Act.10 2.2.2 What Is a Copyright? Copyrights apply to original works of authorship fixed in a tangible medium of expression, including works of poetry and prose, motion pictures, musical compositions, sound recordings, paintings, drawings, sculptures, photographs, law. Different countries’ approaches to IP collateral vary greatly. See generally UNITED NATIONS COMM’N ON INT’L TRADE LAW, UNCITRAL LEGISLATIVE GUIDE ON SECURED TRANSACTIONS: SUPPLEMENT ON SECURITY RIGHTS IN INTELLECTUAL PROPERTY (2010), http://www.uncitral.org/uncitral/uncitral_texts/security/ipsupplement.html. 9. Although some trademarks and other IP assets may be recognized, registered, and/or regulated under the laws of some states, this report generally focuses on the legal issues raised by the pledge of IP property that is created, registered, and/or regulated under federal law. 10. 17 U.S.C. §§ 101–1332 (2012). Some pre-1976 sound recordings, however, are excluded from the Copyright Act requirements, and thus possibly governed by state law, until 2067. Id. § 301(a). 856 The Business Lawyer; Vol. 71, Summer 2016 computer software, and other works.11 Copyright protects only the expression of an idea, and not the idea itself.12 For that reason, there can be many ways of expressing the story of star-crossed lovers from feuding factions, i.e., the overall plot line of Romeo and Juliet, without infringing the copyright in Shakespeare’s play (even if his copyright were still in force). A copyright holder has the exclusive right to: • reproduce the copyrighted work; • prepare derivative works based upon the copyrighted work; • distribute copies of the copyrighted work; and • display or perform the copyrighted work publicly.13 A copyright arises in favor of a human author unless it is a “work for hire.” Works for hire include works prepared by an employee in the course of his or her employment and certain works prepared on commission or special order.14 The hiring or commissioning party is considered the author of a work for hire. Most standard form employment agreements state that copyrightable works created by the employee in the scope of employment are works for hire and, as a back-up, also contractually obligate the employee to assign to the employer the copyright in all such works. 2.2.3 Registration Because a copyright automatically attaches to a work of authorship when the work is reduced to tangible form, it is not necessary for the work to be either published or registered with the Copyright Office. Generally, however, registration of the copyright is a prerequisite to the right to sue for infringement.15 Remedies for infringement of copyright include actual damages, statutory damages, attorney’s fees, injunction against infringement, recovery of the infringer’s profits, and seizure of copies.16 In general, statutory damages and attorney’s fees are available only for infringements occurring after the copyright is registered.17 2.2.4 Assignment and Transfer The ownership of a copyright may be transferred, in whole or in part, by any means of conveyance or by operation of law, and may be bequeathed by will or pass under the applicable laws of intestate succession.18 A written instrument or memorandum of the transfer must be duly signed by the transferor, unless own11. 12. 13. 14. 15. 16. 17. 18. Id. Id. Id. Id. Id. Id. Id. Id. § 102(a) (listing examples of types of works of authorship). § 106. § 101. § 411. §§ 502–504. § 412. § 201(d)(1). Model IP Security Agreement Introductory Report 857 ership is transferred by operation of law.19 A signed transfer instrument may be recorded in the Copyright Office. If the copyright has been registered and the transfer instrument identifies the work by title or registration number so that, after the document is indexed, it would be revealed by a reasonable search under the title or registration number, the recorded document will give all persons constructive notice of the facts stated therein.20 Any “assignment, mortgage, exclusive license” or other “conveyance, alienation, or hypothecation” of a copyright (or any of the exclusive rights comprised in a copyright) is a “transfer of copyright ownership” as defined in the Copyright Act and will be subject to these transfer and recording provisions.21 The Copyright Act provides that a “transfer of copyright ownership” will “prevail” over a later conflicting transfer if the first transfer is properly recorded22 in the Copyright Office (i) within one month after the effective date of the transfer (or within two months if the transfer is executed outside the United States) and (ii) at any time before the later transfer is recorded. Otherwise, the later transfer will prevail, if it is properly recorded and if the later transferee takes its copyright interest in good faith, for valuable consideration (or for a binding promise to pay royalties), and without notice of the first transfer.23 2.2.5 Duration Copyrights have a limited, albeit lengthy, duration. The copyright term depends on several factors, including when the work was first published or renewed.24 No renewal or maintenance payments are necessary to keep a copyright (or registration) in force for its full term. The author of a copyrighted work (other than a work for hire) who has transferred or licensed the copyright on or after January 1, 1978, has the non-waivable right to terminate the transfer (i.e., to rescind the transaction) during the five-year period beginning thirty-five years after the transfer or license.25 This means that authors and their heirs retain a residual interest in their copyrights, even if they have sold them or granted long-term licenses. This right to recapture copyright ownership could override assignments, licenses, and liens previously granted by the author or the author’s heirs.26 19. Id. § 204. 20. Id. § 205(a), (c). A transfer of copyright ownership (or other document pertaining to a copyright) can be recorded in the Copyright Office even if the copyright has not been registered, but the recording will only give constructive notice if it relates to a registered copyright. Note that identifying the copyright only by title may not satisfy the requirements for constructive notice if there are numerous registered works with the same title and many recorded documents referring to the title. 21. Id. § 101. 22. For convenience, this report sometimes uses the term “properly record” to mean that the relevant document is recorded in the Copyright Office in the form and manner required to give constructive notice of the facts stated therein. 23. Id. § 205(d). For a recorded transfer to “prevail over” another transfer, the recording must give constructive notice, which can only happen if the copyright is registered. See supra note 20. Thus, only documents pertaining to registered copyrights can “prevail” under these rules. 24. 17 U.S.C. §§ 302–305. 25. Id. § 203(a). 26. Id. 858 The Business Lawyer; Vol. 71, Summer 2016 2.3 PATENTS 2.3.1 What Law Governs? Patent protection, like copyright, traces its roots to Article 1, Section 8 of the U.S. Constitution.27 Today, the right to obtain and enforce patents is governed by the U.S. Patent Act.28 There is no state patent law or any common law patent rights. 2.3.2 What Is a Patent? A patent is a right granted by the United States government permitting the inventor “to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States”29 for a limited time in exchange for public disclosure of the invention when the patent is granted. Patents provide a competitive advantage during their term; after the expiration of a patent, anyone is free to use the invention. Only a patentee (the original owner or a successor-in-title) can bring an action for infringement.30 2.3.3 Obtaining a Patent To obtain a patent, the inventor, or a person to whom the inventor has assigned (or is under an obligation to assign) the invention, files an application in the PTO.31 An inventor’s employer typically obtains and records a written assignment from the inventor in order to be recognized as the patent owner in the PTO. A patent application must contain the information necessary for the PTO examiner to determine if the invention is eligible for a patent.32 Patent examinations are notoriously rigorous and patents can take years to issue. The attorney for the applicant “prosecutes” the patent application by responding to the PTO examiner’s concerns and modifying the scope of the patent application until the PTO examiner is satisfied. During this “patent prosecution” process, the breadth of the invention initially described in a patent application is often narrowed in order to accommodate the examiner’s concerns. If and when the examiner determines that the invention as then described meets all the requirements, the application is approved and the patent issued.33 An application for a patent is generally kept in confidence by the PTO for eighteen months after its filing date.34 Once a patent is issued, the invention is publicly available and will no longer be protectable as a trade secret. 27. See supra section 2.2.1. 28. 35 U.S.C. §§ 1–390 (2012). 29. Id. § 154(a)(1); see also id. § 271(a) (“whoever without authority makes, uses, offers to sell, or sells any patented invention . . . infringes the patent”). 30. See id. §§ 100(d), 281.35. 31. Id. §§ 111, 118. 32. Id. §§ 111–115. 33. Id. § 131. 34. Id. § 122. Model IP Security Agreement Introductory Report 859 2.3.4 Assignment and Transfer A patent, patent application, or other interest in a patent can be assigned by a written instrument, and a patentee, applicant, or assignee may grant or convey all or part of its rights under the patent or application.35 Any such “assignment, grant, or conveyance” of patent rights will be void as against any subsequent purchaser or mortgagee for a valuable consideration, without notice, unless it is recorded in the PTO within three months from its date or before the subsequent purchase or mortgage.36 2.3.5 Duration A patent is generally valid for 20 years from its application date.37 Maintenance payments are due periodically (at 3.5, 7.5, and 11.5 years after the issuance date) in order to continue the patent in force.38 The validity of the patent can be challenged by third parties at any time by bringing an inter partes review in the PTO.39 2.4 TRADEMARKS 2.4.1 What Law Governs? Trademarks are protected under U.S. federal law, common law in most states, statutes in some states, and international law. The federal law is the Lanham Act (also referred to as the Trademark Act).40 2.4.2 What Is a Trademark? Trademarks are words, phrases, symbols, designs, or a combination thereof that identify and distinguish the source of one party’s goods from those of others.41 A trademark used in connection with services, rather than goods, is sometimes referred to as a “service mark,” and each may be referred to as a “mark.”42 Trademark law protects consumers by making it easier to recognize a particular business, product, or service.43 Trademark law also protects the trademark owner’s valuable property rights in the mark and the goodwill associated with the consumer’s recognition of the mark.44 35. Id. § 261. 36. Id. 37. Id. § 154(a)(2). 38. Id. § 41(b). 39. Id. § 311. 40. 15 U.S.C. §§ 1051–1141 (2012). 41. Id. § 1115(a). 42. Id.; see also id. § 1053. 43. J. THOMAS MCCARTHY, MCCARTHY ON TRADEMARKS AND UNFAIR COMPETITION §§ 5.1, 2.7 (4th ed. 2007) (as originally conceived the purpose of trademark law was to prevent fraud and deceit by unfair competition). 44. See, e.g., Inwood Labs. v. Ives Labs., 456 U.S. 844, 854 n.9 (1982) (an infringer deprives trademark owner of goodwill earned by owner’s efforts and deprives consumers of ability to distinguish among competitors’ products). 860 The Business Lawyer; Vol. 71, Summer 2016 In the United States, trademarks can be registered if they are used in commerce. However, a company can reserve a trademark before actually offering products under that mark by filing an application to register it in the PTO on the basis of a bona fide “intent to use” the mark.45 The mark must then be put into commercial use in interstate commerce within three years from the examiner’s approval of the application.46 2.4.3 Registration Registration is not required for trademark rights to attach to a mark that is used in connection with a business, product, or service. Registration of a trademark47 in the PTO does, however, provide important advantages: • constructive notice of a claim of ownership of the mark; • a legal presumption of ownership of the mark and therefore the exclusive right to use the mark nationwide on or in connection with the goods/services listed in the registration; • the ability to bring an action concerning the mark in federal court; • the use of the U.S. registration as a basis to obtain registration in foreign countries; • the ability to record the U.S. registration with the U.S. Customs and Border Protection Service to prevent importation of infringing foreign goods; • the right to use the federal registration symbol ®; and • listing in the PTO’s online databases.48 2.4.4 Assignment and Transfer A registered trademark can be assigned, but only along with the goodwill of the business in which the trademark is used (or with the goodwill of the part of the business connected with the use of and symbolized by the trademark).49 A trademark for which an application to register has been filed can be assigned in the same way, except that an “intent to use” (ITU) application can only be assigned to a successor to the applicant’s ongoing and existing business (or relevant part of that business) to which the trademark pertains.50 The assignment 45. 15 U.S.C. § 1051(b). 46. Id. § 1051(d)(1)–(2) (explaining the timing of usage and the extensions of time available). 47. The PTO maintains both a “principal register” and a “supplemental register” for trademarks. Some trademark applications may not meet the requirements for the principal register, but may be recorded in the supplemental register, which provides a lower level of protection. This report and the Model Agreement do not distinguish between the two, but use the term “registered” to refer to the principal register, unless otherwise specified. 48. See id. §§ 1072, 1111, 1114(a), 1115(a), 1124. 49. Id. § 1060(a)(1). 50. Id. § 1060(a); 37 C.F.R. § 3.16 (2015). Model IP Security Agreement Introductory Report 861 must be in a signed writing and contain the information required by the PTO.51 An assignment will be void against a subsequent purchaser for valuable consideration, without notice, unless the assignment (including the required information) is recorded in the PTO within three months after the date of the assignment or before the subsequent purchase.52 Patent and trademark assignees may be subject to laws in addition to the recording provisions of the Patent Act or Lanham (Trademark) Act; for example, a new trademark owner may be subject to a license granted by the previous trademark owner, even if the license is not recorded and the new owner has no knowledge of the preexisting license.53 2.4.5 Duration Trademark registration can theoretically remain effective as long as use of the mark continues in connection with the products and services claimed in the registration, periodic affidavits and declarations are filed when required, and the trademark is not “abandoned.”54 A trademark can become abandoned if it is not used, and a federally registered trademark may be presumed to be abandoned after three consecutive years of non-use.55 Trademark protection can also be lost if the trademark owner engages in “naked licensing” (i.e., not adequately monitoring the use of the mark by its licensees) or fails to take adequate steps to prevent unauthorized use by others.56 For example, because the owners of the marks “aspirin” and “escalator” did not take steps to protect against infringements, the names ultimately became generic terms available for anyone to use.57 2.5 TRADE SECRETS 2.5.1 What Law Governs? Trade secrets have traditionally been protected and enforced under state law. Virtually all states have adopted the Uniform Trade Secrets Act (U.T.S.A.) and many courts still refer to guidance under section 757 of the original Restatement of Torts or section 39 of the Restatement of Unfair Competition. As of May 11, 2016, federal law recognizes a cause of action for misappropriation of trade 51. 15 U.S.C. § 1060(a)(3). 52. Id. § 1060(a)(4). 53. See infra section 4.6.4. 54. 15 U.S.C. §§ 1059(a), 1058(a)–(b). 55. Id. § 1127. If the registration is not challenged, however, the trademark will remain on the registry indefinitely, as long as the owner files an affidavit or declaration of use between five and six years after registration, and by the end of every ten-year period after registration. Id. §§ 1058, 1059. 56. E.g., Eva’s Bridal, Ltd. v. Halanick Enters., 639 F.3d 788 (7th Cir. 2011) (trademark owner must have quality control over licensee’s use to maintain consistent quality, not necessarily high quality, of goods and services using the trademark); Barcamerica Int’l USA Trust v. Tyfield Imps., Inc., 289 F.3d 589 (9th Cir. 2002) (trademark owner engaged in naked licensing and thus forfeited its rights in the mark, resulting in the cancellation of registration). 57. 15 U.S.C. § 1064(3); Bayer Co. v. United Drug Co., 272 F. 505 (S.D.N.Y. 1821); Haughton Elevator Co. v. Seeberger (Otis Elevator Co.), 85 U.S.P.Q. 80 (Comm’r Pat. 1850). 862 The Business Lawyer; Vol. 71, Summer 2016 secrets under the Defend Trade Secrets Act of 2016 (D.T.S.A.).58 While virtually all states have adopted a variation of the Uniform Trade Secrets Act (U.T.S.A.),59 many courts still refer to guidance under section 757 of the original Restatement of Torts or section 39 of the Restatement of Unfair Competition. 2.5.2 What Is a Trade Secret? Trade secrets are defined in the U.T.S.A. as information that derives independent value from not being generally known or readily ascertainable by proper means by others (the novelty test) and that is the subject of reasonable efforts to maintain its secrecy (the secrecy test).60 If both tests are met, information such as formulas, patterns, programs, methods, devices, techniques, and processes are cited by the U.T.S.A. as potential trade secrets. Often information that would not qualify as a true trade secret because it fails to satisfy the novelty or secrecy test can be protected by contractual non-disclosure agreements or covenants not to compete from employees (if permitted under applicable state law). Unlike a patent, which permits the owner to exclude others from using the patented information, ownership of a trade secret does not prevent the independent development of the same information by others. Accordingly, a trade secret is only protected against “misappropriation”61—the acquisition of a trade secret by “improper means,”62 such as industrial espionage, breach of a confidentiality agreement, or theft by an employee. The U.T.S.A. does not, however, expressly prohibit a company’s competitor from analyzing or reverse-engineering the company’s product or process in order to use it in the competitor’s own business; reverse engineering by itself is not considered improper means.63 If a trade secret is incorporated into a product that will be publicly used or distributed, the owner may consider protecting it under patent law (if possible) rather than attempting to claim it as a trade secret. 2.5.3 Maintaining a Trade Secret Trade secrets cannot be protected by filing or registering them in any state or federal jurisdiction. Rather, the owner of a trade secret must take reasonable steps to maintain the secrecy of the information. In certain cases, those steps may include limiting access to the information to only those employees who have a need to know the information in the course and scope of their work, providing locks and other physical security to the location at which the information is held, or obtaining confidentiality agreements from vendors or contractors who must 58. 114 P.L. 153, 130 Stat. 376. The D.T.S.A. amends the Economic Espionage Act, 18 U.S.C. §§ 1831–1839 (2012), which was formerly solely a criminal statute. Among other things, the D.T.S.A. creates a federal civil cause of action for trade secret misappropriation, in parallel with state law. See D.T.S.A. § 2(f) (“Nothing in the amendments made by this section shall . . . preempt any other provision of law.”). 59. U.T.S.A. refers to the Uniform Trade Secrets Act with 1985 amendments. 60. U.T.S.A. § 1(4). 61. Id. § 3. 62. Id. § 1(2). 63. Id. § 1(1). Model IP Security Agreement Introductory Report 863 use the trade secret in performing services for the owner. Additionally, the owner of a trade secret may sue to enjoin another from revealing or utilizing its trade secrets. Under the U.T.S.A. as adopted in most states, in an appropriate case the owner would be entitled to enjoin the use or distribution of the trade secret and would also be able to recover damages for misappropriation. 2.5.4 Duration A trade secret will last as long as the owner is able to maintain the secrecy of the information so that it does not become lawfully available to the public. 2.6 DOMAIN NAMES 2.6.1 What Law Governs? Ownership of domain names is governed by state common law. The use of domain names and websites may be subject to regulation under federal law, however, as well as rules established by international organizations, such as the Internet Corporation for Assigned Names and Numbers (ICANN). 2.6.2 What Is a Domain Name? A domain name is a part of the address of a website on the internet that helps a user to access the site. The complete address, including the domain name, is known as a URL, for Uniform Resource Locator. The domain name is the part of the address consisting of a single word, followed by a period and a short alphabetical indicator known as a top-level domain. For example, americanbar.org is a domain name and org is the top-level domain. Every computer or device on the internet has a unique internet address, consisting of a string of numbers, that allows it to connect with others. The domain name system allows more comprehensible letters and words to be associated with the numeric internet addresses. The creation, registration, and use of a domain name, along with the operation and maintenance of the website, generally involves an interlocking set of contracts among the owner, the domain name registrar, internet service providers, network operators, and the like. 2.6.3 Registration Domain names are registered with one of several registrars recognized by ICANN, and the registration can be transferred from one registrar to another. Most courts have considered a registered domain name to constitute intangible personal property,64 although a few have held that domain names are contractual 64. See, e.g., Kremer v. Cohen, 337 F.3d 1024 (9th Cir. 2003) (under California law, a domain name is intangible personal property and can be subject to claim for conversion); Harrods, Ltd. v. Sixty Internet Domain Names, 302 F.3d 214 (4th Cir. 2002); Caesars World, Inc. v. Caesars-Palace.com, 112 F. Supp. 2d 502 (E.D. Va. 2000) (registered domain name is property subject to in rem action under Anti-Cybersquatting Consumer Protection Act); Schott v. McLear (In re Larry Koenig & 864 The Business Lawyer; Vol. 71, Summer 2016 rights.65 The owner of a domain name may also have trademark rights in the name if it is used in marketing the owner’s business. 2.6.4 Duration Registration is effective for the period provided in the registrar’s contract for services. Ten years is a common period, and renewal is generally permitted. 3 U.C.C. ARTICLE 9—BASIC CONCEPTS 3.1 OVERVIEW AND TERMINOLOGY The U.C.C. as a whole is generally intended to simplify, clarify, and modernize the law governing various kinds of commercial transactions and to make that law uniform among the various jurisdictions.66 One of the ways that U.C.C. Article 9 simplified commercial finance transactions was by collecting and consolidating various traditional but somewhat uncertain methods of using personal property as security.67 The term “security interest” was created as a generic replacement for all those common law arrangements, including chattel mortgages, installment sales, title retention, conditional assignments, collateral assignments, and the like.68 Since its creation in the mid-twentieth century, Article 9 has been revised several times to maintain its modern outlook, and was comprehensively revised in 2001.69 In reality, Article 9 is quite complex, not necessarily uniform, and definitely not simple. The following is a brief overview of the Article 9 concepts that are most relevant in discussing issues affecting the use of IP assets (especially federally registered intellectual property) as collateral. Like the federal IP legal systems, U.C.C. Article 9 has its own terminology; both the differences and the unintended similarities can cause confusion when IP interests are used as collateral. 3.2 SECURITY INTERESTS Under Article 9, a debtor enters into a security agreement that grants a security interest in personal property collateral to a secured party, generally to secure the Assoc., LLC), No. 01-12829, 2004 Bankr. LEXIS 2311, at *1 (Bankr. M.D. La. Mar. 31, 2004) (domain name and contractual right to use name are property rights under Louisiana law); Sprinkler Warehouse v. Systematic Rain Inc., 859 N.W. 2d 527 (Minn. Ct. App. 2015) (domain names and copyright-protected material on websites are subject to garnishment). 65. See, e.g., Dorer v. Arel, 60 F. Supp. 2d 558 (E.D. Va. 1999) (registered domain name is not personal property that can be the object of a judgment lien); Network Solutions, Inc. v. Umbro Int’l, Inc., 529 S.E.2d 80, 87 (2000) (registered domain name is not personal property subject to garnishment, but “the product of a contract for services” between the registrant and the registrar). 66. U.C.C. § 1-103(a). 67. U.C.C. § 9-101 cmt. (1972). 68. See id. § 9-102 & note. 69. Revised Article 9 was approved in 1995 and effective in most states on July 1, 2001. The most recent amendments to Article 9 were approved in 2010 and became effective in most states on July 1, 2013. Model IP Security Agreement Introductory Report 865 payment or performance of an obligation of the debtor to the secured party.70 Article 9 honors substance over form; any transaction creating a security interest (regardless of how the interest may be described) is subject to Article 9 unless excepted.71 3.3 ATTACHMENT AND TITLE A security interest attaches to, and becomes enforceable against, whatever rights the debtor has in the collateral described in a signed security agreement once value has been given; the title to the collateral is not necessarily determinative.72 The security agreement must reasonably identify the collateral, but in most cases does not need to be specific, and can even use the collateral types defined in Article 9 (accounts, goods, general intangibles, inventory, etc.)73 The security agreement can cover collateral acquired later by the debtor.74 For example, the description of the collateral in the security agreement can be as general as “all present and future copyrights” of the debtor. 