SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
GAMAByte:
The Legal Ramifications of Going 3D (Printing, That is)
3D printing has been around since the early 1980s, but over the last several years has gained widespread attention as costs have
dropped and access to the technology has grown. While it is possible to surmise what areas of law may be most implicated by
broad adoption of 3D printing, one can only guess how their application might shape the future of manufacturing.
The ability to print materials at home at a nominal cost will almost certainly disrupt countless industries that earn money making
and supplying many small products. These manufacturers will naturally turn to the intellectual property laws to protect their
businesses. At the same time, Congress and federal agencies concerned with consumer safety will be forced to draft new
regulations – most immediately in the area of printing firearms – to set certain standards and limits on how far the technology
may be used.
Intellectual	
  Property	
  Law	
  &	
  3D	
  Prin5ng
Patent
Current patent and copyright laws will undoubtedly be implicated by 3D printing. Inventors who have developed a novel and
useful process, idea or design may seek patent protection from the United States Patent and Trademark Office (USPTO). A
patent holder can restrict others not only from selling or using their patented invention, but also from manufacturing it. This
means that consumers printing a replacement wheel for their bicycle could be liable to the bicycle manufacturer if the
manufacturer holds a patent for the wheels.
Copyright	
  
Copyright law protects original works of authorship fixed in a tangible medium of expression. This means that the author of any
expressive work – such as a writing, photograph, painting or song – can stop others from copying the work. Copyright law has
already been heavily tested by the rise of the Internet, which has allowed for cheap, instantaneous digital copying of many types
copyrighted works. Most notable is the copying and distribution of musical works over peer-to-peer networks and file sharing
protocols. Unlike the Internet, what one does on their 3D printer at home would not necessarily be tied to a user’s Internet
Protocol (IP) address. This means that any copyright infringement would truly be undertaken anonymously. In contrast to a
conventional home printer, individuals would be able to print copyrighted material directly onto consumable goods.
Trade	
  Secrets
What about 3D printing schematics not subject to patent protection? Even these may be protected under trade secret laws. A
trade secret is a concept, design or idea that obtains independent economic value from not being generally known to the public.
Of course, as soon as a trade secret schematic gets out on the Internet, the chance of a business reeling it back in is low, and its
public distribution would eliminate any trade secret protection.
Moreover, a big gap in current intellectual property protection exists where a business has devised an invention, distributed it in
streams of commerce, but not yet obtained patent protection. If the invention is then reverse engineered by competitors, the
inventor has no recourse. This is because independent invention or reverse engineering is a complete defense to most states’
trade secret laws. With the ability to manufacture many iterations of a device at very low cost, the time it takes to reverse
engineer basic products could be significantly shorter.

A  GAMA  Byte  produced  by  Brandon  Wiebe                                                                                                                                    ©  2013.  Gagnier  Margossian  LLP.    All  rights  reserved.  
A	
  Problem	
  of	
  Enforceability
While patent, trademark and trade secrets laws could prohibit many uses of 3D printers, the lack of any foreseeable way to
identify and enforce these infringements may render intellectual property protection futile. The almost undetectable nature of
home printing would make enforcement extremely difficult. As with music file sharing cases of the early 2000s, manufacturers will
likely have to target websites that are distributing 3D printing instructions, rather than the individuals doing the printing
themselves.
Consumer	
  Safety
3D	
  Printed	
  Firearms
Consumer safety related to homemade products represents the other major concern likely to shape laws and regulations. The
most obvious concern is the 3D printed firearm, which would allow gun owners to circumvent numerous gun laws – such as
background checks – and to potentially print all plastic guns incapable of detection at airports and other security checkpoints.
With no 3D printing regulations on the books, Senator Chuck Schumer (D-NY) has sought to leverage an old gun law – The
Undetectable Firearms Act – as a stopgap measure to prohibit home manufacture of plastic guns that could skirt metal
detectors. Senator Schumer, along with Senator Ben Nelson (D-NE), intends to renew the Act this term, though the law only
provides punitive measures for individuals caught with a weapon, and does not include provisions to limit the spread of
undetectable guns.
Home	
  Appliances	
  &	
  Other	
  Products	
  
