Open Close

Finjan Holdings commits to licensing best practices

Finjan Holdings, Inc. (OTC: FNJN) said it has made a commitment to its benchmark licensing best practices to ensure candid, transparent and consistent business practices for intellectual property licensing.

“We understand that defining our core values early in our growth will guide us as a newly public company on how we develop our business relationships, differentiate our brand within the IP licensing industry, and ultimately define our corporate ethos,” said Finjan´s president, Phil Hartstein.

Finjan´s Licensing Best Practices include seven actionable elements:

–Ensure focused licensing and enforcement programs pursuing the provider of the patented technology and not its customers, consumers or end users.

–Conduct reasonable diligence to determine a patent´s enforceability and use with respect to prospective licensees, and make that information available to them.

–Respect procedural rights and judicial efficiency in the courts and in the prosecution and protection of IP behind the innovation.

–Be transparent with the intent in each discussion, and articulate the cause and effect scenarios which would prompt a shift in communication and an escalation of each discussion.

–Provide useful facts to prospective licensees and defendants to foster productive business discussions early and often to aid in informed decision-making.

–Offer fair value licenses or settlements based on legitimate factors and considerations.

–Commit to keeping lines of communications open between the patent owner and prospective licensee to preserve a path for the parties to find an amicable solution or resolution for their respective businesses.

Further details on the Finjan´s Licensing Best Practices and its commitment to achieve industry adoption are outlined in its position paper at

Founded in 1997, Finjan developed and patented technology that is capable of detecting previously unknown and emerging threats on a real-time, behavior-based, basis, in contrast to signature-based methods of intercepting only known threats to computers, which were standard in the online security industry during the 1990s.


If you enjoyed this post, please consider leaving a comment or subscribing to the RSS feed to have future articles delivered to your feed reader.