UNCITRAL Legislative Guide On Secured Transactions: Supplement On Security Rights in Intellectual Property
UNCITRAL Legislative Guide On Secured Transactions: Supplement On Security Rights in Intellectual Property
UNCITRAL Legislative Guide On Secured Transactions: Supplement On Security Rights in Intellectual Property
USD 30
United Nations publication ISBN 978-92-1-133708-2
Printed in Austria
Sales No. E.11.V.6
*1057126*
V.10-57126—March 2011—850 UNITED NATIONS
Further information may be obtained from:
UNITED NATIONS
New York, 2011
Note
The designations employed and the presentation of material in this publication do not imply
the expression of any opinion whatsoever on the part of the Secretariat of the United Nations
concerning the legal status of any country, territory, city or area, or of its authorities, or
concerning the delimitation of its frontiers or boundaries.
Publishing production: English, Publishing and Library Section, United Nations Office at
Vienna.
Preface
At the first part of its fortieth session, in June 2007, the Commission considered
a note by the Secretariat entitled “Possible future work on security rights in
intellectual property” (A/CN.9/632),4 which took into account the conclusions
reached at the colloquium. In order to provide sufficient guidance to States
1
See www.uncitral.org.
2
Official Records of the General Assembly, Sixty-first Session, Supplement No. 17 (A/61/17),
paras. 81, 82 and 86, available from www.uncitral.org/uncitral/en/commission/sessions/39th.html.
3
See www.uncitral.org/uncitral/en/commission/colloquia_security.html.
4
Available from www.uncitral.org/uncitral/en/commission/sessions/40th.html.
iii
as to the adjustments that they might need to make in their laws to avoid
inconsistencies between secured financing law and law relating to intellectual
property, the Commission decided to entrust Working Group VI (Security
Interests) with the preparation of a supplement to the Guide specific to security
rights in intellectual property rights.5 At its resumed fortieth session, in
December 2007, the Commission finalized and adopted the Guide on the
understanding that a supplement to the Guide specific to security rights in
intellectual property rights would subsequently be prepared.6
The work of Working Group VI was carried out at five one-week sessions,
the final session being held in February 2010.7 At its fourteenth, fifteenth and
sixteenth sessions, the Working Group referred certain insolvency-related
matters to Working Group V (Insolvency Law),8 which Working Group V
considered at its thirty-fifth, thirty-sixth and thirty-eighth sessions.9 In addition,
the Working Group cooperated with WIPO and other intellectual property
organizations from the public and the private sector, which attended its
meetings as observers, to ensure that the Supplement would be sufficiently
coordinated with law relating to intellectual property. Moreover, the Working
Group cooperated closely with the Permanent Bureau of the Hague Conference
on Private International Law in the preparation of chapter X of the Supplement,
on the law applicable to a security right in intellectual property.10
At its forty-third session, held in New York from 21 June to 9 July 2010, the
Commission considered and on 29 June 2010 adopted the Supplement by
consensus (see annex II.A).11 Subsequently, the General Assembly adopted
5
Official Records of the General Assembly, Sixty-second Session, Supplement No. 17 (A/62/17
(Part I)), paras. 156, 157 and 162, available from www.uncitral.org/uncitral/en/commission/sessions/40th.
html.
6
Ibid., (A/62/17 (Part II)), paras. 99 and 100. The Guide (United Nations publication, Sales
No. E.09.V.12) is available from www.uncitral.org/pdf/english/texts/security-lg/e/09-82670_Ebook-
Guide_09-04-10English.pdf.
7
The reports of the Working Group on its work at those five sessions are contained in documents
A/CN.9/649, A/CN.9/667, A/CN.9/670, A/CN.9/685 and A/CN.9/689. At those sessions, the Working
Group considered A/CN.9/WG.VI/WP.33 and Add.1, A/CN.9/WG.VI/WP.35 and Add.1, A/CN.9/WG.VI/
WP.37 and Add.1-4, A/CN.9/WG.VI/WP.39 and Add.1-7, and A/CN.9/WG.VI/WP.42 and Add.1-7. The
working papers and reports on the work of Working Group VI (Security Interests) are available from
www.uncitral.org/uncitral/en/commission/working_groups/6Security_Interests.html.
8
A/CN.9/667, paras. 129-140; A/CN.9/670, paras. 116-122; and A/CN.9/685, para. 95. The working
papers and reports of Working Group V (Insolvency Law) are available from www.uncitral.org/uncitral/
en/commission/working_groups/5Insolvency.html.
9
A/CN.9/666, paras. 112-117; A/CN.9/WG.V/WP.87; A/CN.9/671, paras. 125-127; and
A/CN.9/691, paras. 94-98, also available from www.uncitral.org/uncitral/en/commission/working_
groups/5Insolvency.html.
10
At its sixteenth session, the Working Group considered a proposal by the Permanent Bureau of
the Hague Conference (A/CN.9/WG.VI/WP.40, available from www.uncitral.org/uncitral/en/commission/
working_groups/6Security_Interests.html.
11
The draft of the Supplement considered by the Commission is contained in documents
A/CN.9/700 and Add.1-7, available from www.uncitral.org/uncitral/en/commission/sessions/43rd.html.
For the report of the Commission on that draft, see Official Records of the General Assembly, Sixty-fifth
Session, Supplement No. 17 (A/65/17), paras. 192-227.
iv
resolution 65/23 of 6 December 2010 (see annex II.B), in which it expressed
its appreciation to UNCITRAL for the completion and adoption of the
Supplement; requested the Secretary-General to disseminate broadly the text
of the Supplement; recommended that all States give favourable consideration
to the Supplement when revising or adopting their relevant legislation; and
also recommended that all States continue to consider becoming party to the
United Nations Convention on the Assignment of Receivables in International
Trade (2001)12 and implementing the recommendations of the Guide.
12
United Nations publication, Sales No. E.04.V.14, available from www.uncitral.org/uncitral/en/
uncitral_texts/payments/2001Convention_receivables.html.
v
Contents
Paragraphs Page
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-52 1
A. Purpose of the Supplement. . . . . . . . . . . . . . . . . 1 1
B. The interaction between secured transactions
law and law relating to intellectual property. . . 2-7 1
C. Terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32 4
D. Valuation of intellectual property to be
encumbered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33-34 14
E. Examples of financing practices relating to
intellectual property. . . . . . . . . . . . . . . . . . . . . . . 35-45 15
F. Key objectives and fundamental policies. . . . . . 46-52 19
I. Scope of application and party autonomy. . . . . . . . 53-76 23
A. Broad scope of application. . . . . . . . . . . . . . . . . 53-73 23
1. Encumbered assets covered . . . . . . . . . . . . . 54-55 23
2. Transactions covered. . . . . . . . . . . . . . . . . . . 56 24
3. Outright transfers of intellectual property . 57-59 24
4. Limitations in scope. . . . . . . . . . . . . . . . . . . 60-73 26
B. Application of the principle of party autonomy
to security rights in intellectual property. . . . . . 74-76 34
II. Creation of a security right in intellectual property. 77-120 35
A. The concepts of creation and third-party
effectiveness. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77-79 35
B. Functional, integrated and unitary concept of
a security right. . . . . . . . . . . . . . . . . . . . . . . . . . . 80-81 36
C. Requirements for the creation of a security
right in intellectual property. . . . . . . . . . . . . . . . 82-85 37
vii
Paragraphs Page
D. Rights of a grantor with respect to the
intellectual property to be encumbered. . . . . . . 86 39
E. Distinction between a secured creditor and an
owner with respect to intellectual property. . . . 87-88 40
F. Types of encumbered asset in an intellectual
property context. . . . . . . . . . . . . . . . . . . . . . . . . . 89-112 40
1. Rights of an owner. . . . . . . . . . . . . . . . . . . . 91-96 41
2. Rights of a licensor . . . . . . . . . . . . . . . . . . . 97-105 43
3. Rights of a licensee . . . . . . . . . . . . . . . . . . . 106-107 47
4. Tangible assets with respect to which
intellectual property is used. . . . . . . . . . . . . 108-112 48
G. Security rights in future intellectual property . 113-118 49
H. Legal or contractual limitations on the
transferability of intellectual property . . . . . . . . 119-120 51
Recommendation 243. . . . . . . . . . . . . . . . . . . . . 52
III. Effectiveness of a security right in intellectual
property against third parties. . . . . . . . . . . . . . . . . . . 121-129 53
A. The concept of third-party effectiveness. . . . . . 121-123 53
B. Third-party effectiveness of security rights in
intellectual property that are registered in an
intellectual property registry. . . . . . . . . . . . . . . . 124-127 54
C. Third-party effectiveness of security rights in
intellectual property that are not registered in
an intellectual property registry. . . . . . . . . . . . . 128-129 56
IV. The registry system . . . . . . . . . . . . . . . . . . . . . . . . . . 130-172 59
A. The general security rights registry. . . . . . . . . . 130-131 59
B. Asset-specific intellectual property registries. . . 132-134 60
C. Coordination of registries. . . . . . . . . . . . . . . . . . 135-140 61
D. Registration of notices of security rights in
future intellectual property. . . . . . . . . . . . . . . . . 141-143 63
E. Dual registration or search. . . . . . . . . . . . . . . . . 144-154 64
F. Time of effectiveness of registration. . . . . . . . . 155-157 69
viii
Paragraphs Page
G. Impact of a transfer of encumbered intellectual
property on the effectiveness of registration. . . . 158-166 70
H. Registration of security rights in trademarks. . . 167-172 73
Recommendation 244. . . . . . . . . . . . . . . . . . . . . 76
V. Priority of a security right in intellectual property. . 173-221 77
A. The concept of priority . . . . . . . . . . . . . . . . . . . . 173-174 77
B. Identification of competing claimants. . . . . . . . . 175-176 78
C. Relevance of knowledge of prior transfers or
security rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . 177-178 79
D. Priority of security rights in intellectual
property that are not registered in an
intellectual property registry . . . . . . . . . . . . . . . . 179-180 79
E. Priority of security rights in intellectual
property that are registered in an intellectual
property registry. . . . . . . . . . . . . . . . . . . . . . . . . . 181-183 80
F. Rights of transferees of encumbered intellectual
property. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184-187 82
G. Rights of licensees in general. . . . . . . . . . . . . . . 188-192 83
H. Rights of certain licensees. . . . . . . . . . . . . . . . . . 193-212 85
I. Priority of a security right in intellectual
property granted by a licensor as against a
security right granted by a licensee . . . . . . . . . . 213-218 91
J. Priority of a security right in intellectual
property as against the right of a judgement
creditor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219-220 93
K. Subordination . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 94
Recommendation 245. . . . . . . . . . . . . . . . . . . . . 94
VI. Rights and obligations of the parties to a security
agreement relating to intellectual property. . . . . . . . . 222-223 95
A. Application of the principle of party autonomy. 222 95
B. Preservation of the encumbered intellectual
property. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223-226 95
Recommendation 246. . . . . . . . . . . . . . . . . . . . . 97
ix
Paragraphs Page
VII. Rights and obligations of third-party obligors in
intellectual property financing transactions. . . . . . . . 227-228 99
VIII. Enforcement of a security right in intellectual
property. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229-253 101
A. Interaction of secured transactions law and
law relating to intellectual property. . . . . . . . . . 229-232 101
B. Enforcement of a security right relating to
different types of intellectual property. . . . . . . . 233-234 102
C. Taking possession of documents necessary
for the enforcement of a security right in
intellectual property. . . . . . . . . . . . . . . . . . . . . . . 235-236 103
D. Disposition of encumbered intellectual
property . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237-238 104
E. Rights acquired through disposition of
encumbered intellectual property. . . . . . . . . . . . 239-241 105
F. Proposal by the secured creditor to acquire
the encumbered intellectual property. . . . . . . . . 242 106
G. Collection of royalties and other licence fees. . 243 106
H. Licensor’s other contractual rights. . . . . . . . . . . 244 107
I. Enforcement of security rights in tangible
assets with respect to which intellectual
property is used. . . . . . . . . . . . . . . . . . . . . . . . . . 245-248 107
J. Enforcement of a security right in a licensee’s
rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249-253 109
IX. Acquisition financing in an intellectual property
context. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254-283 111
A. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254-255 111
B. Unitary approach. . . . . . . . . . . . . . . . . . . . . . . . . 256-279 112
1. Third-party effectiveness and priority of
an acquisition security right in intellectual
property. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259-263 113
2. Priority of an acquisition security right
registered in an intellectual property
registry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264-268 115
x
Paragraphs Page
3. Priority of an acquisition security right
in proceeds of encumbered intellectual
property. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269-272 118
4. Examples illustrating how the acquisition
financing recommendations of the Guide
could apply in an intellectual property
context. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273-279 120
C. Non-unitary approach. . . . . . . . . . . . . . . . . . . . . 280-283 123
Recommendation 247. . . . . . . . . . . . . . . . . . . . . 124
X. Law applicable to a security right in intellectual
property . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284-339 127
A. Law applicable to property matters. . . . . . . . . . 284-337 127
1. Purpose and scope . . . . . . . . . . . . . . . . . . . . 284-289 127
2. The approach recommended in the Guide
with respect to security rights in
intangible assets . . . . . . . . . . . . . . . . . . . . . . 290-296 129
3. The law of the State of protection
(lex protectionis). . . . . . . . . . . . . . . . . . . . . . 297-300 132
4. Other approaches . . . . . . . . . . . . . . . . . . . . . 301-317 133
5. Examples for a comparative analysis of
the various approaches. . . . . . . . . . . . . . . . . 318-337 139
B. Law applicable to contractual matters. . . . . . . . 338-339 146
Recommendation 248. . . . . . . . . . . . . . . . . . . . . 147
XI. Transition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340-344 149
XII. The impact of insolvency of a licensor or licensee
of intellectual property on a security right in that
party’s rights under a licence agreement. . . . . . . . . 345-367 151
A. General. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345-353 151
B. Insolvency of the licensor. . . . . . . . . . . . . . . . . . 354-362 154
C. Insolvency of the licensee. . . . . . . . . . . . . . . . . . 363-366 157
D. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 158
xi
Annexes
Page
I. Terminology and recommendations of the
UNCITRAL Legislative Guide on Secured Transactions:
Supplement on Security Rights in Intellectual Property. . . . 161
A. Terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
B. Recommendations 243-248. . . . . . . . . . . . . . . . . . . . . . . . 161
II. Decision of the United Nations Commission on
International Trade Law and General Assembly
resolution 65/23 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
A. Decision of the Commission . . . . . . . . . . . . . . . . . . . . . . 165
B. General Assembly resolution 65/23 . . . . . . . . . . . . . . . . 167
xii
Introduction
A. Purpose of the Supplement
1
The Supplement must, therefore, be read together with the Guide. For easy reference, the
S upplement follows the order in which the issues are discussed in the Guide (that is, introduction with
purpose, terminology, examples and key objectives and fundamental polices, scope, creation of a security
right, etc.). In each section, the Supplement summarizes briefly the general considerations of the Guide
and then goes on to discuss how they apply to an intellectual property context.
1
2 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
2
See Legal Instruments Embodying the Results of the Uruguay Round of Multilateral Trade
egotiations, done at Marrakesh on 15 April 1994 (GATT secretariat publication, Sales No.
N
GATT/1994-7).
Introduction 3
C. Terminology
8. States that adopt the law recommended in the Guide may wish to review
their law relating to intellectual property and coordinate the terminology used
in that law with the terminology used in the law recommended in the Guide.
12. The Guide uses the term “consumer goods” to refer to goods that a
grantor uses or intends to use for personal, family or household purposes
(see the term “consumer goods” in the introduction to the Guide, sect. B,
para. 20). In the Supplement, for the purpose of applying the recommendations
of the Guide relating to acquisition security rights in tangible assets to
acquisition security rights in intellectual property, the term includes
intellectual property or a licence of intellectual property used or intended
by the grantor to be used for personal, family or household purposes.
6 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
13. The Guide uses the term “encumbered asset” to denote an asset that is
subject to a security right (see the term “encumbered asset” in the introduction
to the Guide, sect. B, para. 20). While the Guide refers by convention to a
security right in an “encumbered asset”, what is really encumbered and meant
is “whatever right the grantor has in an asset and intends to encumber”.
14. The Guide also uses various terms to denote the particular type of
intellectual property right that may be used as an encumbered asset without
interfering with the nature, the content or the legal consequences of such terms
for purposes of law relating to intellectual property, as well as contract and
property law. These types of intellectual property right that may be used as
security for credit include the rights of an intellectual property owner
(“owner”), the rights of an assignee or successor in title to an owner, the rights
of a licensor or licensee under a licence agreement and the rights in intellectual
property used with respect to a tangible asset, provided that the intellectual
property right is described as an encumbered asset in the security agreement.
The owner, licensor or licensee may encumber all or part of its rights, if they
are transferable under law relating to intellectual property.
16. Typically, under law relating to intellectual property and contract law, the
rights of a licensor and a licensee depend on the terms of the licence agreement
(in the case of a contractual licence), law (in the case of compulsory or
statutory licence) or the legal consequences of specific conduct (in the case
of an implied licence). In addition, normally, the rights of a licensor include
the right to claim payment of royalties and to terminate the licence agreement.
Similarly, the rights of a licensee include the a uthorization given to the licensee
to use the licensed intellectual property in accordance with the terms of the
licence agreement and possibly the right to enter into sub-licence agreements
and the right to obtain payment of sub-royalties (see the term “licence”,
paras. 23-25 below). Finally, the rights of a grantor of a security right in a
tangible asset with respect to which intellectual property is used are described
in the agreement between the secured creditor and the grantor (owner, licensor
or licensee of the relevant intellectual property) in line with secured
transactions law and law relating to intellectual property.
Introduction 7
(e) Grantor
17. The Guide uses the term “grantor” to denote the person creating a
security right to secure either its own obligation or that of another person
(see the term “grantor” in the introduction to the Guide, sect. B, para. 20).
As already mentioned (see para. 14), in a secured transaction relating to
intellectual property, the encumbered asset may be the rights of the
intellectual property owner, the rights of a licensor (including the right to
the payment of royalties) or the rights of a licensee to use or exploit the
licensed intellectual property, to grant sub-licences and to claim the
payment of sub-royalties. Thus, depending on the kind of intellectual
property that is encumbered, the term “grantor” will refer to an owner, a
licensor or a licensee (although, unlike an owner, a licensor or a licensee
may not necessarily enjoy exclusive rights as this term is understood under
law relating to intellectual property). Finally, as is the case with any
secured transaction relating to other types of movable asset, the term
“grantor” may reflect a third party granting a security right in its i ntellectual
property to secure the obligation owed by a debtor to a secured creditor.
18. As used in the Guide (see the term “intellectual property” in the
introduction to the Guide, sect. B, para. 20), the term “intellectual p roperty”
means copyrights, trademarks, patents, service marks, trade secrets and
designs and any other asset considered to be intellectual property under
the domestic law of the enacting State or under an international agreement
to which the enacting State is a party (such as, for example, neighbouring,
allied or related rights3 or plant varieties). Furthermore, references in the
Guide to “intellectual property” are to be understood as references to
“intellectual property rights”, such as the rights of an intellectual property
owner, licensor or licensee. The commentary to the Guide explains that
the meaning given to the term “intellectual property” in the Guide is
intended to ensure consistency of the Guide with law relating to intellectual
property, while at the same time respecting the right of a State enacting
3
Closely related to “copyright” are “neighbouring rights”, also called allied or related rights. These
are rights that are said to be “in the neighbourhood” of copyright. The term typically covers the rights
of performers, producers of phonograms and broadcasting organizations, but in some countries it can
also include the rights of film producers or rights in photographs. Sometimes these are called diritti
connessi (“connected rights”) or verwandte Schutzrechte (“related rights”) or droits voisins (“neighbouring
rights”), but the common term is the English “neighbouring rights”. Internationally, neighbouring rights
are generally protected under the International Convention for the Protection of Performers, Producers
of Phonograms and Broadcasting Organizations, done at Rome on 26 October 1961. Additional protections
are accorded to certain performers and phonogram producers in the WIPO Performances and Phonograms
Treaty, adopted in Geneva on 20 December 1996.
