1. Introduction
Once a kind of collateral handled only by specialists, intellectual property (IP) now occupies a significant position in commercial finance arrangements. Almost every business has IP rights, whether as an owner or as a licensee, ranging from off-the-shelf software products to patents on the next big advance in biotech. The business name or website address can function as a trademark, and copyrights can exist in just about any written text or artwork, including marketing materials, employment manuals, and computer code.
A business will often use its intellectual property as collateral for loans and other financing arrangements. In venture capital financing, intellectual property such as a software program or a patent application may be the debtor’s only valuable asset. Film financing may be based on the value of the copyrighted script or film treatment. In other contexts, a loan may finance the debtor’s acquisition, development, or commercialization of particular IP assets. In almost all syndicated credit facilities, a debtor’s intellectual property is included as a matter of course in an all-assets collateral package, often without particular reliance on the value of the intellectual property or its usefulness in the debtor’s business.
Although these financing arrangements are not unusual, they may still present hurdles for the parties’ counsel. Many lawyers who regularly represent lenders and secured parties are familiar with Article 9 of the Uniform Commercial Code (U.C.C.) but have only a vague understanding of the laws applicable to intellectual property. On the other hand, many IP lawyers are knowledgeable about the laws covering their clients’ IP assets but have avoided dealing with the U.C.C. since law school. U.C.C. lawyers and IP lawyers speak different languages; negotiation of IP collateral arrangements can be treacherous without a translation manual.
1.1. Purpose
The accompanying Model Intellectual Property Security Agreement (the Model Agreement) attempts to bridge the gap between U.C.C. and IP lawyers by offering—and explaining—provisions the lawyers should consider in documenting a secured loan when the collateral includes intellectual property. The Model Agreement was produced by a task force (the Task Force) organized by the Commercial Finance and Uniform Commercial Code Committees of the American Bar Association Business Law Section.
Some model agreements can be used as forms, with only minimal changes to adapt them for particular transactions. The types of intellectual property and their importance for any transaction are so varied, however, that a one-size-fits-all approach will not work. The Model Agreement is therefore largely a teaching tool, supplying basic provisions for an idealized hypothetical transaction that involves solely IP collateral. The footnotes address issues that often arise in practice and suggest modifications that may be negotiated to fit the needs of the parties in various real-world situations.
To assist users of the Model Agreement, this report summarizes some basic U.C.C. and IP concepts and terminology, and briefly discusses some issues that often arise when the two bodies of law interact. We have tried to explain, or at least identify, some of the most relevant legal issues, but neither the Model Agreement nor this report is intended as an exhaustive treatise on IP law or U.C.C. Article 9, “Secured Transactions.” The summaries in section 2 (IP basics) and section 3 (U.C.C. basics) merely point out the most salient and topical issues. The Model Agreement should be used with care; particular transactions may raise legal or practical issues making some provisions inappropriate or incomplete.
1.2. Limited Scope
For simplicity and clarity, the Task Force decided to limit the scope of the Model Agreement and to make certain assumptions about the hypothetical secured transaction. The most important of these limitations and assumptions are:
1.2.1. Loan Agreement
The Model Agreement assumes that the IP assets are being pledged as collateral for loans made under a separate loan agreement that will provide most of the substantive terms of the parties’ agreement. The Model Agreement focuses on the IP collateral, and defers to the loan agreement for more general terms to be negotiated by the parties, such as the matters that will be treated as “material” and the events and circumstances that will constitute events of default.
1.2.2. Single Parties
The Model Agreement contemplates a single U.S. borrower that owns the collateral and a single lender (which could be a single collateral agent acting on behalf of a group of lenders).
1.2.3. Stand-Alone Agreement
The Model Agreement deals solely with IP collateral and the directly associated rights and property. We do not, however, intend to perpetuate the historical practice of using both a “regular” security agreement and a separate IP security agreement for a single transaction. We believe that the historical bifurcated practice grew in part from the U.C.C. lawyer’s limited knowledge of IP law and the IP lawyer’s limited understanding of U.C.C. Article 9. To promote efficiency, eliminate inconsistent language, and conform terminology, we recommend including non-IP and IP assets in a single security agreement.
If the transaction documents include a single security agreement for all types of collateral, then the IP-specific provisions of the Model Agreement can be folded into it, replacing or supplementing the general terms.
