SlideShare uma empresa Scribd logo
1 de 3
Trademarks
from Sharon McLeod


Introduction
Some of you have heard my discourse about protecting trademarks. You may have assumed that, as a technical
writer, I have to do that. Well, guess what? It’s something we all share as employees. You may wonder why you
share in this, and you may wonder, too, what all the trademark fuss is about.
I’ve written down what I remember from a Trademark Training class at a company that I took several years ago to
provide a more complete picture. It’s not the most recent trademark information, to be sure, but it still provides a
useful overview. And, naturally, you should consult your own company’s attorneys as I am not qualified to provide
legal advice in this or any other area.


What is a trademark?
In short, a trademark is “a promise of identity, source, and quality.” A trademark can be words or pictures (logos).
When a potential customer sees a familiar trademark, they expect a product of a certain kind and quality.


Why use trademarks?
Companies have a limited amount of time to “hook” a customer to their product. Using a trademark helps a
customer recognize the product quickly. As an example, what do you think of when you see gold-colored arches? A
swoosh on shoes or clothing? You probably already know what the associated product is.
In our industry, the amount of time required to “hook” the customer differs, depending on the customer type:
              Target market

                                                    30
                 End user
                                                 seconds

               Retail buyers                    20 minutes

                                                 30 hours
               Corporate IT


                                                30+ days
                 OEMs


                                           Time for message

Note:    This illustration may not precisely reflect your situation. It should, however, provide a “broad stroke”
view.
Trademark hierarchy
Some trademarks are easier to protect than others. And it’s all in the name as this illustration suggests:
                                                                   Made up word (for
                                                 Fanciful
     Protectability                                                example, “Pentium”)
     increases
                                                      Dictionary word in an arbitrary or
                                     Arbitrary        unrelated setting (for example,
                                                      “Apple” for PCs; “Java” for software)

                                            Suggest an attribute; requires an additional
                         Suggestive
                                            cognitive leap (for example, “SatisFAXtion”)


                                Describes the thing; generally not able to serve
              Descriptive
                                as a TM (for example, Intel Internet Phone)


                      Name of the thing itself; not
       Generic
                      able to serve as a trademark.

                                                Expense of developing increases


Why protect a trademark?
Companies spend a lot of money to develop trademarks. When customers can quickly identify a product via a
trademark, the theory is that more sales occur and those sales occur faster. The trademark can be “lent” to other
complementary products, aiding in the sales of those products as well.
Things can go awry, however. For example:
•      Other companies can use your trademark to sell their product, leveraging on the trademark recognition.
       Needless to say, this is frowned upon.
•      The trademark can become part of the common language, thus losing its right and ability to represent a specific
       product. “Kleenex” is probably the best known of these terms.
When things go awry, a company can end up in court trying to save their trademark. Their success in court depends
on how well a trademark has been protected. Courts can look at a variety of materials to determine the extent of
protection, including the product and even the company’s internal email.
Sure, it’s only when a trademark ends up in court that protection becomes an issue. However, if protecting a
trademark is fairly simple, you can make protecting it a simple part of your daily routine.


How do I protect a trademark?
To protect a trademark, follow these three “rules”:
1.     Always use a trademark as an adjective accompanied by the appropriate noun. Generally, the noun should be
       lower case.
       Do not:
       •   Join a trademark to other words, symbols, or numbers, either as a single word or with a hyphen.
       •   Abbreviate a trademark.
       •   Pluralize a trademark.
2.     Always use the proper spelling and the proper trademark symbol (™ or ®) when needed. Use superscript or
       subscript when available; otherwise use parentheses: ( TM ) or ( R ).
3.     Always use trademarks and logos only in the ways they were intended: to identify the source of specific
       products as determined by the owner.
How do I protect my company’s trademarks?
Let’s take a closer look at the above rules, and apply them specifically to a hypothetical software product we’ll call
SoftSomething.

