IP Resources
Our Tech Transfer Resources page provides helpful links to help innovators protect, develop, and commercialize their intellectual property. Whether you’re a student, faculty member, or staff, our resources are designed to assist you at every stage of the innovation process, ensuring your discoveries make a lasting impact.
Intellectual Policy Resources
-
Types of Intellectual Property
Patent
A patent for an invention is the grant of a property right to the inventor, issued by the United States Patent and Trademark Office (USPTO). To obtain patent protection, an invention must be described in a patent application and is subject to examination before a patent examiner. This process may take 14-24 months. A patent is protected for a term of 20 years, then the invention enters the public domain.
In the University context, patent protection predominately applies to technical works. Recently patented inventions have emanated from the Ritchie School of Engineering and Computer Science and the Division of Natural Sciences and Mathematics. Inventors work with our Office to disclose their invention and begin the protection process.Copyright
Copyright is a form of protection provided to the authors of original works including literary, dramatic, musical, artistic, and certain other intellectual works, both published and unpublished. Unlike other forms of IP rights, a work does not need to be registered to obtain legal protection - rights begin at the moment of creation when fixed in a tangible form of expression. Work must be registered to enforce rights against an infringing party in litigation . Registration protects the copyright for the author's life plus an additional 70 years or in the work for hire context, 95 years from first publication or 120 years from creation.The University of Denver protects software and creative works with copyright registration.
Trademark
A trademark is a word, name, symbol, or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others. Federal trademark protection involves registration with the USPTO. The mark must be described in a trademark application and is subject to examination before a trademark examiner. Trademarks exist as long as the mark is used lawfully and the owner renews the mark.Trade Secret
A trade secret generally includes any confidential business information that provides a corporation with a competitive advantage. This includes manufacturing or industrial secrets and commercial secrets. Trade secret protection continues as long as the information remains secret. -
Fair Use
What is Fair Use?
The Fair Use Doctrine allows for the non-infringing use of copyrighted work in certain limited situations, including educational purposes. Fair Use is evaluated on a case-by-case basis depending on the facts.
Why do we have Fair Use?
Fair Use allows copyrighted works to be used without permission in furtherance of educational or scholarly purposes. The copyright system in general seeks to incentivize the distribution of ideas to a wide audience. Fair Use also protects the owner of the copyrighted work by placing use limitations. For example, photocopying an entire textbook and distributing the copies to students is unlikely to be fair use.
Determining Fair Use
Fair Use is governed by Section 107 of the Copyright Act. There are four factors that are balanced against each other to determine whether the use of a copyrighted work is fair.
Four-factor Test for Fair Use:
- Purpose and character of use;
- Nature of the copyrighted work;
- Amount and substantiality of the portion used; and
- Effect of use on the potential market of the copyrighted work.
Quick Tips
- Using material under copyright protection ALWAYS requires a Fair Use analysis.
- Including an attribution to the copyright owner does not automatically make the use fair.
- Do not assume use automatically falls with the Fair Use exception because it is educational use.
- There are no bright-line rules dictating an allowable percentage or length of the portion to be used.
- Be reasonable: If your material was being used by a third party, what would you feel is fair?
-
Data Policies
Data is transferred, shared, and created during research. Data is subject to ethical, contractual, and intellectual property considerations. Data ownership, access, and protection are highly valuable considerations during the University's research process.
Raw data is information that has not yet been processed or manipulated. This can be a set of numbers, readings, or other metrics collected from a source. University researchers often obtain raw data from an outside source.
Researchers use raw data as inputs into their experiments to generate variable-based outcomes. Research data is recorded factual material that is an output of an experiment. Research data includes test responses, database contents, models, and software algorithms. Data is often stored digitally.
Federal Policies
Raw data and research data are subject to sharing policies. There are limits on how and when data can be shared—and there are commonly contract provisions related to confidentiality. Federally funded researchers must abide by the funding entity's data sharing policies. For example, the National Institute of Health requires NIH grant recipients to make final research data available via articles in scientific publications or researcher-accessible digital archives.Additionally, when working with human subjects, privacy is paramount. The Health Insurance Portability and Accountability Act's (HIPAA) Privacy Rule requires all individually identifiable health information be removed prior to the transfer of human subject data to protect the subjects' identities.
International Policies
In addition to federal data regulations, the European Union enacted the General Data Privacy Regulation (GDPR) in 2018 for international data. GDPR applies to organizations outside the EU when they offer goods and services to or monitor the behavior of EU data subjects.Artificial Intelligence
Artificial intelligence raises considerable opportunities to analyze and process data in exciting ways. These new applications also bring challenges to data use and governance. Machine learning, a branch of artificial intelligence, must use data in compliance with data rules and regulations. Using artificial intelligence in inventions also raises intellectual property considerations regarding the protection of these technological methods.Our Office is committed to assisting inventors through the Intellectual Property protection process and answering questions related to data use.
- Helpful Links
Tech Transfer Resources
-
Governing Regulations
The Bayh-Dole Act is the governing regulation for Intellectual Property arising from federally-funded research. More on Bayh-Dole is provided in AUTM's guide. AUTM is the nonprofit leader in efforts to educate, promote and inspire technology transfer professionals.
-
Licensing Information
The Office of Intellectual Property and Technology Transfer works with University inventors and outside members of industry to guide licensing agreements.
-
Grant Funding
Proof of Concept Grant
The Proof of Concept (POC) Grant is an Advanced Industries Accelerator Program administered by the Colorado Office of Economic Development and International Trade (OEDIT). The program supports the commercialization of technologies at research institutions, including the University of Denver, along the stages of the commercialization pathway.
This grant uses funding to identify and pull technologies from research institutions where they were discovered and connect them to the private sector where they can be developed into products for commercialization.
The advanced Colorado industries that are supported include aerospace, advanced manufacturing, bioscience, electronics, energy, infrastructure engineering and technology and information.
More information on the POC Grant Program can be found here.
Do you have more questions about ownership of class materials?
Please visit the Unified Request Site.