Beruflich Dokumente
Kultur Dokumente
Intellectual property (IP) protection for bioinformatics databases plays a key role in accelerating
development
biological sciencesofand biotechnological industry. This paper presents current and global position of IP
protection in database. A protection method has been proposed after analysing characteristics of bioinformatics
bioinformatics
database
and s
considering different database protection methods. Further, the paper seeks to analyse the diffusion process of
biological
information and develops an argument that bioinformatics primar y database should be put in public domain,
though
may bethey
given financial subsidies by the government or other public funds according to the diffusion phase of
biological
information. Suitable methods of IP protection in the bioinformatics secondary database have been suggested.
Keywords : Intellectual property, bioinformatics database, transmission model, copyright, contract, , trade
sui generis
secret,
trademark
information. The transmission model is theThis mostmodel has been verified by a number of
appropriate to explain the diffusion process of researchers and the value of the coefficients anda)(
biological information. can be calculated based on actual data. The same
The transmission model is based on the epidemic
transmission model can be applied to the diffusion of
model. During the spread of an epidemic, biological
the numberinformation, which in turn is defined by the
of carriers initially increases and so does the rate
diffusion of
characteristics of the biological information
spreading, until the number of healthy individuals is as follows.
small when the rate of spreading startsIn declining. In
the first phase of the curve, researchers need to
case of transmission model for diffusion the utilities for the diffusion of new biological
examine
information is the variable. In the beginninginformation and and explore ways of its possible
midway during diffusion, the rate of applications.
information So the cost is high and users are less,
spread becomes faster and faster and whichmostleads
of theto the slow diffusion. But after a period
information is used, until the remaining potential
of accumulation, the value of biological information
users lack the ability to use new technology.
can be assessed, the area of technology development
Hereafter, the rate of diffusion becomes slower and
determined and the expected returns can be predicted.
slower and finally stops. The transmission In in the
the second phase of diffusion of biological
diffusion process is expressed in Fig. 1. information, more users get involved and the
Shown in the figure of the diffusion process diffusionis rate
an of biological information becomes
S shaped curve that is defined by thefaster following
and faster where the information is mostly used.
equation: In the third phase, the biological information has been
utilized sufficiently and most researchers have
d X t( X) (t )(1
X t ( )) mastered them. Meanwhile, because of the high
= -
dt diffusion, the ways to obtain the biological
information will also increase, while the research on
where X (t) is the ratio of the technology diffusion and
the biological information will decrease. The rate of
is the diffusion coefficient. the diffusion at this phase will become stable and not
The solution of the equation is change much.
The Government Strategy
1
X t (e ) 1 = +
- -a t
Considering the above model, it will be appropriate
for the government to give varying financial subsidies
When d 2X t ( ) 0 - a to bioinformatics databases depending on the
= , then t diffusion
= andphase of the biological information. Only
d 2t
1
when the funds are distributed reasonably can the
X (t ) = - a 1 is the inflexion point
financialof subsidies
the of the government be utilized more
[,]
2 2
efficiently.
curve in Fig. 1. For the first phase of biological information
diffusion which is the first slow stage of S curve
(Fig. 1), there is a lot of research on application,
which is a sensitive indicator of database cost. If cost
of using the bioinformatics database is high, diffusion
adequate
slower,
ofnumber
Fig. 1 Transmission model for diffusion processresearch.
period
The
the
But
thewhich
biological
second
and
because
financial
of
first
Therefore,
there
commercial
will
phase,
phase
of
information
are
subsidies
hinder
costs
earlier
still
the
for
ofofapplications
diffusion
agovernment
the
bioinformatics
application
lot
research
to will
of
progress
make
research
become
is breakthroughs,
up
involved
the
based
should
offor
databases
applications.
life
accelerative
slower
research.
the
provide
science
inhigh
and
the
ina
CHANG & ZHU: BIOINFORMATICS DATABASES: IP PROTECTION STRATEGY 451
provision to deal with third party disputes and (Springer-Verlag Limited, London), 2009, p.2.
(ii) the rules of contract law are rigid, and often 2 Kane Michael, Bioinformatics outstrips information
conflict with public policy and the law. Technology, Genomic and , 6 (2)
Proteomics
(2006) 32.
