Advertisement

IP and Debt Finance: Cross-Border Considerations

  • Toshiyuki Kono
  • Claire Wan-Chiung ChengEmail author
Chapter
  • 381 Downloads
Part of the Perspectives in Law, Business and Innovation book series (PLBI)

Abstract

Innovation in both technology and finance has greatly changed the definition of national borders in the past decades. This brings vibrant commercial possibilities as well as legal challenges to the age-old loan industry. One relevant question may be: how to stimulate innovative endeavor by providing a globally well-functioning financial infrastructure. As of today, however, not only is it true that national laws rarely address security rights in intellectual property rights (“IPRs”), but also almost no provisions are provided on the international level to determine the law applicable to these kinds of security interests. On the other hand, the tension between the protecting state (i.e. the underpinning lex loci protectionis principal of traditional IPRs jurisprudence) and the efficiency goal of secured transaction law, has become stalemated. This paper digs into this complexity by exploring more than twenty variants of proposals after five major international meetings at UNCITRAL. The introduction session is divided into two parts: historical analysis and policy-debate review. The first part of the introduction section concentrates on the summarization of each proposal, while the second part provides detailed analysis of the rationales raised to support them. A comparative private international law analysis consisting of four jurisdictions follows in the next section to assist the understanding of the current legal status quo in different countries. Finally, the conclusion reflects what is missing in previous discussions, and proposes harmonization of reforms to solve the “self-duplicating” problem embedded in the current lex loci protectionis intellectual property system.