1.2.4. U.S. Intellectual Property Only
Intellectual property is recognized under local law on a country-by-country basis. In light of the global nature of many businesses, lenders usually want to include foreign IP assets owned by the debtor, such as counterparts of U.S. patents issued in other nations or trademarks registered in other countries, in the collateral package. However, the legal regimes for establishing, protecting, and enforcing liens on intellectual property vary widely by country. While the Model Agreement includes foreign IP assets in the collateral package (through broad granting language covering all the debtor’s IP assets), the Task Force decided to leave for another day contractual provisions to establish, protect, and enforce the lender’s rights in foreign intellectual property. Lenders should consult with local counsel as to the requirements for liens on foreign intellectual property.
1.2.5. Broad Grant
The Model Agreement covers virtually every kind of intellectual property that a debtor might have, regardless of the intellectual property’s value or its importance to the debtor’s business or the secured party’s credit decision. To the extent that certain types of intellectual property are not important for the transaction, parts of the Model Agreement can be deleted. For example, if patents form an insignificant part of the collateral, then provisions applicable to patents can be deleted or patents can be expressly excluded from the definition of “Intellectual Property.” The Model Agreement also permits the parties to list property (either by class or item-by-item) that is to be excluded from the collateral package.
1.2.6. Strict Representations and Covenants
The Model Agreement’s representations and warranties, scheduling obligations, and covenants are relatively strict, with few limitations. The result is a document that appears to read more favorably to the lender than the borrower, in the sense that the borrower will be more likely to breach a representation or covenant due to the absence of “wiggle room.” The Task Force took this approach for instructional purposes because it allows the Model Agreement to present straightforward provisions that highlight the issue being addressed, un-cluttered by qualifications. The first draft in a loan transaction is likely to favor the lender in any event, because counsel for the lender generally drafts the loan agreement. The Model Agreement includes footnotes explaining how and when a borrower may want to delete particular provisions, or modify them to include materiality, knowledge, or other limitations.
2. Intellectual Property—Basic Concepts and Terminology
2.1. Overview
2.1.1. IP Assets
“Intellectual property” is a catchall term for various types of intangible rights recognized under federal, state, or foreign law. Different types of intellectual property are created and obtained in different ways, have different characteristics, and are subject to different laws.
The most common types of U.S. statutory intellectual property are copyrights, patents, and trademarks. Copyrights protect works of creative expression such as novels, motion pictures, music, or artworks; patents protect inventions; and trademarks and service marks protect the exclusive rights to use names, images, or slogans to identify products and services. Although trade secrets are not separately protected by statute, they also constitute intellectual property and can take many forms (such as customer lists, recipes, or production know-how). Some types of intellectual property are specialized, in that they pertain only to particular industries or particular assets, and may be subject to different or additional requirements. Such specialized types of intellectual property are not excluded from the granting language and are thus included in the collateral package, but for simplicity the Model Agreement does not contain any special representations or covenants for those assets or the industries in which they are used. Sections 2.2 to 2.6 below briefly summarize some of the basic characteristics of different types of intellectual property.
2.1.2. United States vs. Foreign Intellectual Property
Intellectual property rights are territorial and protected on a country-by-country basis. U.S. patents, for example, are issued by the United States Patent and Trademark Office (PTO) and provide the right to exclude others from practicing the invention claimed in the patent in the United States only. Companies with worldwide businesses often have large IP portfolios consisting of registrations in multiple countries. U.S. companies can file for IP registrations in foreign IP filing offices and foreign corporations can register intellectual property in the United States. Local counsel is generally engaged to prosecute IP filings outside an applicant’s home jurisdiction.
2.1.3. Registered vs. Unregistered Intellectual Property
Copyrights and trademarks can be registered or unregistered. (U.S. patents can only arise upon issuance by the PTO.) Copyright protection arises automatically when the copyrightable work is fixed in a tangible medium of expression, but copyrights can be registered in the United States Copyright Office. Trademarks may also arise under common law through use of the mark in commerce. In the United States, trademarks can be registered nationally in the PTO or locally in most states, usually through the secretary of state’s office.
While IP rights can exist in unregistered copyrights and trademarks, registration provides certain legal advantages, and registered intellectual property is often perceived as more valuable. (The benefits of registering copyrights and trademarks are discussed in sections 2.2.3 and 2.4.3 below.)
2.1.4. Value of Intellectual Property
IP rights tend to be integral to the particular business in which they are used. Accordingly, their value apart from the business as a whole can be difficult to calculate. For these reasons, intellectual property may not be assigned much value in determining how much debt a company’s assets can support. Nevertheless, it is risky for a lender to leave intellectual property outside the collateral package if it hopes to sell the debtor’s business as a going concern in the event of a foreclosure.