Guns may not be the only printable product that should worry regulators. Consumer protection regulations were drafted with
major manufacturers in mind. How is the FTC to adapt its policies and practices to protect an individual who 3D prints his own
toaster? Or how should the Department of Transportation respond to an automobile accident caused by someone’s 3D printed
brake pads?
Ultimately legislators, government agencies and courts will be required to tease out the rules around 3D printing, both from an
intellectual property and a consumer safety perspective. Both businesses and consumers should stay tuned as the impacts of
these decisions will have considerable repercussions on the future of our laws and our economy.
For	
  more	
  informa5on	
  or	
  guidance	
  on	
  complying	
  with	
  relevant	
  laws	
  applying	
  to	
  3D	
  prin5ng	
  or	
  just	
  to	
  chat,	
  
contact	
  an	
  aBorney	
  at	
  Gagnier	
  Margossian	
  LLP.

Internet
Intellectual Property
Privacy
Social Media
Technology
The Good Stuff

#nerdlawyers
Los Angeles

Sacramento

T: 415.766.4591
F: 909.972.1639
E: consult@gamallp.com

gamallp.com
@gamallp

San Francisco

Weitere ähnliche Inhalte

Ähnlich wie GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)

Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
3D Printing Technology White Paper June 22 2014 Final
3D Printing Technology White Paper June 22 2014 Final3D Printing Technology White Paper June 22 2014 Final
3D Printing Technology White Paper June 22 2014 FinalBill Enos
 
3D Printing Technology Publication Wm Enos
3D Printing Technology Publication Wm Enos3D Printing Technology Publication Wm Enos
3D Printing Technology Publication Wm EnosBill Enos
 
Brandsmiths Intelligence On Ai Where Are We Now.pdf
Brandsmiths Intelligence On Ai Where Are We Now.pdfBrandsmiths Intelligence On Ai Where Are We Now.pdf
Brandsmiths Intelligence On Ai Where Are We Now.pdfonline Marketing
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxjameshagwen
 
10 facts on 3D printing
10 facts on 3D printing10 facts on 3D printing
10 facts on 3D printingIannone 3D
 
Guide to IPR Protection in China for the Creative Industry
Guide to IPR Protection in China for the Creative IndustryGuide to IPR Protection in China for the Creative Industry
Guide to IPR Protection in China for the Creative IndustryChina IPR SME Helpdesk
 
Ethical & legal work practices in the design industry
Ethical & legal work practices in the design industryEthical & legal work practices in the design industry
Ethical & legal work practices in the design industryWebmaster
 
Essay: 3D printable gun by Defense Distributed
Essay: 3D printable gun by Defense DistributedEssay: 3D printable gun by Defense Distributed
Essay: 3D printable gun by Defense Distributedriannelinks
 
30 C o M M u n i C at i o n s o f t h e a C M j A.docx
30    C o M M u n i C at i o n s  o f  t h e  a C M       j A.docx30    C o M M u n i C at i o n s  o f  t h e  a C M       j A.docx
30 C o M M u n i C at i o n s o f t h e a C M j A.docxtamicawaysmith
 
3D printing by Ploy, Muk, Prim and Oil
3D printing by Ploy, Muk, Prim and Oil3D printing by Ploy, Muk, Prim and Oil
3D printing by Ploy, Muk, Prim and OilPLOY-Laksika
 

Ähnlich wie GAMAByte: The Legal Ramifications of Going 3D (Printing, That is) (20)

Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
3D Printing Technology White Paper June 22 2014 Final
3D Printing Technology White Paper June 22 2014 Final3D Printing Technology White Paper June 22 2014 Final
3D Printing Technology White Paper June 22 2014 Final
 