8 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
the recommendations of the Guide to align the definition with its own law,
whether national law or law flowing from treaties. An enacting State may add
to the list mentioned above or remove from it types of intellectual property
so that it conforms to national law.4 As a result, the Guide treats as “intel-
lectual property”, for the purposes of the Guide, whatever an enacting State
considers to be intellectual property in conformity with its national law and
in compliance with its international obligations.
19. For purposes of secured transactions law, the intellectual property right
itself is distinct from the rights to payment that flow from it, such as the right
to payment of royalties, for example, from the exercise of broadcasting rights.
Under the Guide rights to payment are characterized as “receivables” and
could be an original encumbered asset, if described as such in the security
agreement, or proceeds of intellectual property, if the original encumbered
asset is intellectual property. However, this treatment of these rights to payment
in the Guide does not preclude a different treatment for purposes of law
relating to intellectual property. For example, for the purposes of law relating
to intellectual property, a right of a licensor to payment of equitable
remuneration might be treated as part of the intellectual property right of the
licensor (for the treatment of receivables under secured transactions law and
law relating to intellectual property, see paras. 97-105 below).
(g) Inventory
21. As used in the Guide, the term “inventory” means tangible assets held
for sale or lease in the ordinary course of a grantor’s business, as well as raw
and semi-processed materials (work-in-process) (see the term “inventory” in
the introduction to the Guide, sect. B, para. 20). For the purposes of the
4
See footnote 24 to the introduction to the Guide.
Introduction 9
22. As already mentioned (see para. 3), the commentary of the Guide also
clarifies that references to the term “law” throughout the Guide include
both statutory and non-statutory law. In addition, the commentary to the
Guide clarifies that the expression “law relating to intellectual property”
(see recommendation 4, subpara. (b)) is broader than intellectual property
law (dealing, for example, directly with patents, trademarks or copyrights)
but narrower than general contract or property law (see the Guide,
introduction, para. 19, and chap. I, paras. 33-36). In particular, the expression
“law relating to intellectual property” means national law or law flowing
from international agreements, to which a State is a party, relating to
intellectual property that governs specifically security rights in intellectual
property, and not law that generally governs security rights in various types
of asset and, as a result, may govern security rights in intellectual property.
An example of a “law relating to intellectual property” might be law that
applies specifically to pledges or mortgages of copyrights in software,
assuming that it is part of the law relating to intellectual property and is not
simply the application of a State’s general law of pledges or mortgages in
an intellectual property context.
(i) Licence
23. The Guide also uses the term “licence” (which includes a sub-licence)
as a general concept, while recognizing that, under law relating to intellectual
property, a distinction may often be drawn: (a) between contractual licences
(whether express or implied) and compulsory or statutory licences, in which
a licence is not the result of an agreement; (b) between a licence agreement
and the licence that is granted by the agreement (for example, the
authorization to use or exploit the licensed intellectual property); and
(c) between exclusive licences (which, under law relating to intellectual
property in some States, may be treated as transfers) and non-exclusive
licences. In addition, under the Guide, a licence agreement does not in itself
create a security right and a licence with a right to terminate the licence
agreement is not a security right (see para. 20 above).
24. However, the exact meaning of these terms is left to law relating to
intellectual property, as well as to contract and other law that may be
10 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
25. In addition, the Guide does not affect in any way the particular
characterization of rights under a licence agreement given by law relating
to intellectual property. For example, the Guide does not affect the nature
of rights created under an exclusive licence agreement as rights in rem or
the nature of an exclusive licence as a transfer, as is the case under some
laws relating to intellectual property. Moreover, the Guide does not affect
any limitations included in the licence agreement as to the transferability of
licensed rights (see paras. 52, 107, 158, 159, 187, 196 and 197 below).
(j) Owner
26. The Guide does not explain the term “owner” of an encumbered asset,
whether that asset is intellectual property or not. This is a matter of the
relevant property law. Accordingly, the Guide uses the term “intellectual
property owner” referring to the meaning of this term under law relating to
intellectual property, generally denoting the person that is entitled to enforce
the exclusive rights flowing from intellectual property or its transferee, that
is, the creator, author or inventor or their successor in title (as to whether
a secured creditor may exercise the rights of an intellectual property owner,
see paras. 29, 30, 87, 88 and 222 below).
5
Available from www.wipo.int/about-ip/en/development_iplaw/pdf/pub835.pdf.
6
Available from www.wipo.int/treaties/en/ip/singapore/singapore_treaty.html.
Introduction 11
27. The term “receivable” is used in the Guide (see the term “receivable”
in the introduction to the Guide, sect. B, para. 20) and in the United Nations
Convention on the Assignment of Receivables in International Trade
(the “United Nations Assignment Convention”; see article 2)7 to reflect a
right to payment of a monetary obligation. Thus, for the purposes of the
Guide, the term includes the right of a licensor (that may be an owner or
not) or a licensee/sub-licensor to obtain payment of licence royalties (without
affecting the terms and conditions of the licence agreement, such as an
agreement between the licensor and the licensee that the licensee will not
create a security right in its right to payment of sub-royalties). The exact
meaning and scope of licence royalties are subject to the terms and conditions
of the licence agreement relating to the payment of royalties, such as that
payments are to be staggered or that there might be percentage payments
depending on market conditions or sales figures (for a discussion of the term
“secured creditor”, which includes an assignee of receivables, see paras. 29
and 30 below; for a discussion of the distinction between a secured creditor
and an intellectual property owner, see paras. 87 and 88 below).
28. The term “assignment” is used in the Guide with respect to receivables
to denote not only outright assignments but also assignments for security
purposes (treated in the Guide as secured transactions) and transactions
creating a security right in a receivable. To avoid creating the impression that
the recommendations of the Guide relating to assignments of receivables
apply also to “assignments” of intellectual property (as the term “assignment”
is used in law relating to intellectual property), the term “transfer” (rather
than the term “assignment”) is used in the Supplement to denote the transfer
of the rights of an intellectual property owner. While the law recommended
in the Guide applies to all types of assignment of receivables, it does not
apply to outright transfers of any right other than a receivable (see the Guide,
recommendations 2, subpara. (d), and 3; see also paras. 57-59 below).
It should also be noted that, while what is a “transfer” or a “licence” is left
to the relevant property or contract law, the term “transfer” is not used in
the Guide to denote a licence agreement (see paras. 158 and 159 below).
29. The Guide recognizes that a security agreement creates a security right,
that is, a limited property right, not an ownership right, in an encumbered
asset, provided that the grantor has the right or power to create a security
7
United Nations publication, Sales No. E.04.V.14.
12 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
right in the asset (see recommendation 13). Thus, in the Guide, the term
“secured creditor” (which includes a transferee by way of security) is
used to denote a person that has a security right and not an outright
transferee or an owner (although, for convenience of reference, the term
includes an outright assignee of receivables; see the term “secured
creditor” in the introduction to the Guide, sect. B, para. 20). In other
words, a secured creditor that acquires a security right under the Guide
does not thereby acquire ownership. This approach protects the grantor/
owner that retains ownership and often possession or control of the
encumbered asset, while at the same time securing the secured creditor
if the grantor or other debtor defaults on the payment of the secured
obligation. In any case, secured creditors normally do not wish to accept
the responsibilities and costs of ownership, and the Guide does not require
a secured creditor to do so. This means, for example, that, even after the
creation of a security right, the owner of the encumbered asset may
exercise all its rights as an owner (subject to any limitations it may have
agreed to with the secured creditor). It should also be noted that, even
when the secured creditor disposes of the encumbered asset by enforcing
its security right after default, the secured creditor does not necessarily
become an owner. In this case, the secured creditor is merely exercising
its right to dispose of the encumbered asset and the transferee acquires
the rights of the grantor free of security rights with a lower priority than
that of the security right being enforced (see paras. 237 and 238 below;
see also the Guide, recommendation 149 and chap. VIII, paras. 57-59).
Only where, after default, the secured creditor exercises the remedy of
proposing to acquire the grantor’s ownership rights in the encumbered
asset in total or partial satisfaction of the secured obligation (in the
absence of any objection by the grantor, the debtor and any other affected
person; see the Guide, recommendations 157 and 158), or acquires
the grantor’s ownership rights by purchasing the asset at a sale in
the context of an enforcement, will the secured creditor ever become the
owner of the asset.
31. The Guide uses the term “security right” to refer to all types of
p roperty right in a movable asset that are created by agreement to secure
payment or other performance of an obligation, irrespective of how they
are denominated (see the term “security right” in the introduction to the
Guide, sect. B, para. 20, and recommendations 2, subpara. (d), and 8).
Thus, the term “security right” would cover the right of a pledgee or
mortgagee of intellectual property, as well as of a transferee in a transfer
for security purposes.
(n) Transfer
32. While the Guide uses the term “outright transfer” to denote transfer
of ownership (see the Guide, chap. I, para. 25), the exact meaning of this
term is a matter of property law. The Guide also uses the term “transfer
for security purposes” to refer to a transaction that is in name only a
transfer but functionally a secured transaction. In view of the functional,
integrated and comprehensive approach it takes to secured transactions
(see recommendations 2, subpara. (d), and 8), for the purposes of secured
transactions law, the Guide treats a transfer for security purposes as a
secured transaction. To the extent that a different characterization of a
transfer for security purposes in other law would apply to all assets, this
is not an issue with respect to which the Guide would defer to law relating
14 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
34. Secured transactions law cannot answer this question. Still, insofar
as it affects the use of intellectual property as security for credit, some
of the complexities involved in appraising the value of intellectual
property need to be understood and addressed. For example, one issue
is that, although the appraisal must take into account the value of the
intellectual property and the expected cash flow, there are no universally
accepted formulae for making this calculation. However, because of
the increasing importance of intellectual property as security for
credit, in some States, lenders and borrowers are often able to seek
guidance from independent appraisers of intellectual property. In addition,
parties in some States may be able to rely on valuation methodologies
developed by national institutions, such as bank associations. Moreover,
parties may be able to rely on training for valuation of intellectual
property in general or for the purpose of licence agreements in particular
provided by international organizations such as WIPO. Parties may also
be able to rely on standards for the valuation of intellectual property as
assets that can be used as security for credit developed by other
international organizations, such as the Organisation for Economic
Co-operation and Development.
Introduction 15
37. Each of the examples illustrates how owners, licensors and licensees
of intellectual property can use these assets as security for credit. In
each case, a prudent prospective lender will engage in due diligence
to ascertain the nature and extent of the rights of the owners, licensors
and licensees of the intellectual property involved and to evaluate
the extent to which the proposed financing would or would not
interfere with such rights. The ability of a lender to address these
issues in a satisfactory manner, obtaining consents and other agreements
where necessary from the owners of the intellectual property, will
affect the lender’s willingness to extend the requested credit and the
cost of such credit. Each of these categories of transaction not only
involves different types (or combinations) of encumbered asset, but
also presents different legal issues for a prospective lender or other
credit provider.8
8
Some of these questions might be addressed in asset-specific intellectual property legislation.
For example, article 19 of the Council Regulation (EC) No. 207/2009 of 26 February 2009 on the
Community trademark provides that a security right may be created in a community trademark and, at
the request of one of the parties, such a right may be registered in the Community trademark registry.
16 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
Example 1
Example 2
Example 3
Example 4
Example 5
43. Apart from the transactions mentioned above, there are transactions in
which assets other than intellectual property, such as inventory or equipment,
serve as security for credit, while the value of these assets is based to some
extent upon the intellectual property with which they are associated.
This category of transactions, illustrated by examples 6 and 7 below, involves
security rights in tangible assets. As discussed in the Supplement (see
paras. 108-112 below), a security right in a tangible asset does not automatically
extend to the intellectual property used with respect to that asset, unless
otherwise agreed by the parties. Thus, if a secured creditor wishes to take a
security right in such intellectual property, the intellectual property has to be
described in the security agreement as part of the encumbered asset.
Example 6
Example 7
46. As already mentioned (see para. 1), the overall objective of the
Guide is to promote secured credit. In order to achieve this general
objective, the Guide formulates and discusses several additional objectives,
including the objectives of predictability and transparency (see the
introduction to the Guide, paras. 43-59). The Guide also rests on and
reflects several fundamental policies. These policies include providing
for comprehensiveness in the scope of secured transactions laws, the
integrated and functional approach to secured transactions (under which
all transactions performing security functions, however denominated, are
considered to be security devices) and the possibility of granting a
security right in future assets (see the introduction to the Guide,
paras. 60-72).
47. These key objectives and fundamental policies are equally relevant to
secured transactions relating to intellectual property. Accordingly,
the overall objective of the Guide with respect to intellectual property
is to promote secured credit for businesses that own or have the right
to use intellectual property, by permitting them to use rights
pertaining to intellectual property as encumbered assets, without
interfering with the legitimate rights of the owners, licensors and
licensees of intellectual property under law relating to intellectual
property, as well as under contract or general property law. Similarly,
all the objectives and fundamental policies mentioned above apply
20 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
49. At this stage, it is sufficient to note that the regime elaborated upon in
the Guide does not, in itself, in any way define the content of any intellectual
property right, describe the scope of the rights that an owner, licensor or
licensee may exercise or impede their rights to preserve the value of their
intellectual property rights by preventing their unauthorized use. Thus, the
Introduction 21
52. Finally, these key objectives mean that secured transactions law should
not override contractual limitations set forth in a license agreement. For
example, if the license agreement provides that the rights of a licensee are
non-transferable without the consent of the licensor, no enforceable security
right in the license may be created without the consent of the licensor.
I. Scope of application and party
autonomy
A. Broad scope of application
53. The law recommended in the Guide applies to security rights in all
types of movable asset, including intellectual property (for the meaning
of the term “intellectual property”, see paras. 18-20 above). Under
the law recommended in the Guide, a legal or natural person may
create or acquire a security right, and a security right may secure
any type of obligation (see recommendation 2). The law recommended
in the Guide applies to all transactions serving security purposes,
regardless of the form of the transaction or the terminology used by
the parties (see the Guide, recommendations 2, subpara. (d), and 8). The
Supplement has an equally broad scope with respect to security rights in
intellectual property.
23
24 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
56. As already mentioned (see para. 53), the law recommended in the
Guide applies to all transactions serving security purposes, regardless of
how they are denominated by the parties or by law relating to intellectual
property. In other words, even if law relating to intellectual property
characterizes a transfer of intellectual property to a creditor for security
purposes as a conditional transfer or even as an “outright” transfer, the
law recommended in the Guide treats this transaction as giving rise to
a security right and thus applies to it as long as it serves security purposes
(see recommendations 2, subpara. (d), and 8).
58. The law recommended in the Guide also applies to transfers of all
movable assets for security purposes, which it treats as transactions giving
rise to a security right (see recommendations 2, subpara. (d), and 8). Thus,
if a State enacts the recommendations of the Guide, a transfer of intellectual
property (whether of full title or rights limited in scope, time or territory)
for security purposes would be treated as a secured transaction. This approach
of the law recommended in the Guide is based on the principle that, in
determining whether a transaction is a secured transaction or not, substance
prevails over form. Accordingly, parties will be able to create a security
right in intellectual property simply by using the methods provided in the
law recommended in the Guide without the need to adopt other formalities
of a “transfer”. This result will not affect licensing practices as, under the
law recommended in the Guide, a licence agreement does not in itself create
a security right and a licence with the right to terminate the licence agreement
is not a security right (see paras. 23-25 above).
59. The law recommended in the Guide does not apply to outright transfers
of any movable asset other than receivables, including intellectual property
(the term “assignment” is used in the Guide only with respect to receivables
to avoid any implication that the recommendations that apply to the
assignment of receivables apply more generally to security rights in
intellectual property; see the introduction to the Guide, footnote 24; see also
paras. 27 and 28 above). The law recommended in the Guide may, however,
affect the rights of an outright transferee of an encumbered asset to the
extent that there is a priority conflict between the rights of that transferee
and the rights of a secured creditor with a security right in the asset. The
reason for the exclusion of outright transfers of any movable asset other
than receivables, including intellectual property, from the scope of the Guide
is that they are normally subject to and sufficiently covered by other law,
including law relating to intellectual property.
26 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
60. The Guide is based on the assumption that, in order to facilitate access to
financing based on intellectual property, States enacting the recommendations
of the Guide will include rules on security rights in intellectual property in their
modern secured transactions regime. Accordingly, States enacting the
recommendations of the Guide may wish to review their laws relating to
intellectual property with a view to replacing all devices by way of which a
security right in intellectual property may be created (including pledges,
mortgages and conditional transfers) with the general concept of a security right.
However, the Guide also recognizes that this must be done in a manner that is
consistent with the policies and infrastructure of law relating to intellectual
property of each enacting State.
61. The potential points of interaction between secured transactions law and
law relating to intellectual property are dealt with in detail in the introduction
(see paras. 2-7 above) and in various chapters of the Supplement (see, for
example, paras. 229-232 below). As noted, the basic principle is set forth in
recommendation 4, subparagraph (b), which provides that the law recommended
in the Guide does not apply to “intellectual property in so far as the provisions
of the law are inconsistent with national law or international agreements, to
which the State (enacting the law recommended in the Guide) is a party, relating
to intellectual property”. To provide a context for this more detailed discussion
of the implications of recommendation 4, subparagraph (b), it is helpful at this
point to delineate: (a) issues that are clearly the province of law relating to
intellectual property and are not intended to be affected in any way by the
Guide; and (b) issues on which a rule of the law recommended in the Guide
may be pre-empted or supplemented by a rule of the law relating to intellectual
property that regulates the same issue in a different manner from the Guide.
62. The law recommended in the Guide addresses only legal issues unique to
secured transactions law as opposed to issues relating to the nature and legal
attributes of the asset that is the object of the security right. The latter are the
exclusive province of the body of property law that applies to the particular
asset (with the partial unique exception of receivables to the extent that certain
aspects of outright transfers of receivables are also covered in the law
recommended in the Guide).
63. In the context of intellectual property financing, it follows that the law
recommended in the Guide does not affect and does not purport to affect
Chapter I. Scope of application and party autonomy 27
Copyright
Patents
(a) The determination of who is the first user or the owner of the mark;
(b) Whether protection of the mark is granted to a person that uses the
mark first or to a person that files an application first and whether protection
Chapter I. Scope of application and party autonomy 29
64. The issues just addressed do not create any necessity for deference to
law relating to intellectual property, since the law recommended in the Guide
does not purport to address these issues. In other words, they are not issues
where the principle of recommendation 4, subparagraph (b), has any
application. The deference issue arises when the law relating to intellectual
property of the State enacting the law recommended in the Guide provides
an intellectual-property-specific rule on an issue falling within the scope of
the law recommended in the Guide, namely, an issue relating to the creation,
third-party effectiveness, priority, enforcement of or law applicable to a
security right in intellectual property (see paras. 2-7 above).
in the various States does not address all secured transactions law issues in
a comprehensive or coordinated way. For this reason, optimal results can
only be obtained if the harmonization and modernization of secured
transactions law achieved through the law recommended in the Guide is
accompanied by a review of law relating to intellectual property to ensure
compatibility and coordination with the secured transactions law recommended
in the Guide. The examples set forth below illustrate some typically
encountered patterns.
Example 1
66. In some States where security rights are created by a transfer of title
to the encumbered asset, a security right may not be created in a trademark.
The reason is a concern that the secured creditor’s title would impair the
quality control required of the trademark holder. Adoption of the law
recommended in the Guide by such a State would make transfers of title
unnecessary to create a security right in a trademark and eliminate the
rationale for this prohibition, since the grantor retains ownership of the
encumbered trademark under the concept of security right of the law
recommended in the Guide. Whether the secured creditor may become the
owner, licensor or licensee of rights in the trademark for the purposes of
law relating to intellectual property is a different matter (for purposes of
secured transactions law, a secured creditor does not become the owner,
licensor or licensee; see paras. 8, 29 and 30 above, as well as paras. 87 and
88 below). Nonetheless, adoption of the law recommended in the Guide
would not automatically eliminate the prohibition, because, to the extent that
it is inconsistent with law relating to intellectual property, the law
recommended in the Guide defers to that law. As a result, a specific
amendment to the relevant law relating to intellectual property may be
needed to harmonize it with the law recommended in the Guide.
Example 2
r ecommended in the Guide would not affect the operation of such a rule
and such specialized registration will continue to be required. However,
deference to law relating to intellectual property will not always be sufficient
to address the issue of coordination between the general security rights
registry and intellectual property registries (see paras. 135-140 below) or
the question whether a security right may be created in and a notice
may refer to a future intellectual property right (see paras. 113-118 and
141-143 below).
