Background A Belgian entrepreneur set up a local food processing operation called ‘BE Food’ in Indonesia. One of their plant managers developed an innovation to the existing raw material cleaning process. The Belgian entrepreneur, believing that BE Food could commercialise this process by manufacturing equipment with this innovation, offered a reward-sharing scheme and brought the plant manager to an attorney to discuss future contractual arrangements, as the existing employment agreement was silent on ownership of intellectual property in inventions. In the meantime, the plant manager secretly instructed a patent attorney to apply for a patent in his own name. The patent was drafted by a local attorney in the Indonesian language (Bahasa Indonesia). As soon as the Belgian entrepreneur discovered the patent filing, he asked the plant manager to surrender the patent application to BE Food. The plant manager refused.
Background A British pharmaceutical manufacturer is a market leader in the production of an anti-cancer drug, which it has been exporting to every major developed country for the last 20 years, and also more recently to developing countries, particularly in Southeast Asia. The active ingredient of the drug was patented (product patent), but the original patent expired 3 years ago. However, a new improved process for making the drug was patented 10 years ago (process patent), and this patent is still in force in various countries, including Singapore, Malaysia, and Indonesia. Two years ago, the manufacturer found out that a generic manufacturer based in Vietnam was making and exporting the anti-cancer drug to Malaysia, and being sold in these countries for half the price of their own drug. This was having a serious adverse effect on sales.
Background Trade secret theft can be extremely difficult to detect and even harder to prove in a court of law. In some cases, victims may even hold strong suspicions over the loss of certain trade secrets to former employees but, as is often the case, are unable to take any action to redress losses because of a lack of proof. In 2010, several relationship managers of a European bank in Singapore left en masse to a rival bank. Prior to leaving the bank, they emailed data from the bank's computer system to their own personal email accounts; they also accessed and printed confidential company data. Nowadays information accessed by such means can easily be gathered from system logs, and recent advances in computer forensics have made it easier to retrieve deleted files. Thanks to such information gathering systems, these employees were subsequently charged in a Singaporean court for the unauthorised access of confidential client data.
Background In an ongoing case, a European engineering firm, PT Basuki, filed a claim against a large construction company in Indonesia and several other parties, for the misuse of its secret know-how in boiler construction. PT Basuki claimed that its secret boiler design know-how was used by the defendant to develop similar products, however, PT Basuki's claim was dismissed by the Bekasi District Court. The judges reasoned that the Commercial Court rather than the District Court ought to have jurisdiction over the case because the case concerned intellectual property, and the Commercial Court had previously heard a related industrial design case between the same parties. However, the Supreme Court upheld the plaintiff's appeal against the case dismissal. The case was sent back to the Bekasi District Court to be retried and is still on-going. The Supreme Court ruling confirms what the law has already stipulated - the case was correctly brought before the district court in Bekasi. The initial rejection of the case by the District Court was incorrect and can only be explained by their difficulty with, and lack of experience in, handling trade secret issues. This is a common problem in developing IP jurisdictions in Southeast Asian countries where trade secret issues are seldom brought before the courts despite the fact that the law may provide for it. The new Indonesian Electronic and Information Technology Law also contains provisions against unauthorised access to computer systems. However, we have yet to see an actual application of these provisions.