Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Intellectual exploitation

Obtaining IP protection is only the first step. The intellectual property rights obtained are only useful if they can be exploited and—ultimately—unauthorized users of the rights can be stopped from exploiting them. [Pg.711]

It is the responsibility of the reader to become familiar with patents that may cover particular compounds, compositions, reactions, or their use in bioconjugation applications. If patents or patent applications exist, it is important that permission or a license be obtained to use it before exploiting any intellectual property for commercial use. [Pg.1233]

The answer to this objection is to make the criterion of belonging to S a special type of functional insulation. What we have to require is not just that the belief that q should fail to intervene to stop the formation of the belief that p - that might be a failure to exploit the known implications of q as a result of some intellectual fault - but, rather, that the insulation should be produced by the wish to believep. To put the point in Freud s way, the insulation of q in S must be dynamic. Then it will no longer be tautological to say that formed the belief that p because the belief that q was confined to. On the contrary, another possible explanation will be excluded, namely intellectual incompetence. [Pg.71]

Richard Koehn I do not think the universities have any idea how intellectual property laws relate to the general research mission of the institution or its desire to exploit the fruits of that research through commercialization. It is completely different when you are doing research in chemistry on a particular area and you see some particular applications in mind, but you are actually utilizing patented procedures or processes in that research. Have you violated the patent The question of a patent violation in research laboratories is extremely sophisticated, and most technology transfer offices at universities do not know that the issue exists or how to think about it. Now that the universities are thinking about exploiting the commercial value of a project, they need to ask what process was used to produce the fruits of that project. That is a different level of sophistication. [Pg.103]

Intellectual property, which arises as the result of work done under R D programmes, requires to be protected from exploitation by other companies. Arranging this protection requires the services of people who are professionally qualified in this... [Pg.96]

The exploitation of intellectual property has to be considered early in the R D cycle. The choice of the exploitation pathway materially affects the scale and type of R D resource that will be needed. For instance, an opportunity may be further developed in house by joint venture if one or more partner is needed or by licensing the technology if it is outside the company s area of expertise. [Pg.147]

The message to any researcher and Manager is exploitation of the unexpected is a difficult activity but one which has high rewards when successfully achieved. The results provide a genuinely novel opportunity for the company to exploit the sole rights of the associated intellectual property. [Pg.163]

The most difficult intellectual property to protect is that of a trade secret, or know how , which is specific to that business. Know-how is often immediately exploitable information, for instance manufacturing process details or the constitution of mixtures, which when obtained avoids the need to carry out the more time consuming and expensive aspects of R D. [Pg.193]

Having developed some intellectual property to the level where it is open to exploitation a decision must be made about how this should be done. R D and marketing personnel will be involved in an evaluation of the product or process to see if it is suitable for development within the company. If, for a variety of reasons, the answer is no, exploitation by other means will be considered. One way could be in a joint venture with an appropriate partner. Alternatively, it is possible to license or sell the intellectual property to another company, if this fits in with the company strategy. The final option is to abandon the project at this stage and to leave the data in the company secret files, for reconsideration at some future date. These options are shown in Figure C9. [Pg.197]

In the early 1990s Dow Chemical considered that it was not exploiting to the full extent its intellectual capital, generated over many years requiring a high-level of expenditure [C-36]. So it set up a small team to examine how it might re-engineer its... [Pg.208]


See other pages where Intellectual exploitation is mentioned: [Pg.950]    [Pg.347]    [Pg.950]    [Pg.30]    [Pg.136]    [Pg.286]    [Pg.681]    [Pg.15]    [Pg.119]    [Pg.134]    [Pg.227]    [Pg.5]    [Pg.45]    [Pg.95]    [Pg.300]    [Pg.957]    [Pg.717]    [Pg.75]    [Pg.111]    [Pg.400]    [Pg.3]    [Pg.385]    [Pg.221]    [Pg.222]    [Pg.1]    [Pg.266]    [Pg.10]    [Pg.147]    [Pg.148]    [Pg.185]    [Pg.197]    [Pg.201]    [Pg.407]    [Pg.10]    [Pg.131]    [Pg.179]    [Pg.326]    [Pg.56]    [Pg.225]    [Pg.300]    [Pg.31]   
See also in sourсe #XX -- [ Pg.197 ]




SEARCH



Exploit

Exploitation

Exploiting

© 2024 chempedia.info