3.4 PERFECTION The secured party perfects its security interest in most kinds of collateral under Article 9 by filing an appropriate financing statement in the appropriate filing office in the applicable state or other jurisdiction determined under Article 9’s governing law rules.75 Perfection helps protect the secured party’s rights in the collateral against claims by other creditors. A financing statement must contain the names of the debtor and the secured party and must “indicate” the collateral.76 In almost all cases, the financing statement need not describe the collateral specifically, and can even indicate only that the collateral consists of all the debtor’s personal property (an “all-assets” filing).77 If authorized by the debtor, the financing statement can be filed before the security interest is created.78 Financing statements are indexed by the name of the debtor, not the nature or type of collateral; potential creditors need only search under the debtor’s name to find any financing statements filed with respect to the debtor’s personal property.79 70. U.C.C. §§ 9-102(a), 1-201(b)(35). 71. Id. § 9-109. 72. Id. §§ 9-203, 9-202. 73. Id. § 9-108. 74. Id. § 9-204. 75. See id. §§ 9-301, 9-501. 76. Id. § 9-502(a). 77. Id. §§ 9-504, 9-108(c). Such a general “all assets” description will not, however, be effective in a security agreement to identify the collateral. 78. Id. § 9-509(a). 79. Id. § 9-519(c). 866 The Business Lawyer; Vol. 71, Summer 2016 3.5 AFTER-ACQUIRED COLLATERAL A filed financing statement is effective against the indicated collateral at the time the security interest attaches to the collateral, even if attachment comes after the financing statement is filed.80 This means that a secured party can file a single financing statement covering present and future items of collateral, without having to refile or specifically describe after-acquired property. For example, if a security agreement covers the debtor’s interests in all present and future patents, and the financing statement indicates “all patents” as the collateral, then the security interest will be enforceable against (i.e., will attach to) the debtor’s rights in both those patents existing when the security agreement is signed and any patents issued after that date, even if the invention is created and the patent granted after the financing statement is filed. 3.6 PRIORITY Article 9 has extensive rules to determine which creditors have priority—that is, the right to satisfy their obligations out of the collateral before other creditors. The priority rules depend on many factors, including the type of collateral, method of perfection, and the nature of the transaction.81 Generally, however, and subject to several exceptions and conditions: • A security interest has priority over a general unsecured claim. • A perfected security interest has priority over an unperfected security interest. • A perfected security interest has priority over the claims of a person (including a bankruptcy trustee) who becomes a lien creditor82 after the security interest is perfected.83 • A perfected security interest has priority over a later-perfected security interest.84 The most prominent exceptions to these rules are: • A secured party who finances the debtor’s acquisition of some kinds of tangible property or software may, by following certain procedures, have priority as to that property over an earlier-perfected security interest.85 • Third parties acquiring collateral subject to an existing security interest, including a buyer of goods in the ordinary course of business86 and a “li80. Id. §§ 9-308(a), 9-502 cmt. 2. 81. See id. §§ 9-317–9-339. 82. Id. § 9-102(a)(52). 83. Id. § 9-317(a). 84. Id. § 9-322(a)(1). 85. Id. §§ 9-103 (defining purchase-money security interest), 9-324 (priority of purchase-money security interest). 86. Id. §§ 9-320, 1-201(a)(9). Model IP Security Agreement Introductory Report 867 censee in the ordinary course of business,” may take the collateral free of the security interest in certain circumstances.87 3.7 OVERRIDE OF ANTI-ASSIGNMENT CLAUSES Article 9 overrides certain contractual restrictions on a debtor’s ability to use certain intangible property as collateral. Many contracts contain “anti-assignment” provisions that prohibit a party from “assigning” its contract rights to a third party without the other party’s consent, and provisions of state or federal law may prohibit “assignment” of governmental permits or licenses without the consent of the governmental authority. Such provisions often do not clearly distinguish between a party’s absolutely assigning away its rights under contracts or permits and merely granting a security interest in those rights. Article 9 facilitates a debtor’s ability to pledge these intangible assets by making certain anti-assignment provisions included in contracts or created by law ineffective to prevent the creation, attachment, perfection, or, in some cases, enforcement of a security interest in these assets.88 The extent to which Article 9 overrides an anti-assignment clause depends in part on the nature of the collateral.89 If the collateral is a right to payment from a third party (an “account” or “payment intangible”90), an anti-assignment provision is ineffective to prevent a secured party taking a security interest in those rights and, in some circumstances, collecting payments in place of the debtor after default.91 For collateral consisting of “general intangibles”92 (a catch-all category of intangible assets that would include copyrights, patents, trademarks, software, IP licenses, and some other forms of intellectual property), the secured party can take a security interest in the debtor’s rights in the general intangibles, despite an anti-assignment clause, but the secured party’s enforcement rights will be significantly limited. Generally, without consent from the other party to the contract: • The secured party cannot enforce the security interest against the other party; • The other party does not assume any duty to the secured party; • The other party does not have to recognize the security interest, render performance to the secured party, or accept performance by the secured party; and 87. Id. § 9-321; see infra section 4.6.1. 88. Id. §§ 9-406(d)–(e), 9-408. 89. The nature of the transaction—as a true sale or a secured payment obligation—is also relevant in some cases. Id. §§ 9-406(e), 9-408(b). 90. Id. § 9-102(a)(2), (61). 91. Id. § 9-406(a), (d). 92. Id. § 9-102(a)(42). 868 The Business Lawyer; Vol. 71, Summer 2016 • The secured party may not use or assign the debtor’s rights under the contract.93 3.8 ENFORCEMENT Under Article 9, after default, a secured party may sell, lease, license, or otherwise dispose of collateral, subject to certain conditions.94 The disposition can be private or public, but every aspect of the disposition must be commercially reasonable.95 While the requirement of commercial reasonableness cannot be waived,96 the security agreement may set the standards by which commercial reasonableness will be measured, provided that the standards are not themselves manifestly unreasonable.97 The secured party generally cannot purchase the collateral at a private sale,98 and it cannot simply take or keep the collateral to satisfy the secured debt without satisfying certain conditions, including the debtor’s written consent after the default.99 The secured party may also collect amounts payable on the collateral and enforce the debtor’s rights under contracts included in the collateral.100 The secured party’s rights to enforce a contract against the other party will generally be subject to the other party’s defenses and rights of setoff against the debtor, and it may be further restricted if the contract prohibits assignment by the debtor.101 4 INTERSECTION OF FEDERAL IP LAW AND U.C.C. ARTICLE 9 4.1 PERFECTING A SECURITY INTEREST 4.1.1 Which Law Applies? The federal IP registration systems are generally intended to create a “chain of title” to each IP asset, allowing the current position to be traced back to the original registration. Assignments, mergers, and name changes generally must be recorded with the applicable IP filing office in order for subsequent owners of the intellectual property to be put on notice. The Copyright Office and the PTO will also accept lien filings (and lien releases) for recording as long as they refer to the 93. Id. § 9-408(d)(1)–(4), (6); see also id. § 9-408 cmt. 2, ex. 1. 94. Id. §§ 9-601–9-624. 95. Id. § 9-610(b). 96. Id. § 9-602(7). 97. Id. § 9-603(a). 98. Id. § 9-610(c)(2) (secured party can purchase collateral at private sale only if the collateral is of a kind that is customarily sold on a recognized market or the subject of widely distributed standard price quotations). 99. Id. § 9-620. Generally, the debtor cannot waive its rights in connection with the secured party’s acceptance of collateral in satisfaction of the debt, and can only waive certain other rights in an authenticated record after default. Id. §§ 9-602(10), 9-624. 100. Id. § 9-607(a). 101. See id. § 9-408(d); supra section 3.6. Model IP Security Agreement Introductory Report 869 registration or application information for each item.102 There is uncertainty, however, regarding the extent to which the federal systems for registering transfers of title are intended to cover transfers of partial interests, such as security interests. One source of confusion is the lack of a common terminology. The federal rules and recording systems were established well before the original version of U.C.C. Article 9, and the few modifications have not dealt with the use of IP assets as collateral.103 Key U.C.C. concepts, such as perfection, do not seem to have any analogue in the federal system, while some common terms have different meanings in the federal IP laws and U.C.C. Article 9. The federal IP statutes generally speak of “assignments” or “transfers” of IP assets, but do not use the U.C.C. terms “security interest,” “secured party,” or “purchaser”; the statues thus address the rights of “assignees,” “transferees,” and even “mortgagees” in some cases, but not the rights of “secured parties.”104 Under the federal IP statutes, it is not clear whether “assignment” and “transfer” apply to a transfer of a partial interest, such as a security interest; some courts have interpreted the terms to refer solely to ownership transfers,105 but the question remains unsettled. The U.C.C., on the other hand, explains that, depending on the context, “assignment” or “transfer” may refer to the outright assignment/transfer of an ownership interest or to the assignment/transfer of a security interest or other limited interest.106 4.1.2 Preemption Under Article VI of the U.S. Constitution, the federal laws of the United States “shall be the supreme law of the land.” If the federal IP laws govern transfers of 102. The PTO accepts only specific types of documents for recording, and it then cross-references each recorded document to the original registration; the PTO can therefore generate a report showing all documents recorded against a particular patent or trademark. The Copyright Office will record any document “pertaining to a copyright” (17 U.S.C. § 205(a)), as long as it contains the original registration number. The Copyright Office does not cross-reference or link the recorded documents and registrations, but can generate a report showing every document that refers to a particular registration or party. 103. See, e.g., Moldo v. Matsco, Inc. (In re Cybernetic Servs.), 252 F.3d 1039, 1044 (9th Cir. 2001) (“As is often true in the field of intellectual property, we must apply an antiquated statute in a modern context.”). 104. For instance, although U.C.C. Article 9 had been in effect for several decades when the Copyright Act was comprehensively amended in 1976 (effective January 1, 1978), the amendments did not specifically address “security interests.” Instead, the amendments defined mortgages, hypothecations, and exclusive licenses as “transfers of copyright ownership,” and addressed the priority of claims of transferees. The Copyright Act does recognize “security interests” as such, but only in a limited context related to collective bargaining agreements. 28 U.S.C. § 4001(c) (2012). 105. See, e.g., Cybernetic Servs., 252 F.3d at 1049–50 (discussing historical meanings of assignment, grant, and conveyance as transfers of title, and equating “hypothecation” to a security interest). 106. See U.C.C. § 9-102 cmt. 26 (regarding the terms “assignment” and “transfer,” “no significance should be placed on the use [in Article 9] of one term or the other. Depending on the context, each term may refer to the assignment or transfer of an outright ownership interest or to the assignment or transfer of a limited interest, such as a security interest.”). 870 The Business Lawyer; Vol. 71, Summer 2016 partial or limited interests107 like security interests in registered IP assets, they would preempt the U.C.C. rules; the federal recording system would then provide the only means to give public notice of an interest akin to a U.C.C. security interest. The U.C.C. recognizes, as it must, the preemptive power of federal law: Article 9 “does not apply . . . to the extent that a statute, regulation, or treaty of the United States preempts” it. However, the U.C.C. defers to federal law “only when and to the extent that it must.”108 Article 9 excepts from its perfection rules certain transactions that are subject to other legal systems. In particular, the filing of a U.C.C. financing statement “is not necessary or effective to perfect a security interest in property subject to . . . a statute, regulation, or treaty of the United States whose requirements for a security interest’s obtaining priority over the rights of a lien creditor with respect to the property preempt” Article 9’s requirement for a filed financing statement.109 Courts addressing this preemption issue have generally found that: • the Copyright Act includes requirements for a security interest to obtain priority over the rights of a lien creditor, and those requirements preempt Article 9’s perfection-by-filing requirements for federally registered copyrights,110 but • neither the Patent Act nor the Lanham (Trademark) Act includes requirements for a security interest to have priority over the rights of a lien creditor and therefore neither act preempts Article 9’s perfection rules.111 107. The federal IP laws generally permit the owner of a registered IP asset to transfer “partial” interests in the nature of different kinds of rights (e.g., performance rights and distribution rights in a copyrighted work) or rights that can be exercised only in certain geographic areas (e.g., exclusive right to use a trademark in Texas and Oklahoma). The federal laws do not necessarily govern all of the contractual rights among transferors and transferees. See infra note 133. The question here is whether a security interest is the kind of “partial interest” that would be governed by the federal IP laws. 108. U.C.C. § 9-109(c)(1) cmt. 8. 109. Id. § 9-311 (addressing federal preemption as to methods of perfection). 110. Aerocon Eng’g, Inc. v. Silicon Valley Bank (In re World Auxiliary Power Co.), 303 F.3d 1120, 1126 (9th Cir. 2002) (Copyright Act’s use of “mortgage” as a type of “transfer” is properly read to include security interests under U.C.C. Article 9); In re Nacio Sys., Inc., 410 B.R. 38 (Bankr. N.D. Cal. 2009); see also In re AEG Acquisition Corp., 127 B.R. 34 (Bankr. C.D. Cal. 1991) (as to registered copyrights), aff’d, 161 B.R. 50 (9th Cir. BAP 1993); In re Peregrine Entm’t, Ltd., 116 B.R. 194 (C.D. Cal. 1990) (same). 111. See, e.g., In re Tower Tech, Inc., 67 F. App’x 521 (10th Cir. 2003) (filing with PTO is ineffective to perfect security interest in patents); Moldo v. Matsco, Inc. (In re Cybernetic Servs.), 252 F.3d 1039 (9th Cir. 2001) (U.C.C. filing is effective to perfect security interest in patents); Trimarchi v. Together Dev. Corp., 255 B.R. 606 (D. Mass. 2000) (U.C.C. filing is necessary to perfect security interest in trademark and PTO recording is ineffective); In re Coldwave Sys. LLC, 368 B.R. 91 (Bankr. D. Mass. 2007) (U.C.C. filing is necessary to perfect security interest in patents); In re 199Z, Inc., 137 B.R. 778 (Bankr. C.D. Cal. 1992) (U.C.C. filing is necessary to perfect security interest in a trademark and PTO recording was ineffective); In re Chattanooga Choo-Choo Co., 98 B.R. 792 (Bankr. E.D. Tenn. 1989) (U.C.C. filing, not federal registration, is required to perfect security interest in trademarks); In re Roman Cleanser Co., 43 B.R. 940 (Bankr. E.D. Mich. 1984) (U.C.C. filing is sufficient to perfect security interest in trademark and PTO recording is not necessary), aff’d, 802 F.2d 207 (6th Cir. 1986). Model IP Security Agreement Introductory Report 871 Although only a few courts have addressed these perfection issues, the rulings cited above have been prominent and persuasive enough that the general understanding among finance and IP lawyers is that a security interest in registered copyrights can only be perfected by a filing in the Copyright Office, while a security interest in patents or trademarks can only be perfected by a U.C.C. filing.112 Perfection will protect a security interest against claims of lien creditors (including a bankruptcy trustee) and unperfected and later-perfected security interests.113 Perfection is a term of art under U.C.C. Article 9, however, and the extent to which perfection will also protect the secured party against the claims of licensees and good-faith purchasers of federally registered intellectual property remains unsettled. Accordingly, the current practice for a cautious secured party with federally registered IP collateral is to file both a U.C.C. financing statement in the appropriate state office and a security document in the appropriate federal filing office.114 The following sections discuss the reasons for this caution. Secured parties often take precautionary approaches, seeking maximum protection by trying to comply with all competing and potentially contradictory legal systems, protocols, and practices affecting perfection.115 This approach, along with due diligence and careful drafting, can address some of the risks, but compliance with multiple filing systems can be duplicative, expensive, and time-consuming. Parties often seek to balance the risks and benefits by negotiating carve-outs, limitations, exceptions, and other terms. Some examples of such provisions are included in the Model Agreement.116 4.2 REASONS FOR DUAL FILING 4.2.1 Copyrights For Article 9 perfection purposes, compliance with the Copyright Act’s requirements for obtaining priority over the rights of a lien creditor is “equivalent” to filing an Article 9 financing statement.117 Nonetheless, secured parties will also want to file an actual financing statement covering all copyright collateral in the appropriate U.C.C. filing office. An “equivalent” federal recording may not cover non-copyright collateral, such as proceeds and other rights. More important, it probably will not cover unregistered copyrights. 112. The federal IP laws do not use the term “perfection”; references here to “perfecting a security interest” in a copyright through a filing in the Copyright Office mean that the filing will be sufficient to give the secured party’s interest priority over lien creditors (including a bankruptcy trustee) and unperfected and later-perfected security interests. 113. See supra section 3.6. 114. The exhibits to the Model Agreement include short-form security agreements for recording liens in the relevant federal IP filing offices. 115. I.e., the secured party’s well-known “belt and suspenders.” 116. See, e.g., section 1.4 (“After-acquired Collateral”), note 30 (possible knowledge and materiality qualifications), and note 65 (possible limitation on perfection requirements) in the Model Agreement. 117. U.C.C. § 9-311(b). 872 The Business Lawyer; Vol. 71, Summer 2016 Some courts have recognized that it is a practical impossibility to register all copyrightable material; a copyright can attach immediately to any tangible expression of an idea, regardless of whether the expression will remain in that initial form. These courts have held that the Copyright Act does not preempt Article 9 as to perfection of a security interest in an unregistered copyright.118 The prevailing view now is that an unregistered copyright is a general intangible in which a security interest is perfected by filing a financing statement in accordance with Article 9, not by recording in the Copyright Office.119 The risk remains, of course, that a security interest in an unregistered copyright perfected by a U.C.C. filing will become unperfected if the copyright is later registered. The Model Agreement includes provisions intended to reduce that risk, including procedures facilitating the secured party’s ability to record its security interest in the Copyright Office immediately upon the debtor’s registration of a copyright or filing of a copyright application.120 4.2.2 Patents and Trademarks Filing a financing statement covering patents or trademarks in the appropriate U.C.C. filing office should give a secured party priority over an unperfected or later-perfected security interest and a later lien creditor, including a bankruptcy trustee. But the extent to which Article 9’s other priority rules might be preempted by federal patent or trademark law remains an unsettled question, especially where a later purchaser or licensee of the intellectual property claims that it takes free of the security interest under federal law. To some extent, the federal patent and trademark laws protect a purchaser who records the transfer of the IP asset in the federal filing office against claims of later transferees; a purchaser whose transfer is not recorded may be subject to the rights of a later transferee that acquires the IP asset in good faith, for value, and without knowledge of the first purchase.121 118. See, e.g., Aerocon Eng’g, Inc. v. Silicon Valley Bank (In re World Auxiliary Power Co.), 303 F.3d 1120, 1131 (9th Cir. 2002). 119. A few older cases had held that recording in the Copyright Office would be necessary to perfect a security interest in materials for which a copyright application could be, but had not been, filed with the Copyright Office. In re AEG Acquisition Corp., 127 B.R. 34 (Bankr. C.D. Cal. 1991), aff’d, 161 B.R. 50 (9th Cir. BAP 1993); In re Avalon Software, Inc., 209 B.R. 517 (Bankr. D. Ariz. 1997). These decisions temporarily led some secured parties to impose the impracticable requirement that debtors register all their copyrights. These decisions were heavily criticized and have been generally discredited. The Aerocon court expressly rejected the holdings in AEG Acquisition and In re Avalon that recording in the Copyright Office would be necessary to perfect a security interest in an unregistered copyright. See also MCEG Sterling, Inc. v. Phillips Nizer Benjamin Krim & Ballon, 646 N.Y.S.2d 778, 780 (Sup. Ct. 1996) (Peregrine ruling is “questionable” as to the need to register security interests in accounts receivable arising from copyrights). 120. See section 1.4.4 (“Notice of Copyright Applications”) and notes 16 & 17 of the Model Agreement. 121. See supra sections 4.2.1 (Copyright Act) & 4.2.2 (Patent and Lanham Acts). Although the language used in the different statutes is not identical, this kind of “bona fide purchaser” is essentially the opposite of a lien creditor, such as a bankruptcy trustee, who does not acquire an asset in good faith and does not provide value. Model IP Security Agreement Introductory Report 873 These are not the results one would expect under Article 9. For example, suppose a secured party files a financing statement covering a patent in the appropriate U.C.C. filing office, but does not record a security document in the PTO. Six months later, a third party purchases the patent without actual notice of the security interest, and it records its interest in the PTO. If all patent priority issues are determined under Article 9, as state law,122 then the purchaser’s interest in the patent will be subject to the earlier perfected security interest regardless of the lack of a PTO recording.123 But if the U.C.C. determines priority only as among secured parties and lien creditors, with federal IP law determining the respective rights of secured parties and purchasers, then the purchaser would take free of the unrecorded security interest.124 Because of this uncertainty, many secured parties record security interests in patents and trademarks in both the U.C.C. filing office and the PTO. If a court were to hold that federal law preempts Article 9 as to claims of parties acquiring ownership of a patent or trademark, the secured party’s timely federal recording could provide notice of its security interest to potential purchasers searching the federal records. 4.3 ASSIGNMENT LANGUAGE VS. GRANTING LANGUAGE Historically, lenders’ counsel unsure about the federal statutory provisions dealing with the “assignment” of IP interests would use assignment and conveyance language to create a security interest. Another traditional approach was to structure a secured transaction like an assignment of real property rents: The borrower would “assign” the intellectual property to the lender, who would license the intellectual property back to the borrower, who could exercise all the rights of an owner until a default, which would terminate the license.125 In light of the prevailing case law, it is not necessary to use assignment language to create a security interest in registered IP assets.126 In addition, assignment language has possible drawbacks: 122. See U.C.C. § 9-311 cmt. 5 (perfection of a security interest under a preemptive federal statute has all the consequences of perfection under Article 9); Moldo v. Matsco, Inc. (In re Cybernetic Servs.), 252 F.3d 1039, 1058 n.9 (9th Cir. 2001) (former U.C.C. section 9-302(3) governs only the “where to file” question, while issues left unresolved by the federal statute, such as priority, are resolved by looking to Article 9). 