Appropriate nouns
Not just any noun can follow a trademarked term; the noun must be an “appropriate” noun. In most companies,
someone or some department owns the transforming of everyday nouns into ones blessed as appropriate for a
particular trademark. Here is a list of nouns that might be appropriate for the SoftSomething trademark:
software
application(s)
component(s)
tool(s)
You should use nouns only from your product’s approved list. If you think the list is either incomplete or overly
ambitious, bring it up as an issue. Generally, a list can evolve with product needs.

The trademark symbol
Trademarks not yet registered with the Patent and Trademark office are identified with the “™” symbol. After the
mark is registered, it is identified with the “®” symbol. When the delivery mechanism doesn’t support superscript or
subscript, use “( R )”.
You should use this symbol in the first appearance of the term in any body of work. You don’t need to use it
thereafter. If the work contains both headings and body text, the symbol should appear in the first occurrence of
each. When the term occurs in electronic media, such as a software GUI, the symbol should also appear in the first
occurrence. Determining the first occurrence in electronic media is sometimes a gray area as some screens can be
printed, thus constituting a separate “body” of work. Use your best judgment.

Referring to trademarks from other companies
When using trademarks owned by other companies, apply the same rules, except use an asterisk (*) or cross (†)
rather than a trademark symbol (™ or ®). Ensure that a general acknowledgment line such as “other brands and
names are the property of their respective owners” exists somewhere in the work (check with your company’s legal
department to determine exact wording). This approach not only recognizes other companies’ trademarked terms, it
avoids the constant updating required to determine trademark status (“™” or “®”).

Samples
Correct                                                 Incorrect
This describes SoftSomething® software. You use         This describes SoftSomething software. You use
SoftSomething software to make applications that. . .   SoftSomething software to make applications that. . .
With SoftSomething software, you can create. . .        With SoftSomething, you can create. . .
SoftSomething software provides. . .                    SoftSomething provides. . .
You must first start the SoftSomething software         You must first start SoftSomething.
kernel.

Mais conteúdo relacionado

Semelhante a Trademark

Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07Enthiosys Inc
 
Trademark basics
Trademark basicsTrademark basics
Trademark basicsDianne Rees
 
Customer Development For Startups
Customer Development For StartupsCustomer Development For Startups
Customer Development For StartupsLloyd Jacob
 
Dashboarding Examples Dt
Dashboarding Examples DtDashboarding Examples Dt
Dashboarding Examples DtKristin Yokota
 
Making A Mark: An Introduction To Trademarks For Nigerian SMEs
Making A Mark: An Introduction To Trademarks For Nigerian SMEsMaking A Mark: An Introduction To Trademarks For Nigerian SMEs
Making A Mark: An Introduction To Trademarks For Nigerian SMEsAdelphi Consulting
 
What Every Small Business Owner Should Know About Trademarks
What Every Small Business Owner Should Know About TrademarksWhat Every Small Business Owner Should Know About Trademarks
What Every Small Business Owner Should Know About TrademarksAndrei Mincov
 
Trademarks and Intellectual Property
Trademarks and Intellectual PropertyTrademarks and Intellectual Property
Trademarks and Intellectual PropertyMBA ASAP
 
Class 2: Introduction to web technology entrepreneurship
Class 2: Introduction to web technology entrepreneurship Class 2: Introduction to web technology entrepreneurship
Class 2: Introduction to web technology entrepreneurship allanchao
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009dr2tom
 
Practical Trademark Law for FOSS Projects
Practical Trademark Law for FOSS ProjectsPractical Trademark Law for FOSS Projects
Practical Trademark Law for FOSS ProjectsShane Curcuru
 
CO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHCO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHLeonardo Sepulcri
 
IBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryIBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryLeonardo Sepulcri
 
NES Enterprise Series 2010 - Pitching for capital
NES Enterprise Series 2010 - Pitching for capitalNES Enterprise Series 2010 - Pitching for capital
NES Enterprise Series 2010 - Pitching for capitalNUSEntrepreneurs
 
Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Br...
Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Br...Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Br...
Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Br...Ulys Law Firm
 
Technology transfer - ulys - Oct 2011 (Go4Europe)
Technology transfer - ulys - Oct 2011 (Go4Europe)Technology transfer - ulys - Oct 2011 (Go4Europe)
Technology transfer - ulys - Oct 2011 (Go4Europe)Deborah Modiano
 
