SlideShare una empresa de Scribd logo
1 de 3
Trademarks
from Sharon McLeod


Introduction
Some of you have heard my discourse about protecting trademarks. You may have assumed that, as a technical
writer, I have to do that. Well, guess what? It’s something we all share as employees. You may wonder why you
share in this, and you may wonder, too, what all the trademark fuss is about.
I’ve written down what I remember from a Trademark Training class at a company that I took several years ago to
provide a more complete picture. It’s not the most recent trademark information, to be sure, but it still provides a
useful overview. And, naturally, you should consult your own company’s attorneys as I am not qualified to provide
legal advice in this or any other area.


What is a trademark?
In short, a trademark is “a promise of identity, source, and quality.” A trademark can be words or pictures (logos).
When a potential customer sees a familiar trademark, they expect a product of a certain kind and quality.


Why use trademarks?
Companies have a limited amount of time to “hook” a customer to their product. Using a trademark helps a
customer recognize the product quickly. As an example, what do you think of when you see gold-colored arches? A
swoosh on shoes or clothing? You probably already know what the associated product is.
In our industry, the amount of time required to “hook” the customer differs, depending on the customer type:
              Target market

                                                    30
                 End user
                                                 seconds

               Retail buyers                    20 minutes

                                                 30 hours
               Corporate IT


                                                30+ days
                 OEMs


                                           Time for message

Note:    This illustration may not precisely reflect your situation. It should, however, provide a “broad stroke”
view.
Trademark hierarchy
Some trademarks are easier to protect than others. And it’s all in the name as this illustration suggests:
                                                                   Made up word (for
                                                 Fanciful
     Protectability                                                example, “Pentium”)
     increases
                                                      Dictionary word in an arbitrary or
                                     Arbitrary        unrelated setting (for example,
                                                      “Apple” for PCs; “Java” for software)

                                            Suggest an attribute; requires an additional
                         Suggestive
                                            cognitive leap (for example, “SatisFAXtion”)


                                Describes the thing; generally not able to serve
              Descriptive
                                as a TM (for example, Intel Internet Phone)


                      Name of the thing itself; not
       Generic
                      able to serve as a trademark.

                                                Expense of developing increases


Why protect a trademark?
Companies spend a lot of money to develop trademarks. When customers can quickly identify a product via a
trademark, the theory is that more sales occur and those sales occur faster. The trademark can be “lent” to other
complementary products, aiding in the sales of those products as well.
Things can go awry, however. For example:
•      Other companies can use your trademark to sell their product, leveraging on the trademark recognition.
       Needless to say, this is frowned upon.
•      The trademark can become part of the common language, thus losing its right and ability to represent a specific
       product. “Kleenex” is probably the best known of these terms.
When things go awry, a company can end up in court trying to save their trademark. Their success in court depends
on how well a trademark has been protected. Courts can look at a variety of materials to determine the extent of
protection, including the product and even the company’s internal email.
Sure, it’s only when a trademark ends up in court that protection becomes an issue. However, if protecting a
trademark is fairly simple, you can make protecting it a simple part of your daily routine.


How do I protect a trademark?
To protect a trademark, follow these three “rules”:
1.     Always use a trademark as an adjective accompanied by the appropriate noun. Generally, the noun should be
       lower case.
       Do not:
       •   Join a trademark to other words, symbols, or numbers, either as a single word or with a hyphen.
       •   Abbreviate a trademark.
       •   Pluralize a trademark.
2.     Always use the proper spelling and the proper trademark symbol (™ or ®) when needed. Use superscript or
       subscript when available; otherwise use parentheses: ( TM ) or ( R ).
3.     Always use trademarks and logos only in the ways they were intended: to identify the source of specific
       products as determined by the owner.
How do I protect my company’s trademarks?
Let’s take a closer look at the above rules, and apply them specifically to a hypothetical software product we’ll call
SoftSomething.

Appropriate nouns
Not just any noun can follow a trademarked term; the noun must be an “appropriate” noun. In most companies,
someone or some department owns the transforming of everyday nouns into ones blessed as appropriate for a
particular trademark. Here is a list of nouns that might be appropriate for the SoftSomething trademark:
software
application(s)
component(s)
tool(s)
You should use nouns only from your product’s approved list. If you think the list is either incomplete or overly
ambitious, bring it up as an issue. Generally, a list can evolve with product needs.