123. U.C.C. § 9-317(d). 124. See In re Transp. Design & Tech., Inc., 48 B.R. 635, 639 (Bankr. S.D. Cal. 1985) (U.C.C. governs perfection of a security interest in a patent, but federal law governs rights of bona fide purchasers, and they would prevail over security interest not recorded in the PTO). 125. For instance, in Clorox Co. v. Chemical Bank, 40 U.S.P.Q.2d 1098 (T.T.A.B. 1996), the transaction at issue was structured as this kind of “assignment-with-license-back.” See infra note 131. 126. See, e.g., In re Roman Cleanser Co., 43 B.R. 940 (Bankr. E.D. Mich. 1984) (security interest in a trademark is not equivalent to an assignment under the Lanham (Trademark) Act), aff’d, 802 F.2d 207 (6th Cir. 1986). 874 The Business Lawyer; Vol. 71, Summer 2016 • A secured party that is an assignee of a patent may be considered an owner and successor-in-title and thus be a necessary party to any infringement suit.127 • A secured party that is an assignee of a trademark may be considered the trademark owner and licensor. As such, the secured party would be required to exercise quality control over the products and services bearing the trademark, whether provided by the debtor or its licensees, at the risk of invalidating the mark.128 • An assignment of a trademark without the accompanying goodwill of the business (sometimes called an “assignment in gross”) can invalidate the mark or weaken its enforceability and value.129 If a secured party is an assignee of a trademark, the security interest could constitute an assignment in gross, with negative consequences for both the secured party and the debtor.130 • Since a secured party is not operating the debtor’s business, an assignment of trademark collateral that inadvertently includes an ITU application may invalidate both the application and the mark itself.131 In the absence of law positively stating that creating a security interest is not the kind of assignment that would threaten the trademark application and any resulting registration, the practice has developed of conditionally excluding ITU applications from the collateral package, but only to the extent that, and as long as, the security interest would be treated as a prohibited assignment.132 127. See 35 U.S.C. §§ 281.35 100(d) (2012); In re Neurografix (360) Patent Litig., 5 F. Supp. 3d 146 (D. Mass. 2014) (an assignee that only has exclusionary right cannot bring infringement suit without joining the assignor patentee). For recording purposes, the PTO treats a “conditional assignment” as an “absolute assignment” regardless of whether the condition, such as payment of money, has been fulfilled, and the “assignment” can only be cancelled by both parties or a court order. 37 C.F.R. § 3.56 (2015). If a security interest in a patent is structured as a conditional assignment and recorded, the secured party could be treated as an assignee. 128. See supra text accompanying note 56. 129. See 15 U.S.C. § 1060(a) (2012); Brown Bark II, L.P. v. Dixie Mills, LLC, 732 F. Supp. 2d 1353 (N.D. Ga. 2010) (secured party that bid on debtor’s trademarks at its own Article 9 foreclosure sale but did not actually use the marks in business had received an “assignment in gross” and had no enforceable rights in the marks). 130. Roman Cleanser Co., 43 B.R. at 947 (security interest in a trademark along with formulas and customer lists satisfied the goodwill requirements of the Lanham (Trademark) Act). 131. See supra section 2.4.4; 15 U.S.C. § 1060(a). In Clorox, the trademark collateral included an intent-to-use (ITU) application, which had been filed in the PTO, but for which the required evidence of use of the trademark had not been accepted by the PTO. Clorox Co. v. Chemical Bank, 40 U.S.P.Q.2d 1098, 1100 (T.T.A.B. 1996). In response to a later challenge, the court found that the trademark registration itself (not merely the lien) had been invalidated by the premature “assignment” of the ITU application without the corresponding goodwill and operating business. Id. at 1105. Because Clorox dealt with an actual “assignment” of the trademarks and ITU application, the same analysis would not necessarily apply to the grant of a security interest that is not structured as an “assignment.” 132. See section 1.2.2 of the Model Agreement. Model IP Security Agreement Introductory Report 4.4 FEDERAL RECORDING VS. 875 U.C.C. FILING SYSTEMS The federal IP recording systems are based on the specific registered item, not the name of the person with an interest in the item. Consequently, a secured party’s document recorded in the Copyright Office or PTO would not be effective if it merely described the debtor’s collateral by category (e.g., “all registered copyrights” or “all patents” or “all registered trademarks”); rather, the recorded security document must specifically identify each item of collateral, generally by registration or application number. Similarly, potential creditors cannot easily determine the lien status of all of a debtor’s IP assets by simply searching in the debtor’s name, but must usually search item-by-item and then work through the sometimes chaotic results. Moreover, transfer and assignment documents must include the item’s registration number; therefore, a transfer or assignment of (or security interest in) future rights in IP assets cannot be effectively recorded, since no registration number would exist. (These requirements prevent the kind of floating lien often used in inventory financing.) All this is in marked contrast to the U.C.C. filing system, which indexes security interests by the debtor’s name, does not require item-by-item identification of collateral, and permits perfection by filing against future collateral. As with real property collateral, a secured party will want to search the IP filing office records, not only to discover other liens, but to make sure that the debtor has good title to its IP assets. Searches are somewhat easier in the PTO, which maintains an online database of recordings against each registration, so that the chain of title can be followed. The Copyright Office records are not so well-organized; a search and the necessarily detailed review of search results can take much longer and cost much more than a U.C.C. search.133 Specific identification of each IP registration or application included in the collateral is thus necessary for recording a lien in the Copyright Office or PTO. The common practice is to identify each item of registered intellectual property in schedules to the security agreement and then attach the schedules to the documents to be recorded. The schedules also give the secured party information for monitoring the status of collateral registrations and applications and exercising its rights to collect on or dispose of collateral after default. 4.5 SECURITY INTERESTS IN “NON-ASSIGNABLE” IP LICENSES IP licenses are often described as “non-assignable” in a kind of shorthand to indicate that the license contains provisions prohibiting the licensee’s assignment of the license without the licensor’s consent. Even if a license is silent as to the licensee’s ability to assign its rights, IP lawyers consider the license to be non- 133. In the Copyright Office, there is a significant lag time between the submission of a nonelectronic document for recording and its actual recording. Consequently, the “chain of title” reflected in the records of the federal IP recording offices may not be complete or correct. For copyright assignments (which cannot be submitted electronically), the lag can be as much as one year. 876 The Business Lawyer; Vol. 71, Summer 2016 assignable.134 Under federal case law, generally, unless the license agreement provides otherwise, a nonexclusive patent, trademark, or copyright license gives the licensee only personal rights to, not property rights in, the licensed intellectual property; the license would thus not be assignable without the licensor’s consent. These are not statutory rules, but judicially developed contract interpretation default rules; the parties can (but generally do not) contract around them.135 Despite the presumption of non-assignability in IP practice, an anti-assignment provision in an IP license may not prevent the licensee’s grant of a security interest in the license. U.C.C. Article 9 views a party’s creation of a security interest in its rights under a contract as different from the type of “assignment” that may be prohibited by the contract terms. Thus, Article 9 generally permits a debtor to grant a security interest in its rights under a contract even if the contract or a statute prohibits “assignment.” However, Article 9 severely limits the rights of the secured party against the other party to the contract, thus averting many of the negative consequences faced by an IP licensor if its licensee assigns the license to an unapproved third party.136 Although courts have not directly determined whether federal law preempts the U.C.C. so as to make an anti-assignment clause in an IP license effective to prevent the grant of a security interest,137 courts frequently rule that not all issues related to IP contracts are necessarily governed by federal law.138 Even if federal law preempts Article 9 on this point, a court may still interpret the policy underlying Article 9’s rules of free assignability with limitations as compatible with federal policy, and find that a security interest in a licensee’s or licensor’s rights under an IP license need not be treated as a prohibited assignment in all circumstances.139 134. See, e.g., Elaine D. Ziff, The Effect of Corporate Acquisitions on the Target Company’s License Rights, 57 BUS. LAW. 767 (2002). 135. In re XMH Corp., 647 F.3d 690 (7th Cir. 2011) (rule that trademark licenses are not assignable without authorization is a sensible default rule); In re Trump Entm’t Resorts, Inc., 526 B.R. 116, 124 (Bankr. D. Del. 2014) (parties to a trademark license agreement are free to contract around the default rule of non-assignability); In re Golden Books Family Entm’t, 269 B.R. 311 (Bankr. D. Del. 2001) (nonexclusive copyright licenses do not create ownership rights and are not assignable over the licensor’s objection). 136. See supra section 3.7. 137. But see U.C.C. § 9-408 cmt. 9 (“This section does not override federal law to the contrary. However, it does reflect an important policy judgment that should provide a template for future federal law reforms.”). 138. See, e.g., as to copyrights, Ryan v. Editions Ltd. W., Inc., 786 F.3d 754, 761 (9th Cir. 2015) (Copyright Act does not generally preempt contract-based claims under state law); Gaiman v. McFarlane, 360 F.3d 644, 652 (7th Cir. 2004) (citing Saturday Evening Post Co. v. Rumbleseat Press, Inc., 816 F.2d 1191, 1194–95 (7th Cir. 1987)) (like a suit to enforce a copyright license, a suit for an accounting of profits between copyright co-owners arises under state law, not federal law, and there is no issue of copyright law); Broadcast Music Inc. v. Hirsch, 104 F.3d 1163, 1167–68 (9th Cir. 1997) (state law, not federal law, determined the effect of copyright owner’s assignment of royalties). 139. See Valley Bank & Trust Co. v. Spectrum Scan, LLC (In re Tracy Broad. Corp.), 696 F.3d 1051 (10th Cir. 2012). In confirming the validity of a debtor’s grant of a security interest in proceeds of its FCC license notwithstanding federal statutory prohibition of an assignment of such a license without FCC consent, the court found support in U.C.C. section 9-408, stating that section 9-408 “does for state licenses what FCC policy does for FCC licenses,” and noting that section 9-408 and its comments recognize that a lien on the right to sale proceeds of a government license can attach Model IP Security Agreement Introductory Report 877 The Model Agreement leaves these arguments open by excluding from the collateral package an IP license if (and only as long as) it is subject to a provision of law or of the IP license that is effective and enforceable to prevent the grant of a security interest, whether or not the provision would prevent an absolute assignment of all the debtor’s rights.140 Disputes about retention and assignability of IP licenses often arise in bankruptcy cases, when a debtor wants to assume and/or assign its rights under an IP license. In bankruptcy, a secured party with collateral consisting of a debtor’s rights as licensee under an IP license faces an inherent risk that this collateral may evaporate if the licensor objects to the debtor’s assumption or assignment of the license.141 The treatment of IP licenses in bankruptcy involves unresolved issues, and it is beyond the scope of this report.142 4.6 IP LICENSE CONSIDERATIONS The collateral may include intellectual property licensed by the debtor to licensees or licensed by third parties to the debtor. The rights of a secured party holding a security interest in a debtor’s rights under an IP license will depend on whether the debtor is a licensor or a licensee, the type of IP asset licensed, and whether the license is exclusive or nonexclusive. Federal law addresses some of these factors, by statute or otherwise, with results that can differ from the results expected under Article 9. If the debtor is a licensor, the secured party will be concerned that the debtor’s licensees might take the licensed intellectual property free of the security interest, or that licenses granted by the debtor would remain effective after foreclosure of the security interest. If the debtor is a licensee, the secured party will be concerned about limitations on the debtor’s rights under the license, in addition to possible restrictions on the debtor’s ability to assign or grant a security interest in its licensee rights.143 when a lender extends credit to a licensee, so long as the governmental interest in regulation of the license is not infringed. Id. at 1064; see also U.C.C. § 9-408 cmt. 9. 140. See section 1.2.3 (“Restricted IP Licenses”) of the Model Agreement. 141. See, e.g., In re Trump Entm’t Resorts, Inc., 526 B.R. 116, 124 (Bankr. D. Del. 2015) (debtor trademark-licensee cannot assume or assign trademark license because trademark law prohibits assignment without consent of licensor). Although courts differ widely as to the correct statutory analysis, Bankruptcy Code section 365 generally permits a bankruptcy trustee or debtor in possession to “assume” and/or “assign” some kinds of existing contracts even if “applicable law” would otherwise “prohibit, restrict, or condition the assignment” of the contract, with an exception for circumstances where the “applicable law” would still bar assumption or assignment of the particular contract at issue. 11 U.S.C. § 365(f) (2012); see, e.g., Perlman v. Catapult Entm’t (In re Catapult Entm’t), 165 F.3d 747 (9th Cir. 1999) (debtor licensee could not assume patent license over licensor’s objection). Although the language in Bankruptcy Code section 365 and in U.C.C. section 9-408 as to laws or contract terms that prohibit, restrict, or condition the assignment of a contract may be similar, Article 9 does not include the same exceptions as the Bankruptcy Code. 142. Other Bankruptcy Code provisions deal with intellectual property. See, e.g., In re Crumbs Bake Shop, Inc., 522 B.R. 766 (Bankr. D.N.J. 2014) (despite debtor’s sale of all its assets, non-debtor trademark licensees could still elect to maintain licenses in place, under Bankruptcy Code section 365(n), even though it technically does not cover trademarks). 143. See supra section 4.5. 878 The Business Lawyer; Vol. 71, Summer 2016 4.6.1 Article 9 “Licensee in Ordinary Course” Under Article 9, an IP licensee generally takes the licensed IP rights subject to any previous security interest.144 There is, however, an exception to this rule: If the license is nonexclusive, a “licensee in ordinary course of business”—that is, a person that in good faith, without knowledge that the license violates the rights of another person, acquires the license in the ordinary course from a person in the business of licensing such property—will take the licensed intellectual property free of a previously perfected security interest, even if the licensee knows of the security interest.145 The federal IP laws take a different approach. 4.6.2 Exclusive Copyright Licenses146 Debtor as licensor. Under Article 9, an exclusive licensee is not a licensee in ordinary course of business; accordingly, the exclusive license would be subject to any security interest that attaches to the licensed property.147 However, under federal law, an exclusive licensee of a copyright may in some circumstances take free of a security interest. Under the Copyright Act, the grant of an exclusive license of a copyright is a type of “transfer of copyright ownership.” Most recent courts decisions have also, explicitly or implicitly, viewed a security interest in a copyright as being a “transfer of copyright ownership.”148 A secured party and an exclusive licensee from the debtor would thus be competing transferees of the license, subject to the rules on “conflicting transfers.”149 If the secured party properly records its security interest in a registered copyright in the Copyright Office within the applicable one or two-month grace period, the recorded security interest should prevail over a later conflicting exclusive license.150 But if the secured party does not properly record within the grace period, a later exclusive license could prevail over the earlier security interest if the licensee takes its license in good faith, for valuable consideration, and without notice of the security interest, and properly records its license before the secured party records its security interest. A secured party that immediately and properly records its security interest may be surprised to find itself behind an earlier exclusive licensee if the licensee 144. U.C.C. §§ 9-201(a), 9-315(a)(1). 145. Id. § 9-321(a), (b). 146. Relevant Copyright Act provisions on recording, registration, priority, and related matters addressed in this section 4.6 are summarized in supra section 2.2.4. 147. U.C.C. § 9-315(a)(1). 148. See supra note 109. 149. The circumstances in which the respective interests of a secured party and an exclusive licensee would “conflict” in a way that would allow one of them to “prevail over” the other are not clear. Possibly there is no “conflict” until the secured party forecloses its lien. Possibly no conflict arises unless both transfers are of the same type or unless the grants are identical. Notwithstanding these theoretical concerns, a secured party will likely be content with a perfected security interest covering the debtor’s rights to collect royalties or license fees generated under the license. See supra note 118. 150. See supra section 2.2.4. Model IP Security Agreement Introductory Report 879 records its license within the applicable grace period. For example, if a security interest is granted on January 20 and properly recorded that same day, the secured party may still find itself behind an undisclosed exclusive licensee that took its license on January 10 but did not record until January 30. An earlier exclusive license still in its grace period is like a secret lien, in that a search of Copyright Office filings would not reveal it.151 Debtor as licensee. If the debtor is an exclusive licensee of a registered copyright, the secured party should consider having the debtor record its license in the Copyright Office against the copyright registration, and then record its security interest in the recorded license. This two-step process minimizes the risk that a transferee of the debtor’s license rights (or a transferee of the licensed copyright itself) would take those rights free of the security interest. Courts have not yet addressed these issues. As a practical matter, however, outside some industries, such as motion pictures152 or music, or with respect to exclusive copyrights that are essential to the transaction or the debtor’s business, secured parties do not generally record liens in the Copyright Office against copyrights licensed to the debtor.153 4.6.3 Nonexclusive Copyright Licenses While the grant of a nonexclusive copyright license is not a “transfer of copyright ownership” under the Copyright Act, the Act protects a nonexclusive licensee, even if the license is not recorded and the licensee does not provide value to the licensor.154 If a debtor grants a security interest in a copyright and later grants a third party a written nonexclusive license to use the copyright, and the license and the security interest conflict with each other,155 the licensee will prevail if the license is taken in good faith without notice of the security interest and before the security interest is recorded.156 If the debtor’s written grant of a nonexclusive copyright license precedes its grant of the security interest, the licensee will prevail, regardless of whether the security interest or the license are recorded.157 151. Documents submitted to the Copyright Office may not be recorded for several months. The date of recording, however, is the date when the proper document, in proper form, and fees are all received in the Copyright Office. 37 C.F.R. § 201.4(e) (2015). 152. In film financing, for instance, the owner of the film copyright may grant an exclusive license in (or assign) the rights to distribute the film (and collect royalties) to a separate distribution company. A lender to the distribution company is likely to require the recordation of both the exclusive license (or assignment) and the security interest in the Copyright Office. 153. Parties may also resist recording licenses when they would prefer to avoid the public disclosure of their relationships and other business terms. 154. 17 U.S.C. § 101 (2012). 155. See supra note 149. 156. 17 U.S.C. § 205(e) (2012). 157. See, e.g., CERx Pharm. Partners, LP v. RPD Holdings, LLC (In re Provider Meds, LP), No. 1330678-BJH, 2014 Bankr. LEXIS 3519, at *10–13 (Bankr. N.D. Tex. Aug. 20, 2014) (in lender’s suit against debtor for fraudulent inducement and tortious interference, alleging that debtor had reduced software collateral value by granting perpetual, royalty-free licenses to third parties, court held that 880 The Business Lawyer; Vol. 71, Summer 2016 These results under the Copyright Act differ from the results under Article 9. Under Article 9, a nonexclusive licensee will take free of an existing security interest only if its licensor created the security interest, is in the business of licensing such property, and grants the license in the ordinary course of its business.158 The Copyright Act’s protections, in contrast, do not depend on who created the security interest or the nature of the licensor’s business or the license transaction. On the other hand, the licensee’s knowledge of the security interest would leave it unprotected under the Copyright Act, whereas Article 9 protects a licensee with knowledge of the security interest as long as the licensee does not have knowledge that the license violates another person’s rights in the copyright license.159 4.6.4 Patent and Trademark Licenses Neither the Patent Act nor the Lanham (Trademark) Act directly addresses the rights of licensees. However, under well-established U.S. patent and trademark law principles, a license grant, whether exclusive or nonexclusive, continues in force when title to the patent or mark is transferred to a new owner, even if the new owner had no knowledge of the license and even if the license is not recorded.160 A security interest, of course, can only attach to the rights that the debtor has in the collateral. A secured party thus could find that its security interest in patent or trademark collateral loses to patent and trademark licenses previously granted by the debtor, and also loses to nonexclusive licensees qualifying as licensees in the ordinary course of business under Article 9. 4.7 ENFORCEMENT OF IP SECURITY INTERESTS For copyright, patent, or trademark collateral, a secured party will typically be able to use Article 9’s normal enforcement rules after default. Federal law generally does not preempt state law as to foreclosures and contract enforcement.161 the licenses did not create “encumbrances,” and that debtor therefore had not breached its representations or covenants as to priority and absence of encumbrances). 158. U.C.C. § 9-321(a). 159. Id. § 9-321(a), (b). 160. See, e.g., Moldo v. Matsco, Inc. (In re Cybernetic Servs.), 252 F.3d 1039, 1052 (9th Cir. 2001) (citing Keystone Foundry v. Fastpress Co., 272 F. 242, 245 (2d Cir. 1921) (patents)); ICEE Distributors, Inc. v. J&J Snack Foods Corp., 325 F.3d 586, 593 (5th Cir. 2003) (trademarks). This rule also has been applied to covenants not to sue and settlement agreements. See, e.g., Jardin v. Datallegro, Inc., No. 08cv1462-IEG-RBB, 2009 U.S. Dist. LEXIS 3339, at *6–7 (S.D. Cal. Jan. 20, 2009) (new patent owner was bound by prior settlement agreement and could not bring infringement action); V-Formation, Inc. v. Benetton Grp. SpA, Civ. A. No. 02-cv-02259-PSF-CBS, 2006 U.S. Dist. LEXIS 13352, at *18–21 (D. Colo. Mar. 10, 2006) (new patent owner could not bring infringement suit even though new owner was not aware of covenant not to sue granted by prior owner). 