Defending your Rights
Defending your RightsDefending your Rights
Defending your Rightsfungfung Chen
 
5 secrets about trademarking
5 secrets about trademarking5 secrets about trademarking
5 secrets about trademarkingdougtalks
 

Semelhante a Trademark (20)

Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
 
Trademark basics
Trademark basicsTrademark basics
Trademark basics
 
Customer Development For Startups
Customer Development For StartupsCustomer Development For Startups
Customer Development For Startups
 
Dashboarding Examples Dt
Dashboarding Examples DtDashboarding Examples Dt
Dashboarding Examples Dt
 
Making A Mark: An Introduction To Trademarks For Nigerian SMEs
Making A Mark: An Introduction To Trademarks For Nigerian SMEsMaking A Mark: An Introduction To Trademarks For Nigerian SMEs
Making A Mark: An Introduction To Trademarks For Nigerian SMEs
 
What Every Small Business Owner Should Know About Trademarks
What Every Small Business Owner Should Know About TrademarksWhat Every Small Business Owner Should Know About Trademarks
What Every Small Business Owner Should Know About Trademarks
 
Trademarks and Intellectual Property
Trademarks and Intellectual PropertyTrademarks and Intellectual Property
Trademarks and Intellectual Property
 
Class 2: Introduction to web technology entrepreneurship
Class 2: Introduction to web technology entrepreneurship Class 2: Introduction to web technology entrepreneurship
Class 2: Introduction to web technology entrepreneurship
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009
 
Practical Trademark Law for FOSS Projects
Practical Trademark Law for FOSS ProjectsPractical Trademark Law for FOSS Projects
Practical Trademark Law for FOSS Projects
 
CO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHCO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISH
 
IBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryIBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information Delivery
 
NES Enterprise Series 2010 - Pitching for capital
NES Enterprise Series 2010 - Pitching for capitalNES Enterprise Series 2010 - Pitching for capital
NES Enterprise Series 2010 - Pitching for capital
 
Context
ContextContext
Context
 
Context is Critical
Context is CriticalContext is Critical
Context is Critical
 
Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Br...
Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Br...Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Br...
Conference Technology transfer by Thibault Verbiest, associate lawyer Ulys Br...
 
Technology transfer - ulys - Oct 2011 (Go4Europe)
Technology transfer - ulys - Oct 2011 (Go4Europe)Technology transfer - ulys - Oct 2011 (Go4Europe)
Technology transfer - ulys - Oct 2011 (Go4Europe)
 
Defending your Rights
Defending your RightsDefending your Rights
Defending your Rights
 
5 secrets about trademarking
5 secrets about trademarking5 secrets about trademarking
5 secrets about trademarking
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Trademark