The trademark symbol
Trademarks not yet registered with the Patent and Trademark office are identified with the “™” symbol. After the
mark is registered, it is identified with the “®” symbol. When the delivery mechanism doesn’t support superscript or
subscript, use “( R )”.
You should use this symbol in the first appearance of the term in any body of work. You don’t need to use it
thereafter. If the work contains both headings and body text, the symbol should appear in the first occurrence of
each. When the term occurs in electronic media, such as a software GUI, the symbol should also appear in the first
occurrence. Determining the first occurrence in electronic media is sometimes a gray area as some screens can be
printed, thus constituting a separate “body” of work. Use your best judgment.

Referring to trademarks from other companies
When using trademarks owned by other companies, apply the same rules, except use an asterisk (*) or cross (†)
rather than a trademark symbol (™ or ®). Ensure that a general acknowledgment line such as “other brands and
names are the property of their respective owners” exists somewhere in the work (check with your company’s legal
department to determine exact wording). This approach not only recognizes other companies’ trademarked terms, it
avoids the constant updating required to determine trademark status (“™” or “®”).

Samples
Correct                                                 Incorrect
This describes SoftSomething® software. You use         This describes SoftSomething software. You use
SoftSomething software to make applications that. . .   SoftSomething software to make applications that. . .
With SoftSomething software, you can create. . .        With SoftSomething, you can create. . .
SoftSomething software provides. . .                    SoftSomething provides. . .
You must first start the SoftSomething software         You must first start SoftSomething.
kernel.

Más contenido relacionado

Similar a Protect Trademarks in 30 Characters

Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07Enthiosys Inc
 
Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07Enthiosys Inc
 
Trademark basics
Trademark basicsTrademark basics
Trademark basicsDianne Rees
 
5 Secrets to Trademarks - How to Trademark Without an Attorney
5 Secrets to Trademarks - How to Trademark Without an Attorney5 Secrets to Trademarks - How to Trademark Without an Attorney
5 Secrets to Trademarks - How to Trademark Without an Attorneydougtalks
 
Customer Development For Startups
Customer Development For StartupsCustomer Development For Startups
Customer Development For StartupsLloyd Jacob
 
Dashboarding Examples Dt
Dashboarding Examples DtDashboarding Examples Dt
Dashboarding Examples DtKristin Yokota
 
Making A Mark: An Introduction To Trademarks For Nigerian SMEs
Making A Mark: An Introduction To Trademarks For Nigerian SMEsMaking A Mark: An Introduction To Trademarks For Nigerian SMEs
Making A Mark: An Introduction To Trademarks For Nigerian SMEsAdelphi Consulting
 
What Every Small Business Owner Should Know About Trademarks
What Every Small Business Owner Should Know About TrademarksWhat Every Small Business Owner Should Know About Trademarks
What Every Small Business Owner Should Know About TrademarksAndrei Mincov
 
Patent Quality Isn't the Question. Patent Value Is the Question.
Patent Quality Isn't the Question. Patent Value Is the Question.Patent Quality Isn't the Question. Patent Value Is the Question.
Patent Quality Isn't the Question. Patent Value Is the Question.Erik Oliver
 
Trademarks and Intellectual Property
Trademarks and Intellectual PropertyTrademarks and Intellectual Property
Trademarks and Intellectual PropertyMBA ASAP
 
Class 2: Introduction to web technology entrepreneurship
Class 2: Introduction to web technology entrepreneurship Class 2: Introduction to web technology entrepreneurship
Class 2: Introduction to web technology entrepreneurship allanchao
 
Types of trademark in india
Types of trademark in indiaTypes of trademark in india
Types of trademark in indiaiamsidkul
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009dr2tom
 
Practical Trademark Law for FOSS Projects
Practical Trademark Law for FOSS ProjectsPractical Trademark Law for FOSS Projects
Practical Trademark Law for FOSS ProjectsShane Curcuru
 