161. See, e.g., Republic Pictures Corp. v. Security-First Nat’l Bank of L.A., 197 F.2d 767 (9th Cir. 1952) (federal court does not have jurisdiction to foreclose copyright mortgage); Moore v. Willis, No. 14cv1602 BTM (RBB), 2014 U.S. Dist. LEXIS 127543, at *4–5 (S.D. Cal. Sept. 8, 2014) (state law applies to determine if copyrights are subject to execution to satisfy a judgment); Mayfair Wireless LLC v. Celico P’ship, No. 11-772-SLR-SRF, 2013 U.S. Dist. LEXIS 124206, at *17–18 (D. Del. Model IP Security Agreement Introductory Report 881 If the debtor is a licensor, its rights to payment from licensees would be “accounts” or “payment intangibles” under the U.C.C., and the secured party should be able to collect payments generated by the licensee’s use of the intellectual property, even if the license prohibits assignment by the licensor.162 If the debtor is a licensee, however, its rights under the license would likely be “general intangibles.” Most IP licenses—especially trademark licenses—expressly or implicitly prohibit assignment by the licensee; even if U.C.C. section 9-408 allows the licensee to grant a security interest,163 the secured party’s ability to use the licensed intellectual property or enforce the license would be severely limited.164 A secured party that contemplates using or enforcing the debtor’s IP licenses upon default should get the licensor’s consent to assignments before the transaction closes, not after default. Sometimes an agreement involving rights in intellectual property, but not titled “security agreement,” may contain language purporting to forfeit or transfer the intellectual property to the secured party automatically upon the debtor’s default. Finance lawyers tend to see this kind of provision as an attempt (possibly unwitting) to evade Article 9’s required foreclosure procedures.165 If the substance of the agreement creates a security interest, then regardless of what the arrangement is called, the party seeking to take the IP asset must comply with Article 9’s enforcement rules, unless federal law preempts the Article 9 enforcement system. Not all courts, however, recognize Article 9’s substance-over-form approach in the IP context.166 5 DRAFTING PROCESS The Task Force was co-chaired by Katherine Simpson Allen and Matthew Kavanaugh, with David Fournier, John E. Murdock, and Elaine D. Ziff serving as vice chairs and Howard Darmstadter as editor. The Task Force met jointly with the Commercial Finance Committee’s Intellectual Property Financing Subcommittee at the ABA annual meetings from Aug. 30, 2013) (federal law determines validity and terms of an assignment of a patent, but state law applies to a transfer of patent ownership by operation of law if it is not deemed an assignment). 162. See U.C.C. § 9-406(a), (d); supra section 3.6. 163. See supra section 4.2. 164. See U.C.C. § 9-408(a); supra section 3.6; see also supra section 4.5 (Bankruptcy Risks). 165. See, e.g., Sky Techs. LLC v. SAP AG, 67 U.C.C. Rep. Serv. 2d 802 (E.D. Tex. 2008) (where patent security agreement was recorded in the PTO, purchaser from secured party’s assignee at foreclosure sale acquired patents by operation of law—U.C.C. Article 9—notwithstanding absence of written assignment or recorded transfer from original debtor to purchaser); In re Coldwave Sys. LLC, 368 B.R. 91 (Bankr. D. Mass. 2007) (U.C.C. Article 9, not patent law, governs secured party’s exercise of remedies, and secured party was not allowed to transfer the IP collateral to itself without debtor’s consent, or waiver, as required for a strict foreclosure under U.C.C. section 9-620). 166. See Corsair Special Situations Fund, L.P. v. Engineered Framing Sys., Inc., 694 F. Supp. 2d 449, 459 (D. Md. 2010) (court construed security agreement provision that patent collateral would “become an absolute assignment” after default to effectuate an automatic transfer of title upon default); but see Steven O. Weise & Stephen L. Sepinuck, Personal Property Secured Transactions, 70 BUS. LAW. 1243, 1265 n.218 (Corsair decision allowing collateral to be automatically assigned to secured party on default, as provided in security agreement, is “simply wrong”). 882 The Business Lawyer; Vol. 71, Summer 2016 2009 through 2013, the Business Law Section’s spring meetings in 2011, 2013, 2014, and 2015, and the Business Law Section’s annual meetings in 2014 and 2015. Beginning in 2012, the Task Force also held monthly meetings by conference call. Guided by John Murdock, the first few meetings in 2010 and 2011 focused on using a document assembly software program to construct a model agreement by collecting provisions in similar agreements available in the EDGAR database and analyzing their relative frequency of use. The initial 2012–2013 working drafts were based in large part on this system, but for various reasons the Task Force ultimately reverted to a more traditional drafting approach. Co-chair Kathi Allen, vice chair Elaine Ziff, and editor Howard Darmstadter acted as a de facto drafting committee. Kathi prepared initial drafts, Elaine provided expert commentary on IP law and practice, and Howard edited each draft to streamline and simplify the language. Revised drafts of the agreement and/or the accompanying report were distributed to the Task Force, and posted on the Task Force website, a few days before each Task Force meeting (whether held in person or by telephone), and the new drafts were discussed at the meeting. Based on the issues raised and discussed at the meeting, the process of revision, distribution, and discussion was repeated for the following meeting. In addition to its co-chairs, co-vice chairs, and drafting committee, the Task Force was supported in its work by members of the Task Force and members of the Commercial Finance Committee’s IP Financing Subcommittee. (Lists of members are available on the respective website home pages for the Task Force and Subcommittee.) The following members of both groups provided especially critical support by attending meetings frequently, reviewing drafts, sending comments, correcting errors, drafting sections, explaining legal technicalities, updating practice tips, offering solutions to drafting problems, and resolving occasional differences of opinion: Warren E. Agin Leianne S. Crittenden Patrick A. Guida Kiriakoula Hatzikiriakos Marilyn C. Maloney Pamela J. Martinson Peter S. Munoz Stephen L. Sepinuck Pauline M. Stevens Stephen T. Whelan The Task Force also enjoyed the support of successive chairs of its sponsoring Committees: Lynn A. Soukup, James Schulwolf, and Neal J. Kling of the Commercial Finance Committee, and Penelope L Christophorou, Norman M. Powell, and Kristen David Adams of the U.C.C. Committee. Model Intellectual Property Security Agreement Contents Parties ....................................................................................................... Background............................................................................................... Agreement................................................................................................. 1 Security Interest .................................................................................... 1.1 Grant and Collateral.................................................................... 1.2 Excluded Property....................................................................... 1.2.1 Scheduled Excluded Property ......................................... 1.2.2 Trademark Intent-to-Use Applications ............................ 1.2.3 Restricted IP Licenses...................................................... 1.2.4 Absence of Conditions .................................................... 1.3 Perfection and Priority ................................................................ 1.3.1 U.C.C. Filing Offices....................................................... 1.3.2 IP Filing Offices .............................................................. 1.3.3 Perfection and Priority .................................................... 1.4 After-acquired Collateral ............................................................. 1.4.1 Notice of After-acquired Collateral; Addenda ................. 1.4.2 Secured Party’s Right to Provide Addenda...................... 1.4.3 IP Security Documents.................................................... 1.4.4 Notice of Copyright Applications.................................... 1.4.5 Commercial Tort Claims ................................................. 1.5 Further Assurances ..................................................................... 2 Representations and Warranties............................................................ 2.1 The Collateral.............................................................................. 2.1.1 Copyrights....................................................................... 2.1.2 Patents ............................................................................ 2.1.3 Trademarks ..................................................................... 2.1.4 Domain Names and IP Licenses...................................... 2.1.5 Other Intellectual Property.............................................. 2.1.6 Ownership ...................................................................... 2.1.7 Restrictive Provisions ...................................................... 2.1.8 Existing or Threatened Claims; Infringement.................. 2.1.9 IP Notices........................................................................ 2.1.10 Standards of Quality ....................................................... 2.1.11 Proprietary Software........................................................ 2.1.12 No Government Funding................................................ 886 886 886 886 886 889 889 890 890 890 891 891 891 891 892 892 893 893 893 894 894 895 895 895 896 897 897 899 899 900 900 901 901 902 903 883 884 2.2 3 4 5 6 The Business Lawyer; Vol. 71, Summer 2016 Debtor......................................................................................... 2.2.1 Existence; Power; Authority ............................................ 2.2.2 Debtor Information ......................................................... Covenants ............................................................................................. 3.1 No Transfers of Collateral ........................................................... 3.2 No Liens on Collateral ................................................................ 3.3 No Restrictive Provisions ............................................................ 3.4 Registration of Copyrights and Trademarks; Pursuit of Patents .. 3.5 Recording of Assignments and IP Licenses ................................. 3.6 Protection of Collateral ............................................................... 3.6.1 Compliance with Law ..................................................... 3.6.2 General............................................................................ 3.6.3 IP Notices........................................................................ 3.6.4 Trademark Quality Control............................................. 3.6.5 Performance of IP Licenses ............................................. 3.6.6 Protection of Trade Secrets ............................................. 3.6.7 Infringements by Others ................................................. 3.6.8 Challenges and Suits by Others ...................................... 3.7 Escrow Agreement ...................................................................... 3.8 Change of Debtor Information.................................................... 3.9 Maintenance of Records; Audit and Inspection........................... Events of Default; Remedies.................................................................. 4.1 Events of Default......................................................................... 4.2 Enforcement, Collection, and Disposition of Collateral .............. 4.3 License to Secured Party to Use Intellectual Property................. 4.4 Access to Debtor’s Systems and Expertise................................... 4.5 General Remedy Provisions......................................................... 4.5.1 U.C.C. Remedies ............................................................. 4.5.2 Remedies Cumulative...................................................... 4.5.3 Reasonable Notice ........................................................... 4.5.4 Application of Proceeds .................................................. 4.5.5 No Marshaling ................................................................ Secured Party’s Other Rights................................................................. 5.1 Power of Attorney ....................................................................... 5.2 Indemnity.................................................................................... 5.3 Costs and Expenses .................................................................... 5.4 Non-Disturbance of Permitted Licenses ...................................... 5.5 Limited Obligations of Secured Party.......................................... General Provisions ................................................................................ 6.1 Term of Agreement ..................................................................... 6.2 Reinstatement.............................................................................. 6.3 Entire Agreement ........................................................................ 6.4 Notices and Communications ..................................................... 6.4.1 General Notices............................................................... 903 903 903 904 904 904 904 905 905 905 905 906 906 907 907 907 907 908 908 909 909 909 909 910 911 912 913 913 913 913 913 914 914 914 914 915 915 916 916 916 916 917 917 917 Model Intellectual Property Security Agreement 885 6.4.2 Electronic Communications ............................................ 6.5 Successors and Assigns ............................................................... 6.6 Amendments and Waivers .......................................................... 6.7 Governing Law............................................................................ 6.8 Severability.................................................................................. 6.9 Jurisdiction; Venue...................................................................... 6.10 Jury Waiver................................................................................. 7 Definitions and Usages.......................................................................... 7.1 Defined Terms ............................................................................ 7.2 Usages ......................................................................................... Signatures ................................................................................................. Schedules .................................................................................................. 917 917 917 918 918 918 918 918 918 921 923 923 Defined Term Addendum, 893 Agreement, 886 Associated Property, 889 Bankruptcy Code, 918 Bankruptcy Law, 918 Business Day, 919 Claims, 915 Collateral, 889 Copyright, 886 Copyright Office, 919 Debtor, 886 Domain Name, 887 Domain Name Contract, 919 Effective Date, 886 Event of Default, 909 Excluded Property, 889 Governmental Authority, 919 Insolvency Proceedings, 919 Intellectual Property, 889 IP Filing Office, 919 IP License, 888 IP Security Document, 919 IP-Related Right, 888 Jurisdiction, 920 License-In, 920 License-Out, 920 Lien, 920 Loan Agreement, 886 Loan Documents, 920 Loans, 886 Material Adverse Effect, 920 Other Intellectual Property, 887 Patent, 887 Permitted License, 920 Permitted Lien, 899 Permitted Transfer, 900 Person, 920 Primary license, 912 Proceeds, 889 PTO, 920 Restrictive Provision, 920 Secured Obligations, 886 Secured Party, 886 Security Interest, 886 State, 921 Trademark, 887 Transfer, 921 U.C.C., 921 United States, 921 886 The Business Lawyer; Vol. 71, Summer 2016 Intellectual Property Security Agreement1 [DATE] (the Effective Date2) PARTIES • [DEBTOR NAME], a [JURISDICTION] [ENTITY] (Debtor) • [SECURED PARTY NAME], a [JURISDICTION] [ENTITY] (Secured Party) BACKGROUND Secured Party has agreed to make Loans to Debtor under the Loan Agreement dated the Effective Date between Debtor and Secured Party. A condition to Secured Party’s obligation to make the Loans is Debtor’s execution and delivery of this Intellectual Property Security Agreement (this Agreement). AGREEMENT The parties agree as follows: 1 SECURITY INTEREST 1.1 GRANT AND COLLATERAL To secure Debtor’s performance of its present and future obligations under the Loan Documents (the Secured Obligations), Debtor grants Secured Party a security interest3 (the Security Interest) in all Debtor’s present and future rights and interest in any: Copyrights, meaning any United States or foreign4: (a) copyrights, whether registered or unregistered, whether in published or unpublished works of authorship, 1. This model agreement was prepared by the Model Intellectual Property Security Agreement Task Force, as a joint project of the Commercial Finance and Uniform Commercial Code Committees of the American Bar Association Business Law Section. The model agreement should be used in conjuction with the Task Force’s Introductory Report and Background Considerations (the “Report”), which provides helpful analysis and additional commentary. 2. Most capitalized defined terms are defined in context throughout the agreement. See the index of defined terms following the table of contents. Other words and phrases are defined in section 7.1 (Defined Terms) or described in section 7.2 (Usages). 3. The model agreement provides for the debtor to simply “grant a security interest” in the collateral, avoiding the unnecessary and ambiguous verbs historically included in IP security agreements (e.g., assign, transfer, convey, pledge, mortgage, hypothecate, remise). See Report § 4.3. 4. As discussed in the Report, the model agreement focuses on U.S. intellectual property, as opposed to IP rights created by or subject to the laws of jurisdictions other than the United States or its states (generally referred to as “foreign intellectual property”). If the secured party is taking the value of the foreign intellectual property into account in its credit decision, local counsel should be consulted in each relevant jurisdiction. If the secured party is not relying on foreign intellectual property, exceptions to the representations and warranties, covenants, and scheduling obligations may be appropriate. See Report §§ 1.2.4, 2.1.2. Model Intellectual Property Security Agreement 887 (b) copyright registrations or applications in any IP Filing Office, (d) copyright renewals or extensions, and (e) rights throughout the world analogous to the foregoing; Patents, meaning any United States or foreign: (a) issued patents (whether utility, design, or plant), patent applications, or certificates of invention in any IP Filing Office, (b) continuations, continuations-in-part, divisions, extensions, reissuances, or reexaminations of a patent or patent application in any IP Filing Office, (c) inventions described and claimed in any patent or patent application, and (d) rights throughout the world analogous to the foregoing; Trademarks, meaning any United States or foreign: (a) trademarks, service marks, certification marks, trade names, or other types of source identifier, whether arising under a statute or under common law, and whether registered or unregistered, (b) corporate and company names, business names, trade styles, designs, logos, or trade dress, (c) the goodwill of the business connected with the use of or symbolized by the trademark or service mark, (d) any registrations, renewals, applications, and other filings for any trademarks in any IP Filing Office, and (e) rights throughout the world analogous to the foregoing; Domain Names, meaning any Internet domain names; Other Intellectual Property, meaning any intellectual property recognized under or established by the laws of any Jurisdiction other than a Copyright, Patent, Trademark, or Domain Name, whether statutory or common law, registered or unregistered, published or unpublished, including • a mask work (i.e., a layered blueprint of the circuitry in a computer chip as protected under Chapter 9 of Title 17 of the United States Code),5 5. Mask works are not copyrights, although they are partially protected under certain provisions of Title 17 of the U.S. Code, codifying the Semiconductor Chip Protection Act of 1984, 17 U.S.C. §§ 901–914 (2012). A mask work is defined as a series of images representing the three-dimensional topography of a semiconductor chip. This Act has turned out to have limited utility. Only the actual chip design is protected under the Act—not any idea, procedure, process, system, method of operation, concept, principle, or discovery that may be described, explained, illustrated, or embodied in the mask work. Id. § 902(c). 888 The Business Lawyer; Vol. 71, Summer 2016 • a trade secret or other proprietary or confidential information or data, • rights with respect to software, programming codes, inventions, technical information, procedures, designs, design registrations, know-how, data and databases, processes, models, drawings, plans, specifications, and records, and • rights of publicity and privacy with respect to natural persons; IP Licenses, meaning any agreements, whether or not styled as a “license,” (a) that grant a Person an exclusive or nonexclusive license or other right to use or exercise rights in Intellectual Property other than software to the extent the software constitutes “goods” under section 9-102(a) of the U.C.C.,6 or (b) that obligate a Person to refrain from using or enforcing any Intellectual Property, including settlements, consents-to-use, non-assertion agreements, and covenants-not-to-sue; IP-Related Rights, meaning, for any Copyright, Patent, Trademark, Domain Name, Other Intellectual Property, or IP License, any (a) rights to royalties, revenues, income, or other payments arising therefrom, (b) rights with respect to claims described at any time on Schedule K, and (c) all other accrued and unaccrued causes of action (whether in contract, tort, or otherwise) or rights to claim, sue or collect damages for, or enjoin or obtain other legal or equitable relief for, an infringement, misuse, misappropriation, dilution, violation, unfair competition, or other impairment (whether past, present, or future) thereof, including expired items;7 6. The model agreement does not address software that is embedded in or so closely related to specific goods that it is treated as part of the goods for Article 9 purposes. See U.C.C. § 9-104(a)(22). 7. This definition is intended to incorporate these related rights in any defined type of IP collateral, even though they may be described differently for different types of intellectual property. The collateral description expressly includes the right to sue for past infringement or other violation of the debtor’s IP rights because generally such an action can only be brought by the owner of the intellectual property. See 17 U.S.C. § 501(b) (2012) (only a legal or beneficial owner of an exclusive right in copyright can bring an infringement action); 35 U.S.C. § 281.35 (2012) (only a patentee can bring an infringement action); id. § 100(d) (a patentee is the person to whom the patent was originally issued or a successor-in-title); see also Silvers v. Sony Pictures Entm’t, Inc., 402 F.3d 881 (9th Cir. 2005) (assignee of accrued claim for copyright infringement lacked standing because assignee had no legal or beneficial interest in copyright itself). Model Intellectual Property Security Agreement 889 Associated Property,8 meaning any (a) accounts, deposit accounts, general intangibles, instruments, investment property, or other personal property at any time constituting, evidencing, or arising under or with respect to Intellectual Property (as defined below) or IP Licenses, (b) commercial tort claims related to Intellectual Property or IP Licenses and described in this Agreement or another record authenticated by Debtor as required by U.C.C. Article 9, (c) books, records, information, and data with respect to Intellectual Property or IP Licenses, and (d) substitutions and replacements for any such property; and Proceeds of any of the foregoing, meaning (a) “proceeds,” as defined in Article 9 of the U.C.C., and (b) additional or replacement collateral provided during, or payment or property received in, an Insolvency Proceeding on account of any “secured claim” (within the meaning of section 506(a) of the Bankruptcy Code or similar Bankruptcy Law). Copyrights, Patents, Trademarks, Domain Names, and Other Intellectual Property are, collectively, Intellectual Property. All Intellectual Property, IP Licenses, IP-Related Rights, Associated Property, and Proceeds subject to the Security Interest and not excluded under the following section 1.2 are the Collateral. 1.2 EXCLUDED PROPERTY Notwithstanding anything to the contrary in this Agreement, the following rights and property (Excluded Property) are excluded from the Collateral to the extent set forth in this section 1.2: 1.2.1 Scheduled Excluded Property Any right or property identified on Schedule A, “Scheduled Excluded Property.”9 8. To guard against the unintentional omission of any form of intellectual property collateral under Article 9 because of an inadequate description, clauses (a) and (b) describe the collateral using the relevant collateral types defined in U.C.C. Article 9. See U.C.C. § 9-108(b)(3) (use of defined collateral types as sufficient collateral descriptions). 9. The model agreement gives the secured party a security interest in all of the debtor’s intellectual property. The parties may, however, want to limit the security interest to a particular category of intellectual property (e.g., certain patents) or to IP rights in particular assets (e.g., a specified film or musical work); alternatively, the parties may want to exempt certain categories or assets. Schedule A provides a convenient way to impose such limitations or exemptions (though conforming changes will be necessary in other parts of the agreement). The secured party should consider any such limitations or exemptions carefully, since a single asset may be protected by multiple types of IP rights. For example, a software program may be patented as a novel “business method,” the code or “look 890 The Business Lawyer; Vol. 71, Summer 2016 1.2.2 Trademark Intent-to-Use Applications A Trademark application filed in the PTO on the basis of Debtor’s intent to use the Trademark before evidence of use of the Trademark has been filed with and accepted by the PTO pursuant to the Lanham Act (15 U.S.C. § 1051 et seq.), but only for so long as granting a security interest in the Trademark application before the filing of evidence of use of the Trademark would adversely affect the enforceability or validity of the Trademark application or the resulting Trademark registration.10 1.2.3 Restricted IP Licenses Debtor’s rights under an IP License that is subject to or contains a Restrictive Provision that is effective against Debtor despite sections 9-406 through 9-409 of the U.C.C. or other applicable law, but only for so long as the Restrictive Provision is effective and enforceable.11 Debtor’s rights under any IP License treated as Excluded Property under this section 1.2.3 will constitute Collateral if the Restrictive Provision is not effective and enforceable. 