3 Langender fer J & Kopp S W, Which way to the revolution?
The above arguments clearly spell out thatThe consequences of database protection as a new form of
secondary bioinformatics database should be intellectual
Journal
property,
of Public Policy and
protected; only the means need to be ascertained. The Marketing , 22 (1) (2003) 83-95.
available means include use of copyright law, sui 4 McCubbin Caroline, Legal issue s in bioinformatics, Journal
of Commercial Biotechnology
, 9 (3) (2003) 249-265.
generis law, trade secret or contract law for protecting 5 Howard Elizabeth & Ramsey Gabriel, Bioinformatics
databases. In practice, it is up to the database maker to databases: Questions
Biopharm of copyright,
International,
select the suitable law to protect his work according to 11 (2002) 46-48.
the relevant situation. Comparing the various 6 Westmacott
existing Philip & Obhi Harjinder, The database right:
methods, although the contract law has some Copyright and confidential Journalinformation,
of Database
Marketing , 9 (2001) 75-78.
shortages, it has more advantages in terms of 7 Cochrane G, Aldebert P & Althorpe Nucleotide N, EMBL
protecting financial returns of the database maker. sequence database: Developments Nucleicin Acids
2005,
The
hence contract
infringement
database
contract
where
Conclusion
promoting
inherent law
Bioinformatics
isother
an
more
law
nature
the can
attractive
means
can
efficiently,
development
such
of prevent
comprehensive
ofbe
databases
option
used
protection
and breach
databases,
freely
for
ofplay
rights.
give
life
database
in of
ascience.
may
the
IP faith
Furthermore,
key
any maker
protection
makers.
be
role
country
Due
absent
89in
10
11 ofand
to
Yao the
for
even
the
andmtDNA Research , 34 (1) (2006) 10-15.
http://morissardjerome.free.fr/infobiogen/www.gdb.org/gdb/
Sugawara
Boeckmann
Jrgen,
29 Yong-Gang,
H,B,
Ogasawara
Blatter
Salas
data
American
Y,
36
index.html
and
biological
(2005)
DDBJ
Antonio,
(2008)
mining
Mfunctional
O,
C882-899.
&Okubo
with
Journal
D22-D24.
context,
(15
in
Famiglietti
Logan
GenBank
new
May
Nucleic
diversity:
K,
Nucleic
,ofIan,
system
85
Gojobori
2009).
Human
(6)
L,
annotation
Bandelt
needs
Acids
Acids
Protein
2009
,and
328
Genetics
Tsurveying,
Swiss
face,
Research,
Research
&929-933.
&(10-11)
variety
Tateno
Hans-
inProt
The
- its
454 J INTELLEC PROP RIGHTS, NOVEMBER 2010
12 Kouranov A, Xie L & de la Cruz J, The RCSB PDB 20 Marshall Eliot, Genomics's odd , 275
couple,
Science
(5301)
information portal for structural genomics, Nucleic Acids (1997) 778.
Research , 34 (1) (2003) 302-305. 21 Marshall Eliot, Intellectual property: Companies rush to patent
13 Boeckmann B, Bairoch A & Apweiler R, The Swiss -Prot DNA , Science , 275 (5301) (1997) 780-781.
protein knowledgebase and its supplement TrEMBL22 in http://www.wto.org/english/tratop_e/trips_e/t_agm3_e.htm#2
2003,
Nucleic Acids Research , 31 (1) (2003) 365-370. (25 February 2010).
14 Hulo N, Bairoch A & Bulliard V, The PROSITE database, 23 http://www.wipo.int/treaties/en/ip/berne/trtdocs_wo001.html
Nucleic Acids Research , 34 (1) (2006) 227-230. #P85_10661 (25 February 2010).
15 Lee T J, Pouliot Y & Wagner V, BioWarehouse: A 24 Feist Rural
Publications
Telephone
Inc Service
v Company
bioinformatics database warehouse toolkit, BMC Inc , 499 US 340-363 (1991).
Bioinformatics , 7 (2006) 170. 25 http://www.bailii.org/ew/cases/EWCA/Civ/2005/863.html
16 http://europa.eu.int/eur- lex/en/lif/da t/1996/en_369L0009. (19 October 2010).
html (20 December 2009).
26 Mahesh Madhavan, Copyright versus database right of
17 http://europa.eu.int/ISPO/infosoc/legreg/docs/969e c.html
protection in the UK: The bioinformatics bone of contention,
(20 Decembe r 2009).
The Journal of World Intellectual
, 9 (1) (2006)
Property
61-99.
18 McBride Scott M, Bioinformatics and intellectual property
protection, Berkeley Technology Law Journal , 1727(2002) http://genes.mit.edu/GENSCAN.html (20 October 2010).
1332-1363. 28 http://genes.mit.edu/license.html (20 October 2010).
29
19 http://www.or nl.gov/sci/techre sourc es/Huma n_Genome / DSouza Suneeta, Gene meets machine: Intellectual property
publica t/hgn/v8n1/10patent.shtml (21 May 2009). issues in bioinformatics,
Health
, 12 (2004)
Law Review
34-43.