3D Printing Technology Publication Wm Enos
3D Printing Technology Publication Wm Enos3D Printing Technology Publication Wm Enos
3D Printing Technology Publication Wm Enos
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
3D printing-guide
3D printing-guide3D printing-guide
3D printing-guide
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Business Presentation
Business PresentationBusiness Presentation
Business Presentation
 
Brandsmiths Intelligence On Ai Where Are We Now.pdf
Brandsmiths Intelligence On Ai Where Are We Now.pdfBrandsmiths Intelligence On Ai Where Are We Now.pdf
Brandsmiths Intelligence On Ai Where Are We Now.pdf
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
10 facts on 3D printing
10 facts on 3D printing10 facts on 3D printing
10 facts on 3D printing
 
Guide to IPR Protection in China for the Creative Industry
Guide to IPR Protection in China for the Creative IndustryGuide to IPR Protection in China for the Creative Industry
Guide to IPR Protection in China for the Creative Industry
 
Ethical & legal work practices in the design industry
Ethical & legal work practices in the design industryEthical & legal work practices in the design industry
Ethical & legal work practices in the design industry
 
E commerce
E commerceE commerce
E commerce
 
Embracing change
Embracing changeEmbracing change
Embracing change
 
Essay: 3D printable gun by Defense Distributed
Essay: 3D printable gun by Defense DistributedEssay: 3D printable gun by Defense Distributed
Essay: 3D printable gun by Defense Distributed
 
30 C o M M u n i C at i o n s o f t h e a C M j A.docx
30    C o M M u n i C at i o n s  o f  t h e  a C M       j A.docx30    C o M M u n i C at i o n s  o f  t h e  a C M       j A.docx
30 C o M M u n i C at i o n s o f t h e a C M j A.docx
 
3D printing by Ploy, Muk, Prim and Oil
3D printing by Ploy, Muk, Prim and Oil3D printing by Ploy, Muk, Prim and Oil
3D printing by Ploy, Muk, Prim and Oil
 
A Skeptics Guide to 3D Printing
A Skeptics Guide to 3D PrintingA Skeptics Guide to 3D Printing
A Skeptics Guide to 3D Printing
 

Mehr von Christina Gagnier

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistChristina Gagnier
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification Christina Gagnier
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsChristina Gagnier
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarChristina Gagnier
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"Christina Gagnier
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaChristina Gagnier
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsChristina Gagnier
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017Christina Gagnier
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramChristina Gagnier
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistChristina Gagnier
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomChristina Gagnier
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsChristina Gagnier
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and SecurityChristina Gagnier
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal DetailsChristina Gagnier
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeChristina Gagnier
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Christina Gagnier
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentChristina Gagnier
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Christina Gagnier
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingChristina Gagnier
 

Mehr von Christina Gagnier (20)

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" Bullying
 

Kürzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)