1.2.4 Absence of Conditions The Security Interest will immediately attach to any item of property treated as Excluded Property under section 1.2.2 or 1.2.3 to the extent that the conditions in that section cease to exist or cease to apply to that item. and feel” of the program may be protectable under copyright law, the source code may be a trade secret, and the logo or name of the program may be a trademark or service mark. 10. This section 1.2.2 is intended to address a longstanding concern that granting a security interest in an ITU application before evidence of use of the trademark has been accepted by the PTO could constitute an “assignment” that might impair the enforceability or validity of the trademark or the ensuing registration. This section thus excludes the application until the required evidence of use has been accepted by the PTO, but only to the extent (if any) that the grant of the security interest would compromise the ITU application or registration. See Report § 4.3. 11. “Restrictive Provision” is defined in section 7.1 (Defined Terms). The definition tracks the language in U.C.C. sections 9-406 and 9-408 describing the kinds of contractual provisions or provisions of law that purport to restrict a party’s assignment of its rights in collateral such as licenses. (For convenience, these restrictive provisions under applicable law or in a contract are generally referred to as anti-assignment or non-assignment provisions or clauses.) IP attorneys often describe IP licenses as non-assignable without realizing that U.C.C. sections 9-406 and 9-408, if applicable, could make certain non-assignment provisions in a contract or law at least partly unenforceable, so that the provisions would not be triggered by an “assignment” in the form of a security interest. See Report § 4.5 (discussing non-assignable licenses). If an anti-assignment provision is effective, neither the secured party nor the debtor will want the grant of a security interest to cause the IP license to be terminated or declared in default. To avoid unintended consequences of violating an effective anti-assignment provision, this section 1.2.3 excludes IP licenses to the extent (but only to the extent) such a provision is enforceable. Model Intellectual Property Security Agreement 1.3 PERFECTION AND 891 PRIORITY 1.3.1 U.C.C. Filing Offices Debtor authorizes Secured Party to file U.C.C. financing statements for any Collateral in such filing offices as Secured Party reasonably deems advisable to perfect or protect the Security Interest. Debtor ratifies and confirms Secured Party’s authorization to file any such U.C.C. financing statements before the Effective Date. 1.3.2 IP Filing Offices For any IP Collateral that is the subject of a registration or application in an IP Filing Office, Debtor will, at Secured Party’s request, execute and deliver to Secured Party an IP Security Document, which Secured Party may file in the IP Filing Office.12 1.3.3 Perfection and Priority13 Debtor represents and warrants to Secured Party that: (i) The Security Interest in each Copyright that is the subject of a registration or application in the Copyright Office will be perfected upon the filing of an IP Security Document in the Copyright Office.14 12. The form and content of a document to be filed or recorded with the federal filing office will depend in part on the type of IP collateral and the administrative rules of the filing office. For copyright transfers, the statute allows the recordation of “a note or memorandum of the transfer,” 17 U.S.C. § 204(a) (2012), and the criteria for constructive notice set forth in 17 U.S.C. § 205 arguably could be satisfied by either a notice or an agreement. The Copyright Office rules, however, require a document pertaining to a copyright to be “complete by its own terms,” although other documents may be identified or incorporated by reference. 37 C.F.R. § 201.4(c)(2) (2015). The Copyright Office rules also recommend, but do not require, that a document submitted for recording be accompanied by its Recordation Document Cover Sheet (Form DCS). Id. § 201.4(b). For patents, the statute refers to a “recorded” assignment, 15 U.S.C. § 261 (2012), but the cover sheet required by the PTO rules provides the option to record a “security agreement” as well as an “assignment.” For trademarks, the statute requires only that “information regarding the transfer” be recorded in the PTO, id. § 1060(4), but the PTO form of cover sheet describes the document to be recorded as a “notice of security interest.” Both the Copyright Office and PTO have other specific recording requirements, and the filing office rules should be consulted before submitting a document for recordation. 13. Representations and warranties as to perfection and priority of the security interest are customary. However, the representations and warranties usually provide little comfort to the secured party; they merely state legal conclusions that are likely to be as much within the secured party’s knowledge as the debtor’s (especially when the secured party will be making the required filings). The model agreement has a separate event of default (section 4.1(iii)) that makes a failure of perfection or priority an immediate event of default, thus obviating much of the reason for the representation and warranty. We have kept the representation, however, because of the slim possibility that there may be other reasons for non-perfection or non-priority that are known to the debtor and that could form the basis for a misrepresentation action. The representation also serves as a kind of roadmap for the parties’ lawyers, who may be unfamiliar with the perfection rules applicable to IP assets. To the extent that a secured party does not feel the need for such a roadmap and believes a misrepresentation claim is unlikely, it may wish to drop this section 1.3.3. 14. The prevailing legal view is that a security interest in registered copyrights can only be perfected by recording in the Copyright Office. See Report § 4.1.2. Secured parties generally file U.C.C. financing statements also, to cover related rights and proceeds. 892 The Business Lawyer; Vol. 71, Summer 2016 (ii) The Security Interest in all other Collateral will be perfected upon • the filing of a U.C.C. financing statement with the information required by U.C.C. § 9-502(a) in the applicable U.C.C. filing offices listed on Schedule I, • for each Patent issued by or pending in the PTO, the filing of an IP Security Document in the PTO, and • for each Trademark registered or pending in the PTO, the filing of an IP Security Document in the PTO.15 (iii) For each item of Collateral, the Security Interest thus perfected will have priority over a competing security interest in the item if • when such U.C.C. financing statement is filed, there is no effective filed financing statement for the competing security interest, • for such Copyrights, the IP Security Document is recorded in the Copyright Office within one month after the Security Interest attaches and the competing security interest is not recorded in the Copyright Office before the end of that one-month period, and • for such Patents and Trademarks, the IP Security Document is recorded in the PTO within three months after the Security Interest attaches and the competing security interest is not recorded in the PTO before the end of that three-month period.16 1.4 AFTER-ACQUIRED COLLATERAL17 1.4.1 Notice of After-acquired Collateral; Addenda Debtor will notify Secured Party of each acquisition after the Effective Date of an interest in 15. The weight of authority supports the conclusion that federal filing is not required for perfection of security interests in patents and trademarks, but a debtor (or debtor’s IP counsel) may still be reluctant to make a representation on this legal issue. This representation contemplates both state U.C.C. filing to perfect and a backup federal filing to provide notice. This approach allows the debtor to make the representation without having to make legal determinations. See Report § 4.2.2. Of course, the debtor’s representation does not eliminate the need to determine the appropriate method of perfection and take appropriate actions. 16. The one-month period for copyrights and the three-month period for patents and trademarks in this section are based on the recording periods established by federal law for determining the relative priorities of certain third-party rights in the same IP asset. 17 U.S.C. § 205(d) (2012) (transferees of copyright ownership); 35 U.S.C. § 261 (2012) (subsequent purchasers and mortgagees of patents); 15 U.S.C. § 1060(a)(4) (2012) (subsequent purchasers of trademarks). See Report §§ 4.1, 4.2. 17. Because the grant clause in the agreement includes the debtor’s after-acquired intellectual property, new intellectual property becomes part of the collateral package immediately upon its acquisition by the debtor. However, additional recordings in the IP filing offices will be necessary to perfect the security interest in newly acquired registered or applied-for copyrights, and may be advisable if the new intellectual property consists of patents or trademarks even if the additional recording is not required for perfection. The notice and filing provisions in section 1.4 of the model agreement are intended to balance the secured party’s interests against the burden imposed on the debtor, especially if the debtor’s business involves frequent IP filings. Model Intellectual Property Security Agreement 893 • a registered or applied-for Copyright, Patent, Trademark, or Domain Name, or • an IP License of a type required to be listed on a Schedule on the Effective Date. Debtor will provide the notice by the 10th Business Day following the end of the calendar quarter in which the interest was acquired, along with addenda to Schedules B through G (each an Addendum), as appropriate, listing the acquired interests.18 Each Addendum will become part of the relevant Schedule effective upon Secured Party’s receipt of the Addendum.19 1.4.2 Secured Party’s Right to Provide Addenda Without limiting Debtor’s obligations, Secured Party may at any time unilaterally provide an Addendum to any of Schedules B through G, as appropriate, to include any such after-acquired Collateral, whether or not Debtor has notified Secured Party of its acquisition. Each such Addendum will become a part of the relevant Schedule effective upon Secured Party’s sending a copy of the Addendum to Debtor. Debtor’s or Secured Party’s failure to provide an Addendum will not limit or detract from the Security Interest in the after-acquired Collateral or other Collateral. 1.4.3 IP Security Documents With each Addendum delivered to Secured Party, Debtor will also deliver (unless previously delivered under the following section 1.4.4) executed IP Security Documents for the Intellectual Property listed on the Addendum, which Secured Party may file with the applicable IP Filing Office.20 1.4.4 Notice of Copyright Applications Debtor will notify Secured Party at least 10 Business Days before Debtor files an application to register Copyright Collateral with the Copyright Office.21 The notice 18. If the debtor has an extensive IP portfolio, a three-month reporting period is commonly used for after-acquired trademarks and patents, in part because recording in the PTO is not considered necessary for perfection, but acts as a backup. See Report §§ 2.3.4, 2.4.4, 4.2.2. A secured party will be likely to require more frequent reporting for copyrights, however, both because the similar grace period for copyrights is only one month, 17 U.S.C. § 205 (2012), and because a security interest in registered copyrights can only be perfected by filing in the Copyright Office. Section 1.4.4 therefore requires the secured party’s lien notice to be submitted to the Copyright Office with, not after, the debtor’s copyright application. See Report §§ 2.2.4, 4.1.2. 19. Many of the debtor’s representations, warranties, and covenants will only apply to the new collateral when it is listed on a schedule. See infra the introductory language to section 2. 20. Some security agreements place the federal recording obligations on the debtor. However, since the secured party has the greater incentive to keep its lien recordings up-to-date, it is more logical for it to undertake the filing tasks, regardless of where the loan documentation places the obligation. In either case, the debtor typically bears the recording costs. See infra section 5.3 (Costs and Expenses). 21. The parties may negotiate an exception to this requirement to allow the debtor to file a copyright application without prior notice to the extent that registration of the copyright is a prerequisite to proceeding against a potential infringer on an expedited basis. 894 The Business Lawyer; Vol. 71, Summer 2016 will include the title of the copyrighted work as it will appear on the application and the date the application will be filed. Prior to filing, Debtor will execute and deliver to Secured Party any IP Security Documents that Secured Party reasonably requests to maintain the perfection and priority of the Security Interest in the Copyright. At Secured Party’s request, Debtor will file such lien documents in the Copyright Office concurrently with filing the application, and provide Secured Party with copies of the filed copyright application and lien documents.22 1.4.5 Commercial Tort Claims Debtor will promptly notify Secured Party of any commercial tort claim with respect to any Collateral in a signed writing that gives brief details of the claim and grants Secured Party a security interest in the claim and any proceeds, all upon the terms of this Agreement.23 1.5 FURTHER ASSURANCES Upon Secured Party’s request, Debtor will promptly and duly execute and deliver such further instruments and documents and take such further actions as Secured Party reasonably deems appropriate to obtain the full benefits of this Agreement, including • using reasonable efforts to obtain third-party consents and approvals for Debtor to grant a security interest in any item of Collateral to Secured Party, or for Secured Party to enforce the Security Interest or exercise other rights and remedies under this Agreement,24 and 22. The debtor may find it burdensome to observe two different notification and reporting periods— collective quarterly notices under section 1.4.3 for patents and trademarks and specific prior notice for each copyright under this section 1.4.4—and may propose that all new intellectual property be reported on a quarterly, or even semiannual, basis. The secured party may reasonably insist on the different notice procedure for copyrights, however, because Copyright Office filing is necessary for perfection of a security interest. See Report § 4.1.2. 23. This covenant requires the debtor to take the appropriate action to extend the security interest to cover particular claims the debtor may have against other parties with respect to the IP collateral. The collateral description in section 1.1 (Grant and Collateral Description) includes commercial tort claims related to intellectual property (as part of “Associated Property”) as well as tort causes of action and claims for damages related to IP collateral (as part of “IP-Related Rights”). U.C.C. section 9-102(a)(13) defines “commercial tort claim” to include two kinds of tort claims—(1) where the claimant is an organization and (2) where the claimant is an individual, but the claim arose in the course of the individual’s business or profession and does not include damages for personal injury or death. In either case, while identifying collateral by Article 9 type is adequate for most personal property under Article 9, such identification is not sufficient for commercial tort claims. U.C.C. § 9-108(e)(1). The description can be general, not specific, and does not need to identify the amounts or types of damages claimed, name the defendants, or outline legal theories. See id. § 9-108 cmt. 5. 24. To the extent that this covenant covers IP licenses that purport to prohibit assignment, the debtor may be reluctant to take on a blanket obligation to seek the other parties’ consents to assignment of or grants of a security interest in the debtor’s rights under such licenses, even if qualified by “reasonable efforts.” The debtor may derive some comfort from section 1.2.3 (Excluded Property—Restricted IP Licenses), which excludes from the collateral IP licenses that are truly “non-assignable”—meaning that the debtor cannot grant a security interest in its rights under the license without causing a default Model Intellectual Property Security Agreement 895 • filing or cooperating with Secured Party in filing forms or other documents in connection with the perfection, protection, priority, or enforcement of the Security Interest, the termination or release of ineffective filings, and the recording of documents to cover missing steps in the chain of title. 2 REPRESENTATIONS AND WARRANTIES Except to the extent otherwise set forth on the relevant Schedule, Debtor represents and warrants to Secured Party that on the Effective Date, on the date each Loan is made to Debtor, and, for any Collateral added by an Addendum, the date the Addendum becomes part of the relevant Schedule25: 2.1 THE COLLATERAL26 2.1.1 Copyrights (i) Schedule B lists all of Debtor’s subsisting27 or termination event. See Report § 4.5. Rather than engage in a language harmonization exercise or attempt to resolve federal law preemption issues, if a particular “non-assignable” license is material to the debtor’s business, the secured party should consider making the licensor’s consent a condition to closing. See Report §§ 4.5, 4.7. 25. The debtor (or secured party) will prepare addenda to the schedules identifying items of collateral acquired after the effective date, and the representations and warranties are repeated as to those items when the relevant addendum becomes effective. See supra section 1.4 (After-acquired Collateral). 26. The model agreement allows specific copyrights, trademarks, patents, and IP licenses to be listed on schedules attached to the agreement. Schedules B through G can list IP collateral by general categories (e.g., “all trademarks registered after 1990”) or by specific items. The schedules serve several purposes, and the purpose may dictate the nature of the description. See Report § 4.4. Some of the representations, warranties, and covenants in the model agreement only apply to the collateral listed on the schedules. For example, the debtor only represents and warrants as to the validity of the scheduled copyrights, patents, and trademarks. See infra sections 2.1.1(ii), 2.1.2(ii) & 2.1.3(ii). Depending on how the schedules are to be used, the secured party may agree to permit the debtor to schedule only the most valuable or most strategically important collateral. 27. The term “subsisting” is generally understood to mean that the IP rights or registrations have not lapsed or expired and have not been abandoned. The secured party may request that the schedules also include expired and abandoned IP registrations and applications, since even an expired or abandoned item may have some residual value. For example, an expired registration might support a claim for an infringement that occurred while the registration was still in effect. Owners of some kinds of intellectual property may have a right, for a limited time and subject to various conditions, to revive certain lapsed or abandoned items. In response to such a request, a debtor may argue that including defunct items will increase its administrative burden without providing any material benefit to the secured party, where the debtor has already determined, as a business matter, that the items were not worth maintaining or are expired at full term (most relevant for patents). The debtor might also argue that its lien recording (and releasing) costs would be increased unnecessarily if the secured party includes the expired or abandoned items in a notice of security interest recorded in the Copyright Office or PTO. Finally, if expired and abandoned items are included, then some of the representations and warranties (such as the validity representations in infra section 2.1.1(ii)) will need to be modified to apply only to subsisting items, thereby complicating the drafting process. For these reasons, it is not unusual for a secured party to allow the debtor to leave abandoned and expired intellectual property off the schedules. If the debtor does have a pending or threatened claim for the infringement of an expired or lapsed item while it was in force, the item and claim should be included on the applicable IP schedule, so that the secured party may (if required or advisable) record its security interest. 896 The Business Lawyer; Vol. 71, Summer 2016 • Copyrights that are registered, or are the subject of pending applications, in any IP Filing Office,28 and • Copyright Licenses-In.29 (ii) Each Copyright listed on Schedule B is valid and enforceable.30 2.1.2 Patents (i) Schedule C lists all of Debtor’s subsisting • issued Patents, and Patent applications31 pending, in any IP Filing Office, and • Patent Licenses-In. (ii) Each issued Patent listed on Schedule C is 28. This representation will require the debtor to identify and schedule all copyrights that are registered. This information may be necessary for the secured party to perfect or enforce its security interest in the copyrights. The representation covers filing or registration in any IP filing office, including foreign IP offices, although the model agreement does not address foreign intellectual property or foreign IP filing systems. The parties may agree to limit the actions to be taken to perfect the secured party’s lien in foreign intellectual property because of the cost, time involved, or lesser materiality of the foreign intellectual property. See Report §§ 1.2.6, 2.1.2. 29. This representation identifies the debtor’s “licenses-in” (i.e., where a third party grants rights in its intellectual property to the debtor), in part to permit the secured party to file a required or optional notice of security interest in the debtor’s rights as licensee in an IP filing office. See Report § 4.6. Because these notice filings are publicly available, the secured party should consider possible confidentiality restrictions before identifying particular IP licenses or other confidential information in a schedule attached to a lien filing. See Report § 2.3.3 (patents kept secret for a limited time). The debtor’s “licenses out,” where the debtor grants rights in its intellectual property to third parties, are listed on schedule F. See infra section 2.1.4(ii). Except for exclusive copyright licenses under some circumstances, licensesout would not normally be included in any filing in an IP filing office. See Report § 4.6.2. The debtor may argue that listing all its IP licenses would be an unreasonable burden. Depending on the secured party’s policies, the nature of the debtor’s business, and the debtor’s credit standing, the secured party may agree to limit the scheduling requirement for licenses to material or exclusive licenses and/or to exclude licenses of commercial off-the-shelf software. 30. A debtor may ask the secured party to delete unqualified representations and warranties that intellectual property is valid, or to limit them to the debtor’s knowledge or to add a materiality qualifier. For example, the debtor may argue that it cannot know whether a copyright is not fairly claimed due to unconscious copying of another author’s work, whether there is prior art existing that would invalidate a patent, or whether anyone else has previously used the same or a similar trademark. A knowledge-based representation will at least give the secured party some comfort that the debtor did not commit an intentional fraud on an IP filing office. On the other hand, the secured party may argue that the risk of invalidity should be allocated to the debtor completely, as the debtor is in the better position to investigate problems that might affect validity. A common additional representation in IP security agreements is that the debtor’s intellectual property “has not been adjudged invalid, in whole or in part.” This language does not appear to add anything to the basic representations that the debtor’s copyrights, patents, and trademarks are subsisting, valid, and enforceable. Moreover, this additional statement is confusing, because intellectual property often is judged invalid “in part” during the application process. 31. If a patent application has not yet been published, the debtor may be concerned about the possible disclosure of information, such as the patent title, that would otherwise be kept confidential by the PTO until publication of the patent. A common suggestion is to identify only the application numbers of unpublished patents in schedules, or to delay filing the lien until the patent has been published. Model Intellectual Property Security Agreement 897 • valid and enforceable, and • not subject to any overdue IP Filing Office fees. (iii) Each Patent application listed on Schedule C is subsisting, and Debtor has no knowledge of any circumstances that might prevent the issuance of a valid Patent in due course. 2.1.3 Trademarks (i) Schedule D lists all of Debtor’s subsisting • registered Trademarks, and Trademark applications pending, in any IP Filing Office, • material unregistered Trademarks, and • Trademark Licenses-In. (ii) Each Trademark registration and material unregistered Trademark listed on Schedule D • is valid and enforceable,32 and does not relate to a mark that has been abandoned, and • is not subject to any overdue IP Filing Office fees. (iii) Debtor has no knowledge of any circumstances that might prevent the valid registration of any Trademark for which a Trademark application is listed on Schedule D. (iv) Debtor has notified Secured Party of all circumstances known to Debtor that could reasonably be expected to lead to the invalidity or unenforceability of a Trademark listed on Schedule D, including Debtor’s failure to use the mark or to enforce it against material unauthorized uses by third parties. 2.1.4 Domain Names and IP Licenses (i) Schedule E lists each of Debtor’s subsisting Domain Names, its registrant, and its next renewal date.33 32. Some debtors are concerned about the implications of making a validity representation (even one limited by “knowledge”) as to trademarks that are no longer in use, and will note exceptions to this representation and warranty or seek to exclude such marks from the collateral. See Report § 2.4.5. 