Abstract
This article aims at contributing to academic debates on PIL rules on security interest in IP using functional analysis . Functional analysis here means a method to take a legal rule as a mechanism which brings about certain effects, to analyze conditions under which the effects would be produced, and to seek possible directions to improve the legal rule. Security interests in IP represent a convergence of three fields of law, i.e. IP, PIL and security interest law. Therefore, an integral platform where these three fields could be analyzed on an equal level would be needed. Functional analysis provides such a platform. For this purpose, this article first clarified the functions of security interest and its conditions, then identified which option as a PIL rule would be appropriate for each condition of the individual function of security interest in IP. Perspectives from both states’ and parties’ interests should be properly integrated in the analytical process. Lastly, the scope and conditions of party autonomy as well as objective connecting factors were identified. The outcome of this analysis provides tools to clarify not fully conceived parts of previous discussions. The CLIP Principles were compared with our proposals from this perspective.
This article is a part of outcomes of Kakenhi Grant Type S, “Research on International Security Interest in IP by the method of Law and Economic” (2012–2016) (Principal investigater: Toshiyuki Kono).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For example, UCC (Uniform Commercial Code) provides a similar definition: “‘Security interest’ means an interest in personal property or fixtures which secures payment or performance of an obligation.” See U.C.C § 1–201(2001).
- 2.
For example, see Baird (2004), pp. 1789–1800.
- 3.
In this context, see Baird et al. (1994), p. 314.
- 4.
This definition does not depend upon legal system in a specific State, so that it would be easier to link with discussions on PIL rule.
- 5.
On varieties of security interest, see Mann (1997), pp. 625–683.
- 6.
Legal rules on security interest in a broader sense, includes not only functions to promote, but also to restrict collateral. Thus an approach to integrating the mechanism of security interest can be found other fields of law, such as contract law, trust law, and corporate law.
- 7.
See Kagami (2006).
- 8.
By introducing a uniform law, the costs to understand various national laws could be reduced. However the introduction of a uniform law itself is costly. Also fitness of rules would be lowered. See Kono and Kagami (2013), pp. 314–337.
- 9.
Naming of three functions to be analyzed in this chapter is inspired by Baird (2004).
- 10.
If all stakeholders’ judgments and actions are doable without costs, and if market mechanism functions effectively, introducing collateral does not affect efficiency. Hence significance of collateral presumes imperfect market mechanism. See Schwartz (1981).
- 11.
On diversification of collateral and security interest right, see U.C.C. § 9 (2001); UNCITRAL (2011), https://www.uncitral.org/pdf/english/texts/security-lg/e/09-82670_Ebook-Guide_09-04-10English.pdf; Castellano (2015), pp. 611–640. Overviews of recent developments of security interest and amendments of relevant laws. Armour (2008), pp. 3–29 discusses on policy designs based on preceding theoretical works and empirical analysis.
- 12.
- 13.
For example, see Harris and Mooney (1994), pp. 2021–2072.
- 14.
Costs in this context occur exogenously.
- 15.
“‘Insulation’ is a word to describe the ways in which a secured creditor can minimize the indirect costs associated with bankruptcy.” See Baird (2004), p. 1789. But we avoid using the terms “insolvency” or “bankruptcy” and defining in a more general form in order to connect this function with analysis on the level of PIL at a later stage.
- 16.
As an empirical analysis on insulation and its conditions: Feng et al. (2009), pp. 1833–1876.
- 17.
Using the building as debtor’s principal place of business as collateral could mean more than collateral.
- 18.
- 19.
- 20.
- 21.
Similar view is stressed in O’Hara and Ribstein (2000), pp. 1151–1232.
- 22.
Some authors analyze whether territoriality should be followed to choose applicable law on IP issues even in the era of globalization and IT. See, for example: Bradley (1997), pp. 505–586; Buxbaum (2009), pp. 631–676; Dinwoodie (2009), pp. 711–800, Metzger (2010), Cook (2014) pp. 293–297, Treppoz (2014), pp. 557–571, Torremans (2013).
- 23.
In this context, see Borchers (2008), pp. 1645–1661, Lehmann (2008), pp. 381–434, Rühl (2009), pp. 153–183, Kramer and Themeli (2016), pp. 27–49, and Maultzsch (2016), pp. 466–491, Bebchuk and Guzman (1999), pp. 775–808 identified that, applying economic analysis, party autonomy enhances global welfare much more than territoriality.