Example 3
Example 4
Example 5
p resumptions). In States that adopt this approach, the position is essentially the
same as when no specialized registry exists at all. Where these issues are dealt
with by law relating to intellectual property, the law recommended in the Guide
defers to it. Where, however, these issues are left to be determined by general
property law, no issue of deference arises since the pre-Guide rules were derived
not from the law relating to intellectual property but rather from property law
generally. Thus, adoption of the law recommended in the Guide will replace
the existing rules on creation, third-party effectiveness, priority, enforcement and
law applicable to security rights in intellectual property. The old rules on these
issues will continue to apply to outright transfers of intellectual property since
the law recommended in the Guide only covers security rights in intellectual
property. Consequently, the secured creditor will need to verify whether a
purported transfer is actually an outright transfer or a disguised secured
transaction (that is, a transaction that, although not called a secured transaction
by the parties, serves security purposes). However, this type of risk management
is no different from that necessary for any other type of encumbered asset for
which a specialized registry does not exist.
Example 6
Example 7
74. The law recommended in the Guide generally recognizes the principle
of party autonomy, although it does set forth a number of exceptions
(see recommendations 10 and 111-113). This principle applies equally to
security rights in intellectual property to the extent that law relating to
intellectual property does not limit party autonomy (see para. 222 below). It
should be noted that recommendations 111-113 apply only to tangible assets,
as they refer to possession, a notion which in the Guide means “actual”
possession and thus is not applicable to intangible assets (see the term
“possession” in the introduction of the Guide, sect. B, para. 20).
78. Under the law recommended in the Guide, a security right in intellectual
property may be created by written agreement between the grantor and
the secured creditor (see the Guide, recommendation 13, and paras. 82-85
below). For the security right to be effective against third parties, under the
general rule recommended in the Guide, an additional step is required
(see recommendation 29; for exceptions, see recommendations 34,
subpara. (b), 39-41, and 43-45). For most intangible assets, this step is
registration of a notice about the possible existence of the security right in a
public registry, which also establishes an objective criterion for determining
priority between a secured creditor and a competing claimant (see the Guide,
recommendations 32 and 33; for the term “competing claimant”, see
paras. 10 and 11 above). Accordingly, if a security right has been created in
accordance with the requirements set forth in the law recommended in the
Guide, the security right is effective between the grantor and the secured
creditor even if the additional steps necessary to make the security right
effective against third parties have not yet been taken (see recommendation
30). As a result, the secured creditor may enforce the security right in
accordance with the enforcement procedures set forth in chapter VIII of the
law recommended in the Guide, subject to the rights of competing claimants
in accordance with the priority rules set forth in chapter V.
35
36 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
79. This distinction between creation and effectiveness against third parties
applies equally to security rights in intellectual property. Thus, under the law
recommended in the Guide, a security right in intellectual property can be
effective between the grantor and the secured creditor even if it is not
effective against third parties. In some States, law relating to intellectual
property draws such a distinction. In other States, however, such a distinction
is not drawn in law relating to intellectual property, which provides that the
same actions are required for both the creation of a security right and its
effectiveness against third parties. In such a case, as required by
recommendation 4, subparagraph (b), the law recommended in the Guide
defers to that law. To ensure better coordination between secured transactions
law and law relating to intellectual property, States enacting the law
recommended in the Guide may wish to consider reviewing their law relating
to intellectual property. Such a review should make it possible for States to
determine whether: (a) the fact that law relating to intellectual property does
not draw a distinction between creation and third-party effectiveness of a
security right in intellectual property serves specific policy objectives of law
relating to intellectual property (rather than other law, such as general
property law, contract law or secured transactions law) and should be
retained; or (b) the distinction should be introduced in law relating to
intellectual property so as to harmonize it with the relevant approach of the
law recommended in the Guide.
80. To the extent that law relating to intellectual property permits the
creation of a security right in intellectual property, it may do so by referring
to outright or conditional transfers of intellectual property, mortgages,
pledges, trusts or similar terms. The Guide uses the term “security right” to
refer to property rights in movable assets that are created by agreement and
secure payment or other performance of an obligation, regardless of whether
the parties have denominated it as a security right (thus, transfers for security
purposes are covered as security devices; see the term “security right” in the
introduction to the Guide, sect. B, para. 20). This approach is referred to as
the “functional, integrated and comprehensive approach” to secured
transactions (see the Guide, chap. I, paras. 101-112, and recommendation 8).
The Guide contemplates, by exception, that States may adopt a non-unitary
approach in the limited context of acquisition financing and may retain
transactions denominated as retention of title or financial lease of tangible
assets (see the Guide, chap. IX).
Chapter II. Creation of a security right in intellectual property 37
81. A similar approach may be followed with respect to: (a) conditional
transfers of an intellectual property right or of a licence of an intellectual
property right in which the transferor is the secured creditor and the transfer
of the intellectual property right or of the licence does not take place until
the transferee pays any unpaid portion of the purchase price or meets any
obligation incurred or repays any credit provided to enable the transferee to
acquire the intellectual property right or the licence; (b) outright transfers
of an intellectual property right or of a licence in which the transferee obtains
the intellectual property right or the licence on credit and creates a security
right in favour of the transferor to secure any unpaid portion of the purchase
price or any obligation incurred or credit provided to enable the transferee
to acquire the intellectual property or the licence; (c) retention-of-title
transactions with respect to an intellectual property right or a licence in
which the seller is the secured creditor and the buyer does not obtain the
intellectual property right or the licence until the buyer pays any unpaid
portion of the purchase price or meets any obligation incurred or repays any
credit provided to enable the buyer to acquire the intellectual property right
or the licence; or (d) financial lease kind of transactions with respect to an
intellectual property right or a licence in which the lessor is the secured
creditor and the lessee may exploit the intellectual property right or the
license only as long as the lessee pays lease instalments or meets any
obligation incurred or repays any credit provided to enable the lessee to
acquire the right to exploit the intellectual property right or the licence
(see the term “acquisition security right” in the introduction to the Guide,
sect. B, para. 20; see also chap. IX below). Thus, States enacting the law
recommended in the Guide may wish to review their law relating to
intellectual property with a view to: (a) replacing all terms used to refer to
the right of a secured creditor with the term “security right”; or (b) providing
that, whatever the term used, rights performing security functions are treated
in the same way and that such a way is not inconsistent with the treatment
of security rights in the law recommended in the Guide.
82. As already mentioned (see para. 78), under the law recommended in
the Guide, the creation of a security right in an intangible asset requires a
written document, which by itself or in conjunction with the course of
conduct between the parties evidences the agreement of the parties to create
a security right. In addition, the grantor must have rights in the asset to be
encumbered or the power to encumber it either at the time of the conclusion
38 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
of the security agreement or thereafter. The agreement must reflect the intent
of the parties to create a security right, identify the secured creditor and the
grantor, and describe the secured obligation and the encumbered assets in a
manner that reasonably allows their identification (see the Guide,
recommendations 13-15). No additional step is required for the creation of
a security right in an intangible asset. The additional steps (for example,
registration of a notice in a general security rights registry) required for
third-party effectiveness of that security right are not required for the security
right to be created and thus be effective as between the grantor and the
secured creditor.
they are always entitled to do so and will probably do so in most cases; but
this should not deprive the parties of the right to describe the encumbered
intellectual property rights in a general way, unless otherwise required by
law relating to intellectual property.
85. The standard to be met with regard to the description of the encumbered
assets in the security agreement under the law recommended in the Guide
is sufficiently flexible to accommodate all different situations in that it refers
to a description of the encumbered assets “in a manner that reasonably allows
their identification” (see recommendation 14, subpara. (d)); the same standard
applies to the notice to be registered (see para. 141, below and the Guide,
recommendation 63). Thus, this standard could vary depending on what is
a reasonable description under the relevant law and practice with respect to
the particular encumbered asset. Furthermore, in all these situations, under
the principle embodied in recommendation 4, subparagraph (b), the law
recommended in the Guide would apply only in so far as it is not inconsistent
with law relating to intellectual property. States enacting the law recommended
in the Guide may wish to consider reviewing their laws relating to intellectual
property to determine whether the different concepts and requirements with
respect to the creation of security rights in intellectual property serve specific
policy objectives of law relating to intellectual property and should be
retained or whether they should be harmonized with the relevant concepts
and requirements of the law recommended in the Guide.
86. As already mentioned (see para. 82), a grantor of a security right must
have rights in the asset to be encumbered or the power to encumber it at
the time of the security agreement or at a later time (see the Guide,
recommendation 13). This is a principle of secured transactions law that
applies equally to intellectual property. A grantor may encumber its full
rights or only limited rights. So, an intellectual property owner, licensor or
licensee may encumber its full rights or rights limited in time, scope or
territory. In addition, a grantor may encumber its assets only to the extent
that the assets are transferable under general property law (the law
recommended in the Guide does not affect such limitations; see the Guide,
recommendation 18, and paras. 119 and 120 below). This principle also
applies to secured transactions relating to intellectual property. So, an owner,
licensor or licensee may only encumber its rights to the extent that those
rights are transferable under law relating to intellectual property.
40 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
87. For the purposes of the law recommended in the Guide, the secured
creditor does not become an owner, licensor or licensee (depending on the
rights of the grantor) on the sole ground that it acquired a security right in
intellectual property. This may also be the case though under law relating
to intellectual property (see the terms “owner” and “secured creditor”,
paras. 26, 29 and 30 above). However, the exercise of the secured creditor’s
rights upon default of the grantor will often result in the grantor’s encumbered
intellectual property rights being transferred and, thus, the identity of the
owner, licensor or licensee (depending on the rights of the grantor), as
determined by law relating to intellectual property, might change. This may
happen in situations in which the enforcement of the security right in the
intellectual property results in acquisition of the encumbered intellectual
property by the secured creditor in a disposition (see paras. 237 and 238
below and the Guide, recommendations 142 and 148) or in an acquisition
of the encumbered intellectual property by the secured creditor in total or
partial satisfaction of the secured obligation (see para. 242 below and the
Guide, recommendations 156-159).
88. In any case, the question of who is the owner, licensor or licensee with
respect to intellectual property and whether the parties may determine it for
themselves is a matter of law relating to intellectual property. As already
mentioned (see para. 87), under law relating to intellectual property, a
secured creditor may at times be treated as an owner, licensor or licensee.
Should law relating to intellectual property so provide, the secured creditor
could, for example, renew registrations or pursue infringers or agree with
the owner, licensor or licensee that the secured creditor will become the
owner, licensor or licensee (see paras. 223-226 below).
89. Under the law recommended in the Guide, a security right may be
c reated not only in the rights of an intellectual property owner but also in
the rights of a licensor or licensee under a licence agreement (see the term
“encumbered asset”, paras. 13-16, 54 and 55 above). In addition, although a
security right in a tangible asset with respect to which intellectual property
is used (for example, designer watches or clothes bearing a trademark) does
not extend to the intellectual property (see paras. 108-112 below), such a
Chapter II. Creation of a security right in intellectual property 41
security right may have an impact on the intellectual property used with
respect to the tangible asset to the extent the secured creditor may enforce
its security right in the tangible asset (see paras. 245-248 below). As already
mentioned (see paras. 82-85), under the law recommended in the Guide, the
intellectual property to be encumbered needs to be described in the security
agreement in a manner that reasonably allows its identification and this
standard is sufficiently flexible to accommodate any requirements of law
relating to intellectual property for a specific description of intellectual
property to be encumbered (see the Guide, recommendation 14, subpara. (d)).
90. It should be noted that the law recommended in the Guide does not
override any provisions of law relating to intellectual property (or other law)
that limit the creation or enforcement of a security right or the transferability
of an intellectual property (or other) asset (see recommendation 18).
In addition, the law recommended in the Guide does not affect contractual
limitations to the transferability of intellectual property rights (recommendation
23 deals only with contractual limitations on the assignability of receivables).
As a result of these two recommendations, if, under law relating to
intellectual property, a security right may not be created or enforced in an
intellectual property right or if that intellectual property right is non-
transferable by law or contract, the law recommended in the Guide will not
interfere with these limitations (see paras. 119 and 120 below). The law
recommended in the Guide, however, does override legal limitations to the
assignability of future receivables or of receivables assigned in bulk or in
part on the sole ground that they are future receivables or are assigned in
bulk or in part (see recommendation 23). In addition, under certain conditions,
the law recommended in the Guide affects contractual limitations to the
assignability of receivables (without affecting the different treatment of
receivables for purposes of law relating to intellectual property; see the
Guide, recommendation 24, and paras. 102-105 below). As a result, to the
extent that the law recommended in the Guide is enacted by a State, these
legal or contractual limitations to the assignability of such receivables will
no longer apply.
92. If, under law relating to intellectual property, these rights are transferable,
the owner may encumber all or some of them with a security right under
the law recommended in the Guide, which will apply to such a security
right subject to recommendation 4, subparagraph (b). In such a case, all
these rights would constitute the original encumbered assets (any rights to
the payment of royalties would be proceeds of the owner’s rights, unless
included in the description of the encumbered assets in the security
agreement). If these rights may not be transferred under law relating to
intellectual property, they may not be encumbered by a security right under
the law recommended in the Guide, since, as already mentioned (see
para. 90), the law recommended in the Guide does not affect legal provisions
that limit the creation or enforcement of a security right, or the transferability
of assets, with the exception of provisions relating to the assignability of
future receivables and receivables assigned in bulk (see the Guide,
recommendation 18, and paras. 98-101 below).
95. For example, if, before or after the creation of a security right in the
rights of an intellectual property owner, an infringement has been committed,
and after the creation of such a security right, the owner has sued infringers
and infringers have paid compensation to the owner, the secured creditor
may be able to claim the compensation paid either as proceeds of the original
encumbered intellectual property or as an original encumbered asset if
properly so described in the security agreement. If the compensation has not
been paid at the time of creation of the security right, but is paid later after
default of the grantor (owner), the secured creditor could also be able to
claim the compensation paid either as proceeds of the original encumbered
intellectual property or, if appropriately so described in the security
agreement, as an original encumbered asset. To the contrary, under law
relating to intellectual property, the right to pursue infringers would normally
not constitute proceeds of the original encumbered intellectual property or
an original encumbered asset (see para. 93 above). However, if the grantor
(owner) has filed a suit against an infringer and the lawsuit is still pending
at the time of enforcement of the security right, a person that acquired the
grantor’s rights in the encumbered intellectual property in the context of
enforcement of the security right should be able to take over the lawsuit
and obtain any compensation granted (again, if permitted under law relating
to intellectual property).
96. Similar considerations apply to the question of whether the right to deal
with authorities at the various stages of the registration process (for example,
the right to file an application for the registration of intellectual property,
the right to register intellectual property or the right to renew a registration
of intellectual property) or the right to grant licences may be transferred,
and thus be part of the encumbered intellectual property. Whether the
right to deal with authorities or to grant licences may be transferred or
is an inalienable right of the owner is a matter of law relating to intellectual
property. Whether it is part of the encumbered rights of the owner is a
matter of the description of the encumbered asset in the security
agreement, assuming that it may be transferred under law relating to
intellectual property.
97. Under the law recommended in the Guide, a security right may be
created in a licensor’s rights under a licence agreement (see paras. 13-16,
54 and 55 above). If a licensor is an owner, it can create a security right in
(all or part of) its rights as mentioned above (see paras. 91-96 above).
44 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
98. Following the approach taken in most legal systems and reflected in
the United Nations Assignment Convention (see art. 2), the law recommended
in the Guide treats rights to the payment of royalties arising from the licence
of intellectual property as receivables (see the term “receivable” in the
introduction to the Guide, sect. B, para. 20). This means that the general
discussion and recommendations dealing with security rights, as modified
by the receivables-specific discussion and recommendations of the Guide,
apply to rights to the payment of royalties. Thus, under the law recommended
in the Guide, statutory prohibitions that relate to the assignment of future
receivables or receivables assigned in bulk or in part on the sole ground that
they are future receivables or receivables that are assigned in bulk or in part
are rendered unenforceable (see the Guide, recommendation 23). However,
other statutory prohibitions or limitations are not affected (see recommendation
18). In addition, a licensee could raise against an assignee of the licensor’s
right to the payment of royalties all defences or rights of set-off arising from
the licence agreement or any other agreement that was part of the same
transaction (see recommendation 120).
105. Under the law recommended in the Guide, a secured creditor with a
security right in a receivable has the benefit of a security right in intellectual
property securing payment of the receivable (see recommendation 25).
However, this does not mean that legal limitations on the transferability of
intellectual property rights are set aside (see recommendation 18). Similarly,
this does not mean that contractual limitations on the transferability of
intellectual property rights are affected, as recommendation 24 applies to
assignment of receivables and not to transfers of intellectual property rights.
106. Under an intellectual property licence agreement and the law governing
it, a licensee may have the right to grant sub-licences and to receive as a
sub-licensor the payment of any royalties flowing from a sub-licence
agreement. The discussion above with respect to the rights of a licensor
(see paras. 97-105) would apply equally to the rights of a licensee as to
those of a sub-licensor.
108. Intellectual property may be used with respect to a tangible asset. For
example: (a) a tangible asset may be manufactured according to a patented
process or through the exercise of patented rights; (b) jeans may bear a
trademark and cars or other items may include a copy of copyrighted software
or design rights; (c) a compact disc may contain a software programme; or
(d) a heat pump may contain a patented component.
110. However, under the law recommended in the Guide, the parties to the
security agreement may always agree that a security right is created both in
a tangible asset and in intellectual property used with respect to that asset
(see recommendation 10). For example, a security right may be taken in
inventory of trademarked jeans and in the trademark, giving the right to the
secured creditor in the case of default of the grantor to sell both the encumbered
trademarked jeans and the right to produce other jeans bearing the encumbered
trademark. In such a case, where the manufacturer/grantor is the trademark
owner, the encumbered assets are the owner’s rights. Where the manufacturer/
grantor is a licensee, the encumbered assets are the licensee’s rights under the
licence agreement (see paras. 43-45 above).
111. The exact extent of the security right depends on the description of the
encumbered asset in the security agreement. As already noted (see paras. 82-
85 above), a description of the encumbered assets “in a manner that reasonably
allows their identification” is sufficiently flexible to accommodate all different
situations (see the Guide, recommendation 14, subpara. (d)), as it sets a
standard that could vary depending on what is a reasonable description under
the relevant law and practice. It would thus seem that a general description
Chapter II. Creation of a security right in intellectual property 49
112. As already mentioned (see paras. 109 and 110), a security right in
a tangible asset, with respect to which intellectual property is used, does
not extend to the intellectual property (unless otherwise agreed), but it does
encumber the tangible asset itself, including those characteristics of the
asset that use the intellectual property (for example, the security right
applies to a television set as a functioning television set). Thus, a security
right in such an asset does not give the secured creditor the right to
manufacture additional assets using the intellectual property. Upon default,
however, the secured creditor with a security right in the tangible asset
could exercise the remedies recognized under secured transactions law,
provided that such exercise of remedies did not interfere with rights existing
under law relating to intellectual property. It may be that, under applicable
law relating to intellectual property, the “exhaustion doctrine” (or similar
concepts) might apply and permit the enforcement of the security right
(for a discussion of enforcement issues, see paras. 245-248 below).
113. The law recommended in the Guide provides that a person may grant
a security right in a future asset, namely an asset created or acquired by
the grantor after the creation of a security right (see recommendation 17).
Like any other rule recommended in the Guide, this rule too applies to
intellectual property, except in so far as it is inconsistent with law relating
to intellectual property (see recommendation 4, subpara. (b)). Accordingly,
under the law recommended in the Guide, a security right can be created
in future intellectual property (as to legal limitations in that regard, see the
Guide, recommendation 18, as well as paras. 119 and 120 below). This
approach is justified by the commercial utility in allowing a security right
to extend to future intellectual property.
50 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
114. Many laws relating to intellectual property follow the same approach,
allowing intellectual property owners to obtain financing useful in the
development of new works, provided that their value can be reasonably
estimated in advance. For example, it is usually possible to create a security
right in a copyrighted motion picture or software (the security right is created
when the copyrighted work is created; see para. 40 above). In some States,
a security right may be created in a patent application before the patent right
is granted (typically, after the patent right is granted, it is considered as
having been created at the time of the application).