33. If a domain name is vital to the debtor’s business, the secured party may want to be in a position to take control of the domain name immediately following the debtor’s default. In that case, the secured party will want the security agreement to contain information to assist in taking control. This information might include the identity and locations of the servers used in connection with the domain name, the persons having control over the servers, the debtor’s administrative contact with the registrar, and, most important, the user names and passwords necessary to access the debtor’s ac- 898 The Business Lawyer; Vol. 71, Summer 2016 (ii) Schedule F lists Debtor’s subsisting Licenses-Out of Intellectual Property Collateral.34 (iii) Each IP License and Domain Name Contract listed on any Schedule to this Agreement is in full force and effect and constitutes a valid and enforceable obligation of Debtor and, to Debtor’s knowledge, each other party thereto, except as enforceability may be limited by bankruptcy, insolvency, reorganization, moratorium, or similar laws affecting the enforcement of creditor’s rights generally, and by general equitable principles (whether enforcement is sought by proceedings in equity or at law). (iv) No further consent of any party to any such IP License or Domain Name Contract is required in connection with the execution, delivery, and performance of this Agreement. (v) No further consent or authorization of, filing with, or other act by or in respect of any Governmental Authority is required in connection with the execution, delivery, performance, validity, or enforceability of any such IP License or Domain Name Contract by or against any party thereto. (vi) Neither Debtor nor, to Debtor’s knowledge, any other party to any such IP License or Domain Name Contract is in default in the performance or observance of any of its terms. (vii) Debtor’s rights under each such IP License or Domain Name Contract are not subject to any defense, offset, counterclaim, or other claim [that could reasonably be expected, either individually or in the aggregate, to have a Material Adverse Effect on the value of the Collateral taken as a whole].35 count at the registrar. A debtor may refuse to disclose passwords or may insist upon an escrow arrangement for such information. In addition, passwords, server locations, and contact individuals can change over time, so a secured party seeking this information should have a mechanism for obtaining updates. Further, because the domain name may contain a trademark owned by the debtor (for example, “Amazon” in “Amazon.com”), the secured party should ensure that it also has a perfected security interest in that trademark, or it may be prevented from using the domain name. 34. The debtor’s scheduling obligations may justifiably be stricter for licenses-out. Licenses-out are analogous to encumbrances on the licensed intellectual property, at least if the licenses are granted before the effective date of the security agreement. See Report §§ 4.6.2 (exclusive copyright licenses), 4.6.3 (nonexclusive copyright licenses) & 4.6.4 (patent and trademark licenses). 35. A debtor with a large IP portfolio will be reluctant to make this kind of broad representation, and will want a materiality provision or other limitation. The specific wording and scope of such a materiality exception would generally be established in the loan agreement. “Material Adverse Effect” is defined in section 7.1(a) to have the same meaning as in the loan agreement, and the related language should be adjusted accordingly. Model Intellectual Property Security Agreement 899 2.1.5 Other Intellectual Property Schedule G lists all of Debtor’s material Other Intellectual Property that is not listed on any of Schedules B through F and is not confidential. 2.1.6 Ownership (i) Debtor is the sole legal and equitable owner of, and has good title to, the Collateral, free and clear of any Lien, other than • Liens permitted under the Loan Agreement, • Liens permitted by Secured Party’s express prior written consent, or • Permitted Licenses (each a Permitted Lien).36 (ii) Debtor is the record owner of all Collateral that is registered, or for which an application is pending, in any IP Filing Office, and there are no gaps in the chain of title to such Collateral.37 (iii) No IP License materially adversely affects Debtor’s rights to conduct its business as currently conducted. (iv) No third party has a contractual right to require Debtor to Transfer38 any Collateral, except to renew Permitted Licenses. 36. In virtually all secured loans, the secured party prohibits additional liens on the collateral, but agrees that the existence of certain claims, encumbrances, and liens on the collateral will not constitute a default. The exceptions are generally defined collectively and narrowly as “permitted liens” or “permitted encumbrances” while the term “lien” is generally defined broadly. Under the standard definitions, some IP licenses would arguably be treated as liens but not necessarily permitted liens. The model agreement incorporates the standard kinds of permitted liens but also adds certain kinds of IP licenses. See section 7.1 (defining “Permitted License”). The separate definition of “Permitted Lien” is included in the model agreement for instructive purposes; ordinarily this definition would be in the loan agreement, to cover all liens that are allowed. 37. Like real estate, registered intellectual property has a “chain of title” created by recording. See Report § 4.1.1. Gaps in the chain of title to registered intellectual property are more common than gaps in the chain of title to real property. For instance, a debtor may acquire a portfolio of intellectual property with existing gaps or unreleased liens. In such cases, the acquisition agreement may include a post-closing covenant to record documents needed to complete the chain of title, although it may be impracticable to obtain or locate assignments for gaps that were created by prior owners. In such cases, a qualification of the “reasonable efforts” is common. Also, if the debtor has recently changed its name or acquired intellectual property, the title records in the IP filing offices may not yet have been updated. In such cases, specific exceptions to the record ownership representation may be appropriate. 38. The term “Transfer” is defined to cover voluntary assignments and transfers of collateral other than transfers for collateral purposes (which are treated as “Liens”). See infra section 7.1 (Defined Terms) & note 50. The definition is not the same as the definition of a “transfer of copyright ownership” in the Copyright Act, but does include an exclusive license that is equivalent to an absolute assignment. See 17 U.S.C. § 101 (2012) (including exclusive copyright license in the definition of “transfer of copyright ownership interest”). 900 The Business Lawyer; Vol. 71, Summer 2016 (v) Debtor has not Transferred or agreed to Transfer any Collateral listed on Schedules B–G except in a Transfer that is • expressly permitted by the Loan Documents, • permitted by Secured Party’s express prior written consent, or • a Permitted License39 (each a Permitted Transfer). 2.1.7 Restrictive Provisions Schedule H lists all of Debtor’s Intellectual Property and IP Licenses (including Excluded Property) that are both • listed on any of Schedules A through G, and • subject to or contain a Restrictive Provision.40 2.1.8 Existing or Threatened Claims; Infringement Except as described on Schedule K,41 (i) No claim is pending or has been made or, to Debtor’s knowledge, threatened, including via an invitation to license, by any Person (other than by 39. An outright prohibition on the future licensing of intellectual property may impede the debtor’s business. In some businesses, the debtor grants IP licenses to its customers in the same way that a merchant sells inventory to its customers. U.C.C. Article 9 recognizes this concept, and protects a “nonexclusive licensee in the ordinary course of business” from a security interest created by its licensor, U.C.C. § 9-321(b), in the same way that it protects a “buyer in ordinary course of business from a security interest created by its seller.” Id. § 9-320(a). Depending on the circumstances, including the secured party’s view of the importance and value of the debtor’s IP rights, the parties may agree to permit additional license transactions. These might include IP licenses that the debtor issues in the ordinary course of business, nonexclusive licenses, and/or licenses that do not adversely affect the debtor’s use of the licensed intellectual property in its business. The model agreement uses the defined term “Permitted Licenses” to cover some of these possibilities. See infra section 7.1 (Defined Terms) & note 50. Even if the security agreement allows the debtor to issue new IP licenses, however, such licenses will still be subject to the security interest unless the license fits within the scope of U.C.C. section 9-321. To avoid argument over the statutory definition of “licensee in ordinary course” and the interaction between that definition and the debtor’s ability to issue “Permitted Licenses,” the debtor may ask the secured party to include a “non-disturbance” clause or expressly subordinate its lien to “Permitted Licenses.” See infra section 5.4 (Non-Disturbance of Permitted Licenses). 40. This representation requires the debtor to identify its licenses that contain language purporting to keep the debtor from assigning its rights under the license or that may be subject to provisions of law prohibiting or restricting such assignment. The debtor is not required to make a determination as to the legal effectiveness of such anti-assignment provisions, since section 1.2.3 above excludes a license from the collateral if the restrictive provisions are effective to prohibit a security interest. The schedule called for in this section will be purely informative, allowing the secured party to make its own determination as to the effectiveness of anti-assignment provisions affecting particular licenses. Note that, because IP licenses generally do prohibit assignment, the representation might require the debtor to schedule virtually all its licenses-in, unless a materiality qualifier is added. See Report § 4.5 (discussing non-assignable licenses); see supra note 30 (regarding materiality qualifiers). 41. Claims are generally listed on a separate schedule for all kinds of intellectual property, but alternatively could be listed on the applicable schedule for a particular type of intellectual property. Model Intellectual Property Security Agreement 901 an IP Filing Office examiner in the ordinary course of prosecution of applications) asserting that any Intellectual Property Collateral is wholly or partly invalid or unenforceable, or that any such Collateral or the conduct of Debtor’s business infringes, dilutes, misappropriates, or otherwise violates the rights of any Person.42 (ii) To Debtor’s knowledge, neither the use of the Collateral by Debtor or its licensees, nor the conduct of Debtor’s business, infringes, dilutes, misappropriates, or otherwise violates any Intellectual Property owned or controlled by any Person. (iii) To Debtor’s knowledge, no Person is infringing, diluting, misappropriating, or otherwise violating any of Debtor’s rights in the Collateral, and Debtor has not made any such claim that has not been resolved.43 2.1.9 IP Notices Debtor uses proper notices of Copyright proprietorship in connection with publication of its Copyrighted works and proper statutory notices in connection with its use of its issued Patents and registered Trademarks.44 2.1.10 Standards of Quality (i) Debtor uses consistent standards of quality in all products manufactured, distributed, and sold, and in the performance of services provided, in connection with the Trademark Collateral, and (ii) Debtor has taken all action necessary to ensure that all licensees of Debtor’s Trademarks adhere to Debtor’s established standards of quality 42. The debtor may seek to limit the “no claims made” representation to a certain number of years prior to the effective date or to claims made or threatened in writing. This representation is also often limited to claims that are reasonably likely to have a material adverse effect on the debtor. 43. A representation as to non-infringement of the debtor’s intellectual property by others is often limited to the debtor’s knowledge because there is no way a debtor can know what every third party is doing. In addition, popular marks, domain names, logos, characters, or technology are often subject to many small infringements of limited duration or scope. This representation is therefore typically limited to material infringements or infringements that are reasonably likely to have a material adverse effect on the debtor. Note that limiting the representation to cover the debtor’s material intellectual property, rather than material infringements, is somewhat illusory and unlikely to be useful for the debtor or the secured party; the debtor’s material intellectual property is generally the most attractive to unauthorized users and, thus, more likely to be subject to infringement. 44. This representation can be surprisingly controversial. Although good IP marking practices would work to the debtor’s benefit, many debtors do not use them consistently. As a general matter, marking is not required to preserve IP rights but is desirable to counter the defense of “innocent infringement.” The parallel covenant—that the debtor will employ good IP marking practices in the future (section 3.6.3 below)—can be controversial for the same reason. 902 The Business Lawyer; Vol. 71, Summer 2016 for the goods and services provided by the licensee using the licensed Trademark.45 2.1.11 Proprietary Software For each of Debtor’s proprietary software programs included in the Collateral: (i) Each of Debtor’s current and former employees, officers, contractors, and consultants who has developed, contributed to, modified, or improved such program either performed such work as a “work for hire” or has assigned to Debtor all of such Person’s interest in such programs. (ii) There are no material defects or malfunctions in the program that have not been corrected, and the program operates in accordance with its specifications in all material respects. (iii) The program does not contain any device or feature designed to disrupt, disable, or otherwise impair the functioning of any software program. (iv) To Debtor’s knowledge, there has been no unauthorized access to the program or to any of Debtor’s proprietary databases. (v) Except as otherwise provided in this Agreement, Debtor has not delivered, licensed, or made available, and has no obligation (present, contingent, or otherwise) to deliver, license, or make available the program’s source code to any escrow agent or other Person other than Debtor’s current employees for the performance of their duties to Debtor.46 (vi) The program is not subject to any open source, free software, or other license terms and conditions that would require Debtor to disclose any source code or license the program, the code, or any modifications to a third party.47 45. Trademark owners protect their trademarks in part by maintaining consistent quality standards for themselves and their licensees. Marks that are the subject of “naked licensing” devoid of quality control by the owner may be considered compromised and less attractive to a purchaser on foreclosure. Registered marks that are subject to naked licensing may be deemed to have been abandoned. See Report § 2.4.5. 46. Some software is released in source code form, in which case this representation would not be appropriate. This representation is intended to apply only where proprietary software is released to the public in compiled object code form, or where a release of the software in source code form might adversely affect the debtor’s proprietary rights in the code by disclosing a trade secret. 47. Examples of open source programs that require such disclosure and licensing are the GNU General Public License (any version), GNU Lesser General Public License, Mozilla Public License, and BSD License. Notwithstanding the possible negative consequences of incorporating open source code into a software program, it may be impracticable for a debtor to represent that it has not used any open source software in its proprietary programs. Its personnel who would have the relevant knowledge may no longer be with the company and documentation of the software development pro- Model Intellectual Property Security Agreement 903 2.1.12 No Government Funding Debtor has not received funding from any governmental entity or any academic funding that was used in the development of the Collateral.48 2.2 DEBTOR 2.2.1 Existence; Power; Authority Debtor is validly existing and has the corporate (or other organizational) power and capacity to enter into, and perform all of its obligations under, this Agreement. Debtor’s execution and delivery of, and performance of its obligations under, this Agreement have been duly authorized by all necessary action by or on behalf of Debtor. 2.2.2 Debtor Information49 Schedule J sets forth • if Debtor is a corporation, limited liability company, limited partnership, corporate trust, or other registered organization, (i) the Jurisdiction under whose law Debtor is organized, and (ii) Debtor’s name as shown in its public organic record in that Jurisdiction. • if Debtor is an individual, (i) the State and address of Debtor’s primary residence and (ii) Debtor’s name as shown on an unexpired driver’s license issued by that State. • the address of Debtor’s chief executive office and, if different, its principal place of business, • the addresses where Debtor’s records concerning the Collateral are maintained, and • Debtor’s taxpayer identification number, if any. cess may not exist or provide these details. This representation is more important where the debtor’s most valuable collateral is proprietary software. 48. For example, patent rights in inventions made with federal assistance may be subject to limitations and government claims. See 35 U.S.C. §§ 200–212 (2012). 49. These representations cover the information necessary to complete U.C.C. financing statements and file them in the correct offices. They are not IP-specific and need not be included here if covered in the loan agreement or elsewhere. 904 The Business Lawyer; Vol. 71, Summer 2016 3 COVENANTS 3.1 NO TRANSFERS OF Debtor will not Transfer 3.2 NO LIENS ON COLLATERAL 50 any Collateral except in a Permitted Transfer.51 COLLATERAL Debtor will not create and will take any action necessary to remove any Lien on the Collateral other than a Permitted Lien.52 3.3 NO RESTRICTIVE PROVISIONS Debtor will not enter into any IP License-In after the Effective Date that contains a Restrictive Provision.53 50. Note that this covenant prohibits the “Transfer” of collateral, while section 3.2 prohibits “Liens.” Both terms are defined in section 7.1. Most standard loan agreement definitions of liens and transfers are broad enough to cover licenses in both definitions, although IP licenses may be affected differently. In this agreement, “Lien” is defined to include security interests, collateral assignments, and involuntary liens, as well as IP licenses that create encumbrances. “Transfer” is defined to include only voluntary transactions that transfer title, including some exclusive IP licenses. The definition of “Transfer” includes the “disposition” or “disposal” of collateral, but excludes the debtor’s actual or deemed abandonment of IP collateral. A common variant of this covenant prohibits the “disposition” or “disposal” of collateral, arguably preventing the debtor from abandoning or allowing any IP registrations to lapse. Accordingly, a covenant worded in terms of “disposition” without such an exception would need to be harmonized with the covenant in section 3.6.2 below, which requires the debtor to maintain the collateral. Conversely, the secured party may consider extending this negative covenant to cover “Excluded Property,” which otherwise would not be covered. 51. An unqualified prohibition on the transfer or license of IP collateral could be impractical for debtors in the IP licensing business. The exception for “Permitted Transfers” allows licenses and other transfers permitted under the loan agreement and nonexclusive licenses granted in the ordinary course of business. (The separate definition of “Permitted Transfer” is included in the model agreement mostly for instructive purposes. Although this definition ordinarily would be in the loan agreement, to cover all “transfers” that are allowed, the definitions in the model agreement differentiate between “transfers” for security and “transfers” of title, so that licenses are permitted regardless of the nomenclature.) Another common approach is to limit the restriction to material collateral or to provide specific exceptions. Yet another approach is to require the secured party’s prior consent (not to be unreasonably withheld) for transfers or licenses. However, this can be intrusive if the debtor has a licensing-oriented business or a large IP portfolio. In any event, many secured parties would not want to be burdened with requests for such approvals on a regular basis. On the other hand, the secured party may consider extending this negative covenant to cover Excluded Property, which otherwise would not be covered. 52. Note that this covenant prohibits “Liens” on the collateral, while section 3.1 prohibits “Transfers.” Both terms are defined in section 7.1. See supra note 50. 53. Depending on the nature of the debtor’s business, the parties may want to limit this covenant. One common exception carves out “customary non-assignment clauses in intellectual property licenses,” on the grounds that IP licenses customarily prohibit assignment by the licensee and the debtor may be unable to convince the licensor to change its typical practices. The effectiveness of such provisions is a separate question. See supra note 11; Report § 4.5 (discussing “non-assignable” licenses). Model Intellectual Property Security Agreement 3.4 REGISTRATION OF COPYRIGHTS PURSUIT OF PATENTS AND 905 TRADEMARKS; To the extent not already registered or the subject of a pending application, Debtor will promptly register all material Copyright and Trademark Collateral with the applicable IP Filing Office, and will pursue Patents on all material patentable inventions, in each case except to the extent that Debtor reasonably determines that the costs or risks of such action would materially outweigh the probable benefits.54 3.5 RECORDING OF ASSIGNMENTS AND IP LICENSES Within 30 days after obtaining a written assignment of a registered or appliedfor Copyright, Patent, or Trademark from any Person, Debtor will record the assignment in the applicable IP Filing Office. Within 30 days after obtaining an IP License for which recordation will give third parties constructive notice of Debtor’s interest, Debtor will record the IP License in the applicable IP Filing Office.55 3.6 PROTECTION OF COLLATERAL 3.6.1 Compliance with Law Debtor will comply in all material respects with all United States laws and regulations applicable to any Collateral. 54. Secured parties sometimes request that the debtor agree to register all its intellectual property— especially its material copyrights—so that the secured party can take the steps that are necessary or advisable to perfect and protect its security interest. If an unregistered copyright is later registered, the perfection method changes from U.C.C. filing to recordation in the Copyright Office, and the secured party may become unperfected. See Report § 4.2.1. To limit this risk, the secured party may propose that material or certain copyrights be registered and liens be filed upon application and registration. The risk of becoming unperfected is lower for patent and trademark collateral, since all courts addressing the federal preemption issue have held that federal filings are not necessary or effective to perfect a security interest in these types of intellectual property. Report § 4.2.2. Although secured parties often make protective federal lien filings in addition to U.C.C. filings for patent and trademark collateral, a secured party will not typically require patents or trademarks to be registered as a preliminary step to federal lien filings. In the debtor’s view, however, an unlimited covenant to register intellectual property will undoubtedly be objectionable because registration can be burdensome and costly, especially for patents. Pursuing IP registrations generally entails a business decision as to how material the intellectual property is, the value that registration will add, whether the intellectual property will be used long-term, and how easily registration can be obtained. A covenant to register intellectual property might be appropriate for specific and/or material items of intellectual property, such as a key software product, a motion picture, a critical invention, or the trademark for a primary consumer product name. 55. This covenant requires the prompt recordation of any assignments of intellectual property to the debtor. Such recording generally protects the debtor’s ownership interest in the intellectual property against third parties that purchase the intellectual property from the prior owner without notice of the assignment. See Report §§ 2.2.4 (copyrights), 2.3.4 (patents) & 2.4.4 (trademarks). 906 The Business Lawyer; Vol. 71, Summer 2016 3.6.2 General With respect to Collateral that is necessary to the conduct of Debtor’s business as currently conducted, Debtor will take all reasonable steps to • maintain the registrations of all such registered Collateral in full force and effect, • prosecute any pending applications for registration of such Collateral, and • prevent any such Collateral from being abandoned, forfeited, or dedicated to the public.56 Such steps may include: • taking actions in, or filing responses to office actions issued by, an IP Filing Office, court, or Governmental Authority, • paying when due all maintenance and other required fees, • filing timely applications for renewal or extension, • filing affidavits or declarations of use under sections 8 and 15 of the Lanham Act, and • filing divisional, continuation, continuation-in-part, or reissue applications for Patents. 