References

  1. American Law Institute (1934) Restatement of law, first, conflict of laws. American Law Institute, Washington DCGoogle Scholar
  2. American Law Institute (1988) Restatement of law, second, conflict of laws. American Law Institute, Washington DCGoogle Scholar
  3. Anderson K, Okuda Y (2006) Translation of Japan’s private international law: act on the general rules of application of laws [Ho no Tekiyo ni Kansuru Tsusokuho], Law No. 10 of 1898 (as newly titles and amended 21 June 2006). APLPJ 8:138Google Scholar
  4. Borchers PJ (1998) Choice of law relative to security interest and other liens in international bankruptcies. Am J Comp Law Suppl 46:165CrossRefGoogle Scholar
  5. Boulet P, Garrison C, Hoen ET (2003) Drug patents under the spotlight: sharing practical knowledge about pharmaceutical patent. http://apps.who.int/medicinedocs/en/d/Js4913e/. Accessed 18 May 2017
  6. CLIP (2011) Principles on conflict of laws in intellectual property. http://www.cl-ip.eu/_www/files/pdf2/Final_Text_1_December_2011.pdf. Accessed 17 May 2017
  7. CLIP (2013) Conflict of laws in intellectual property: the CLIP principles and commentary. Oxford University, OxfordGoogle Scholar
  8. Collins L, Briggs A, Harris J, McClean JD, McLachlan C, Morse CGJ (2006) Dicey, Morris and Collins on the conflict of laws. Sweet & Maxwell, LondonGoogle Scholar
  9. Dogauchi M, Kanzaki T, Hayakawa Y, Nishitani Y, Nakanishi Y, Kitazawa A (2007) New private international law of Japan. Jpn Annu Int Law 50:3–87Google Scholar
  10. Haemmerli A (1996) Insecurity interests: where intellectual property and commercial law collide. Columbia Law Rev 96:1645–1752CrossRefGoogle Scholar
  11. Hagedorn RB (2007) Secured transaction in a nutshell. West, St PaulGoogle Scholar
  12. Hay P, Weintraub R, Borchers P (2009) Conflict of Laws, Foundation Press, New YorkGoogle Scholar
  13. Kanzaki T, Hayakawa Y, Motonaga K (2006) Ko ku sai shi hou (Private international law). Yuhikaku, TokyoGoogle Scholar
  14. Ke ZD (2010) Guo ji si fa (Private international law). Angel, TaipeiGoogle Scholar
  15. Lee SY (2011) Guo ji si fa xue (Private international law). Peking University Press, BeijingGoogle Scholar
  16. Lu ZY (2007) Zhuan li quan zhi ya rong zi xian zhuang fen xi (Analysis of the state of patent pledge financing). China Invention Pat 6:45–47Google Scholar
  17. Lui C (2011) Navigating through the legal minefield of state and federal filing for perfecting security interests in intellectual property. Santa Clara Law Rev 51:705Google Scholar
  18. Matsuoka H (2008) Gen dai ko ku sai shi hou kou gi (Lectures on private international law). Houritsubunkasha, KyotoGoogle Scholar
  19. Nguyen XT (2002) Commercial law collides with cyberspace: the trouble with perfection—insecurity interests in the new corporate asset. Wash Lee Law Rev 59(1):37Google Scholar
  20. Nordstrom RJ, Murray JE Jr, Clovis AL (1987) Problems and materials on secured transactions. West, St PaulGoogle Scholar
  21. Pissler KB (2012) Das neue internationale privatrecht der volksrepublik China: nach den steinen tastend den fluss überqueren (The new private international law of the People’s Republic of China: cross the river by feeling the stones). Rabels Zeitschrift fuer auslaendisches und internationales Privatrecht 76(1):1–46CrossRefGoogle Scholar
  22. SIPO (2007) China intellectual property yearbook 2006. Knowledge Press, BeijingGoogle Scholar
  23. UNCITRAL (1997) Model law on cross-border insolvency. http://www.uncitral.org/uncitral/en/uncitral_texts/insolvency/1997Model.html. Accessed 22 May 2017
  24. UNCITRAL (2002) Report of Working Group VI (Security Interests) on the work of its first session. https://documents-dds-ny.un.org/doc/UNDOC/GEN/V02/549/74/PDF/V0254974.pdf?OpenElement. Accessed 16 May 2017
  25. UNCITRAL (2007) Report of Working Group VI (Security Interests) on the work of its twelfth session. https://documents-dds-ny.un.org/doc/UNDOC/GEN/V07/810/60/PDF/V0781060.pdf?OpenElement. Accessed 16 May 2017
  26. UNCITRAL (2008a) Annex to the UNCITRAL legislative guide on secured transactions dealing with security rights in intellectual property (Part 2). https://documents-dds-ny.un.org/doc/UNDOC/LTD/V08/562/95/PDF/V0856295.pdf?OpenElement. Accessed 16 May 2017
  27. UNCITRAL (2008b) Report of Working Group VI (Security Interests) on the work of its fourteenth session. https://documents-dds-ny.un.org/doc/UNDOC/GEN/V08/577/88/PDF/V0857788.pdf?OpenElement, para 124. Accessed 16 May 2017
  28. UNCITRAL (2008c) Report of Working Group VI (Security Interests) on the work of its thirteenth session. https://documents-dds-ny.un.org/doc/UNDOC/GEN/V08/539/36/PDF/V0853936.pdf?OpenElement. Accessed 16 May 2017
  29. UNCITRAL (2008d) Security rights in intellectual property rights. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V08/521/28/PDF/V0852128.pdf?OpenElement. Accessed 16 May 2017
  30. UNCITRAL (2009a) Draft annex to the UNCITRAL legislative guide on secured transactions dealing with security rights in intellectual property. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V09/808/23/PDF/V0980823.pdf?OpenElement. Accessed 16 May 2017
  31. UNCITRAL (2009b) Draft supplement to the UNCITRAL legislative guide on secured transactions dealing with security rights in intellectual property: proposal by the Permanent Bureau Of The Hague Conference on private international law. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V09/855/76/PDF/V0985576.pdf?OpenElement. Accessed 16 May 2017
  32. UNCITRAL (2009c) Draft supplement to the UNCITRAL legislative guide on secured transactions dealing with security rights in intellectual property. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V09/855/16/PDF/V0985516.pdf?OpenElement. Accessed 16 May 2017
  33. UNCITRAL (2009d) Draft supplement to the UNCITRAL legislative guide on secured transactions dealing with security rights in intellectual property. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V09/885/80/PDF/V0988580.pdf?OpenElement. Accessed 16 May 2017
  34. UNCITRAL (2009e) Report of Working Group VI (Security Interests) on the work of its sixteenth session. https://documents-dds-ny.un.org/doc/UNDOC/GEN/V09/877/38/PDF/V0987738.pdf?OpenElement. Accessed 16 May 2017
  35. UNCITRAL (2010a) Report of Working Group VI (Security Interests) on the work of its seventeenth session. https://documents-dds-ny.un.org/doc/UNDOC/GEN/V10/511/34/PDF/V1051134.pdf?OpenElement. Accessed 16 May 2017
  36. UNCITRAL (2010b) UNCITRAL legislative guide on secured transactions. https://www.uncitral.org/pdf/english/texts/security-lg/e/09-82670_Ebook-Guide_09-04-10English.pdf. Accessed 22 May 2017
  37. UNCITRAL (2011a) Draft security rights registry guide. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V11/859/00/PDF/V1185900.pdf?OpenElement. Accessed 18 May 2017
  38. UNCITRAL (2011b) UNCITRAL legislative guide on secured transactions: supplement on security rights in intellectual property. http://www.uncitral.org/pdf/english/texts/security-lg/e/10-57126_Ebook_Suppl_SR_IP.pdf. Accessed 16 May 2017
  39. UNCITRAL (2013) Draft Technical Legislative Guide on the Implementation of a Security Rights Registry. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V13/803/11/PDF/V1380311.pdf?OpenElement. Accessed 18 May 2017
  40. UNCITRAL (2015a) Draft guide to enactment of the draft model law on secured transactions. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V15/083/78/PDF/V1508378.pdf?OpenElement. Accessed 18 May 2017
  41. UNCITRAL (2015b) Draft model law on secured transactions. https://documents-dds-ny.un.org/doc/UNDOC/LTD/V15/080/04/PDF/V1508004.pdf?OpenElement. Accessed 18 May 2017
  42. Whaley DJ, McJohn SM (2014) Problems and materials on secured transactions. Wolters Kluwer, Alphen aan den RijnGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Kyushu UniversityFukuokaJapan
  2. 2.National Chengchi UniversityTaipeiTaiwan

Personalised recommendations