  • 1. GAMAByte: The Legal Ramifications of Going 3D (Printing, That is) 3D printing has been around since the early 1980s, but over the last several years has gained widespread attention as costs have dropped and access to the technology has grown. While it is possible to surmise what areas of law may be most implicated by broad adoption of 3D printing, one can only guess how their application might shape the future of manufacturing. The ability to print materials at home at a nominal cost will almost certainly disrupt countless industries that earn money making and supplying many small products. These manufacturers will naturally turn to the intellectual property laws to protect their businesses. At the same time, Congress and federal agencies concerned with consumer safety will be forced to draft new regulations – most immediately in the area of printing firearms – to set certain standards and limits on how far the technology may be used. Intellectual  Property  Law  &  3D  Prin5ng Patent Current patent and copyright laws will undoubtedly be implicated by 3D printing. Inventors who have developed a novel and useful process, idea or design may seek patent protection from the United States Patent and Trademark Office (USPTO). A patent holder can restrict others not only from selling or using their patented invention, but also from manufacturing it. This means that consumers printing a replacement wheel for their bicycle could be liable to the bicycle manufacturer if the manufacturer holds a patent for the wheels. Copyright   Copyright law protects original works of authorship fixed in a tangible medium of expression. This means that the author of any expressive work – such as a writing, photograph, painting or song – can stop others from copying the work. Copyright law has already been heavily tested by the rise of the Internet, which has allowed for cheap, instantaneous digital copying of many types copyrighted works. Most notable is the copying and distribution of musical works over peer-to-peer networks and file sharing protocols. Unlike the Internet, what one does on their 3D printer at home would not necessarily be tied to a user’s Internet Protocol (IP) address. This means that any copyright infringement would truly be undertaken anonymously. In contrast to a conventional home printer, individuals would be able to print copyrighted material directly onto consumable goods. Trade  Secrets What about 3D printing schematics not subject to patent protection? Even these may be protected under trade secret laws. A trade secret is a concept, design or idea that obtains independent economic value from not being generally known to the public. Of course, as soon as a trade secret schematic gets out on the Internet, the chance of a business reeling it back in is low, and its public distribution would eliminate any trade secret protection. Moreover, a big gap in current intellectual property protection exists where a business has devised an invention, distributed it in streams of commerce, but not yet obtained patent protection. If the invention is then reverse engineered by competitors, the inventor has no recourse. This is because independent invention or reverse engineering is a complete defense to most states’ trade secret laws. With the ability to manufacture many iterations of a device at very low cost, the time it takes to reverse engineer basic products could be significantly shorter. A  GAMA  Byte  produced  by  Brandon  Wiebe                                                                                                                                    ©  2013.  Gagnier  Margossian  LLP.    All  rights  reserved.  
  • 2. A  Problem  of  Enforceability While patent, trademark and trade secrets laws could prohibit many uses of 3D printers, the lack of any foreseeable way to identify and enforce these infringements may render intellectual property protection futile. The almost undetectable nature of home printing would make enforcement extremely difficult. As with music file sharing cases of the early 2000s, manufacturers will likely have to target websites that are distributing 3D printing instructions, rather than the individuals doing the printing themselves. Consumer  Safety 3D  Printed  Firearms Consumer safety related to homemade products represents the other major concern likely to shape laws and regulations. The most obvious concern is the 3D printed firearm, which would allow gun owners to circumvent numerous gun laws – such as background checks – and to potentially print all plastic guns incapable of detection at airports and other security checkpoints. With no 3D printing regulations on the books, Senator Chuck Schumer (D-NY) has sought to leverage an old gun law – The Undetectable Firearms Act – as a stopgap measure to prohibit home manufacture of plastic guns that could skirt metal detectors. Senator Schumer, along with Senator Ben Nelson (D-NE), intends to renew the Act this term, though the law only provides punitive measures for individuals caught with a weapon, and does not include provisions to limit the spread of undetectable guns. Home  Appliances  &  Other  Products   Guns may not be the only printable product that should worry regulators. Consumer protection regulations were drafted with major manufacturers in mind. How is the FTC to adapt its policies and practices to protect an individual who 3D prints his own toaster? Or how should the Department of Transportation respond to an automobile accident caused by someone’s 3D printed brake pads? Ultimately legislators, government agencies and courts will be required to tease out the rules around 3D printing, both from an intellectual property and a consumer safety perspective. Both businesses and consumers should stay tuned as the impacts of these decisions will have considerable repercussions on the future of our laws and our economy. For  more  informa5on  or  guidance  on  complying  with  relevant  laws  applying  to  3D  prin5ng  or  just  to  chat,   contact  an  aBorney  at  Gagnier  Margossian  LLP. Internet Intellectual Property Privacy Social Media Technology The Good Stuff #nerdlawyers Los Angeles Sacramento T: 415.766.4591 F: 909.972.1639 E: consult@gamallp.com gamallp.com @gamallp San Francisco