3.6.3 IP Notices Debtor will use proper notices of copyright proprietorship in connection with publication of its Copyrighted works, and proper statutory notices in connection with its use of its registered Trademarks and issued Patents.57 56. A debtor may object to undertaking an unqualified obligation to maintain all its intellectual property in effect. The introductory language in section 3.6.2 limits this obligation to only the intellectual property that is “necessary” for the debtor’s business. The determination of whether particular IP items are “necessary” will depend on the facts and circumstances in each case. If practicable, the parties may agree to designate particular items or types of collateral as “necessary.” Alternatively, the parties may agree to more generic exceptions on a qualitative or quantitative basis, and exclude (for instance) collateral with minimal commercial value or usefulness or collateral for which the cost of maintaining the registration would materially outweigh the probable economic benefits to be gained. The parties may agree to a procedure for the debtor to notify the secured party and obtain consent if the debtor wants to abandon particular intellectual property. Note that a debtor may have legitimate business reasons for deciding to make some of its own copyrights or patents available to others for free, for product marketing or as “open licensing,” or otherwise. But any such “dedication to the public” should be purposeful, not accidental, so specific exceptions could be added to this section. 57. See supra note 44 regarding good IP marking practices and the debtor’s possible reluctance to make this commitment. Model Intellectual Property Security Agreement 907 3.6.4 Trademark Quality Control (i) Debtor will maintain the standards of quality of all products manufactured, distributed, and sold, and in the performance of services provided, in connection with Trademark Collateral at a level at least as high as on the Effective Date.58 (ii) Debtor will take all action necessary to ensure that all licensees of its Trademarks adhere to Debtor’s then-established standards of quality for the goods and services provided by the licensee using the licensed Trademark.59 3.6.5 Performance of IP Licenses Debtor will perform all its material obligations under each IP License to which it is a party. 3.6.6 Protection of Trade Secrets Debtor will take reasonable measures to protect its material trade secrets, including entering into confidentiality agreements with employees and labeling and restricting access to secret information and documents.60 3.6.7 Infringements by Others Debtor will • promptly notify Secured Party, providing reasonable details, of any Person’s infringement, dilution, misappropriation, or other violation of any Collateral,61 and 58. To protect the enforceability and value of a trademark, the owner must maintain a consistent and uniform level of quality. If the quality of goods or services sold under the mark is changed without notice, the mark may mislead customers and lose its meaning as a mark. The purpose of this covenant is to set a fairly objective test, so that the secured party has some comfort that the debtor will continue to monitor the use of its trademarks. Although this approach is common, the debtor may object that the requirement interferes with its business strategy and is technically not required by law to maintain the trademark rights. A debtor-friendly modification may permit changes in quality that are uniformly maintained, part of the debtor’s business strategy, and not misleading to customers. 59. See Report § 2.4.5 (debtor’s monitoring of licensee’s products and services for compliance with debtor’s quality standards). 60. Taking reasonable measures to protect the confidentiality of trade secrets is required for trade secret protection. See Report § 2.5.4. The measures listed in this covenant are commonly recognized as reasonable, but may need to be tailored to reflect the debtor’s actual practices. 61. If infringements are common in the debtor’s business—for example, software, fashion, entertainment, or publishing—but tend to be transitory, then neither the debtor nor the secured party will want this covenant to apply to all infringements. In such a case, the notice obligation may be limited to material infringements of material intellectual property. Note that, if the debtor is a party to a government-funded research contract, use of the debtor’s intellectual property by the U.S. government that would otherwise constitute infringement will be legally permitted. See 35 U.S.C. §§ 200–212 (2012). 908 The Business Lawyer; Vol. 71, Summer 2016 • take all reasonable actions to stop such infringement, dilution, misappropriation, or other violation, including seeking damages for or enjoining such conduct. 3.6.8 Challenges and Suits by Others Debtor will • promptly notify Secured Party, providing reasonable details, of the institution of any proceeding before a Governmental Authority regarding the validity or enforceability of, or Debtor’s right to register, own, or use, any Intellectual Property Collateral, and of any adverse determination on the merits in any such proceeding (in each case other than non-final “office actions” by IP Filing Office examiners in the ordinary course of prosecution of applications),62 and • take all reasonable steps to defend its rights in the Intellectual Property Collateral in such proceedings and other interference, reexamination, opposition, cancellation, infringement, dilution, misappropriation, and other proceedings. 3.7 ESCROW AGREEMENT Debtor will enter into a source code escrow agreement with Secured Party by the Effective Date.63 Debtor will deposit with the escrow agent under the escrow agreement all materials required under the escrow agreement, including the source code for • current versions of Debtor’s proprietary computer software, by the 10th Business Day following the Effective Date, and • each update to such software by the 10th Business Day following public release of the update.64 62. A materiality or material adverse effect limitation may be appropriate here if the debtor has a large IP portfolio and many proceedings in progress. See supra note 30 (regarding materiality qualifiers). 63. Escrows to hold pledged source code for a secured party are infrequently used in financings, although such arrangements are commonplace in software licensing programs. Source code escrows may be too burdensome for most transactions but may be appropriate where the debtor is a software developer with a single product that provides much of its revenue. An escrow enables the secured party to easily access the source code upon foreclosure when the debtor may be uncooperative and its employees scattered. The escrow arrangement should be put in place on the effective date; the parties will be less motivated to do so later. Setting up an escrow arrangement after the debtor becomes insolvent may compromise the enforceability of the arrangement. Most commercial vendors providing escrow services have their own form agreements, which are often not subject to significant negotiation. However, such forms tend to be fairly balanced as to the parties’ rights and obligations and can be implemented quickly. Escrow arrangements can theoretically be used to maintain and ensure access to other confidential IP-related information, although this approach is rare in practice. 64. Many commercial software programs are continuously updated to fix bugs and include minor enhancements. The frequency of escrow deposits and the materiality of an update that triggers an Model Intellectual Property Security Agreement 909 Debtor will not establish source code escrow arrangements with any third party without Secured Party’s prior written consent. 3.8 CHANGE OF DEBTOR INFORMATION65 Debtor will notify Secured Party 15 days before taking any action that will cause, and will promptly notify Secured Party of any other event that may cause or has caused, any information in Schedule J, “Debtor Information,” to become inaccurate. 3.9 MAINTENANCE OF RECORDS; AUDIT AND INSPECTION Debtor will maintain appropriate and customary books and records with respect to the Collateral and will permit Secured Party to visit Debtor’s premises to inspect such books and records and any tangible items embodying the Collateral. Such visits and inspections will be made during regular business hours with reasonable advance notice, except that notice will not be required while an Event of Default exists. Debtor will deliver copies of reports and information as to Collateral in Debtor’s possession or under its control as Secured Party reasonably requests. 4 EVENTS OF DEFAULT; REMEDIES 4.1 EVENTS OF DEFAULT Each of the following events or conditions is an Event of Default: (i) There is an “Event of Default” as defined in the Loan Agreement. (ii) A representation or warranty made by Debtor in this Agreement is incorrect in any material respect when made or deemed made. (iii) The Security Interest in • any [material] item of Collateral that is described on any of Schedules B through G[, or • any other material [item of] [part of the] Collateral,] is not a perfected first-priority security interest.66 escrow deposit obligation need to be negotiated based on the facts. One test might be that the update has resulted in a new release number. See supra note 30 (regarding materiality qualifiers). 65. Like the representations in section 2.2.2, this covenant is not IP-specific and may be covered in the loan agreement or elsewhere. See supra note 49. 66. Without the second bulleted clause, this event of default only concerns those items of collateral described on the schedules; these would presumably encompass all the collateral on which the secured party based its credit decision. If some of the scheduled collateral is not material, to the point that the secured party may decide not to take the steps necessary to perfect its security interest or protect its priority, then the parties may wish to limit the first bulleted clause to material items of collateral. The parties may also agree to include the second bulleted clause to bring in material collateral not listed on a schedule. But whether this second clause should be used, and whether it should apply item-by-item, will depend on the characteristics of the collateral, including the extent to which per- 910 The Business Lawyer; Vol. 71, Summer 2016 (iv) Debtor or a third party challenges the attachment, perfection, or priority of the Security Interest in any Collateral as to which Debtor has represented that the Security Interest is perfected and will have priority over competing security interests, and Secured Party believes that the challenge has a material probability of success and, if successful, will have a Material Adverse Effect on the value of the Collateral taken as a whole. (v) Debtor Transfers any Collateral, except in a Permitted Transfer. (vi) Any Collateral is subject to a Lien other than a Permitted Lien.67 (vii) Debtor fails to observe or perform any of its other obligations under this Agreement and does not correct the failure within 10 days after notice from Secured Party. 4.2 ENFORCEMENT, COLLECTION AND DISPOSITION OF COLLATERAL While an Event of Default exists, Secured Party may take any appropriate actions to enforce, collect, protect the value of, or dispose of Collateral to the extent permitted by applicable law.68 Such actions may include (i) taking possession of any tangible Collateral, and entering premises where such Collateral is located to effect such possession, (ii) taking physical or electronic action to render any tangible Collateral unusable by Debtor, and entering premises where such Collateral is located to effect such action, (iii) preparing and advertising Collateral for sale, lease, license, or other disposition, (iv) disposing of any Collateral by public or private sale, lease, license, or other disposition, at Secured Party’s offices or elsewhere, at such prices as Secured Party deems acceptable, for cash or on credit, without assumption of any credit risk, (v) to the extent possible without violating any then-existing Permitted Licenses, granting licenses and sublicenses in any Collateral to third parties, on an exclusive or nonexclusive basis, on such terms and conditions and in such manner as Secured Party may determine, with such licenses fection and priority are governed by non-U.S. law. If the second bulleted clause is not used, then paragraph (iii) would read (without bullets): “The Security Interest in any [material] item of Collateral that is described on any of Schedules B through G is not a perfected first-priority security interest.” 67. The parties may wish to provide a cure period for the debtor to have the lien released. 68. Some IP security agreements purport to automatically assign IP collateral to the secured party upon default. Other agreements (e.g., loan agreements, partnership agreements, investment agreements) may not be called security agreements, but may similarly provide that the intellectual property is deemed to be assigned to the non-owner if the owner fails to make a payment or otherwise breaches the agreement. The model agreement does not contain this language because it is inconsistent with U.C.C. Article 9, and it could encourage a secured party to take actions that would violate Article 9. See Report §§ 3.8, 4.7. Model Intellectual Property Security Agreement 911 or sublicenses as are lawfully granted by Secured Party (or by Debtor by means of Secured Party’s power of attorney) surviving as direct licenses or sublicenses of Debtor when the Event of Default no longer exists, (vi) notifying any account debtor or other Person liable for payment to Debtor with respect to any Collateral of Secured Party’s interest in such Collateral, instructing the account debtor or other Person to make the payment directly to Secured Party or as Secured Party directs, and receiving and collecting such payments, (vii) notifying parties to any IP License or Domain Name Contract included in the Collateral that Debtor’s rights and interest in the IP License or Domain Name Contract have been assigned to Secured Party, and communicating with such parties to verify the existence, amount, terms, and status of the IP License or Domain Name Contract, (viii) instituting, defending, or settling legal proceedings to collect on or enforce Debtor’s rights and remedies against third parties, including account debtors, licensors, licensees, and other parties to IP Licenses or Domain Name Contracts, under or on account of any Collateral, without becoming a party to or incurring any liability under any IP License or Domain Name Contract, (ix) paying, discharging, purchasing, contracting for, or compromising any actual or threatened Lien on Collateral that in Secured Party’s opinion may be prior or superior to the Security Interest or may adversely affect Secured Party’s rights, [and] (x) taking any actions that Secured Party deems reasonably appropriate to maintain Debtor’s standards of quality, as referenced in section 3.6.4 (“Trademark Quality Control”), for products manufactured, distributed, or sold, or services performed, in connection with Trademark Collateral [, and] [(xi) exercising any of Debtor’s rights in Collateral as fully and completely as though Secured Party were the absolute owner of such rights for all purposes69]. 4.3 LICENSE TO SECURED PARTY TO USE INTELLECTUAL PROPERTY Solely to enable Secured Party to exercise its rights and remedies under this section 4 during and after an Event of Default, Debtor grants Secured Party a nonexclusive, irrevocable, worldwide license (or sublicense) to use and exercise Debtor’s rights in or to any of Debtor’s Intellectual Property (whether or not in- 69. A secured party concerned about inadvertently acquiring control of the debtor’s business may want to omit clause (xi). 912 The Business Lawyer; Vol. 71, Summer 2016 cluded in the Collateral70), without payment of royalty or other compensation to Debtor. This license is in addition to Secured Party’s other rights with respect to the Collateral, and is subject to the following: • To the extent that this license is a sublicense of Debtor’s rights as a licensee under any IP License (the primary license), this license is subject to any limitations in the primary license. • Without limiting the foregoing, this license does not include Intellectual Property if the primary license for such Intellectual Property by its terms or as a matter of law prohibits sublicenses, requires the licensor’s consent, or entails additional consideration. • The term of this license is the same as the term of this Agreement.71 • For licensed Trademarks, this license is subject to Debtor’s standards of quality control and inspection as provided in section 4.2(x), as necessary to avoid the risk of invalidation of the Trademarks.72 4.4 ACCESS TO DEBTOR’S SYSTEMS AND EXPERTISE In connection with Secured Party’s exercise of its rights and remedies under this section 4, Debtor will, at Secured Party’s request and to the extent within Debtor’s power and authority, give Secured Party access to • all software used for the management of data as to the Collateral or any Intellectual Property licensed to Secured Party under section 4.3, and access to all media in which any of such Collateral or Intellectual Property may be recorded or stored, 70. The point of this license is to allow the secured party to use the debtor’s intellectual property as necessary to sell collateral without risking liability for infringement of the intellectual property, for example, through marketing efforts or by use of store signage. Under section 4.2, the secured party already has this right as to the collateral, and this license is not intended to limit the secured party’s rights to use the collateral. In many cases, this license covers only the IP collateral itself, to allow for its use under license during the foreclosure process. 71. Section 6.1 addresses the term of the security agreement, meaning the time period during which the security agreement—and this license—remain effective. The introductory language limits the scope of the license to actions to enable the secured party to exercise post-default remedies; because the scope of the license is limited, it is not necessary to create a “springing” license by deferring grant of the license. 72. Some debtors and secured parties feel more comfortable with an objective quality standard. An alternative formulation requires that the quality of the debtor’s goods and services sold under the licensed trademarks be maintained at substantially the level that existed immediately before the event of default. Some debtors may request that the secured party’s license be subject to exclusive licenses granted by the debtor prior to the effective date or permitted under the security agreement. Otherwise, the grant of a license to the secured party might cause the debtor to violate such licenses or inhibit the debtor’s ability to grant exclusive licenses permitted under the loan documents. In response, the secured party may argue that (1) it will only exercise its rights under the license during an event of default, so its license will have no commercial impact until then, and (2) the non-disturbance clause in section 5.4 below will protect a licensee from losing its rights. This may not be satisfactory to the debtor as a business matter. If so, additional language can be added to carve out any use by the secured party that would violate a permitted exclusive license. Model Intellectual Property Security Agreement 913 • Debtor’s know-how, expertise, and relevant data (such as customer lists) regarding the Collateral or the manufacture, sale, distribution, or provision of any goods or services in connection with Intellectual Property Collateral, and • Debtor’s personnel responsible for such matters.73 4.5 GENERAL REMEDY PROVISIONS 4.5.1 U.C.C. Remedies While an Event of Default exists, Secured Party may exercise all rights and remedies available under the U.C.C. to a secured party following a debtor’s default. 4.5.2 Remedies Cumulative The remedies provided to Secured Party in this Agreement are cumulative and in addition to the other rights and remedies available under applicable law. Remedies may be exercised separately or concurrently, without demand on or notice to Debtor, except as required (A) expressly by this Agreement or (B) by applicable law, and the exercise or partial exercise of any such right or remedy will not preclude the exercise of any other right or remedy. 4.5.3 Reasonable Notice To the extent that Secured Party is required by the U.C.C. or other applicable law to give Debtor prior notice of the disposition of any Collateral, 10-days’ notice of the time and place of any public disposition or of the time after which a private disposition may take place is reasonable notice of such matters. 4.5.4 Application of Proceeds74 Secured Party will apply any proceeds of collection or sale, license, or other disposition of Collateral, to the extent received in cash, to the payment of the Secured Obligations in such order of preference as Secured Party may determine, with proper allowance and provision being made for any Secured Obligations not then due. Upon the final payment and satisfaction in full of all of the Secured Obligations and after making any payments on subordinated security interests required by U.C.C. §§ 9-608(a)(1)(C) or 9-615(a)(3), Secured Party will return any remaining proceeds to Debtor. Only after so paying over such net proceeds and after the payment by Secured Party of any other amount required by any provision of law will Secured Party need to account to Debtor for any surplus 73. As a practical matter, the debtor’s ability to comply with this provision will be limited. The debtor will not have the power to compel its employees to remain employed, change their duties, or work for the secured party. 74. As with other provisions of this agreement, counsel should be careful that this section not contradict any provisions of the loan agreement, which may also cover these matters. 914 The Business Lawyer; Vol. 71, Summer 2016 proceeds. Debtor will remain liable for any deficiency if the proceeds of disposition of the Collateral are insufficient to fully pay the Secured Obligations. 4.5.5 No Marshaling Secured Party need not marshal the Collateral or any other present or future security for, or other assurances of payment of, the Secured Obligations or resort to such security or assurances in any particular order. To the extent permitted by applicable law, Debtor will not invoke, and irrevocably waives the benefits of, any law relating to the marshaling of collateral that might delay or impede the enforcement of Secured Party’s rights and remedies under this Agreement or otherwise. 5 SECURED PARTY’S OTHER RIGHTS 5.1 POWER OF ATTORNEY Debtor appoints Secured Party as its attorney-in-fact, with full power of substitution, without notice to or assent by Debtor, in its own name or in Debtor’s name, in Debtor’s place and stead, (i) to file any documents with an IP Filing Office that Secured Party reasonably deems appropriate in connection with the perfection, protection, priority, or enforcement of the Security Interest, or the removal of ineffective filings, (ii) to take any actions required of Debtor under this Agreement that Debtor fails or is unable to take in a timely manner, and (iii) while an Event of Default exists, to take any actions that Secured Party deems appropriate • to protect, preserve, or realize upon the Collateral and the Security Interest or to accomplish the purposes of this Agreement, including any actions described in section 4, and • in connection with a disposition of any Collateral, (A) to assign or transfer title to such Collateral to itself or to any third-party purchaser, and (B) to file with any IP Filing Office or Governmental Authority any documents necessary or advisable to implement, effectuate, or reflect the disposition, including any transfer statement permitted under section 9-619 of the U.C.C. This power of attorney is a power coupled with an interest and will be irrevocable as long as this Agreement is in effect or is reinstated. 5.2 INDEMNITY Debtor will defend and indemnify Secured Party and its officers, employees, and agents against Model Intellectual Property Security Agreement 915 • all losses, obligations, demands, claims, and liabilities (collectively, Claims) asserted by a third party in connection with the transactions contemplated by this Agreement, including acts or failures to act of Secured Party under section 4 (“Events of Default; Remedies”), and • all costs and expenses (including reasonable attorney’s fees and fees of professionals) paid or incurred by Secured Party in connection with a Claim, except to the extent the Claim is caused by the gross negligence or willful misconduct of Secured Party (or any of its officers, employees, or agents). 5.3 COSTS AND EXPENSES Debtor will pay • all fees, costs, and expenses incurred by Debtor, Secured Party, or a third party in connection with actions required of Debtor under this Agreement, • all out-of-pocket fees, costs, and expenses (including reasonable attorney’s fees and fees of advisors, experts, agents, and professionals) reasonably incurred in connection with Secured Party’s exercise, enforcement, or protection of its rights and remedies under this Agreement or in respect of the Collateral, including claims against Debtor for breach of this Agreement and actions under sections 1.3 (“Perfection and Priority”), 1.4 (“Afteracquired Collateral”), 1.5 (“Further Assurances”), 3.9 (“Maintenance of Records; Audit and Inspection”), 4 (“Events of Default; Remedies”), 5.1 (“Power of Attorney”), 5.2 (“Indemnity”), or 6.2 (“Reinstatement”), and • any claims and charges that in Secured Party’s reasonable opinion might, if not paid, prejudice, imperil, or otherwise adversely affect the Security Interest or its priority. Debtor’s obligations to Secured Party under this section 5.3 will be payable on demand. Until paid, such obligations will bear interest at the “Default Rate” defined in the Loan Agreement and (with such interest) will be part of the Secured Obligations. 