117. The secured creditor should understand how these concepts are
interpreted under law relating to intellectual property and how they may
affect the concept of “ownership”, which is essential in the creation of a
security right in intellectual property. For example, this determination is of
particular relevance in the case of copyrighted software. In some States, a
security right in a version of copyrighted software that exists at the time of
the financing may extend automatically to modifications made to that version
following the financing. However, typically law relating to intellectual
property treats such future improvements as separate assets and not as
integral parts of existing intellectual property. Thus, if future intellectual
property rights may be encumbered, a prudent secured creditor that wishes
to ensure that improvements are encumbered should describe the encumbered
Chapter II. Creation of a security right in intellectual property 51
119. Specific rules of law relating to intellectual property may limit the
ability of an intellectual property owner, licensor or licensee to create a
security right in certain types of intellectual property. In many States, only
the economic rights of an author are transferable; the moral rights are not
transferable. In addition, legislation in many States provides that an author’s
right to receive equitable remuneration may not be transferable. Moreover,
in many States, trademarks are not transferable without their associated
goodwill. Finally, as is the case with assets other than intellectual property,
an asset may not be encumbered by a person if that person does not have
rights in the asset or the power to encumber it (see the Guide, recommendation
13, and the nemo dat (quod non habet) principle).9 The law recommended
in the Guide respects all these limitations on the transferability of intellectual
property (see recommendation 18).
120. The only legal limitations on the transferability of certain assets that
the law recommended in the Guide may affect and remove are the legal
9
Also known as the principle of nemo plus juris ad alium transferre potest quam ipse habet
(no person can transfer to another a greater right than he has).
52 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
Recommendation 24310
The law should provide that, in the case of a tangible asset with respect
to which intellectual property is used, a security right in the tangible asset
does not extend to the intellectual property and a security right in the
intellectual property does not extend to the tangible asset.
10
If it could be included in the Guide, this recommendation would be placed in chapter II, Crea-
tion of a security right, as recommendation 28 bis.
III. Effectiveness of a security right in
intellectual property against third parties
A. The concept of third-party effectiveness
121. As already noted (see paras. 77-79), the law recommended in the Guide
distinguishes between the creation of a security right (effectiveness of the
security right as between the parties) and its effectiveness against third parties.
This distinction applies equally to security rights in intellectual property.
However, to the extent that law relating to intellectual property makes no
such distinction and this is an intellectual-property-specific approach, the law
recommended in the Guide would defer to that law (see recommendation 4,
subpara. (b)).
53
54 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
124. Under the law recommended in the Guide, security rights in intangible
assets may be made effective against third parties by registration of a notice
in the general security rights registry or of a document or notice in a
specialized registry, if any. The law recommended in the Guide is based on
the assumption that where a State maintains a specialized registry, it will
permit registration of a document or notice of a security right as a method
of achieving third-party effectiveness of the security right (see the Guide,
recommendations 32, 34, subpara. (a) (ii), and 38, subpara. (a), and
paras. 132-134 below).
127. The Guide recommends a general security rights registry (see the
Guide, chap. IV). In addition, where specialized registries exist that permit
registration of a document or notice of a security right as a method of
achieving third-party effectiveness of the security right, the Guide avoids
undermining them. The Guide achieves that result by accepting registration
in such a specialized registry as a method of achieving third-party
effectiveness of a security right and attributing priority results to such a
registration (see recommendations 38, 77 and 78). As this matter is beyond
the scope of secured transactions law and, in any case, would require
additional effort and expense by States, the Guide does not recommend that
States that currently do not have a specialized registry for certain types of
intellectual property create such a registry in order to permit the registration
56 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
128. As already mentioned (see para. 124), under the law recommended in
the Guide, a security right in intellectual property may become effective against
third parties by registration of a notice in the general security rights registry
(see the Guide, recommendation 32). This is possible even if the encumbered
intellectual property right may not be registered in an intellectual property
registry (as is typically the case, for example, with copyrights, industrial designs
or trade secrets). The same rule would apply in cases where a document or
notice of a security right in intellectual property may be registered in
an intellectual property registry but is not actually registered. In these
cases, registration of a notice in the general security rights registry is sufficient
and the legal consequence of registration is to make the security right
effective against third parties (see the Guide, recommendations 29, 32, 33 and
38). However, in the particular case where law relating to intellectual
property provides that a security right in intellectual property may be
made effective against third parties only by registration in an intellectual
property registry, a security right cannot be made effective against third parties
by registration in the general security rights registry (see the Guide,
recommendation 4, subpara. (b)).
Chapter III. Effectiveness of a security right in intellectual property against third parties 57
129. As also already mentioned (see paras. 125 and 126), there are differ-
ent approaches in law relating to intellectual property to the question of
registration of a document or notice of a security right in intellectual property.
In some States (often those whose secured transactions law derives from
non-possessory pledge concepts), either no rights at all may be registered,
at least, in some types of intellectual property or only outright transfers of
intellectual property may be registered. This means that a security right in
such intellectual property cannot be made effective against third parties by
registration in an intellectual property registry. In other States (often those
whose secured transactions law utilizes mortgage concepts), a security right
in intellectual property is treated as another type of (outright or conditional)
transfer and is, therefore, created and made effective against third parties to
the same extent as any other transfer. Consequently, in those States, a
document or notice of a title-based security right must often be registered
in the relevant intellectual property registry in order for it to be created and
made effective against third parties, but a non-title-based security right
cannot be so registered. In some of those States, such registration has third-
party effects. Finally, in a few States, there are additional requirements.
These commonly include payment of a stamp duty or other transaction tax,
or a requirement to give notice to an administrative body such as a national
authors’ association or collecting society. States enacting the law recommended
in the Guide may wish to harmonize their secured transactions laws and
their laws relating to intellectual property by: (a) replacing all existing
security devices with an integrated notion of a security right or, at least,
subjecting title-based security rights to the same rules that are applicable
to security rights (see paras. 80 and 81 above); and (b) permitting
the registration of a notice of a security right in intellectual property in
the relevant intellectual property registry (at least for intellectual property
rights that may already be registered therein) as a method of achieving
third-party effectiveness.
IV. The registry system
A. The general security rights registry
130. As already noted (see para. 127), the Guide recommends that States
establish a general security rights registry (see recommendations 54-75).
In general, the purpose of the registry system recommended in the Guide
is: (a) to provide an efficient method for making a security right in existing
or future assets effective against third parties; (b) to establish an effective
point of reference for priority rules based on the time of registration; and
(c) to provide an objective source of information for third parties dealing
with a grantor’s assets as to whether the assets may already be encumbered
by a security right (see the purpose section of the recommendations in
chapter IV of the Guide on the registry system). Under this approach,
registration is accomplished through registration of a notice of a security
right, as opposed to registration of the security agreement or other
document (see recommendation 54, subpara. (b)). The notice need only
provide basic information concerning the security right, that is: (a) the
name or other identifier of the grantor and the secured creditor or its
representative, as well as their addresses; (b) a description of the
encumbered asset; (c) the duration of registration; and (d) a statement
of the maximum amount for which the security right may be enforced,
if so provided in a State enacting the law recommended in the Guide
(see recommendation 57).
131. The law recommended in the Guide provides precise rules for
identifying the grantor of the security right, whether an individual or a
legal person. This matter is important because notices are indexed and can
be retrieved by searchers according to the name or other identifier of the
grantor (see recommendations 54, subpara. (h), and 58-61). In addition,
the law recommended in the Guide contains a number of rules to simplify
the operation and use of the registry. For example, the law recommended
in the Guide provides that, to the extent possible, the registry should
be electronic and permit registration and searching by electronic means
(see recommendation 54, subpara. (j)). Moreover, the law recommended
in the Guide provides that fees for registration and searching, if any, should
be set at a level no higher than necessary to permit cost recovery
(see recommendation 54, subpara. (i)).
59
60 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
132. As already mentioned (see paras. 124-127), many States maintain national
registries for registering (or recording) transactions (such as transfers) relating
to intellectual property. In some of those registries, security rights in intellectual
property may also be initially filed (that is, an application for registration may
be submitted) and then actually registered. However, while patent and trademark
registries exist in most States, not all provide for the registration of a document
or notice of a security right in a patent or a trademark. In addition, in some
States, the registration of a notice (whether of a security right or some other
right) does not produce third-party effects. Moreover, a number of States have
similar registries for copyrights, but the practice is not universal.
11
Available from www.wipo.int/treaties/en/ip/tlt/.
12
Available from www.wipo.int/treaties/en/ip/plt/.
13
Available from www.wipo.int/treaties/en/registration/madrid/.
Chapter IV. The registry system 61
which (1989) provides for the possibility to record a restriction of the holder’s
right of disposition in an international application or registration form.14
In addition, under the Community trademark regulation (see para. 133 above),
a statement may be registered referring not only to ownership but also to a
security right with third-party effects. Another example is the treaty on the
International Registration of Audiovisual Works (the Film Register Treaty,
(1989)), under the auspices of WIPO. The Film Register Treaty created an
international registry that permits the registration of statements concerning
audiovisual works and rights in such works, including, in particular, rights
relating to their exploitation (the records of the diplomatic conference indicate
that statements concerning security rights were also contemplated). Registration
in this international registry creates an evidentiary presumption of validity for
registered statements. This international registry allows two types of application:
(a) a work-related application which identifies an existing or future work at
least by title or titles; and (b) a person-related application which identifies one
or more existing or future works by the natural person or legal entity that
makes or owns, or is expected to make or own, each work. The international
registry maintains an electronic database that allows cross-indexing between
the different types of registration.
135. As already mentioned (see paras. 124 and 125), the Guide neither
r ecommends the creation of a specialized registration system (for intellectual
property or for any other type of asset), if one does not exist, nor interferes
with existing specialized registration systems. However, where, under law
relating to intellectual property, a document or notice of a security right in
intellectual property may be registered in an intellectual property registry and,
at the same time, under the law recommended in the Guide, that security right
may also be registered in the general security rights registry, there is a need
to address the issue of coordination between these two registries. In order to
avoid interfering with law relating to intellectual property, the law recommended
in the Guide addresses it through the general deference to law relating to
intellectual property (see recommendation 4, subpara. (b)) and appropriate
priority rules (see recommendations 77 and 78).
136. Thus, the law recommended in the Guide does not address or purport
to address the question whether a security right in intellectual property may
be registered in an intellectual property registry, the requirements for such
14
See Form MM19 at www.wipo.int/madrid/en/forms.
62 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
144. As already mentioned (see para. 138), the law recommended in the
Guide gives priority, as a matter of secured transactions law, to rights with
respect to which a registration is made in an intellectual property registry
Chapter IV. The registry system 65
and defers to any rules of law relating to intellectual property governing the
registry with respect to the details of registration of a document or notice of
a security right. As also noted above, this means that the law recommended
in the Guide often obviates the need for dual registration or search. In
particular, registration only in the general security rights registry would seem
to be necessary and useful for secured transactions purposes: (a) where the
encumbered asset is a type of intellectual property with respect to which
no registration system exists under law relating to intellectual property
(for example, copyrights or trade secrets in many States); (b) where the
encumbered asset is a type of intellectual property with respect to
which ownership rights may be registered in an intellectual property registry,
but not a document or notice of a security right; and (c) where a document
or notice of security right in intellectual property may be registered in
an intellectual property registry, but such registration has effects that
are inconsistent with third-party effects. On the other hand, registration
in the relevant intellectual property registry may be preferable, for example:
(a) where the encumbered asset is a type of intellectual property for
which a registration system exists and allows registration of a document
or notice of a security right (for example, patents or trademarks in
many States); and (b) where the secured creditor needs to ensure priority
over other secured creditors or transferees under the relevant law relating to
intellectual property.
146. Under the law recommended in the Guide, it is envisaged that the
general security rights registry will be electronic and will accept registration
of notices of possible security rights with third-party effects at a nominal
cost (based on cost recovery), if any, for registration and searching
(see recommendation 54, subpara. (i)). This means that, in States that enact
the recommendations of the Guide, registration and searching in the general
security rights registry is likely to be simple, quick and inexpensive. However,
under law relating to intellectual property, registries may not necessarily be
fully electronic (although an increasing number of intellectual property
registries allow online searching for a small or no fee). In addition, the
document evidencing a transaction or a summary thereof may need to be
registered (instead of a notice). Moreover, the document registered may have
to be checked by the registry staff at least to the extent that the legal
consequence of registration may be conclusive or presumptive evidence of
the existence of a right in intellectual property.
and probably more certain information (for example, because registration may
constitute or be deemed to provide firm evidence as to the existence of a
right).
149. A grantor that is the initial owner of a single intellectual property right
creates a security right in that intellectual property right. Whether registration
is made in the general security rights registry or in the relevant intellectual
property registry, the secured creditor needs to register only one notice in
order for the security right to be effective against third parties (unless the
secured creditor prefers to register also in the relevant intellectual property
registry, if any, because of the priority rules recommended in the Guide).
A searcher that wants to extend credit on the basis of the encumbered
intellectual property right will mainly need to search in the relevant intellectual
property registry. The reason for this result is that by registering in that
registry the searcher’s security right would gain priority even over a security
right, a notice of which was registered earlier in the general security rights
registry. It should be noted, however, that, if the intellectual property
registration system requires registration of a document, the registrar may have
to check the document to ensure that it can be registered. These requirements
may affect the time- and cost-efficiency of the registration process. While
the notice-based registration system of the general security rights registry has
the advantage of providing greater confidentiality and simplicity than a
document-based registration system of the intellectual property registry, it has
the disadvantage that it may not provide a searcher as much information as
a document-based registration system.
151. However, a searcher will also need to conduct a separate search against
each of the 10 intellectual property rights in the intellectual property registry
to determine if there are other competing claimants such as outright transferees.
If there is a specialized registry in which security rights in the intellectual
property may be registered and the secured creditor, cognizant of the priority
advantages of registration in such a registry, decides to search that registry
and register its security right there, the secured creditor may need to register
a document or notice for each intellectual property right separately, although
in some cases it may be possible to register a single document or notice that
identifies some or all of the encumbered intellectual property (for example, if
all the intellectual property rights are patents). In such cases, a searcher needs
to conduct a search in the intellectual property registry against each of the
10 intellectual property rights to find both prior security rights and other
competing claimants.
152. In the example just mentioned (see paras. 150 and 151), if the grantor
is not the initial owner but a transferee in a chain of transferees and each of
the 10 intellectual property rights has 10 prior owners, registration in the
general security rights registry may still be more efficient than registration in
an intellectual property registry. A secured creditor would only need to register
one notice in the general security rights registry against the grantor, but, in
any relevant intellectual property registry, the secured creditor would need to
register a document or notice against each of the 10 intellectual property rights.
However, with respect to searching, if a security right remains effective against
transferees without the need for an amendment notice to be registered in the
general security rights registry (see paras. 158-166 and recommendation 244
below), then a searcher would have to conduct 10 searches outside the security
rights registry to identify the prior owners of each intellectual property right
and then conduct a search of each prior owner in the general security rights
registry to discover whether there are prior competing security rights, that is
100 searches (10 prior owners multiplied by 10 intellectual property rights)
in the general security rights registry to identify all prior security rights.
However, if a security right is registered in an intellectual property registry,
if any, the secured creditor need only conduct 10 searches, that is, one
for each intellectual property right, since the search in the intellectual
property registry will disclose both prior competing security rights and other
competing claimants. Thus, as to searching with respect to multiple intellectual
property rights that have had many previous owners, it would seem that
searching in the intellectual property registry, if any, would be more time-
and cost-efficient.
153. The examples mentioned above indicate that, while the general security
rights registry in the Guide may better accommodate intellectual property
financing in some contexts, this may not always be the case and would depend
Chapter IV. The registry system 69
on the circumstances of each case (see also paras. 158-166 below). They also
indicate that, in view of the priority of a security right registered in an
intellectual property registry and the need for the secured creditor to establish
that the grantor has rights in the intellectual property to be encumbered, a
registration or search may need to take place in the intellectual property
registry in most cases (where registration of a security right in an intellectual
property registry is possible).
154. The law applicable to third-party effectiveness and priority will also
have an impact on the time- and cost-efficiency of registration. If the law
applicable to these matters is the law of the State in which the encumbered
intellectual property is protected, in the case of a portfolio of intellectual
property rights, registration and searching will involve the registries of several
States. The result would be different if third-party effectiveness and priority
were to be governed by the law of the State in which the grantor is located
(unless the grantor moves to another State or the encumbered intellectual
property right is transferred from a person in one State to a person in another
State, in which the law of more than one State will be involved; see the Guide,
recommendations 45, 219 and 220). However, in any case, the main cause of
the difference would be the applicable law and not the type of registration.
Therefore, this matter is discussed in chapter X, on the law applicable to a
security right in intellectual property.
158. The Guide recommends that the secured transactions law address the
impact of a transfer of an encumbered asset on the effectiveness
of registration of a notice in the general security rights registry
(see recommendation 62). This recommendation is equally applicable to
security rights in intellectual property made effective against third parties
by registration of a notice in the general security rights registry. However,
this recommendation is not relevant if:
(a) The transferee of an encumbered asset acquires it free of the
security right, as is the case, for example, where the transfer is authorized
by the secured creditor free of the security right (see recommendation 80);
(b) A document or notice of the security right has been registered in
an intellectual property (or other specialized) registry;
(c) The grantor has transferred all its rights in an asset before granting
a security right in that asset (in such situations, under the Guide, no security
right is created; see recommendation 13); or
(d) There is no transfer of ownership, but only a licence in intellectual
property.
162. States enacting the law recommended in the Guide will have to
consider the relative advantages and disadvantages of the different approaches
mentioned above and, in particular, their impact on rights in intellectual
property. For example, under the first approach, a secured creditor extending
credit against the entire copyright in a film would need to make continuous
registrations against tiers of licensees and sub-licensees (if the relevant law
relating to copyrights treated such an exclusive licence as a transfer that
72 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
may be registered) to maintain its priority against them or their own secured
creditors. This would be a significant burden on such lenders and might
discourage the extension of credit based upon such assets. On the other
hand, such an approach would make it easier for a lender to a sub-licensee
to find a security right created by its sub-licensor by a simple search only
against the identifier of the sub-licensor. Here, the trade-off is between the
relative costs of monitoring and multiple registrations by the lender to the
“upstream” party as against the costs of conducting a search of the entire
chain of title for security rights created by the “downstream” party. In this
regard, it should be noted that typically under law relating to intellectual
property a prior transfer retains its priority over later transfers without the
need for an additional registration in the name of a transferee of an
encumbered asset.
163. As already mentioned (see para. 161), if a State does not follow the
third option, a secured creditor would have to register an amendment notice
in the general security rights registry each time the encumbered intellectual
property became the subject of an unauthorized transfer, licence or sub-licence
(if licences are treated as transfers under the relevant law relating
to intellectual property), at the risk of losing its priority if it was not
informed about the transfer or was informed but had not acted promptly.
The following examples may highlight the need for such an approach
(see recommendation 244 below).
165. If, however, the law requires the registration of a new notice each
time the encumbered intellectual property is transferred, the secured creditor
must register one notice against its grantor and one for each of the 10 prior
owners. This may require that the secured creditor make a substantial effort
to monitor not only the actions of its grantor, but also transferees
(and licensees, if a licence is treated as a transfer).
166. These examples indicate that, if the law requires the secured creditor
to register an amendment notice each time the encumbered intellectual
property is transferred or licensed (to the extent an exclusive licence is
Chapter IV. The registry system 73
15
See www.inta.org/index.php?option=com_content&task=view&id=1517&Itemi.