CO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHCO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHLeonardo Sepulcri
 
IBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryIBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryLeonardo Sepulcri
 
NES Enterprise Series 2010 - Pitching for capital
NES Enterprise Series 2010 - Pitching for capitalNES Enterprise Series 2010 - Pitching for capital
NES Enterprise Series 2010 - Pitching for capitalNUSEntrepreneurs
 

Similar a Protect Trademarks in 30 Characters (20)

Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07
 
Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
 
Trademark basics
Trademark basicsTrademark basics
Trademark basics
 
5 Secrets to Trademarks - How to Trademark Without an Attorney
5 Secrets to Trademarks - How to Trademark Without an Attorney5 Secrets to Trademarks - How to Trademark Without an Attorney
5 Secrets to Trademarks - How to Trademark Without an Attorney
 
Customer Development For Startups
Customer Development For StartupsCustomer Development For Startups
Customer Development For Startups
 
Dashboarding Examples Dt
Dashboarding Examples DtDashboarding Examples Dt
Dashboarding Examples Dt
 
Trademark
Trademark Trademark
Trademark
 
Making A Mark: An Introduction To Trademarks For Nigerian SMEs
Making A Mark: An Introduction To Trademarks For Nigerian SMEsMaking A Mark: An Introduction To Trademarks For Nigerian SMEs
Making A Mark: An Introduction To Trademarks For Nigerian SMEs
 
What Every Small Business Owner Should Know About Trademarks
What Every Small Business Owner Should Know About TrademarksWhat Every Small Business Owner Should Know About Trademarks
What Every Small Business Owner Should Know About Trademarks
 
Patent Quality Isn't the Question. Patent Value Is the Question.
Patent Quality Isn't the Question. Patent Value Is the Question.Patent Quality Isn't the Question. Patent Value Is the Question.
Patent Quality Isn't the Question. Patent Value Is the Question.
 
Trademarks and Intellectual Property
Trademarks and Intellectual PropertyTrademarks and Intellectual Property
Trademarks and Intellectual Property
 
Class 2: Introduction to web technology entrepreneurship
Class 2: Introduction to web technology entrepreneurship Class 2: Introduction to web technology entrepreneurship
Class 2: Introduction to web technology entrepreneurship
 
Types of trademark in india
Types of trademark in indiaTypes of trademark in india
Types of trademark in india
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009
 
Practical Trademark Law for FOSS Projects
Practical Trademark Law for FOSS ProjectsPractical Trademark Law for FOSS Projects
Practical Trademark Law for FOSS Projects
 
CO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHCO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISH
 
IBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryIBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information Delivery
 
NES Enterprise Series 2010 - Pitching for capital
NES Enterprise Series 2010 - Pitching for capitalNES Enterprise Series 2010 - Pitching for capital
NES Enterprise Series 2010 - Pitching for capital
 
Context
ContextContext
Context
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Protect Trademarks in 30 Characters