5.4 NON-DISTURBANCE OF PERMITTED LICENSES Secured Party will not disturb the rights of any third-party licensee of Collateral under a Permitted License, so long as the licensee is not in breach of its obligations to Debtor under the Permitted License. Upon Debtor’s request with respect to a particular licensee, Secured Party will use reasonable efforts to negotiate, execute, and deliver a non-disturbance agreement with the licensee, in form reasonably acceptable to Secured Party, Debtor, and the licensee.75 75. This provision might seem unnecessary in light of U.C.C. § 9-321, which provides that a “licensee in ordinary course of business” takes a nonexclusive license free of any security interest created by its licensor. Nonetheless, this kind of non-disturbance provision is becoming more common, 916 The Business Lawyer; Vol. 71, Summer 2016 5.5 LIMITED OBLIGATIONS OF SECURED PARTY Secured Party will not be liable for any failure to exercise, or delay in exercising, any of its rights or remedies under this Agreement, or for any diminution in the value of the Collateral, and will not be obligated to • collect any amounts due, redeem or realize on, or make any presentments, demands, or notices of protest in connection with, any Collateral, • take any steps necessary to preserve rights in any instrument, contract, license, or lease against third parties or to preserve rights against prior parties, • take any actions referenced in section 3.6 (“Protection of Collateral”) or any other action to maintain, preserve, protect, or enforce any rights in the Collateral, or • remove any Liens or take any actions for the perfection, enforcement, collection, or protection of Collateral, except to the extent that such obligations may not be waived or varied under U.C.C. section 9-602. 6 GENERAL PROVISIONS76 6.1 TERM OF AGREEMENT This Agreement will remain in effect, and Secured Party will have no obligation to release any Collateral, until all the Secured Obligations are completely and indefeasibly paid and performed in full and Secured Party no longer has a commitment to make any Loan to Debtor. 6.2 REINSTATEMENT This Agreement will continue to be effective or be automatically reinstated, as the case may be, if at any time payment, in whole or in part, of any of the Secured Obligations is rescinded or must otherwise be restored or returned by Secured Party or any holder of the Secured Obligations as a preference, fraudulent conveyance, or otherwise under any Bankruptcy Law, all as though such payment had not been made. especially where a significant portion of the debtor’s business involves licensing intellectual property, because it (1) can cover exclusive licenses and (2) may reduce disputes about the scope and applicability of the U.C.C. provision. 76. Except for section 6.6 (Amendments and Waivers), which addresses the secured party’s right to make unilateral amendments by addenda under section 1.4, the boilerplate provisions in section 6 are not specific to IP collateral. They are included in the model agreement for completeness only, and the particular language is not intended to act as a model for any provision. Many of these matters may be addressed in the loan agreement and need not be repeated here. Moreover, applicable state law may limit the enforceability of these provisions, determine whether they should be included at all, or dictate the appropriate language. Model Intellectual Property Security Agreement 917 6.3 ENTIRE AGREEMENT This Agreement and the other Loan Documents constitute the entire agreement between the Parties and supersede all prior agreements, oral or written, relating to their subject matter. 6.4 NOTICES AND COMMUNICATIONS 6.4.1 General Notices All notices and other communications required or permitted under this Agreement will be in writing or other record form, and will be sent by hand, by registered or certified mail return receipt requested, by overnight courier service maintaining records of receipt, or electronically as specified in section 6.4.2 below, in all cases with charges prepaid, and will be effective on the earlier of receipt or • if mailed, the third Business Day after being mailed, • if sent by overnight courier service, the following Business Day, or • if sent by facsimile, upon sender’s receipt of transmission confirmation. All notices will be addressed to the parties at the following addresses until changed by notice pursuant to this section: • To Debtor: _______________________ • To Secured Party: _________________ 6.4.2 Electronic Communications Notices and other communications may be delivered electronically (including by e-mail) and will be effective upon receipt, except that any record required to be signed, executed, or authenticated will only be effective when authenticated and delivered by electronic imaging means (e.g., .pdf or .tif ). 6.5 SUCCESSORS AND ASSIGNS Debtor will not assign its rights or delegate its duties under this Agreement. Secured Party may assign the Secured Obligations to one or more assignees on such terms and conditions as Secured Party deems advisable. Debtor waives and will not assert against such an assignee any claims, setoffs, recoupments, or defenses that Debtor may have against Secured Party. 6.6 AMENDMENTS AND WAIVERS Except as provided in section 1.4 with respect to describing Collateral in an appropriate Addendum,77 this Agreement may not be modified or amended ex77. This initial clause addresses the secured party’s right to make unilateral amendments by addenda under section 1.4. This right is an IP-specific exception to standard language prohibiting amendment by one party without the other party’s consent. 918 The Business Lawyer; Vol. 71, Summer 2016 cept in a record authenticated by Debtor and Secured Party, and none of its provisions may be waived except in a record authenticated by Secured Party. No waivers will be implied, whether from any custom or course of dealing, any delay or failure in Secured Party’s exercise of its rights and remedies under this Agreement, or otherwise. Any waiver granted by Secured Party will not obligate Secured Party to grant any further, similar, or other waivers. 6.7 GOVERNING LAW This Agreement will be construed in accordance with and governed by the laws of [STATE]. 6.8 SEVERABILITY If any provision of this Agreement or its application to any Person or circumstance is invalid or unenforceable to any extent, the remainder of this Agreement or the application of the provision to other Persons or circumstances will not be affected thereby and will be enforceable to the greatest extent permitted by law. 6.9 JURISDICTION; VENUE Debtor irrevocably consents to personal jurisdiction in the courts located in [STATE] for any action in connection with this Agreement, any Secured Obligations, or any Collateral, and will not contest or challenge venue in any such court. 6.10 JURY WAIVER Debtor and Secured Party each knowingly, willingly, and irrevocably waives its rights to demand a jury trial in any action or proceeding involving this Agreement, the Secured Obligations, or the Collateral. A copy of this section may be filed as a written consent to a trial by the court. 7 DEFINITIONS AND USAGES 7.1 DEFINED TERMS In this Agreement, the following terms have the following meanings: Bankruptcy Code means Title 11 of the United States Code, titled “Bankruptcy.”78 Bankruptcy Law means the Bankruptcy Code and any similar United States federal, State, or foreign bankruptcy, insolvency, receivership, or similar law affecting creditors’ rights generally. 78. Section 7.2 sets forth usage rules that make it unnecessary to include amendments and successor statutes. Model Intellectual Property Security Agreement 919 Business Day means a day other than a Saturday, Sunday, or other day on which commercial banks in [CITY] are authorized or required by law to close. Copyright Office means the United States Copyright Office. Domain Name Contract means an agreement that permits a Person to use a Domain Name. Governmental Authority means any United States federal, State, municipal, or other government, governmental department, commission, board, bureau, court, agency, or instrumentality (including an IP Filing Office), or political subdivision thereof, or any entity or officer exercising executive, legislative, judicial, regulatory, or administrative functions of or pertaining to any government or any court of the United States or any State. Insolvency Proceedings means any United States federal, State, or foreign bankruptcy, reorganization, liquidation, assignment for the benefit of creditors, receivership, or other insolvency proceedings commenced at any time by or against a Person or its property, pursuant to Bankruptcy Law or otherwise. IP Security Document79 means any one or more of the following documents, as applicable, in proper form for recordation or registration in the applicable IP Filing Office: (i) for Copyrights, a notice or agreement substantially in the form of Exhibit 1, (ii) for Patents, a notice or agreement substantially in the form of Exhibit 2, or (iii) for Trademarks, a notice or agreement substantially in the form of Exhibit 3, or (iv) any other assignment, mortgage, confirmation, notice, agreement, instrument, or other document that Secured Party reasonably considers necessary or advisable to record in any IP Filing Office in order to create, evidence, perfect, protect, or enforce the Security Interest in any Collateral. IP Filing Office means, as applicable, the Copyright Office (for Copyrights), the PTO (for Patents and Trademarks), any similar office or agency in any Jurisdiction, or any Internet domain name registry (for Domain Names). A State U.C.C. filing office is not an IP Filing Office. 79. The form and content of a document to be filed or recorded with the federal filing office will depend in part on the type of IP collateral and the administrative rules of the filing office. See supra note 12. 920 The Business Lawyer; Vol. 71, Summer 2016 Jurisdiction means any jurisdiction creating or recognizing rights in Intellectual Property, including the United States, any State, any foreign country, or any subdivision thereof. License-In means an IP License where Debtor is the licensee and a third party (which may be an affiliate of Debtor) is the licensor. License-Out means an IP License where Debtor is the licensor and a third party (which may be an affiliate of Debtor) is the licensee. Lien means, with respect to Debtor’s rights or interest in any item of Collateral, (i) any “Lien” as defined in the Loan Agreement, (ii) any voluntary collateral assignment, conditional assignment, license equivalent to an encumbrance, mortgage, charge, hypothecation, pledge, security interest, or lien on, in, or to those rights or that interest, or (iii) any involuntary lien, claim, or other encumbrance on, in, or to those rights or that interest, including a tax, judgment, statutory, common law, or equitable lien, or other attachment, levy, execution, or judicial action with respect to those rights or that interest.80 Loan Documents means the Loan Agreement, the promissory note dated the Effective Date issued by Debtor to Secured Party, this Agreement, and any other agreement executed on or after the Effective Date in connection with any of them. Material Adverse Effect has the same meaning as in the Loan Agreement. Permitted License means a License-Out that (i) was listed on Schedule F as of the Effective Date, or (ii) is granted by Debtor in the ordinary course of business and that, when granted, did not have a Materially Adverse Effect on Debtor’s business or the value of the Collateral taken as a whole.81 Person means a natural person, corporation, limited liability company, trust, business trust, joint venture, association, company, partnership, Governmental Authority, or other entity. PTO means the United States Patent and Trademark Office. Restrictive Provision means a provision of an agreement or of applicable law that purports to 80. See supra note 50 (comparing the defined terms “Lien” and “Transfer”). 81. See supra note 30 regarding materiality limitations. Model Intellectual Property Security Agreement 921 • prohibit Debtor’s assignment of, grant of a security interest in, or license of its rights under, an IP License or Domain Name Contract, • require any other Person’s consent to such assignment, grant, or license, or • make such assignment, grant, or license constitute or result in a violation of law or a breach, default, or termination of an IP License or Domain Name Contract. State means a state or territory of the United States, or the District of Columbia. A Transfer of Collateral is Debtor’s voluntary disposition (or agreement to dispose) of its rights therein, in whole or in part, by sale, lease, license, assignment, operation of law, or other method, other than the creation or enforcement of a Lien on, or any actual or deemed abandonment of, Debtor’s rights in any Collateral. To Transfer any Collateral means to effect or implement a Transfer.82 U.C.C. means the [STATE] Uniform Commercial Code or, for any particular matter, the Uniform Commercial Code of the State that governs such matter. United States includes all the States (as defined above) and the Commonwealth of Puerto Rico. 7.2 USAGES Unless otherwise stated or the context clearly requires otherwise: U.C.C. terms. Terms defined in the U.C.C. have the same meanings in this Agreement. If a term is defined in Article 9 of the U.C.C. and in another article of the U.C.C., the term has the meaning specified in Article 9. United States law. References to the laws or regulations of the United States include all United States federal, State, and local laws or regulations. Debtor. If Debtor is a partnership or an unincorporated association of more than one person, the term “Debtor” refers to the entity and to each partner and/or each such person, jointly, severally, and individually Singular and plural. Definitions of terms apply equally to the singular and plural forms. 82. See supra note 50 (comparing the defined terms “Lien” and “Transfer”). Not all IP licenses constitute encumbrances. See, e.g., In re Provider Meds LP, No. 13-30678-BJH, 2014 WL 4162870 (Bankr. D. Tex. Aug. 20, 2014) (debtor’s grant of perpetual, royalty-free software licenses to third parties did not breach debtor’s obligation to provide lender with first-priority security interest in the software, and licensees’ failure to obtain secured party’s required consent to “encumbrances” of the collateral was not tortious interference with loan contract because licenses were not “encumbrances”). 922 The Business Lawyer; Vol. 71, Summer 2016 Masculine and feminine. Pronouns include the corresponding masculine, feminine, and neuter forms. Time of day. All indications of time of day mean [CITY] time. When action may be taken. Any action permitted under this Agreement may be taken at any time and from time to time. May. Any action that a Person “may” take it may take in its discretion but is not obligated to take. Inclusive Terms. “Including” (or “include(s)”) means “including (or include(s)), but not limited to.” “Reasonable” means the same as “commercially reasonable.” Or. “A or B” means “A or B or both.” Successors and assigns. References to a Person include the Person’s permitted successors and assigns. Statutes and regulations. References to a statute refer to the statute and all regulations promulgated under or implementing the statute as in effect at the relevant time. References to a specific provision of a statute or regulation include successor provisions. References to a section of the Bankruptcy Code also refer to any similar provision of Bankruptcy Law. Governmental agencies and self-regulatory organizations. References to a governmental or quasi-governmental agency or authority or a self-regulatory organization include any successor agency, authority, or self-regulatory organization. Agreements. References to an agreement (including this Agreement) refer to the agreement as amended at the relevant time. Schedules and Exhibits. References to a Schedule or Exhibit refer to Schedules or Exhibits to this Agreement. Section references. Section references refer to sections of this Agreement. References to numbered sections refer to all included sections. For example, a reference to section 2 also refers to sections 2.1, 2.1.2, 2.1.2(ii), etc. References to a section or article in an agreement, statute, or regulation include successor and renumbered sections and articles of that or any successor agreement, statute, or regulation. Nouns and adjectives. Defined terms that are nouns may be used as adjectives; for example, “Copyright Collateral” to refer to Copyrights included in the Collateral. Model Intellectual Property Security Agreement SIGNATURES [DEBTOR] By: _________________ [NAME] [TITLE] [SECURED PARTY] By: _________________ [NAME] [TITLE] SCHEDULES A Scheduled Excluded Property B Copyrights, Copyright Applications, and Copyright Licenses-In C Patents, Patent Applications, and Patent Licenses-In D Registered Trademarks, Trademark Applications, and Trademark Licenses-In E Domain Names F Licenses-Out G Other Intellectual Property H Restrictive Provisions I U.C.C. Filing Offices J Debtor Information K Claims and infringements EXHIBITS 1. IP Security Document for Copyrights 2. IP Security Document for Patents 3. IP Security Document for Trademarks 923 924 The Business Lawyer; Vol. 71, Summer 2016 EXHIBIT 1 FORM OF IP SECURITY DOCUMENT—COPYRIGHTS COPYRIGHT SECURITY AGREEMENT [DATE] PARTIES [DEBTOR NAME], a [JURISDICTION] [ENTITY] [ADDRESS] (Debtor) [SECURED PARTY NAME], a [JURISDICTION] [ENTITY] [ADDRESS] (Secured Party) BACKGROUND This Copyright Security Agreement is executed pursuant to the Loan Agreement and the Security Agreement, both dated [the Effective Date], between Debtor and Secured Party. Secured Party has agreed to make certain Loans to Debtor, and Debtor has agreed to provide certain Collateral to secure the Loans, all on the terms and conditions set forth in the Loan Agreement and the Security Agreement. Those conditions include the execution, delivery and recordation of this Copyright Security Agreement (this Agreement). AGREEMENT The parties agree as follows: 1. Supplement to Security Agreement This Agreement has been entered into in conjunction with the Security Interest granted to Secured Party under the Security Agreement. The terms of this Agreement are supplemental to and not in replacement of the terms of the Security Agreement, and the rights and remedies of Secured Party with respect to the security interests granted herein are without prejudice to, but in addition to, those set forth in the Security Agreement. If there is any conflict between this Agreement and the Security Agreement, the Security Agreement will govern. 2. Security Interest and Collateral To secure Debtor’s performance of its present and future obligations under the Loan Agreement, Debtor grants Secured Party a security interest in all Debtor’s present and future rights and interest in the registered copyrights and copyright applications identified on Schedule 1 to this Agreement. 3. General Provisions The provisions of section 6 (“General Provisions”) of the Security Agreement are incorporated herein by reference, except that the term “Agreement” will mean this Agreement. Model Intellectual Property Security Agreement 925 4. Terms and Usages in Security Agreement All capitalized terms used in this Agreement and not otherwise defined herein will have the meanings assigned to them in the Security Agreement, except that the term “Agreement” will mean this Agreement. Unless otherwise stated or the context clearly requires otherwise, the usage rules set forth in Section 7.2 of the Security Agreement will apply to this Agreement. 5. Recording Debtor authorizes and requests the United States Copyright Office to record this Copyright Security Agreement. 6. Termination When all the Secured Obligations have been completely and indefeasibly paid and performed in full and Secured Party no longer has a commitment to make any Loan to Debtor, this Agreement will terminate. SIGNATURES83 [DEBTOR] By: _________________ [NAME] [TITLE] [SECURED PARTY] By: _________________ [NAME] [TITLE] 83. It is good practice to have both parties sign, even though only the debtor’s signature is legally required. See 17 U.S.C. § 204 (2012) (copyrights); 35 U.S.C. § 261 (2012) (patents); 15 U.S.C. § 1060(3) (2012) (trademarks). 926 The Business Lawyer; Vol. 71, Summer 2016 SCHEDULE 1 TO COPYRIGHT SECURITY AGREEMENT REGISTERED COPYRIGHTS TITLE OF WORK REGISTRATION NUMBER REGISTRATION DATE COPYRIGHT APPLICATIONS TITLE OF WORK APPLICATION DATE Model Intellectual Property Security Agreement 927 EXHIBIT 2 FORM OF IP SECURITY DOCUMENT—PATENTS PATENT SECURITY AGREEMENT [DATE] PARTIES [DEBTOR NAME], a [JURISDICTION] [ENTITY] [ADDRESS] (Debtor) [SECURED PARTY NAME], a [JURISDICTION] [ENTITY] [ADDRESS] (Secured Party) BACKGROUND This Patent Security Agreement is executed pursuant to the Loan Agreement and the Security Agreement, both dated [the Effective Date], between Debtor and Secured Party. Secured Party has agreed to make certain Loans to Debtor, and Debtor has agreed to provide certain Collateral to secure the Loans, all on the terms and conditions set forth in the Loan Agreement and the Security Agreement. Those conditions include the execution, delivery and recordation of this Patent Security Agreement (this Agreement). AGREEMENT The parties agree as follows: 1. Supplement to Security Agreement This Agreement has been entered into in conjunction with the Security Interest granted to Secured Party under the Security Agreement. The terms of this Agreement are supplemental to and not in replacement of the terms of the Security Agreement, and the rights and remedies of Secured Party with respect to the security interests granted herein are without prejudice to, but in addition to, those set forth in the Security Agreement. If there is any conflict between this Agreement and the Security Agreement, the Security Agreement will govern. 2. Security Interest and Collateral To secure Debtor’s performance of its present and future obligations under the Loan Agreement, Debtor grants Secured Party a security interest in all Debtor’s present and future rights and interest in the issued patents and patent applications identified on Schedule 1 to this Agreement. 3. General Provisions The provisions of section 6 (“General Provisions”) of the Security Agreement are incorporated herein by reference, except that the term “Agreement” will mean this Agreement. 928 The Business Lawyer; Vol. 71, Summer 2016 4. Terms and Usages in Security Agreement All capitalized terms used in this Agreement and not otherwise defined herein will have the meanings assigned to them in the Security Agreement, except that the term “Agreement” will mean this Agreement. Unless otherwise stated or the context clearly requires otherwise, the usage rules set forth in Section 7.2 of the Security Agreement will apply to this Agreement. 5. Recording Debtor authorizes and requests the United States Patent and Trademark Office to record this Patent Security Agreement. 6. Termination When all the Secured Obligations have been completely and indefeasibly paid and performed in full and Secured Party no longer has a commitment to make any Loan to Debtor, this Agreement will terminate. SIGNATURES84 [DEBTOR] By: _________________ [NAME] [TITLE] [SECURED PARTY] By: _________________ [NAME] [TITLE] 84. It is good practice to have both parties sign, even though only the debtor’s signature is legally required. See 17 U.S.C. § 204 (copyrights); 35 U.S.C. § 261 (patents); 15 U.S.C. § 1060(3) (trademarks). Model Intellectual Property Security Agreement SCHEDULE 1 TO PATENT SECURITY AGREEMENT ISSUED PATENTS PATENT NUMBER DATE ISSUED TITLE FILING DATE TITLE PATENT APPLICATIONS APPLICATION NUMBER 929 930 The Business Lawyer; Vol. 71, Summer 2016 EXHIBIT 3 FORM OF IP SECURITY DOCUMENT—TRADEMARKS TRADEMARK SECURITY AGREEMENT [DATE] PARTIES [DEBTOR NAME], a [JURISDICTION] [ENTITY] [ADDRESS] (Debtor) [SECURED PARTY NAME], a [JURISDICTION] [ENTITY] [ADDRESS] (Secured Party) BACKGROUND This Trademark Security Agreement is executed pursuant to the Loan Agreement and the Security Agreement, both dated [the Effective Date], between Debtor and Secured Party. Secured Party has agreed to make certain Loans to Debtor, and Debtor has agreed to provide certain Collateral to secure the Loans, all on the terms and conditions set forth in the Loan Agreement and the Security Agreement. Those conditions include the execution, delivery and recordation of this Trademark Security Agreement (this Agreement). AGREEMENT The parties agree as follows: 1. Supplement to Security Agreement This Agreement has been entered into in conjunction with the Security Interest granted to Secured Party under the Security Agreement. The terms of this Agreement are supplemental to and not in replacement of the terms of the Security Agreement, and the rights and remedies of Secured Party with respect to the security interests granted herein are without prejudice to, but in addition to, those set forth in the Security Agreement. If there is any conflict between this Agreement and the Security Agreement, the Security Agreement will govern. 2. Security Interest and Collateral To secure Debtor’s performance of its present and future obligations under the Loan Agreement, Debtor grants Secured Party a security interest in all Debtor’s present and future rights and interest in the registered trademarks and trademark applications identified on Schedule 1 to this Agreement, together with the goodwill of the business connected with the use of or symbolized by such registered or applied-for trademarks. Model Intellectual Property Security Agreement 931 3. General Provisions The provisions of section 6 (“General Provisions”) of the Security Agreement are incorporated herein by reference, except that the term “Agreement” will mean this Agreement. 4. Terms and Usages in Security Agreement All capitalized terms used in this Agreement and not otherwise defined herein will have the meanings assigned to them in the Security Agreement, except that the term “Agreement” will mean this Agreement. Unless otherwise stated or the context clearly requires otherwise, the usage rules set forth in Section 7.2 of the Security Agreement will apply to this Agreement. 5. Recording Debtor authorizes and requests the United States Patent and Trademark Office to record this Trademark Security Agreement. 6. Termination When all the Secured Obligations have been completely and indefeasibly paid and performed in full and Secured Party no longer has a commitment to make any Loan to Debtor, this Agreement will terminate. SIGNATURES85 [DEBTOR] By: _________________ [NAME] [TITLE] [SECURED PARTY] By: _________________ [NAME] [TITLE] 85. It is good practice to have both parties sign, even though only the debtor’s signature is legally required. See 17 U.S.C. § 204 (copyrights); 35 U.S.C. § 261 (patents); 15 U.S.C. § 1060(3) (trademarks). 932 The Business Lawyer; Vol. 71, Summer 2016 SCHEDULE 1 TO TRADEMARK SECURITY AGREEMENT REGISTERED TRADEMARKS MARK REGISTRATION NUMBER REGISTRATION DATE APPLICATION NUMBER FILING DATE TRADEMARK APPLICATIONS MARK
© Copyright 2025 Paperzz