74 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
168. The main principles of such best practice are the following:
(a) A security right in a mark covered by a pending application or
registration should be registrable in the national trademark office;
(b) For purposes of giving notice of a security right, registration in
the applicable national trademark office or in any applicable commercial
registry is recommended, with free public accessibility, preferably through
electronic means;
(c) The grant of a security right in a mark should not have the effect
of a transfer of legal or equitable title to the mark that is subject to the
security right and should not confer upon the secured creditor a right to use
the mark;
(d) The security agreement creating the security right should clearly
set forth provisions acceptable under local law enabling the renewal of the
marks by the secured creditor, if necessary to preserve the mark
registration;
(e) Valuation of marks for purposes of security rights should be made
in any manner that is appropriate and permitted under local law and no
particular system or method of valuation is preferred or recommended;
(f) Registration of security rights in the local trademark office should
suffice for purposes of perfecting a security right in a mark; at the same
time, registration of a security right in any other place allowed under local
law, such as a commercial registry, should also suffice;
(g) If local law requires that a security right be registered in a place
other than the local trademark office in order to be perfected, such as in a
commercial registry, dual registration of the security right should not be
prohibited;
(h) Formalities in connection with registration of a security right and
the amount of any government fees should be kept to a minimum; a document
evidencing: (i) existence of a security right; (ii) the parties involved;
(iii) the mark(s) involved by application and/or registration number; (iv) a
brief description of the nature of the security right; and (v) the effective
date of the security right, should suffice for purposes of making a security
right effective against third parties;
(i) Regardless of the procedure, enforcement of a security right
through foreclosure, after a judgement, administrative decision or other
triggering event, should not be an unduly burdensome process;
(j) The applicable trademark office should promptly record the entry
of any judgement or adverse administrative or other decision against its
records and take whatever administrative action is necessary; the filing of a
certified copy of the judgement or decision should be sufficient;
Chapter IV. The registry system 75
169. Principles (a), (b), (f) and (g) set forth in paragraph 168 above, dealing
with third-party effectiveness of a security right in a mark, are compatible
with the law recommended in the Guide in that they promote the objectives
of certainty and transparency (see recommendation 1, subpara. (f)).
170. Principle (c) set forth in paragraph 168 above, providing that the
creation of a security right in a mark does not result in a transfer of the
mark or confer upon the secured creditor the right to use the mark, is also
compatible with the law recommended in the Guide. It should be noted that,
under the law recommended in the Guide, the secured creditor has a right,
but no obligation, to preserve an encumbered intangible asset (such an
obligation is foreseen only for tangible assets; see recommendation 111).
If, in the case of the owner’s insolvency, neither the owner nor the insolvency
representative nor the secured creditor takes the necessary steps to preserve
the encumbered mark, the mark may still be preserved under law relating to
intellectual property (for example, under the doctrine of the “excusable
non-use” of a mark).
171. In addition, principle (d) set forth in paragraph 168 above is compatible
with the law recommended in the Guide in that it sets forth a default rule
for the rights of the parties within the limits of the applicable law. Principle
(e) is also compatible with the law recommended in the Guide to the extent
it emphasizes the importance of valuation of marks without suggesting any
particular system of valuation. Principle (h) is also compatible with the law
recommended in the Guide in that it recommends notice filing even in
relation to mark registries. It should be noted that the reference to “the
effective date of the security right” is a reference to the time of effectiveness
of the security right between the parties and not against third parties.
76 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
172. Moreover, principles (i), (j) and (k) set forth in paragraph 168 above
are compatible with the law recommended in the Guide in the sense that
they provide for efficient enforcement mechanisms and registration of court
judgements or administrative enforcement decisions. Finally, principle (m),
which is subject to approval by the appropriate government authorities, is
compatible with the law recommended in the Guide with respect to efficient
registration procedures.
Recommendation 24416
16
If it could be included in the Guide, this recommendation would be placed in chapter IV, The
registry system, as recommendation 62 bis.
V. Priority of a security right in intellectual
property
A. The concept of priority
77
78 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
175. The Guide uses the term “competing claimant” to refer to another
s ecured creditor with a security right in the same asset (which includes a
transferee in a transfer by way of security), an outright transferee, lessee or
licensee of the encumbered asset, a judgement creditor with a right in the
encumbered asset and an insolvency representative in the insolvency of the
grantor (see the term “competing claimant”, paras. 10 and 11 above). In
particular, the law recommended in the Guide applies to priority conflicts:
(a) between security rights, notices of which are registered in the general
security rights registry (see the Guide, recommendation 76, subpara. (a));
(b) between a security right, a notice of which is registered in the general
security rights registry, and a security right, a document or notice of which
is registered in the relevant intellectual property registry (see recommendation
77, subpara. (a)); (c) between security rights, documents or notices of which
are registered in the relevant intellectual property registry (see recommendation
77, subpara. (b)); (d) between the rights of a transferee or licensee of
intellectual property and a security right in that intellectual property, a
document or notice of which may be registered in an intellectual property
registry (see recommendation 78); (e) between the rights of a transferee or
licensee of intellectual property and a security right in that intellectual
property, a document or notice of which may not be registered in an
intellectual property registry (see recommendations 79-81); and (f) between
two security rights that are both effective against third parties, one of which
is created by the grantor and the other is created by the transferee, lessee
or licensee of the encumbered asset. The last conflict is addressed in the
sense that the transferee, lessee or licensee takes the asset subject to the
security right created by the grantor (see recommendations 79 and 82) and
the secured creditor of the transferee, lessee or licensee takes no more rights
than the transferee, lessee or licensee had (see recommendation 31).
received a right in the same asset from the same grantor (that no longer had
any rights in the encumbered asset). This is not a priority conflict under the
law recommended in the Guide, but it may well be a conflict addressed by
law relating to intellectual property.
177. Under the law recommended in the Guide, knowledge of the existence
of a prior security right on the part of a competing claimant is generally
irrelevant for determining priority (see recommendation 93; however,
knowledge that a transfer violates the rights of a secured creditor may be
relevant; see recommendation 81, subpara. (a)). Thus, a later created but
earlier registered security right has priority over an earlier created but later
registered security right, even if the holder of the later created security right
had knowledge of the existence of the earlier created security right
(see recommendation 76, subpara. (a)).
180. Under the law recommended in the Guide, priority between security
rights granted by the same grantor in the same encumbered asset that were
made effective against third parties by registration in the general security rights
registry is determined by the order of registration of a notice in that registry
(see recommendation 76, subpara. (a)). This rule applies if a document or
notice of a security right may not be registered or is not registered in a
specialized registry. If such a document or notice may be registered and is
registered in a specialized registry, different rules apply (see the Guide,
recommendation 77, and paras. 181-183 below). In addition, if a security right
is granted by a different grantor (for example, a transferee of the initial
grantor), different rules apply (see the Guide, recommendations 79-83,
and paras. 184-201 below). All these rules apply equally to security rights
in intellectual property.
181. The Guide recommends that a security right in an asset that is made
effective against third parties by registration in a specialized registry (see
recommendation 38) has priority over a security right in the same asset that
is made effective against third parties by another method (see recommendation
77, subpara. (a)). It also recommends that a security right in an asset that is
made effective against third parties by registration in a specialized registry has
priority over a security right in the same asset that was subsequently registered
in the specialized registry (see recommendation 77, subpara. (b)). In addition,
the Guide recommends that, if an encumbered asset is transferred, leased or
licensed and, at the time of the transfer, lease or licence, the security right
has been made effective against third parties by registration in a specialized
registry, the transferee, lessee or licensee takes its rights subject to the security
right. If such a security right has not been registered in a specialized registry,
a transferee, lessee or licensee of an encumbered asset takes the asset free of
the security right, even if a notice of the security right was registered in the
general security rights registry (see recommendation 78). These rules are
subject to certain exceptions (see paras. 184-212 below, as well as the Guide,
recommendations 79-81). In addition, if a transferee, lessee or licensee of an
encumbered asset acquires its rights in the asset free of a security right, any
person that subsequently acquires rights in the asset acquires its rights free of
the security right (see the Guide, recommendations 31 and 82).
(or may exercise the rights of an owner) of the intellectual property with
authority to grant licences while the security right is in place (see para. 222
below). In this situation, a licence granted by the original owner would be
an unauthorized licence under law relating to intellectual property and the
licensee would obtain nothing based on the nemo dat principle. It also
follows that, because the secured creditor only obtains a security right in
the rights that the grantor has, in this situation there is no asset which the
security right of the secured creditor of the licensee can encumber (see the
Guide, recommendation 13).
190. If the owner, after creating a security right in its intellectual property,
remains the owner but its ability to grant licences is limited by agreement
with the secured creditor (to the extent such agreement is permitted under
law relating to intellectual property), the owner may theoretically grant a
licence, but the granting of a licence by the owner in breach of its agreement
with the secured creditor would be an event of default. As a result, the
owner’s secured creditor could enforce its security right and, exercising the
rights of the owner, sell the licensed intellectual property or grant another
licence free of the pre-existing licence (and any security right granted by
the licensee), as that licensee would normally have taken its licence subject
to the security right of the owner’s secured creditor (see the Guide,
recommendations 79 and 161-163). Alternatively, the owner’s secured
creditor could enforce its security right upon default by collecting the
royalties payment of which is owed by the licensee to the owner as licensor.
If the encumbered asset is the owner’s intellectual property rights, the secured
creditor may collect the royalties as proceeds of the encumbered asset
(see recommendations 19, 39, 40, 100 and 168). If the encumbered asset is
the right of the owner as licensor to the payment of royalties, the secured
creditor may collect the royalties as the original encumbered asset. In either
case, the secured creditor may collect royalties even before default, but only
if there is an agreement to that effect between the owner and its secured
creditor (see recommendation 168). In any case, if the licensee took the
licensed intellectual property free of the security right created by the owner
in the intellectual property, the licensee could retain its licence and the
secured creditor could only seek to collect the royalties owed by the licensee
to the owner (see recommendations 80, subpara. (b), and 245).
191. If the licensee also creates a security right in its rights under the
licence agreement (for example, the right to use or exploit the licensed
intellectual property), that security right would be in a different asset
(that is, not in the owner’s rights). The reason for this result is that the
licensee would have taken its rights under the licence agreement subject to
the security right created by the owner (see the Guide, recommendation 79)
and the licensee could not have given to its secured creditor more rights
Chapter V. Priority of a security right in intellectual property 85
than the licensee had (based on the nemo dat principle). So, if the secured
creditor of the owner enforced its security right and disposed of the encumbered
intellectual property free of the licence, the licence would terminate upon that
disposition and the asset encumbered by the licensee would cease to exist.
Likewise, whether or not the owner had created a security right to one of its
creditors, if the licensee defaults on the licence agreement, the owner as
licensor can terminate it to the extent permitted under law relating to
intellectual property and the licensee’s secured creditor would be again left
without an asset encumbered by its security right.
192. As already mentioned (see paras. 23-25, 158, 159 and 187), the rights
of the licensor and the licensee under the licence agreement and the law
relating to intellectual property would remain unaffected by secured transactions
law. So, if the licensee defaulted on the licence agreement, the licensor could
exercise any available right to terminate it and the licensee’s secured creditor
would again be left without security. Similarly, secured transactions law would
not affect an agreement between the licensor and the licensee prohibiting the
licensee from granting sub-licences or assigning to the licensor the licensee’s
rights to the payment of royalties owed by sub-licensees to the licensee as
sub-licensor (see paras. 102-104 above).
194. The first exception arises where the secured creditor authorizes the
granting of a licence by the licensor free of the security right
(see recommendation 80, subpara. (b)). Thus, under the law recommended in
the Guide, in the case of the grantor’s default, the secured creditor could
collect any royalties owed by the licensee to the grantor as licensor, but
not sell the licensed intellectual property free of the rights of the existing
licensee or grant another licence with the effect of interfering with the rights
of the existing licensee as long as the licensee performs the terms of the
licence agreement.
rights of the secured creditor in the licensed intellectual property, takes its
rights under the licence agreement unaffected by a security right previously
granted by the licensor (see the Guide, recommendation 81, subpara. (c),
which applies to intangible assets generally, but only if a security right has
been created and made effective against third parties before conclusion of
a licence agreement). The result of this rule is that, in the case of enforcement
of the security right in the licensed intellectual property by the secured
creditor of the licensor under the enforcement rules of the law recommended
in the Guide, the secured creditor could collect any royalties owed by the
licensee to the licensor, but not sell the licensed intellectual property free
of the rights of the existing licensee or grant another licence with the effect
of interfering with the rights of the existing licensee as long as the licensee
performs the terms of the licence agreement. This rule is intended to protect
everyday, legitimate transactions, such as off-the-shelf purchases of
copyrighted software with end-user licence agreements, by limiting the
enforcement remedies of a secured creditor under the enforcement rules of
the law recommended in the Guide. In such transactions, the essence of the
protection meant here is that purchasers should not have to do a search in
a registry or acquire the copyrighted software subject to security rights
created by the software developer or its distributors.
197. The secured creditor may elect to avoid extending any credit to the
grantor until it has an opportunity to review and approve the terms and
conditions of any licence or sub-licence agreement entered into by the
grantor. For example, the secured creditor may include terms in the security
Chapter V. Priority of a security right in intellectual property 87
agreement to ensure that expected royalties are paid up front, to provide for
termination of any licence agreement in the case of non-payment of royalties
and to prohibit the assignment of any royalties or sub-royalties. In addition, if
the secured creditor of the grantor/licensor does not want to encourage non-
exclusive licences, it can, in its security agreement (or elsewhere), require the
grantor/licensor to place in all of the non-exclusive licences a provision that
the licence will terminate if the licensor’s secured creditor enforces its security
right. Similarly, if the grantor/licensor does not want its licensee to grant any
sub-licences, it can include in the licence agreement a provision that the granting
of a sub-licence by the licensee is an event of default under the licence
agreement that would entitle the licensor to terminate the licence. Nothing in
the Guide would interfere with the enforcement of such provisions as between
the secured creditor and the grantor (or as between the licensor and its licensee).
Ordinarily, the secured creditor will have no interest in doing that, since the
grantor/licensor (and any licensee) is in the business of granting non-exclusive
licences and the secured creditor expects the grantor/licensor to use the fees
paid under those licence agreements to pay the secured obligation.
198. From the discussion above it becomes clear that the scope of application
of recommendation 81, subparagraph (c), is very limited for a number of
reasons. Firstly, secured creditors often have no interest in limiting the ability
of an owner/grantor to grant licences in its intellectual property and collect
royalties. As a matter of fact, a secured creditor is in many cases interested in
permitting licensing so that the owner/grantor may repay the secured obligation.
Secondly, by its wording, recommendation 81, subparagraph (c), applies only
where there is a non-exclusive licence, one that includes a legitimate “off-the-
shelf” purchase of licences of mainly copyrighted software used with respect
to equipment and only where the licensee had no knowledge that the licence
violated the rights of the secured creditor under the security agreement.
201. To the contrary, if a licence has not been authorized, the licensee
takes the licence subject to a security right created by the licensor.
To the extent that a State has such a rule in its law relating to intellectual
property, recommendation 81, subparagraph (c), would not apply (see the
Guide, recommendation 4, subpara. (b)). As a result, unless the secured
creditor authorized the grantor to grant licences unaffected by the security
right (which will typically be the case as the grantor will rely on its
royalty income to pay the secured obligation), the licensee would take
the licence subject to the security right. Thus, if the grantor defaults,
the secured creditor would be able to enforce its security right in the
licensed intellectual property and sell or license it free of the licence.
In addition, a person obtaining a security right from the licensee will
not obtain an effective security right as the licensee would not have
received an authorized licence and would have no right in which to create
a security right.
202. If law relating to intellectual property does not address this matter
at all or addresses it consistently with the way in which it is addressed
in recommendation 81, subparagraph (c), recommendation 81, subparagraph
(c), will apply in the limited cases and with the limited impact described
above (see the Guide, recommendation 4, subpara. (b)).
205. The following examples are designed to clarify the situations to which
this approach would apply and the impact of its application. In each example,
it should be assumed that: (a) O owns intellectual property; (b) O creates a
security right in the intellectual property in favour of SC; (c) SC’s security
right is effective against third parties either in accordance with the
recommendations of the Guide or, if the law recommended in the Guide does
not apply, in accordance with recommendation 4, subparagraph (b), under the
law relating to intellectual property; and (d) SC has not agreed, in the security
agreement or otherwise, that any licensee of O will enjoy its rights in the
encumbered and licensed intellectual property free of SC’s security right.
206. After SC takes the steps necessary to make its security right effective
against third parties, O, who is in the business of granting non-exclusive
licences of the intellectual property on substantially the same terms to any
person who agrees to perform in accordance with such terms, offers to license
the intellectual property to L. L enters into a licence agreement with O on
those terms. O defaults on the obligation secured by the security right and
SC sets out to enforce its security right. The right of L to use the intellectual
property is protected by recommendation 81, subparagraph (c), and
recommendation 245 below against enforcement by SC of its security right.
However, SC still has whatever rights it may have against L under law relating
to intellectual property and contract law.
207. After SC takes the steps necessary to make its security right effective
against third parties, O grants a licence in the intellectual property to L.
The licence agreement provides that L may grant sub-licences in the intellectual
property only for educational markets. L grants a sub-licence in a commercial
market to SL. O defaults on the obligation secured by the security right,
and SC sets out to enforce its security right. If, under the law relating to
intellectual property, the sub-licence to SL is not authorized, the right of SL
to use the intellectual property is not protected by recommendation 81,
subparagraph (c), or recommendation 245 below against enforcement by SC
of its security right.
90 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
208. After SC takes the steps necessary to make its security right effective
against third parties, O grants a licence in the intellectual property to L. The
licence agreement provides that L has exclusive rights to use the intellectual
property in State Z. O defaults on the obligation secured by the security
right, and SC sets out to enforce its security right. The right of L to use the
intellectual property is not protected by recommendation 81, subparagraph
(c), or recommendation 245 below against enforcement by SC of its security
right because the licence is exclusive.
209. After SC takes the steps necessary to make its security right effective
against third parties, O, who is in the business of granting non-exclusive
licences of the intellectual property on substantially the same terms to any
person who agrees to perform in accordance with such terms, offers to
license the intellectual property to L on such terms. L declines to enter into
a licence agreement with O on those terms. Instead, O grants a licence in
the intellectual property to L, pursuant to which L has substantially greater
rights in the intellectual property than under the licences generally offered
to others. O defaults on the obligation secured by the security right, and SC
sets out to enforce its security right. The right of L to use the intellectual
property is not protected by recommendation 81, subparagraph (c), or
recommendation 245 below against enforcement by SC of its security right
because the licence is not on substantially the same terms as other licences
of the same intellectual property.
210. Before O and L enter into the licence agreement, L discovers the
notice filed to make SC’s security right effective against third parties and,
accordingly, asks to see a copy of the security agreement relating to that
notice. The security agreement is furnished to L by O. Upon reading the
security agreement, L discovers that the licence to it would violate the rights
of SC. Nonetheless, L enters into the licence agreement with O. O defaults
on the obligation secured by the security right, and SC sets out to enforce
its security right. The right of L to use the intellectual property is not
protected by recommendation 81, subparagraph (c), or recommendation 245
below against enforcement by SC of its security right because L had
knowledge that the licence agreement would violate SC’s rights.
212. After SC takes the steps to make its security right effective against
third parties, O offers to license the intellectual property but only to parties
Chapter V. Priority of a security right in intellectual property 91
213. Under the law recommended in the Guide, with limited exceptions
(see the Guide, recommendations 80, subpara. (b), and 81, subpara. (c), and
recommendation 245 below), a licensee takes its rights subject to a security
right previously created by the licensor in its rights and made effective
against third parties (see the Guide, recommendation 79). As already
explained (see paras. 22 and 23), this means that, upon default, the secured
creditor may enforce its security right and sell or license the grantor’s rights
in the intellectual property. If the licensee also grants a security right in
its rights as a sub-licensor against the sub-licensee, no priority conflict
arises under the law recommended in the Guide between the two
security rights because they encumber different assets. The licensor’s
secured creditor has a security right in the licensor’s right to the payment
of the royalties owed to the licensor by the licensee under the licence
agreement, while the licensee’s secured creditor has a security right in any
sub-royalties due to the licensee (as sub-licensor) by a sub-licensee under a
sub-licence agreement.