- 24.
Applicable law chosen ex post by other creditors may not satisfy effectiveness and fitness for state. If the debtor received benefits through a special deal with a specific creditor, and such benefits are much larger than damages caused to other creditors, the state of the debtor’s domicile may accept the result and justify the outcome of the debtor’s behaviour. This could be legitimate, since the world’s welfare would be raised as a whole. As this example suggests, a decision based on weighing parties’ interests and states’ interests is crucial.
- 25.
This applies at least to situations where the collateral agreement was concluded first, then parties may switch to an alternative scheme. This however needs more elaboration. For example, cases where parties chose an alternative scheme first, then they decided to switch to security interest, or cases where an alternative scheme becomes desirable ex post, should be examined.
- 26.
For example, a registration system for these kinds of collateral is not well developed.
- 27.
European Max-Planck Group on Conflict of Laws in Intellectual Property (CLIP) (2013), pp. 354–369, p. 507.
- 28.
CLIP (2013), p. 355.
- 29.
CLIP (2013), pp. 355–356.
- 30.
CLIP (2013), p. 356.
- 31.
CLIP (2013), p. 356.
- 32.
But if the enforcement involves the transfer of ownership in an IP right, the law of the state of protection applies to the question whether and under which conditions ownership in the IP right may be transferred. Art. 3:802 (1) (2) of CLIP. See CLIP (2013), p. 354.
- 33.
The law of the state for which protection is sought shall apply to (a) the existence, validity, scope and all other issues concerning the IP right as such which is used as security, including the question whether a particular IP right may be transferred or encumbered to create a security right.
References
Adler BE (1998) Secured credit contracts. In: Newman P (ed) The new palgrave dictionary of economics and the law, pp 405–410
Akseli NO (2011) International secured transactions law: facilitation of credit and international conventions and instruments. Routledge, Abington
Armour J (2008) The law and economics debate about secured lending: lessons for European lawmaking? Eur Co Financ Law Rev Spec 2:3–29
Baird DG (2004) Secured lending and its uncertain future. Cardozo Law Rev 25:1789–1800
Baird DG, Gertner RH, Picker RC (1994) Game theory and the law. Harvard University Press, Boston, p 314
Basedow J, Kono T, Rühl G (eds) (2006) An economic analysis of private international law. Mohr Siebeck, Tubingen
Bebchuck LA, Fried JM (1996) The uneasy case for the priority of secured claims in bankruptcy. Yale Law J 105:857–934
Bebchuk LA, Guzman AT (1999) An economic analysis of transitional bankruptcies. J Law Econ 42(2):775–808
Borchers PJ (2008) Categorical exceptions to party autonomy. Priv Int Law Tulane Law Rev 82(5):1645–1661
Bowers JW (2000) Security interests: creditors’ priorities and bankruptcy. In: Bouckaert B, De Geest G (eds) Encyclopedia of Law and Economics, vol II. Edward Elgar, Cheltenham, pp 90–128
Bradley CA (1997) Territorial intellectual property rights in an age of globalism. Va J Int Law 37:505–586
Buxbaum HL (2009) Territory territoriality and the resolution of jurisdictional conflict. Am J Comp Law 57:631–676
Castellano GG (2015) Reforming non-possessory secured transactions laws: a new strategy? Mod Law Rev 78(4):611–640
Coco G (2000) On the use of collateral. J Econ Surv 14(2):191–214
Cook T (2014) Territoriality and jurisdiction in EU IP law. J Intellect Prop Rights 19:293–297
Dinwoodie GB (2009) Developing a private international intellectual property law: The Demise of Territoriality? William Mary Law Rev 51(2):711–800
Dornis TW (2017) Trademark and unfair competition conflicts. Cambridge University, Cambridge
European Max-Planck Group on Conflict of Laws in Intellectual Property (CLIP) (2013) Conflict of laws in intellectual property the clip principles and commentary. Oxford University, Oxford, pp 354–369
Feng M, Gramlich JD, Gupta GS (2009) Special purpose vehicles: empirical evidence on determinants and earnings management. Acc Rev 84(6):1833–1876