  • 1. Trademarks from Sharon McLeod Introduction Some of you have heard my discourse about protecting trademarks. You may have assumed that, as a technical writer, I have to do that. Well, guess what? It’s something we all share as employees. You may wonder why you share in this, and you may wonder, too, what all the trademark fuss is about. I’ve written down what I remember from a Trademark Training class at a company that I took several years ago to provide a more complete picture. It’s not the most recent trademark information, to be sure, but it still provides a useful overview. And, naturally, you should consult your own company’s attorneys as I am not qualified to provide legal advice in this or any other area. What is a trademark? In short, a trademark is “a promise of identity, source, and quality.” A trademark can be words or pictures (logos). When a potential customer sees a familiar trademark, they expect a product of a certain kind and quality. Why use trademarks? Companies have a limited amount of time to “hook” a customer to their product. Using a trademark helps a customer recognize the product quickly. As an example, what do you think of when you see gold-colored arches? A swoosh on shoes or clothing? You probably already know what the associated product is. In our industry, the amount of time required to “hook” the customer differs, depending on the customer type: Target market 30 End user seconds Retail buyers 20 minutes 30 hours Corporate IT 30+ days OEMs Time for message Note: This illustration may not precisely reflect your situation. It should, however, provide a “broad stroke” view.
  • 2. Trademark hierarchy Some trademarks are easier to protect than others. And it’s all in the name as this illustration suggests: Made up word (for Fanciful Protectability example, “Pentium”) increases Dictionary word in an arbitrary or Arbitrary unrelated setting (for example, “Apple” for PCs; “Java” for software) Suggest an attribute; requires an additional Suggestive cognitive leap (for example, “SatisFAXtion”) Describes the thing; generally not able to serve Descriptive as a TM (for example, Intel Internet Phone) Name of the thing itself; not Generic able to serve as a trademark. Expense of developing increases Why protect a trademark? Companies spend a lot of money to develop trademarks. When customers can quickly identify a product via a trademark, the theory is that more sales occur and those sales occur faster. The trademark can be “lent” to other complementary products, aiding in the sales of those products as well. Things can go awry, however. For example: • Other companies can use your trademark to sell their product, leveraging on the trademark recognition. Needless to say, this is frowned upon. • The trademark can become part of the common language, thus losing its right and ability to represent a specific product. “Kleenex” is probably the best known of these terms. When things go awry, a company can end up in court trying to save their trademark. Their success in court depends on how well a trademark has been protected. Courts can look at a variety of materials to determine the extent of protection, including the product and even the company’s internal email. Sure, it’s only when a trademark ends up in court that protection becomes an issue. However, if protecting a trademark is fairly simple, you can make protecting it a simple part of your daily routine. How do I protect a trademark? To protect a trademark, follow these three “rules”: 1. Always use a trademark as an adjective accompanied by the appropriate noun. Generally, the noun should be lower case. Do not: • Join a trademark to other words, symbols, or numbers, either as a single word or with a hyphen. • Abbreviate a trademark. • Pluralize a trademark. 2. Always use the proper spelling and the proper trademark symbol (™ or ®) when needed. Use superscript or subscript when available; otherwise use parentheses: ( TM ) or ( R ). 3. Always use trademarks and logos only in the ways they were intended: to identify the source of specific products as determined by the owner.
  • 3. How do I protect my company’s trademarks? Let’s take a closer look at the above rules, and apply them specifically to a hypothetical software product we’ll call SoftSomething. Appropriate nouns Not just any noun can follow a trademarked term; the noun must be an “appropriate” noun. In most companies, someone or some department owns the transforming of everyday nouns into ones blessed as appropriate for a particular trademark. Here is a list of nouns that might be appropriate for the SoftSomething trademark: software application(s) component(s) tool(s) You should use nouns only from your product’s approved list. If you think the list is either incomplete or overly ambitious, bring it up as an issue. Generally, a list can evolve with product needs. The trademark symbol Trademarks not yet registered with the Patent and Trademark office are identified with the “™” symbol. After the mark is registered, it is identified with the “®” symbol. When the delivery mechanism doesn’t support superscript or subscript, use “( R )”. You should use this symbol in the first appearance of the term in any body of work. You don’t need to use it thereafter. If the work contains both headings and body text, the symbol should appear in the first occurrence of each. When the term occurs in electronic media, such as a software GUI, the symbol should also appear in the first occurrence. Determining the first occurrence in electronic media is sometimes a gray area as some screens can be printed, thus constituting a separate “body” of work. Use your best judgment. Referring to trademarks from other companies When using trademarks owned by other companies, apply the same rules, except use an asterisk (*) or cross (†) rather than a trademark symbol (™ or ®). Ensure that a general acknowledgment line such as “other brands and names are the property of their respective owners” exists somewhere in the work (check with your company’s legal department to determine exact wording). This approach not only recognizes other companies’ trademarked terms, it avoids the constant updating required to determine trademark status (“™” or “®”). Samples Correct Incorrect This describes SoftSomething® software. You use This describes SoftSomething software. You use SoftSomething software to make applications that. . . SoftSomething software to make applications that. . . With SoftSomething software, you can create. . . With SoftSomething, you can create. . . SoftSomething software provides. . . SoftSomething provides. . . You must first start the SoftSomething software You must first start SoftSomething. kernel.