216. In this regard, it should be noted that the licensor has, under the law
recommended in the Guide, numerous ways to protect itself in this
circumstance. For example, the licensor can protect its rights by: (a) ensuring
that its secured creditor registers first a notice of its security right in the
general security rights registry; (b) ensuring that its secured creditor registers
first a document or notice in the relevant intellectual property registry;
(c) requiring the secured creditor of the licensee to enter into a subordination
agreement with the licensor’s secured creditor before granting a licence;
(d) prohibiting the licensee from granting a security right in its right to the
payment of sub-royalties; (e) terminating the licence in cases where the
licensee created a security right in its sub-royalties in breach of such a
prohibition; or (f) prior to the licensee as sub-licensor granting a security
right in its right to the payment of sub-royalties to its secured creditor,
granting a security right in its right to payment of a percentage of the
sub-royalties and agreeing that any sub-licensee pay its sub-royalties directly
to an account of the licensor. The Guide does not interfere with any
agreements of this kind between licensor and licensee, if they are effective
Chapter V. Priority of a security right in intellectual property 93
under law relating to intellectual property and contract law. In addition, the
licensor could insist that the licensee grant to the licensor a security right
in its right to the payment of sub-royalties and take as a secured creditor
the steps just mentioned.
217. However, these steps may protect the licensor to a certain extent only,
because, for example: (a) rights in the encumbered intellectual property
may not be subject to registration in an intellectual property registry; or
(b) it may not be commercially practicable for the licensor to prohibit
sub-licensing, terminate the licence agreement or obtain a subordination
agreement. In addition, the priority of a security right created by the licensor
as against another security right created by the licensee in its right to the
payment of sub-royalties would be subject to the general rules explained
above (see para. 213).
219. The Guide recommends that a security right that was made effective
against third parties before a judgement creditor obtained rights in the
encumbered asset have priority as against the right of the judgement creditor.
However, if an unsecured creditor obtained a judgement against the grantor
and took the steps necessary under the law governing the enforcement of
judgements to acquire rights in the encumbered assets before the security
right became effective against third parties, the right of the judgement
creditor has priority (see the Guide, recommendation 84).
K. Subordination
Recommendation 24517
17
If it could be included in the Guide, this recommendation would be placed in chapter V, Priority
of a security right, as recommendation 81 bis. As an asset-specific recommendation, this recommendation
would replace general recommendation 81, subparagraph (c), to the extent that it applies to the priority
of the rights of a non-exclusive licensee of intellectual property as against the rights of a secured creditor
of the licensor.
VI. Rights and obligations of the parties to a
security agreement relating to intellectual
property
A. Application of the principle of party autonomy
222. With few exceptions, the law recommended in the Guide generally
recognizes the freedom of the parties to the security agreement to tailor
their agreement so as to meet their practical needs (see recommendation
10). The principle of party autonomy applies equally to security rights in
intellectual property, subject to any limitations specifically introduced by
law relating to intellectual property (see the Guide, recommendation 4,
subpara. (b)). For example, unless otherwise provided by law relating to
intellectual property, an owner/grantor and its secured creditor may agree
between themselves that: (a) the secured creditor may exercise some of
the rights of the owner/grantor (for example, to deal with authorities,
renew registrations or pursue infringers; see para. 75 above); (b) the
owner/grantor may not grant licences (in particular exclusive licences)
without the consent of the secured creditor; or (c) the secured creditor
may collect royalties owed to the owner/grantor as a licensor even before
default on the part of the owner/grantor.
223. Under the law recommended in the Guide, the party in possession
of an encumbered asset has the obligation to take reasonable steps to
preserve it (see recommendation 111). Similar rules apply to intellectual
property. For example, the grantor has an obligation to deal with
authorities, pursue infringers and renew registrations. In some States, law
relating to patents provides that the owner/grantor may not revoke or limit
the encumbered patent without the consent of the secured creditor.
95
96 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
225. Moreover, under the law recommended in the Guide, the secured
creditor should be able to request the owner/grantor to allow the secured
creditor to preserve the value of the encumbered intellectual property, for
example, by dealing with authorities, renewing registrations or pursuing
infringers (see recommendation 10), unless prohibited by law relating
to intellectual property (see recommendation 4, subpara. (b)). Otherwise,
the value of the encumbered intellectual property could diminish and
such a result could negatively affect the use of intellectual property as
security for credit.
226. If the owner/grantor accepted this request (or the secured creditor
was authorized by agreement with the owner/grantor to take steps to
preserve the encumbered intellectual property), the secured creditor would
be entitled to exercise those rights with the explicit consent of the owner/
grantor; if the owner/grantor did not respond, the secured creditor would
be entitled to exercise those rights with the implicit consent of the owner/
grantor; and, if the owner/grantor rejected the request, the secured
creditor would not be entitled to exercise those rights. In addition, if
the owner/grantor failed to pursue infringers or renew registrations,
the secured creditor could consider that that failure constituted an event
of default as described in the security agreement and could enforce its
security right in the encumbered intellectual property. Again, these results
would not interfere with law relating to intellectual property as
recommendation 4, subparagraph (b), would defer to that law in case of
any inconsistency.
Chapter VI. Rights and obligations to a security agreement relating to intellectual property 97
Recommendation 24618
The law should provide that the grantor and the secured creditor may
agree that the secured creditor is entitled to take steps to preserve the
encumbered intellectual property.
18
If it could be included in the Guide, this recommendation would be placed in chapter VI,
Rights and obligations of the parties to a security agreement, as recommendation 116 bis.
VII. Rights and obligations of third-party
obligors in intellectual property financing
transactions
227. Where a licensor assigns to its assignee (whether an outright
assignee or a secured creditor, see the terms “assignee”, “assignment”
and “secured creditor” in the introduction to the Guide, sect. B, para.
20) its claim against a licensee for the payment of royalties under a
licence agreement, the licensee (as the debtor of the assigned receivable)
would be a third-party obligor under the Guide and its rights and
obligations would be the rights and obligations of a debtor of a receivable.
Similarly, where a licensee assigns to its assignee its claim against a
sub-licensee for the payment of sub-royalties under a sub-licence
agreement, the sub-licensee would be a third-party obligor with respect
to the licensee’s assignee in the sense of the Guide.
99
VIII. Enforcement of a security right in
intellectual property
A. Interaction of secured transactions law and law
relating to intellectual property
101
102 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
235. The right of the secured creditor to take possession of the encumbered
asset as set forth in recommendations 146 and 147 of the Guide is normally
not relevant if the encumbered asset is an intangible asset such as intellectual
property (as the term “possession”, as defined in the Guide, means actual
possession; see the introduction to the Guide, sect. B, para. 20). These two
recommendations deal only with the taking of possession of tangible assets.
However, according to the general principle of extrajudicial enforcement, the
secured creditor should be entitled to take possession of any documents
necessary for the enforcement of its security right where the encumbered asset
is intellectual property, whether or not those documents were specifically
mentioned as encumbered assets in the security agreement. Such a right will
normally be provided for in the security agreement.
The use referred to here means use consistent with the authorization of the
owner or other licensor; if the use is unauthorized, the products are unauthorized
and the secured creditor may be an infringer. So, for example, the secured
creditor may take possession of a tangible asset, such as a compact disc or a
digital video disc, and may exercise its enforcement remedies against the discs
under the law recommended in the Guide. In cases where the secured creditor
also wishes to obtain a security right in the intellectual property itself (including,
to the extent the grantor has the right to sell or otherwise dispose of, or license
the intellectual property, the right to sell or otherwise dispose of, or license it),
it would be necessary for the secured creditor to specifically describe such
intellectual property as encumbered assets in the security agreement with the
grantor (see paras. 108-112 above, and the Guide, recommendation 243).
237. Under the law recommended in the Guide, upon the grantor’s default,
the secured creditor has the right to dispose of or grant a licence in the
encumbered intellectual property (but always within the limits of the rights of
the grantor; see recommendation 148). As a result, if the grantor is the owner,
the secured creditor should, in principle, have the right to sell (assign) or
otherwise dispose of, or license the encumbered intellectual property. However,
if the grantor had previously granted an exclusive licence to a third party free
of the security right for a certain jurisdiction and time period, upon default,
the secured creditor would be unable to grant another licence covering the
same use within the same geographical and time limits of the licence, as the
grantor had no such right at the time the secured creditor acquired its security
right (nemo dat). However, the secured creditor may be able to grant another
licence outside the geographical or time limits of the exclusive licence
previously granted by the grantor.
239. Under the law recommended in the Guide, rights in intellectual property
acquired through judicial disposition would be regulated by the relevant law
applicable to the enforcement of court judgements (see recommendation 160).
In the case of an extrajudicial disposition in line with the law recommended
in the Guide, the first point to note is that the transferee or licensee takes its
rights directly from the grantor. The secured creditor that chooses to enforce
its rights in this manner does not become the owner merely as a result of this
enforcement process, unless the secured creditor acquires the encumbered
intellectual property in total or partial satisfaction of the secured obligation or
at an enforcement sale (see recommendations 148 and 156).
240. The second point is that the transferee or licensee could only take such
rights as were actually encumbered by the enforcing secured creditor’s security
right. Under the law recommended in the Guide, the transferee or licensee
would take the intellectual property free of the security right of the enforcing
secured creditor and any lower-ranking security rights, but subject to any
higher-ranking security rights. Similarly, a good-faith transferee or licensee that
acquired a right in intellectual property pursuant to an extrajudicial disposition
that is inconsistent with the law recommended in the Guide would take the
intellectual property free of the security right of the enforcing secured creditor
and any lower-ranking security rights (see recommendations 161-163).
241. Under the law recommended in the Guide, a security right in a tangible
asset extends to and may be enforced against attachments to that asset
(see recommendations 21 and 166). To ensure that the security right also covers
assets produced or manufactured by the grantor from encumbered assets, the
security agreement normally provides expressly that the security right extends
to such manufactured assets. Where the encumbered asset is intellectual
property, it is important to determine whether the asset that is disposed of to
the transferee or licensee is simply the intellectual property as it existed at the
time the security right became effective against third parties or whether it also
includes any subsequent improvement to it (for example, an enhancement of
a patent or an adaptation of copyrighted work). Generally, laws relating to
intellectual property treat such improvements (“updates”, “adaptations” or
“enhancements”) as separate assets and not as integral parts of existing
intellectual property. As a result, a prudent secured creditor that wishes to
ensure that improvements are encumbered with the security right should
describe the encumbered asset in the security agreement in a manner that
ensures that improvements are directly encumbered by the security right
(see paras. 116 and 117 above).
106 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
242. Under the enforcement regime recommended in the Guide, the secured
creditor has the right to propose to the grantor that it acquire the grantor’s
rights in total or partial satisfaction of the secured obligation. If the grantor is
the owner of intellectual property, the secured creditor could itself become the
owner in the way prescribed by law relating to intellectual property, provided
that the grantor and any other interested party (such as the debtor, any other
person owing performance of the secured obligation or any person with rights
in the encumbered asset) do not object (see the Guide, recommendations 156-
159). Should the owner have licensed its intellectual property to a licensee
that acquired its rights under the licence agreement free of the rights of the
enforcing secured creditor, when the secured creditor acquires the intellectual
property from the grantor, it acquires that right subject to the prior-ranking
licence in accordance with the nemo dat principle. Once a secured creditor
becomes the owner of intellectual property, its rights and obligations are
regulated by the relevant law relating to intellectual property. In particular, the
secured creditor may need to register a notice or document confirming that it
acquired the intellectual property to enjoy the rights of an owner or to obtain
any relevant priority. Finally, the secured creditor that acquires the encumbered
intellectual property in total or partial satisfaction of the secured obligation
would take the intellectual property free of any lower-ranking security rights,
but subject to any higher-ranking security rights (see recommendation 161).
243. Under the enforcement regime recommended in the Guide, where the
encumbered asset is the right to receive payment of royalties and other fees
under a licence agreement, the secured creditor should be entitled to enforce
the security right by simply collecting the royalties and other licence fees upon
default and notification to the person that owes the royalties or fees
(see recommendation 168). In all these situations, the right to the payment of
royalties and other licence fees is, for the purposes of secured transactions
laws, a receivable (see paras. 98-105 above). Thus, the rights and obligations
of the parties will be governed by the principles pertaining to receivables that
are set forth in the United Nations Assignment Convention and the regime
recommended in the Guide for receivables. Once again, the secured creditor
that has taken a security right in the right to the payment of present and future
royalties is entitled to enforce only such rights to the payment of royalties
(including rights to the payment of future royalties under existing licenses)
Chapter VIII. Enforcement of a security right in intellectual property 107
as were vested in the grantor (licensor) at the time of the conclusion of the
security agreement or when the grantor acquired rights in the encumbered
receivable or the power to encumber it (see the Guide, recommendation 13).
In addition, subject to any contrary provision of law relating to intellectual
property (see recommendation 4, subpara. (b)), the secured creditor’s rights
to collect royalties includes the right to collect or otherwise enforce any
personal or property right that secures payment of the royalties
(see recommendation 169).
244. In addition to the right to collect royalties, the licensor will normally
include a number of other contractual rights in its agreement with the licensee
(see para. 97 above). These may include, for example, the licensor’s right to
terminate the licence agreement if the licensee, in violation of an agreement
not to grant any sub-licence or to create a security right in its rights under the
licence agreement, grants such a sub-licence or creates such a security right.
Where the licensor creates a security right only in its right to collect royalties,
these rights will remain vested in the licensor. However, if the secured creditor
also wishes to obtain a security right in these other rights of the licensor, they
would have to be included in the description of the encumbered assets in the
security agreement. In any case, if the secured creditor enforces its security
right in the licensor’s rights under a licence agreement and takes the encumbered
intellectual property, as a matter of contract law, the secured creditor will be
bound by the terms and conditions of the licence agreement.
248. In cases where the secured creditor also wished to obtain a security
right in the intellectual property itself (including, to the extent the grantor
has the right to sell or license the intellectual property, the right to sell or
license it), it would be necessary for the secured creditor to specifically
refer to such intellectual property as an encumbered asset in the security
agreement. Here, the encumbered asset is not the product produced using
the intellectual property, but rather the intellectual property itself (or the
licence to manufacture tangible assets using the intellectual property).
A prudent secured creditor will normally seek to take a security right in
Chapter VIII. Enforcement of a security right in intellectual property 109
249. In the discussion above, the grantor of the security right has been
assumed to be the owner of the relevant intellectual property. The
encumbered asset is one or more of the following rights: (a) the intellectual
property itself; (b) the right of the owner/licensor to receive payment of
royalties and other licence fees; or (c) the right of the owner/licensor to
enforce other contractual terms relating to the intellectual property. Only
in the discussion of security rights in tangible assets produced with the
use of intellectual property (see paras. 245-248 above) were the rights of
the owner/licensor and the rights of the licensee discussed together.
However, most of the issues addressed in sections C-H of this chapter
also are relevant in situations where the encumbered asset is not the
intellectual property itself but the rights of a licensee (or sub-licensee)
arising from a licence agreement (see paras. 106 and 107 above). In cases
where the encumbered asset is merely a licence, the secured creditor
obviously may only enforce its security right against the licensee’s rights
and may do so only in a manner that is consistent with the terms of the
licence agreement.
251. Where the encumbered asset is the sub-licensor’s right to the payment
of royalties under a sub-licence agreement, the regime recommended in the
Guide treats the asset as a receivable. This means that the secured creditor
of the licensee/sub-licensor may collect the royalties to the extent that these
were vested in the grantor/sub-licensor at the time when the security right
in the receivable is enforced. In the case where creation by the licensee/
sub-licensor of a security right in its right to payment of royalties owed by
its sub-licensee constitutes a breach of an initial or intervening licence
agreement, the licensor would retain all its contractual rights under the
licence agreement, including the right to terminate that agreement, and the
secured creditor of the licensee/sub-licensor would also retain its right to
collect sub-royalties, at least, as long as the licensor did not terminate the
licence agreement.
A. Introduction
111
112 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
260. The law recommended in the Guide offers alternatives for obtaining
third-party effectiveness in relation to inventory and equipment. Under the
first alternative, an acquisition security right in tangible assets other than
consumer goods or inventory (that is, equipment) would have priority over
a competing non-acquisition security right granted in the same asset by the
same grantor, provided that the acquisition secured creditor retained
possession of the asset or a notice of the acquisition security right was
registered in the general security rights registry within a short period of time
after the grantor obtained possession of the asset (see the Guide,
recommendation 180, alternative A, subpara. (a)). A different rule would
apply with respect to security rights in inventory (that is, in assets held by
the grantor for sale, lease or licence in the ordinary course of the grantor’s
business; see the introduction to the Guide, sect. B, para. 20). In this situation,
an acquisition secured creditor must have retained possession of the asset
or registration of a notice in the general security rights registry would have
to occur before delivery of the inventory to the grantor and secured creditors
with earlier registered non-acquisition security rights would have to be
notified of the acquisition secured creditor’s intention to claim an acquisition
security right, once again before delivery of the inventory to the grantor
(see the Guide, recommendation 180, alternative A, subpara. (b)). By contrast,
under a second alternative, no distinction would be drawn between inventory
114 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
and assets other than consumer goods or inventory. Under this alternative,
the rule applicable under the first alternative to assets other than inventory
would apply to all types of asset other than consumer goods
(see recommendation 180, alternative B).
264. As a general rule, the law recommended by the Guide does not seek
to modify any rules set out in other law that are applicable to specialized
registries whether in relation to third-party effectiveness (see recommendations
34, 38 and 42) or priority (see recommendations 77 and 78). This policy is
also adopted in the chapter on acquisition financing (see recommendation
181). Two consequences follow. Firstly, the special priority status granted
to an acquisition security right over prior registered non-acquisition security
rights refers only to security rights registered in the general security rights
registry and not to security rights registered in specialized registries.
Secondly, the general priority afforded by other law to security rights
registered in specialized registries is maintained by the law recommended
116 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
266. The following example may be useful in clarifying why such a regime
might merit consideration. State A that has enacted the recommendations of
the Guide also decides to permit registration of notices of security rights in
intellectual property (even future intellectual property) in the relevant
intellectual property registry as a method of achieving third-party effectiveness.
A bank has extended credit to the grantor, and this credit is secured by
a security right in all present and future intellectual property rights of
the grantor. The bank has made that right effective against third parties
by registering in the specialized registry. The security right in each
future item of intellectual property is not effective against third parties
until the grantor acquires that item. Nonetheless, under the general
priority principles recommended in the Guide, which the State would
presumably adopt if it were to permit registration of notices of security rights
in future intellectual property, priority dates from the date of registration
(see recommendation 76).
can achieve the status of an acquisition financier with a special priority over
already registered non-acquisition security rights unless the law relating to
intellectual property so provides. That is to say, even if the seller wishing
to achieve the special priority status of an acquisition financier follows all
the steps necessary to claim such a right and registers a notice, a security
right, a notice or document of which was registered in a specialized registry
will always have priority over a security right, a notice of which was
registered in the general registry (see the Guide, recommendation 77). Thus,
if the specialized registration regime permits the registration of security
rights in intellectual property but does not at the same time provide for a
special priority status of acquisition financiers, a security right in present
and future intellectual property registered first in the relevant intellectual
property registry will have priority over the rights of an acquisition financier
that takes a security right in the intellectual property being sold, registering
a notice in the general security rights registry. Such a seller would have to
rely on a transaction by which it retained title to the intellectual property
right in question, provided that law relating to intellectual property recognized
that approach (see paras. 280-283 below). The same situation could occur
where: (a) the grantor seeks to acquire an exclusive licence, which is treated
as a transfer of the intellectual property itself; (b) a licensor would be willing
to grant a non-exclusive licence on credit if it is granted additional protection
beyond that which it would get by simply terminating the licence agreement;
(c) a licensee, as a sub-licensor, is willing to grant a non-exclusive sub-
licence only if it can acquire a security right in the rights of a sub-licensee
and any rights to payment of sub-royalties payable to the sub-licensee by a
sub-sub-licensee; and (d) the acquisition financing is provided not by the
owner as transferor or as licensor, nor by the licensee as sub-licensor, but
by a third-party lender.
271. It might be argued that this direct transposition is not optimal in the
case of acquisition security rights in intellectual property. For example,
intellectual property owners and licensors typically rely on their rights to
payment of royalties to develop new ideas protected by intellectual property
rights. Additionally, if the rights of secured creditors with an all-asset security
right in rights of licensees always had priority over the rights of secured
creditors with a security right in rights of intellectual property owners or
licensors, owners or licensors would not be able to effectively use their rights
to payment of royalties as security for credit. By contrast, it might also be
argued that intellectual property owners and licensors could achieve an
equivalent result by ensuring that they or their secured creditors: (a) obtained
a security right in or an outright assignment of a right to payment of a
percentage of the sub-royalties payable to the licensee as a sub-licensor by
sub-licensees and registered a notice thereof in the relevant intellectual
property registry before any registration in that registry by a secured creditor
of the licensee; (b) obtained a security right in or an outright assignment of
a right to payment of a percentage of the sub-royalties payable to the licensee
as a sub-licensor by sub-licensees and registered first a notice thereof in the
general security rights registry; or (c) obtained a subordination agreement
from the secured creditor of the licensee.