Flint GL Jr (1999) Secured transactions history: the fraudulent myth. New Mexico Law Rev 29:363–405
Gullifer L, Akseli NO (2016) Secured transactions law reform: principles policies and practice. Hart Publishing, Oxford
Guzman AT (2001) Choice of law: new foundations. Geo LJ 90:883–940
Harris SL, Mooney CW Jr (1994) A property-based theory of security interests: taking debtors’ choices seriously. Va Law Rev 80:2021–2072
Jackson TH (1982) Bankruptcy, non-bankruptcy entitlement and the creditors’ bargain. Yale Law Rev 91(5):857–907
Jackson TH, Kronman AT (1979) Secured financing and priorities among creditors. Yale Law J 88:1143–1182
Kagami K (2006) The systematic choice of legal rules for private international law: an economic approach. In: Basedow J, Kono T (eds) An economic analysis of private international Law. Mohr Siebeck, Tubingen
Kono T, Kagami K (2013) Is a uniform law always preferable to private international law? Jpn Yearb int Law 56:314–337
Kramer X, Themeli E (2016) The party autonomy paradigm: European and global developments on choice. In: Lazic V, Stuij S (eds) Brussels ibis regulation: changes and challenges of the renewed procedural scheme. T.M.C. Asser Press, Hague, pp 27–49
Lehmann M (2008) Liberating the individual from battles between states: justifying party autonomy in conflict of laws. Vanderbilt J Trans Law 4:381–434
Mann RJ (1997) Explaining the pattern of secured credit. Harv Law Rev 110(625):625–683
Maultzsch F (2016) Party autonomy in European private international law: uniform principle or context-dependent instrument? J priv int Law 12(3):466–491
Metzger A (2010) Applicable law under the clip principles: a pragmatic revaluation of territoriality. In: Basedow J, Kono T, Metzger A (eds) Intellectual property in the global arena–jurisdiction applicable law and the recognition of judgments in Europe Japan and the US. Mohr Siebeck, Tubingen
Michaels R (2008) The new European choice-of-law revolution. Tul L Rev 82:1607–1644
Matulionyte R (2011) Law applicable to copyright: a comparison of the ALI and CLIP proposals. Edward Elgar, Cheltenham
O’Hara E, Ribstein LE (2000) From politics to efficiency in the choice of law. Univ Chicago Law Rev 67:1151–1232
Ruhl G (2006) Methods and approaches in choice of law: an economic perspective. Berkeley J int Law 24(3):801–841
Rühl G (2009) Party autonomy in the private international law of contracts: transatlantic convergence and economic efficiency. In: Gottschalk E, Michaels R, Ruhl G, von Hein J (eds) Conflict of laws in a globalized world. Cambridge University, Cambridge, pp 153–183
Schwartz A (1981) Security interests and bankruptcy priorities: a review of current theories. J Leg Stud 10(1):1–37
Schwartz A (1984) The continuing puzzle of secured debt. Vanderbilt Law Rev 37(5):1051–1069
Scott RE (1997) Truth about secured financing. Cornell L Rev 82:1436–1465
Thomas S (2016) Security interests in intellectual property: proposals for reform. Legal Studies
Torremans Paul (2013) Holyoak and Torremans intellectual property law. Oxford University, Oxford
Tosato A (2011) Security interests over intellectual property. J Intellect Prop Law Pract 6(2):93–104
Treppoz E (2014) International choice of law in trademark disputes from a territorial approach to a global approach. J Law Arts 37:557–571
UNCITRAL (2011) Legislative guide on secured transactions. https://www.uncitral.org/pdf/english/texts/security-lg/e/09-82670_Ebook-Guide_09-04-10English.pdf. Accessed 20 May 2017
Whincop MJ, Keyes M (2001) Policy and pragmatism in the conflict of laws. Ashgate, Aldershot
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Kono, T., Kagami, K. (2017). Functional Analysis of Private International Law Rules for Security Interests in Intellectual Property. In: Kono, T. (eds) Security Interests in Intellectual Property. Perspectives in Law, Business and Innovation. Springer, Singapore. https://doi.org/10.1007/978-981-10-5415-0_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-5415-0_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5414-3
Online ISBN: 978-981-10-5415-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)