2.2. Copyrights
2.2.1. What Law Governs?
The genesis of copyright law in the United States is Article 1, Section 8 of the U.S. Constitution, which provides that “Congress shall have the power … [t]o promote the Progress of Science and Useful Arts, by securing for limited times to Authors and Inventors, the Exclusive Right to their respective Writing and Discoveries.” Copyright protection is provided under the U.S. Copyright Act.
2.2.2. What Is a Copyright?
Copyrights apply to original works of authorship fixed in a tangible medium of expression, including works of poetry and prose, motion pictures, musical compositions, sound recordings, paintings, drawings, sculptures, photographs, computer software, and other works. Copyright protects only the expression of an idea, and not the idea itself. For that reason, there can be many ways of expressing the story of star-crossed lovers from feuding factions, i.e., the overall plot line of Romeo and Juliet, without infringing the copyright in Shakespeare’s play (even if his copyright were still in force).
A copyright holder has the exclusive right to:
reproduce the copyrighted work;
prepare derivative works based upon the copyrighted work;
distribute copies of the copyrighted work; and
display or perform the copyrighted work publicly.
A copyright arises in favor of a human author unless it is a “work for hire.” Works for hire include works prepared by an employee in the course of his or her employment and certain works prepared on commission or special order. The hiring or commissioning party is considered the author of a work for hire. Most standard form employment agreements state that copyrightable works created by the employee in the scope of employment are works for hire and, as a back-up, also contractually obligate the employee to assign to the employer the copyright in all such works.
2.2.3. Registration
Because a copyright automatically attaches to a work of authorship when the work is reduced to tangible form, it is not necessary for the work to be either published or registered with the Copyright Office. Generally, however, registration of the copyright is a prerequisite to the right to sue for infringement.
Remedies for infringement of copyright include actual damages, statutory damages, attorney’s fees, injunction against infringement, recovery of the infringer’s profits, and seizure of copies. In general, statutory damages and attorney’s fees are available only for infringements occurring after the copyright is registered.
2.2.4. Assignment and Transfer
The ownership of a copyright may be transferred, in whole or in part, by any means of conveyance or by operation of law, and may be bequeathed by will or pass under the applicable laws of intestate succession. A written instrument or memorandum of the transfer must be duly signed by the transferor, unless own-ership is transferred by operation of law. A signed transfer instrument may be recorded in the Copyright Office. If the copyright has been registered and the transfer instrument identifies the work by title or registration number so that, after the document is indexed, it would be revealed by a reasonable search under the title or registration number, the recorded document will give all persons constructive notice of the facts stated therein. Any “assignment, mortgage, exclusive license” or other “conveyance, alienation, or hypothecation” of a copyright (or any of the exclusive rights comprised in a copyright) is a “transfer of copyright ownership” as defined in the Copyright Act and will be subject to these transfer and recording provisions.
The Copyright Act provides that a “transfer of copyright ownership” will “prevail” over a later conflicting transfer if the first transfer is properly recorded in the Copyright Office (i) within one month after the effective date of the transfer (or within two months if the transfer is executed outside the United States) and (ii) at any time before the later transfer is recorded. Otherwise, the later transfer will prevail, if it is properly recorded and if the later transferee takes its copyright interest in good faith, for valuable consideration (or for a binding promise to pay royalties), and without notice of the first transfer.
2.2.5. Duration
Copyrights have a limited, albeit lengthy, duration. The copyright term depends on several factors, including when the work was first published or renewed. No renewal or maintenance payments are necessary to keep a copyright (or registration) in force for its full term.
The author of a copyrighted work (other than a work for hire) who has transferred or licensed the copyright on or after January 1, 1978, has the non-waivable right to terminate the transfer (i.e., to rescind the transaction) during the five-year period beginning thirty-five years after the transfer or license. This means that authors and their heirs retain a residual interest in their copyrights, even if they have sold them or granted long-term licenses. This right to recapture copyright ownership could override assignments, licenses, and liens previously granted by the author or the author’s heirs.
2.3. Patents
2.3.1. What Law Governs?
Patent protection, like copyright, traces its roots to Article 1, Section 8 of the U.S. Constitution. Today, the right to obtain and enforce patents is governed by the U.S. Patent Act. There is no state patent law or any common law patent rights.