274. B creates a security right in all of its present and future movable assets
(including intellectual property) in favour of SC, who takes the actions necessary
to make that security right effective against third parties. Subsequently, B
acquires a patent from O to be used in B’s business. Pursuant to the agreement
between B and O, B agrees to pay the purchase price to O over time and B
grants O a security right in the patent to secure B’s obligation to pay the
purchase price. O makes that security right effective against third parties within
a short period of time such as 20 or 30 days after B obtains the patent. O’s
security right is an acquisition security right and has priority over the security
right of SC (see recommendation 180, alternative A, subpara. (a), or alternative
B, subpara. (b)). Whether the priority of O’s security right extends to proceeds
of the patent in the form of receivables, negotiable instruments, rights to
payment of funds credited to a bank account or rights to receive proceeds under
an independent undertaking depends on which version of recommendation 185
a State enacts. Under alternative A, the priority of O’s security right carries
over into the proceeds (see recommendation 185, alternative A, subpara. (a),
Chapter IX. Acquisition financing in an intellectual property context 121
275. B creates a security right in all of its present and future movable assets
(including intellectual property) in favour of SC1, who takes the actions
necessary to make the security right effective against third parties. Subsequently,
B acquires a patent from O for the purpose of licensing it to third parties in
the ordinary course of B’s business. B obtains the money necessary to pay the
purchase price to O by borrowing money from SC2, to whom B grants a
security right in the patent to secure B’s repayment obligation. Before B obtains
the patent, SC2: (a) takes the actions necessary to make its security right
effective against third parties; and (b) notifies SC1 that SC2 has an acquisition
security right. SC2’s security right is an acquisition security right and has
priority over the security right of SC1 (see recommendation 180, alternative
A, subpara. (b), and alternative B, subpara. (b), as transposed). The priority of
SC2’s security right does not extend to proceeds of the patent in the form of
receivables, negotiable instruments and rights to payment of funds credited to
a bank account or rights to receive proceeds under an independent undertaking,
although it does extend to other types of proceeds (see recommendation 185,
alternative A, subpara. (b), and alternative B, as transposed).
276. B has created a security right in all of its present and future movable
assets (including intellectual property) in favour of SC, who has taken the
actions necessary for that security right to be effective against third parties.
Subsequently, B obtains a licence from O to use a patent owned by O in B’s
business. B agrees to pay the licence fee to O over time and grants O a security
right in B’s rights as licensee to secure B’s payment obligation. O makes that
security right effective against third parties within a short period of time (such
as 20 or 30 days) after B obtains the licence. O’s security right in B’s rights
under the licence agreement is an acquisition security right and has priority
over the security right of SC (see recommendation 180, alternative A, subpara.
(a), and alternative B, subpara. (b), as transposed). Whether the priority of O’s
security right extends to proceeds of B’s rights as licensee in the form of
receivables, negotiable instruments and rights to payment of funds credited to
122 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
277. B grants a security right in all of its present and future movable assets
(including intellectual property) to SC1, who takes the actions necessary to
make the security right effective against third parties. Subsequently, B obtains
a licence from O, the patent owner, for the purpose of sub-licensing the patent
to third parties in the ordinary course of B’s business. B obtains the money
necessary to pay its licence fee by borrowing money from SC2, to whom B
grants a security right in B’s rights as licensee to secure B’s repayment
obligation. Before B obtains the licence, SC2: (a) takes the actions necessary
to make its security right effective against third parties; and (b) notifies SC1
that SC2 will have an acquisition security right. SC2’s security right is an
acquisition security right and has priority over the security right of SC1
(see recommendation 180, alternative A, subpara. (b), and alternative B, subpara.
(b), as transposed). The priority of SC2’s security right does not extend to
proceeds of the licence in the form of receivables, negotiable instruments and
rights to payment of funds credited to a bank account, although it does extend
to other types of proceeds (see recommendation 185, alternative A, subpara.
(b), and alternative B, as transposed).
agreement. B will also utilize the operating system on the personal computers
owned by B. Because the predominant use of the operating system by B is to
hold it for sale or license to others, the rules that apply to acquisition security
rights in inventory apply to SC’s acquisition security right.
281. For the same reasons, if a State adopts the “non-unitary approach” to
acquisition financing of tangible assets, it is reasonable to assume that the State
would also adopt the non-unitary approach to acquisition financing of intellectual
property. The non-unitary approach to acquisition financing of intellectual
property rights might be reflected, for example, by contractual terms providing
for a conditional transfer (which, under law relating to intellectual property,
may include a conditional exclusive licence), a retention-of-title right, a financial
lease right or a similar transaction with respect to an intellectual property right.
Under the non-unitary approach, in addition, it is possible for an owner or for
a third-party financier such as a bank to take an acquisition security right of
the type available under the unitary approach.
Recommendation 24719
The law should provide that the provisions on an acquisition security right
in a tangible asset also apply to an acquisition security right in intellectual
property or a licence of intellectual property. For the purpose of applying these
provisions:
(a) Intellectual property or a licence of intellectual property:
( i) Held by the grantor for sale or licence in the ordinary course
of the grantor’s business is treated as inventory; and
19
If it could be included in the Guide, this recommendation would be placed in chapter IX,
Acquisition financing, as recommendation 186 bis.
Chapter IX. Acquisition financing in an intellectual property context 125
285. Chapter X of the Guide does not define the security rights to which
the conflict-of-laws rules recommended in the Guide apply. Normally, the
characterization of a right as a security right for conflict-of-laws purposes
reflects the substantive secured transactions law in a State. However, the Guide
recommends that a State that enacts the law recommended in the Guide
following a non-unitary approach to acquisition financing apply the conflict-
of-laws rules governing security rights to retention-of-title rights or financial
leases (see recommendation 201). Similarly, as most of the substantive law
rules of the law recommended in the Guide that apply to security rights in
receivables apply also to outright assignments, the Guide recommends that
such a State apply the conflict-of-laws rules governing assignments of
receivables for security purposes to outright assignments of receivables
(see the term “security right” in the introduction to the Guide, sect. B,
para. 20, and recommendations 3 and 208).
286. In principle, a court or other authority will use its own law whenever
it is required to characterize an issue for the purpose of selecting the appropriate
conflict-of-laws rule. As the conflict-of-laws rules recommended in the Guide
have been prepared to reflect the substantive law rules recommended in the
Guide, a State that enacts both the substantive law and the conflict-of-laws
rules recommended in the Guide will have no difficulty in applying either.
If, however, a State does not enact the substantive law rules recommended in
127
128 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
20
For example, under article 16 of Council Regulation (EC) No. 207/2009 on the Community
Trademark (see footnote 8 above), articles 17-24 apply. The law of the country where the proprietor has
his seat or establishment (if inside the European Union) or the law of the seat of the Office (Spain)
applies only if these articles have no specific rule.
Chapter X. Law applicable to a security right in intellectual property 129
289. It should also be noted that, whatever the applicable law may be, its
application will be subject to: (a) the public policy and mandatory rules
of the forum (see the Guide, recommendations 222); and (b) in the case
of the grantor’s insolvency, the impact of the application of the law of
the State in which the insolvency proceedings are commenced with respect
to certain insolvency-related matters (lex fori concursus; see recommendation
223). Finally, it should be noted that, like all the other rules recommended
in the Guide, the conflict-of-laws rules as well do not apply in so far
as they are inconsistent with national law or international agreements,
to which the State is a party, relating to intellectual property, if any
(see recommendation 4, subpara. (b)).
290. Under the law recommended in the Guide, the law applicable to the
creation, third-party effectiveness, priority and enforcement of a security right
in an intangible asset is the law of the State of the grantor’s location
(see recommendations 208 and 218, subpara. (b)). Following the approach
followed in many States, the Guide has asset-specific recommendations for
security rights in certain types of intangible asset, such as rights to funds
credited to a bank account (see recommendations 209-212), but not for
security rights in intellectual property. Thus, if a State enacts the conflict-of-laws
rules recommended in the Guide, without an asset-specific rule for intellectual
property, the law of the State in which the grantor is located would apply to
the creation, third-party effectiveness, priority and enforcement of a security
right in intellectual property. The location of the grantor is defined as its
place of business and, in the case of places of business in more than one
State, its central administration, that is, the real, rather than the statutory,
seat of the grantor (see recommendation 219). As already mentioned
(see para. 289), recommendation 4, subparagraph (b), would also apply and,
to the extent that the conflict-of-laws rules recommended in the Guide would
be inconsistent with those of the law relating to intellectual property that
applied specifically to intellectual property, the conflict-of-laws rules of the
law relating to intellectual property would apply.
291. The principal advantage of an approach based on the law of the State
in which the grantor is located is that it leads to the application of a single
law to the creation, third-party effectiveness, priority and enforcement of a
security right. So, for example, a secured creditor that wishes to obtain a
security right in all present and future intangible assets (including both
130 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
intellectual property and other assets) of a grantor could obtain the security
right, make it effective against third parties, ascertain its priority and have it
enforced by referring to the law of a single State, even if the assets have
connections with several States. In particular, both registration and searching
costs with respect to security rights would in most cases be reduced, as a
secured creditor would need to register and a searcher would need to search
only in the State in which the grantor was located. This result would reduce
transaction costs and enhance certainty and would thus potentially have a
beneficial impact on the availability and the cost of credit.
293. However, if the grantor is a transferee that has taken the asset from the
initial or intermediate owner located in a State other than the State of the
grantor’s location, the secured creditor would have to search in the security
rights registry (and possibly in the relevant intellectual property registry, if
any) of any such other State. It should be noted that, in such a case, if the
initial or intermediate owner had itself granted a security right that was subject
to the law of the location of the initial or intermediate owner, under the law
recommended in the Guide, the applicable law would be the law of the State
21
United Nations publication, Sales No. E.99.V.3.
Chapter X. Law applicable to a security right in intellectual property 131
in which the grantor was located at the time a priority conflict arose
(see recommendations 208 and 220, subpara. (b)). Under the law recommended
in the Guide, except in certain prescribed situations, each transferee of an
encumbered asset would take the asset subject to a pre-existing security right.
As a result, each transferee would take the asset subject to a security right
created by a prior owner (see recommendations 79-82).
294. It should be noted that where the grantor moves from one State to
another State that has enacted the law recommended in the Guide, additional
rules apply, if the law of the State of the grantor’s new location is the applicable
law. According to these rules, if the grantor moves to a State that has enacted
the law recommended in the Guide, a security right remains effective against
third parties for a short period of time without any action on the part of the
secured creditor and thereafter only if the third-party effectiveness requirements
of the State of the grantor’s new location are met (see the Guide,
recommendation 45).
296. It should also be noted that, under the law recommended in the Guide,
the relevant time for determining the location of the grantor for creation issues
is the time of the putative creation of a security right and for third-party
effectiveness and for priority issues it is the time when the issue arises
(see recommendation 220). As a result, under the approach based on the law
of the State of the grantor’s location rule recommended in the Guide and to
the extent that rule would apply to security rights in intellectual property
assets, the creation of the security right of SC1 would be subject to the law
132 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
of State X and the creation of the security right of SC2 would be subject
to the law of State Y. Whether transferee B and its secured creditor SC2
would take the intellectual property asset subject to the security right of SC1
would, after a short period of time (see the Guide, recommendation 45),
be governed by the law of State Y.
22
See the report of Working Group VI (Security Interests) on the work of its sixteenth session (A/
CN.9/685, para. 90).
23
Available from www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html.
24
Available from www.wipo.int/treaties/en/ip/berne/trtdocs_wo001.html.
25
These instruments may contain certain exceptions that are not considered relevant to this
discussion.
Chapter X. Law applicable to a security right in intellectual property 133
301. The view mentioned above (see paras. 297 and 298), attributing an
extensive effect to international intellectual property conventions with respect
to the determination of the law applicable to issues relating to security rights
134 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
304. For example, the approaches based on the law of the State of the
grantor’s location and the lex protectionis could be combined in the
following way. The law of the State of the grantor’s location would
apply in principle to the creation, third-party effectiveness, priority
and enforcement of a security right in intellectual property. However,
the third-party effectiveness and priority of a security right as against
the rights of an outright transferee or licensee of intellectual property
would be governed by the lex protectionis. This rule would apply
irrespective of whether or not the lex protectionis provided for registration
of a security right in intellectual property in an intellectual property
registry. Under this first hybrid approach, a secured creditor would need
to establish its right under the lex protectionis only in instances where a
competition with an outright transferee or licensee was a concern. In the
typical case where the insolvency of the grantor is the main concern
(because the grantor cannot pay all its creditors), it would be sufficient for
the secured creditor to rely on the law of the State in which the grantor
is located, as would be the case for other types of intangible asset
(such as receivables).
Chapter X. Law applicable to a security right in intellectual property 135
305. In States that follow such an approach with respect to security rights
in intellectual property, it results in lowering transaction costs mainly for
two reasons. Firstly, a secured creditor may always register under the lex
protectionis and in the relevant intellectual property registry. Secondly, where
the main concerns of a secured creditor are the insolvency of the grantor
and a dispute with another secured creditor or a judgement creditor, the
secured creditor may only need to meet the third-party effectiveness
requirements of the State in which the grantor is located (for example, to
register a notice only in the general security rights registry in the State in
which the grantor is located). In such a case, a secured creditor may be
prepared to take the risk of not registering under the lex protectionis in the
intellectual property registry of the State in which the intellectual property
is protected, which would protect the secured creditor against the risk of
fraud by the grantor, as it would not lend if it feared fraud.
306. However, this first “hybrid” approach also has disadvantages. If the
secured creditor needs to ensure its priority as against all competing
claimants, it would have to meet the requirements of the law that typically
governs ownership in intellectual property, that is, the lex loci protectionis.
This would be the case in particular with respect to priority as against: (a)
a transferee of intellectual property; (b) an exclusive licensee of intellectual
property where an exclusive licence is treated as a transfer; and (c) a secured
creditor that under law relating to intellectual property is treated as an owner
or may exercise the rights of an owner (see paras. 30, 87, 88 and 222 above).
Such a result could have a negative impact on the availability and the cost
of credit. In addition, if the law of the State in which the grantor is located
is not the law of the protecting State, the security right may not be effective
and enforceable under the law of the protecting State, unless that State has
adopted a conflict-of-laws rule referring to the grantor’s location. Moreover,
as already mentioned (see para. 290), even in States in which a security
right is subject to the law of the State in which the grantor is located, the
lex protectionis may be applicable by virtue of recommendation 4,
subparagraph (b). It should also be noted that, in particular if a security
right may be registered in an intellectual property registry, the applicable
law of the State of the grantor’s location may be set aside as fundamentally
contrary to the public policy and the internationally mandatory rules of the
forum (see the Guide, recommendation 222).
308. The main advantage of this approach is that it takes into account the
existence of national, regional or international intellectual property registries
and the potential reluctance of States that have such registries to adopt a
conflict-of-laws rule that would disregard the existence of those registries.
To the extent that legislation of regional or international organizations
provides for registration of rights in intellectual property, member States of
these organizations would find it difficult to adopt a rule that runs counter
to regional or international legislation. For example, member States of the
European Union may not be in a position to adopt a rule that failed to take
into account that, under article 16 of the Council Regulation (EC)
No. 207/2009 on the Community Trademark, community trademarks are
subject primarily to articles 17-24 of the Regulation and only if these
provisions have no specific rule will the law of the State where the proprietor
has his seat or establishment (if inside the European Union) or the law of
the seat of the Office (Spain) apply.
309. This second hybrid approach also has disadvantages. To the extent
that rights in some types of intellectual property are capable of being
registered in an intellectual property registry (for example, patents and
trademarks), while other types are not (copyrights), it results in a different
conflict-of-laws treatment of security rights in the various type of intellectual
property. In addition, to the extent that this approach is based on the lex
protectionis, it draws unnecessary distinctions, as the lex protectionis should
apply to all types of intellectual property whether or not the lex protectionis
provides for the registration of certain intellectual property rights. Moreover,
to the extent that the second part of such an approach is identical with the
first hybrid approach discussed above, but with a more limited scope of
application, it would have all of its advantages and disadvantages (para. 306
above). Furthermore, such an approach may add cost and complexity to
outright transfers of intellectual property rights that are not subject to such
registration under the lex protectionis. This is so because an outright
transferee of such an intellectual property right would have to investigate
the law of the State of the grantor’s location to ensure that the transfer was
not subject to a prior security right.
Chapter X. Law applicable to a security right in intellectual property 137
311. Another possible combination of the two approaches (the third hybrid
approach) might be to refer the creation and enforcement of a security right
to the law of the State of the grantor’s location, unless the parties agreed
to refer the law of the protecting State. Under such an approach, the third-
party effectiveness and priority of a security right could be referred to the
law of the State of the grantor’s location, with the exception of the third-
party effectiveness and priority of a security right as against the rights of a
transferee, licensee or another secured creditor. This approach would:
(a) allow a limited extent of party autonomy with respect to creation and
enforcement of a security right; (b) refer third-party effectiveness and priority
of a security right mainly to the law of the protecting State; and (c) refer
the third-party effectiveness and priority of a security right as against an
insolvency representative to the law of the State of the grantor’s location.
312. This approach too would have disadvantages. To the extent that
creation and third-party effectiveness are referred to two different laws, only
States that treat these two issues as distinct issues (in other words, follow
the approach recommended in the Guide) could apply such a rule. Thus,
such a rule would have limited application until wide adoption of a law that
would be consistent with the law recommended in the Guide. In addition,
referring any issue other than the mutual rights and obligations of the parties
to party autonomy just with respect to security rights in intellectual property
would be a departure from the approach followed in the Guide
(see recommendation 10, which does not permit party autonomy for any
applicable law issue other than the mutual rights and obligations of the
parties) and from conflict-of-laws principles of many States that do
not permit party autonomy in the determination of the law applicable to
property rights issues.
138 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
314. Yet another combination of the law of the grantor’s location and the
lex protectionis might be the following: the lex protectionis could apply to
the creation, third-party effectiveness and priority of a security right in
intellectual property. However, a secured creditor could also effectively
create a security right under the law of the State of the grantor’s location.
In addition, a secured creditor could rely on that law to achieve the
effectiveness of a security right as against judgement creditors and the
grantor’s insolvency representative. Moreover, the law of the State of the
grantor’s location could govern the enforcement of such a security right.
This is the recommended approach (see recommendation 248 below).
its security right effective against judgement creditors and the grantor’s
insolvency representative under the law of the grantor’s location would
not give rise to circular priority problems because the lex protectionis
would recognize such effectiveness against those potential competing
claimants. Moreover, the lex protectionis would always apply to priority
disputes with other competing claimants (for example, another secured
creditor or a transferee).
319. Under the lex protectionis approach A and SC1 would have to meet
the creation requirements of State X with respect to the copyright portfolio
protected under the law of State X and the requirements of State Y with
respect to patent and trademark portfolio protected under the law of State
Y. If they fail to do so, the security agreement will achieve only part of its
intended purpose; for example, it may create a security right under the law
of State X, but fail to create a security right under the law of State Y. Under
the first hybrid approach that combines the law of the State of the grantor’s
location and the lex protectionis (see para. 304 above), A and SC1 would
need to meet the requirements of State X for the creation of its security
right in both the copyright portfolio and the patent and trademark portfolio
(that is, for the security right to be effective between grantor A and secured
creditor SC1).
321. Under the third hybrid approach, which permits limited party
autonomy with respect to the law applicable to the creation of a security
right in intellectual property (see para. 311 above), the law of State X would
apply, unless the parties chose in the security agreement the law of State Y.
To the extent that both States distinguish between creation and third-party
effectiveness and attribute to creation effects only as between the parties,
this approach would not create problems. Otherwise, this approach could
result in uncertainty as to the law applicable to creation issues. It should be
noted that, if creation is distinct from third-party effectiveness and is referred
by A and SC1 to the law of State X and by A and SC2 to the law of State
Y, no major problem would arise as long as the priority conflict between
SC1 and SC2 is referred to one law, in this example, to the law of State Y.