  • 1. Trademarks from Sharon McLeod Introduction Some of you have heard my discourse about protecting trademarks. You may have assumed that, as a technical writer, I have to do that. Well, guess what? It’s something we all share as employees. You may wonder why you share in this, and you may wonder, too, what all the trademark fuss is about. I’ve written down what I remember from a Trademark Training class at a company that I took several years ago to provide a more complete picture. It’s not the most recent trademark information, to be sure, but it still provides a useful overview. And, naturally, you should consult your own company’s attorneys as I am not qualified to provide legal advice in this or any other area. What is a trademark? In short, a trademark is “a promise of identity, source, and quality.” A trademark can be words or pictures (logos). When a potential customer sees a familiar trademark, they expect a product of a certain kind and quality. Why use trademarks? Companies have a limited amount of time to “hook” a customer to their product. Using a trademark helps a customer recognize the product quickly. As an example, what do you think of when you see gold-colored arches? A swoosh on shoes or clothing? You probably already know what the associated product is. In our industry, the amount of time required to “hook” the customer differs, depending on the customer type: Target market 30 End user seconds Retail buyers 20 minutes 30 hours Corporate IT 30+ days OEMs Time for message Note: This illustration may not precisely reflect your situation. It should, however, provide a “broad stroke” view.
  • 2. Trademark hierarchy Some trademarks are easier to protect than others. And it’s all in the name as this illustration suggests: Made up word (for Fanciful Protectability example, “Pentium”) increases Dictionary word in an arbitrary or Arbitrary unrelated setting (for example, “Apple” for PCs; “Java” for software) Suggest an attribute; requires an additional Suggestive cognitive leap (for example, “SatisFAXtion”) Describes the thing; generally not able to serve Descriptive as a TM (for example, Intel Internet Phone) Name of the thing itself; not Generic able to serve as a trademark. Expense of developing increases Why protect a trademark? Companies spend a lot of money to develop trademarks. When customers can quickly identify a product via a trademark, the theory is that more sales occur and those sales occur faster. The trademark can be “lent” to other complementary products, aiding in the sales of those products as well. Things can go awry, however. For example: • Other companies can use your trademark to sell their product, leveraging on the trademark recognition. Needless to say, this is frowned upon. • The trademark can become part of the common language, thus losing its right and ability to represent a specific product. “Kleenex” is probably the best known of these terms. When things go awry, a company can end up in court trying to save their trademark. Their success in court depends on how well a trademark has been protected. Courts can look at a variety of materials to determine the extent of protection, including the product and even the company’s internal email. Sure, it’s only when a trademark ends up in court that protection becomes an issue. However, if protecting a trademark is fairly simple, you can make protecting it a simple part of your daily routine. How do I protect a trademark? To protect a trademark, follow these three “rules”: 1. Always use a trademark as an adjective accompanied by the appropriate noun. Generally, the noun should be lower case. Do not: • Join a trademark to other words, symbols, or numbers, either as a single word or with a hyphen. • Abbreviate a trademark. • Pluralize a trademark. 2. Always use the proper spelling and the proper trademark symbol (™ or ®) when needed. Use superscript or subscript when available; otherwise use parentheses: ( TM ) or ( R ). 3. Always use trademarks and logos only in the ways they were intended: to identify the source of specific products as determined by the owner.
  • 3. How do I protect my company’s trademarks? Let’s take a closer look at the above rules, and apply them specifically to a hypothetical software product we’ll call SoftSomething. Appropriate nouns Not just any noun can follow a trademarked term; the noun must be an “appropriate” noun. In most companies, someone or some department owns the transforming of everyday nouns into ones blessed as appropriate for a particular trademark. Here is a list of nouns that might be appropriate for the SoftSomething trademark: software application(s) component(s) tool(s) You should use nouns only from your product’s approved list. If you think the list is either incomplete or overly ambitious, bring it up as an issue. Generally, a list can evolve with product needs. The trademark symbol Trademarks not yet registered with the Patent and Trademark office are identified with the “™” symbol. After the mark is registered, it is identified with the “®” symbol. When the delivery mechanism doesn’t support superscript or subscript, use “( R )”. You should use this symbol in the first appearance of the term in any body of work. You don’t need to use it thereafter. If the work contains both headings and body text, the symbol should appear in the first occurrence of each. When the term occurs in electronic media, such as a software GUI, the symbol should also appear in the first occurrence. Determining the first occurrence in electronic media is sometimes a gray area as some screens can be printed, thus constituting a separate “body” of work. Use your best judgment. Referring to trademarks from other companies When using trademarks owned by other companies, apply the same rules, except use an asterisk (*) or cross (†) rather than a trademark symbol (™ or ®). Ensure that a general acknowledgment line such as “other brands and names are the property of their respective owners” exists somewhere in the work (check with your company’s legal department to determine exact wording). This approach not only recognizes other companies’ trademarked terms, it avoids the constant updating required to determine trademark status (“™” or “®”). Samples Correct Incorrect This describes SoftSomething® software. You use This describes SoftSomething software. You use SoftSomething software to make applications that. . . SoftSomething software to make applications that. . . With SoftSomething software, you can create. . . With SoftSomething, you can create. . . SoftSomething software provides. . . SoftSomething provides. . . You must first start the SoftSomething software You must first start SoftSomething. kernel.