322. Where A and SC1 have chosen the law of the State of the grantor’s
location (State X) and A and SC2 have chosen the law of the State in which
the intellectual property is protected (State Y), while the only difference
between the laws of States X and Y with respect to the creation of a security
right lies in the fact that, for example, State X, which has not enacted the
recommendations of the Guide, requires more formalities in a security
Chapter X. Law applicable to a security right in intellectual property 141
a greement than does State Y, which has enacted the rules recommended in
the Guide, this difficulty can be overcome by preparing the security
agreement so that it satisfies the requirements of the more stringent law
(although this could result in additional costs for the transaction). However,
when States X and Y have inconsistent requirements with respect to
formalities, this approach will not suffice to overcome this problem.
Similarly, where the security agreement contemplates multiple present and
future intellectual property rights as encumbered assets, difficulties may arise
that could not be overcome. This is so in particular when a State has enacted
the rules recommended in the Guide (allowing a single security agreement
to create security rights in multiple present and future assets), while another
State does not allow a security agreement to create a security right in assets
not yet in existence or not yet owned by the grantor, or does not allow
multiple assets to be encumbered in one and the same agreement.
324. In the same example (see para. 318 above), in order to make its
security right effective against third parties, under the lex protectionis
approach, SC1 would need to meet the third-party effectiveness requirements
of State X to make its security right in the copyright portfolio effective
against third parties and the requirements of State Y to make its security
right in the patent and trademark portfolio effective against third parties.
This would possibly necessitate the registration of multiple notices
with respect to the security right in the relevant registries of those States.
In addition, potential creditors would have to search in all those registries.
This means that potential creditors of A would need search the relevant
registry in State X to find the security right in favour of SC1 in the copyright
portfolio and the relevant registry in State Y to find the security right
in favour of SC1 and SC2 in the patent and trademark portfolio. This
situation could be further complicated by the fact that some of those
States might utilize the general security rights registry for such notices,
other States might provide the option of utilizing an intellectual property
registry and still other States might utilize an intellectual property registry,
if registration in such a registry is mandatory under law relating to
142 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
325. However, under the first hybrid approach, it would be sufficient for
SC1 to meet the third-party effectiveness requirements of State X. Any
potential creditors of A would need to search only in the relevant registry
in State X to find any security right created by A in its copyright portfolio
in State X or in its patent and trademark portfolio in State Y (although
a transferee or licensee need only search in the patent and trademark
registry in State Y, as a conflict of priority with a transferee or licensee
is under the first hybrid approach governed by the lex protectionis).Under
the second hybrid approach, SC1 would need to meet the third-party
effectiveness requirements of State X with respect to the security right in
the copyright portfolio and the third-party effectiveness of State Y with
respect to the security right in the patent and trademark portfolio. Under
the third hybrid approach, SC1 and SC2 would have to meet the third-
party effectiveness requirements of both States X and Y to ensure the
effectiveness of their security rights against all possible competing
claimants other than judgement creditors and the grantor’s insolvency
representative (with respect to which the law of State X would apply).
Under the recommended approach (see recommendation 248 below), SC1
should generally meet the third-party effectiveness requirements of the
law of State X for the copyright portfolio and the law of State Y for the
patent and trademark portfolio (in both cases, the protecting State).
However, to protect its right as against judgement creditors and the
grantor’s insolvency representative, SC1 would have the option of meeting
only the requirements of the law of State X (the law of the State of the
grantor’s location).
326. In the same example (see para. 318 above), if A creates another
security right in its patent and trademark portfolios protected in State Y
in favour of SC2, there will be a priority conflict between the security
rights of SC1 and SC2 in the patents and trademarks protected in State
Y. Under the lex protectionis approach, this priority conflict would be
governed by the laws of State Y. The law of State Y would govern
this priority conflict also under the approach referring priority of a
security right in intellectual property that may be registered in an
intellectual property registry to the law of the State under whose authority
the registry is maintained.
Chapter X. Law applicable to a security right in intellectual property 143
327. Another example will illustrate how the lex protectionis approach will
apply in the case of multiple transfers in a chain of title, where the transferor
and each of the transferees create security rights. A, located in State X, owns
a patent in State X. Owner A grants a security right in a patent to secured
creditor SC1. A then transfers the patent to B, located in State Y, who creates
a security right in favour of SC2. Whether transferee B obtains the patent
subject to the security right of SC1 will be determined in accordance with
the lex protectionis, that is, the law of State X, which happens to be also
the law of the grantor’s location. Whether secured creditor SC2 takes its
security right in the patent from transferee B subject to the security right of
SC1 will also be determined in accordance with the lex protectionis (normally,
under the nemo dat principle, SC2 will acquire no more rights than B had).
328. Under the first hybrid approach, this priority conflict would be
governed by the law of State X, in which the grantor is located. Under the
second hybrid approach, the law of State Y would apply to the security right
in the patent and trademark portfolio (registered in State Y) and the law of
State X (the law of the State in which the grantor is located) would apply
to the priority of the security right in the copyright portfolio. To modify the
example slightly, if the copyright portfolio also includes copyrights protected
in various States (in addition to State X) in which registration of a copyright
and a security right in a copyright may be possible, under the second hybrid
approach, the law of all those various States would apply to the priority of
a security right in these copyrights.
329. Under the third hybrid approach, circular priority problems could
arise. If grantor A became insolvent and insolvency proceedings were
instituted in State X, under this approach, priority as between SC1 and SC2
would be governed by the law of State Y, while priority as between the
insolvency representative (on one hand) and SC1 and SC2 (on the other
hand) would be governed by the law of State X. If: (a) under the law of
State X, the insolvency representative has priority over SC1 but not over
SC2 and (b) under the law of State Y, SC1 has priority over SC2, then: the
right of SC1 has priority over the right of SC2 (under the law of State Y),
the right of insolvency representative has priority over the right of SC1 (under
the law of State X), and the right of SC2 has priority over the right of the
insolvency representative (under the law of State X). The result would be
circular priority, as the right of SC1 prevails over the right of SC2 whose
right prevails over the right of the insolvency representative whose right
prevails over the right of SC1.
332. In the same example (see para. 318 above), if A does business in
States X, Y and Z and uses a particular patent under the law of each of
those States, those patent rights may well have greater value taken
together than they do separately because they operate collectively. Thus,
if A creates a security right in those patents, SC1 would likely prefer to
dispose of them together upon A’s default because such a disposition
would likely yield greater proceeds (thus also benefitting A). Yet this is
likely to be difficult or impossible if States X, Y and Z have different
rules for disposition of encumbered intellectual property rights. If State
X allows only a judicial disposition of an encumbered asset, while States
Y and Z allow a non judicial disposition, disposition of the patent rights
in a single transaction might be impossible. Even if all of the relevant
States allow non-judicial disposition, the differences in required
procedures may make a disposition of the rights in a single transaction
inefficient at best.
Chapter X. Law applicable to a security right in intellectual property 145
334. Under an approach based on the lex protectionis or the law of the
State under whose authority the registry is maintained, SC1 would need
to enforce its security right in the patent protected in State X in accordance
with the law of State X, its security right in the patent protected in State
Y in accordance with the law of State Y and its security right in the
patent protected in State Z in accordance with the law of State Z. Under
the first hybrid approach, enforcement of the security right in the patent
would be governed by the law of the State in which grantor A is located.
It should be noted that, no matter which approach is followed, if SC1
sells the encumbered patents, in order to be fully protected, the transferee
will have to register its rights in the patent registry of each State in which
the relevant patent is registered and protected, that is, States X, Y and Z.
336. Under the third hybrid approach, problems could arise if enforcement
and priority are referred to different laws. For example, if enforcement
is referred by A and SC1 to the law of State X (the law of the State of
the grantor’s location) and by A and SC2 to the law of State Y
(the protecting State) and both A and B initiate enforcement proceedings,
146 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
one law might apply to the remedies exercised by A and another law
might apply to the remedies exercised by B. For instance, having the
laws of States X and Y apply to procedural enforcement issues
(for example, time periods for notices, or which of the two enforcing
secured creditors had priority and could take over enforcement, or else
distribution of proceeds) could result in uncertainty and inconsistencies.
This would be particularly problematic if the law of State X allowed an
extra-judicial sale of the encumbered asset while the law of State Y
prohibited it (and which one of the two secured creditors sold the asset
may have an impact on whether the transferees acquired the encumbered
asset free or subject to the security right).
338. Under the law recommended in the Guide, the law applicable to
the mutual rights and obligations of the grantor and the secured creditor
arising from their security agreement (the contractual aspects of the
security agreement) is left to party autonomy. In the absence of a choice
of law by the parties, the law applicable to these matters is the law
governing the security agreement as determined by the conflict-of-laws
rules generally applicable to contractual obligations (see the Guide,
chap. X, para. 61, and recommendation 216).
26
See www.hcch.net/upload/wop/genaff_concl09e.pdf on the development of a future
instrument on the choice of law in international contracts by the Hague Conference on Private
International Law.
Chapter X. Law applicable to a security right in intellectual property 147
Recommendation 24827
27
If it could be included in the Guide, this recommendation would be placed in chapter X,
Conflict of laws, as recommendation 214 bis.
XI. Transition
340. Under the law recommended in the Guide, the law should set out the
date as of which it will come into force (the “effective date”) and specify the
extent to which, after the effective date, the new law applies to security rights
that existed before the effective date (see the Guide, chap. XI, paras. 1-3, and
recommendation 228).
149
150 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
28
United Nations publication, Sales No. E.05.V.10, available at www.uncitral.org/pdf/english/texts/
insolven/05-80722_Ebook.pdf.
151
152 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
also recommends that the insolvency law should specify the contracts
that are exempt from the operation of this recommendation, such as
financial contracts, or are subject to special rules, such as labour contracts
(see the Insolvency Guide, recommendation 71).
351. The commentary of the Insolvency Guide also states that other
laws override these clauses and explains the relevant reasons (see the
Insolvency Guide, part two, chap. II, paras. 116 and 117). The commentary
further explains that, although some insolvency laws do permit these
types of clause to be overridden if insolvency proceedings are commenced,
this approach has not yet become a general feature of insolvency laws.
In this regard, the commentary speaks of an inherent tension between
promoting the debtor’s survival, which may require the preservation of
contracts, and affecting commercial dealings by creating a variety of
exceptions to general contract rules. The commentary concludes by
expressing the desirability that an insolvency law permit such clauses to
be overridden (see part two, chap. II, para. 118).
154 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
or by entering into a new licence agreement with a new licensor and the rights
thereby obtained would be proceeds in which the secured creditor would have
a security right. As a practical matter, this arrangement too would be worthwhile
only for significant licence agreements.
358. As already mentioned, if at least one party has fully performed its
obligations with respect to a licence agreement, the licence agreement is not
subject to the recommendations of the Insolvency Guide concerning treatment
of contracts. Where neither the licensor nor the licensee has fully performed
its obligations under the licence agreement, however, the licence agreement
would be subject to rejection under those recommendations. To protect long-
term investments of licensees and in recognition of the fact that a licensee may
depend on the use of rights under a licence agreement, some States have
adopted rules that give additional protection to a licensee (and, in effect, its
secured creditor) in the case of a licence agreement that would otherwise be
subject to rejection in the insolvency of the licensor. Such protection is
particularly important where there is a chain of licence and sub-licence
agreements and thus several parties may be affected by the insolvency of one
party in the chain.
359. For example, some States give a licensee the right to continue to use or
exploit the licensed intellectual property, following the rejection of the licence
agreement by the licensor’s insolvency representative, as long as the licensee
continues to pay royalties to the estate as provided in the licence agreement
and otherwise continues to perform the licence agreement. The only obligation
imposed upon the licensor’s estate as a result of this rule is the obligation to
continue honouring the terms and conditions of the licence agreement, an
obligation that does not impose upon the resources of the licensor’s estate.
This approach has the effect of balancing the interest of the insolvent licensor
to escape affirmative burdens under the licence agreement and the interest of
the licensee to protect its investment in the licensed intellectual property.
360. In other States, licence agreements may not be subject to rejection under
insolvency law because: (a) a rule that excludes the leases of immovable
property from insolvency rules on rejection of contracts in the case of the
lessor’s insolvency applies by analogy to licence agreements in the licensor’s
insolvency; (b) licence agreements relating to exclusive licences create property
rights (rights in rem) that are not subject to rejection (but may be subject
to avoidance); (c) licence agreements are not regarded as contracts that have
not been fully performed by both parties as the licensor has already performed
its obligations by granting the licence; or (d) they are registered in the
relevant intellectual property registry. In these States, the licensee may be
able to retain the licence as long as it pays the royalties owed under the
licence agreement.
Chapter XII. The impact of insolvency of a licensor or licensee of intellectual property 157
362. It should be noted that the Insolvency Guide provides (see part two,
chap. II, para. 143) that exceptions to the power to reject may also be
appropriate in the case of labour agreements, agreements where the debtor
is a lessor or franchisor or a licensor of intellectual property and termination
of the agreement would end or seriously affect the business of the
counterparty, in particular where the advantage to the debtor may be relatively
minor, and contracts with government, such as licensing agreements and
procurement contracts. To protect long-term investments and expectations of
licensees and their creditors from the ability of the licensor’s insolvency
representative in effect to renegotiate licence agreements existing at the
commencement of insolvency proceedings, States may wish to consider
adopting rules similar to those described in the preceding paragraphs.
Any such rules would have to take account of the general rules of insolvency
law and the overall effect on the insolvency estate, as well as law relating
to intellectual property. States may also wish to consider to what extent the
commercial practices described in paragraphs 356 and 357 above would
provide adequate practical solutions.
363. If the licensee is the insolvent debtor and has granted a security right
in its rights under the licence agreement and the licensee’s insolvency
representative decides to continue the licence agreement, the licence
agreement will remain in place, the licensee will continue to have its rights
under the licence agreement to use or exploit the licensed intellectual
property (in accordance with the terms and conditions of the licence
agreement) and the licensee’s secured creditor will continue to have a
security right in those rights. In this case, if the licensor has granted a
158 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
s ecurity right in its rights to the payment of royalties under the licence
agreement, the licensor’s secured creditor will continue to have a security
right in the licensor’s right to the payment of royalties.
D. Summary
Question: Question:
Licensor grants a security right What happens if the licensor or its insolvency representative What happens if the licensee or its insolvency representative
in its rights under a licence decides to continue the performance of the licence decides to continue the performance of the licence
agreement (primarily the right to agreement under the insolvency law (see the Insolvency agreement under the insolvency law (see the Insolvency
receive royalties) Guide, recommendations 69-86)? Guide, recommendations 69-86)?
Answer: Answer:
The licensee continues to owe royalties under the licence The licensor continues to have a right to receive royalties
agreement and the secured creditor of the licensor continues under the licence agreement and thus the secured creditor
to have a security right both in the licensor’s right to of the licensor continues to have a security right both in
royalties under the licence agreement and in the proceeds the licensor’s right to royalties under the licence agreement
of that right, in other words, any royalty payments that are and in the proceeds of that right, in other words, any
made. royalty payments that are made.
Question: Question:
What happens if the licensor or its insolvency representative What happens if the licensee or its insolvency representative
rejects the licence agreement under the insolvency law rejects the licence agreement under the insolvency law
(see the Insolvency Guide, recommendations 69-86)? (see the Insolvency Guide, recommendations 69-86)?
Answer: Answer:
The licensee does not owe royalties under the licence The licensee does not continue to owe royalties under the
agreement with respect to periods after rejection, but still licence agreement with respect to periods after rejection,
owes any unpaid royalties for periods before rejection; the but still owes any unpaid royalties for periods before
secured creditor of the licensor thus has a security right in rejection; the secured creditor of the licensor thus has a
the right to collect such royalties for periods prior to the security right in the right to collect such royalties for
rejection and in the royalties paid for those periods, but periods prior to the rejection and in the royalties paid for
has no security right in rights to any future royalties those periods, but has no security right in rights to any
because there will be no future royalties under the rejected future royalties because there will be no future royalties
agreement. under the rejected agreement.
159
160
Licensor is insolvent Licensee is insolvent
Question: Question:
Licensee grants a security right What happens if the licensor decides to continue the What happens if the licensee decides to continue the
in its rights under a licence performance of the licence agreement under the insolvency performance of the licence agreement under the insolvency
Question: Question:
What happens if the licensor or its insolvency representative What happens if the licensee or its insolvency representative
rejects the licence agreement under the insolvency law rejects the licence agreement under the insolvency law
(see the Insolvency Guide, recommendations 69-86)? (see the Insolvency Guide, recommendations 69-86)?
Answer: Answer:
The licensee does not have rights under the licence The licensee does not have rights under the licence
agreement with respect to periods after rejection, but agreement with respect to periods after rejection, but
retains any rights it may still have with respect to periods retains any rights it may still have with respect to periods
before rejection; the secured creditor of the licensee before rejection; the secured creditor of the licensee
continues to have a security right in those rights of the continues to have a security right in those rights of the
licensee with respect to periods before rejection. licensee with respect to periods before rejection.
Annex I
Terminology and recommendations of the
UNCITRAL Legislative Guide on Secured
Transactions: Supplement on Security Rights in
Intellectual Property
A. Terminologya
243. The law should provide that, in the case of a tangible asset with respect
to which intellectual property is used, a security right in the tangible asset
a
If it could be included in the Guide, this text would be placed in the relevant terms in
section B, Terminology and interpretation.
b
If it could be included in the Guide, this recommendation would be placed in chapter II, Creation
of a security right, as recommendation 28 bis.
161
162 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
does not extend to the intellectual property and a security right in the
intellectual property does not extend to the tangible asset.
244. The law should provide that the registration of a notice of a security
right in intellectual property in the general security rights registry remains
effective notwithstanding a transfer of the encumbered intellectual property.
245. The law should provide that the rule in recommendation 81,
subparagraph (c), applies to the rights of a secured creditor under this law
and does not affect the rights the secured creditor may have under the law
relating to intellectual property.
246. The law should provide that that the grantor and the secured creditor
may agree that the secured creditor is entitled to take steps to preserve the
encumbered intellectual property.
247. The law should provide that the provisions on an acquisition security
right in a tangible asset also apply to an acquisition security right in
intellectual property or a licence of intellectual property. For the purpose of
applying these provisions:
(a) Intellectual property or a licence of intellectual property:
(i) Held by the grantor for sale or licence in the ordinary course of
the grantor’s business is treated as inventory; and
c
If it could be included in the Guide, this recommendation would be placed in chapter IV,
The registry system, as recommendation 62 bis
d
If it could be included in the Guide, this recommendation would be placed in chapter V, Priority
of a security right, as recommendation 81 bis. As an asset-specific recommendation, this recommendation
would replace the general recommendation 81, subpara. (c), to the extent that it applies to the priority
of the rights of a non-exclusive licensee of intellectual property as against the rights of a secured creditor
of the licensor.
e
If it could be included in the Guide, this recommendation would be placed in chapter VI, Rights
and obligations of the parties to a security agreement, as recommendation 116 bis.
f
If it could be included in the Guide, this recommendation would be placed in chapter IX,
Acquisition financing, as recommendation 186 bis.
Annex I 163
g
If it could be included in the Guide, this recommendation would be placed in chapter X, Conflict
of laws, as recommendation 214 bis.
Annex II
Decision of the United Nations Commission
on International Trade Law and General
Assembly resolution 65/23
A. Decision of the Commission
1. At its 914th meeting, on 29 June 2010, the Commission adopted the
following decision:
165
166 UNCITRAL Legislative Guide: Supplement on Security Rights in Intellectual Property
a
United Nations publication, Sales No. E.05.V.10.
Annex II 167
2. At its 57th plenary meeting, on 6 December 2010, the General Assembly
adopted, on the basis of the report of the Sixth Committee A/65/465, draft
resolution III, the following resolution:
b
See Official Records of the General Assembly, Sixty-fifth Session, Supplement No. 17 (A/65/17),
chap. IV.
c
Resolution 56/81, annex.
Further information may be obtained from:
USD 30
United Nations publication ISBN 978-92-1-133708-2
Printed in Austria
Sales No. E.11.V.6
*1057126*
V.10-57126—March 2011—850 UNITED NATIONS