2.3.2. What Is a Patent?
A patent is a right granted by the United States government permitting the inventor “to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States” for a limited time in exchange for public disclosure of the invention when the patent is granted. Patents provide a competitive advantage during their term; after the expiration of a patent, anyone is free to use the invention. Only a patentee (the original owner or a successor-in-title) can bring an action for infringement.
2.3.3. Obtaining a Patent
To obtain a patent, the inventor, or a person to whom the inventor has assigned (or is under an obligation to assign) the invention, files an application in the PTO. An inventor’s employer typically obtains and records a written assignment from the inventor in order to be recognized as the patent owner in the PTO.
A patent application must contain the information necessary for the PTO examiner to determine if the invention is eligible for a patent. Patent examinations are notoriously rigorous and patents can take years to issue. The attorney for the applicant “prosecutes” the patent application by responding to the PTO examiner’s concerns and modifying the scope of the patent application until the PTO examiner is satisfied. During this “patent prosecution” process, the breadth of the invention initially described in a patent application is often narrowed in order to accommodate the examiner’s concerns. If and when the examiner determines that the invention as then described meets all the requirements, the application is approved and the patent issued.
An application for a patent is generally kept in confidence by the PTO for eighteen months after its filing date. Once a patent is issued, the invention is publicly available and will no longer be protectable as a trade secret.
2.3.4. Assignment and Transfer
A patent, patent application, or other interest in a patent can be assigned by a written instrument, and a patentee, applicant, or assignee may grant or convey all or part of its rights under the patent or application. Any such “assignment, grant, or conveyance” of patent rights will be void as against any subsequent purchaser or mortgagee for a valuable consideration, without notice, unless it is recorded in the PTO within three months from its date or before the subsequent purchase or mortgage.
2.3.5. Duration
A patent is generally valid for 20 years from its application date. Maintenance payments are due periodically (at 3.5, 7.5, and 11.5 years after the issuance date) in order to continue the patent in force. The validity of the patent can be challenged by third parties at any time by bringing an inter partes review in the PTO.
2.4. Trademarks
2.4.1. What Law Governs?
Trademarks are protected under U.S. federal law, common law in most states, statutes in some states, and international law. The federal law is the Lanham Act (also referred to as the Trademark Act).
2.4.2. What Is a Trademark?
Trademarks are words, phrases, symbols, designs, or a combination thereof that identify and distinguish the source of one party’s goods from those of others. A trademark used in connection with services, rather than goods, is sometimes referred to as a “service mark,” and each may be referred to as a “mark.” Trademark law protects consumers by making it easier to recognize a particular business, product, or service. Trademark law also protects the trademark owner’s valuable property rights in the mark and the goodwill associated with the consumer’s recognition of the mark.
In the United States, trademarks can be registered if they are used in commerce. However, a company can reserve a trademark before actually offering products under that mark by filing an application to register it in the PTO on the basis of a bona fide “intent to use” the mark. The mark must then be put into commercial use in interstate commerce within three years from the examiner’s approval of the application.
2.4.3. Registration
Registration is not required for trademark rights to attach to a mark that is used in connection with a business, product, or service. Registration of a trademark in the PTO does, however, provide important advantages:
constructive notice of a claim of ownership of the mark;
a legal presumption of ownership of the mark and therefore the exclusive right to use the mark nationwide on or in connection with the goods/services listed in the registration;
the ability to bring an action concerning the mark in federal court;
the use of the U.S. registration as a basis to obtain registration in foreign countries;
the ability to record the U.S. registration with the U.S. Customs and Border Protection Service to prevent importation of infringing foreign goods;
the right to use the federal registration symbol ®; and
listing in the PTO’s online databases.
2.4.4. Assignment and Transfer
A registered trademark can be assigned, but only along with the goodwill of the business in which the trademark is used (or with the goodwill of the part of the business connected with the use of and symbolized by the trademark). A trademark for which an application to register has been filed can be assigned in the same way, except that an “intent to use” (ITU) application can only be assigned to a successor to the applicant’s ongoing and existing business (or relevant part of that business) to which the trademark pertains. The assignment must be in a signed writing and contain the information required by the PTO. An assignment will be void against a subsequent purchaser for valuable consideration, without notice, unless the assignment (including the required information) is recorded in the PTO within three months after the date of the assignment or before the subsequent purchase.
Patent and trademark assignees may be subject to laws in addition to the recording provisions of the Patent Act or Lanham (Trademark) Act; for example, a new trademark owner may be subject to a license granted by the previous trademark owner, even if the license is not recorded and the new owner has no knowledge of the preexisting license.
2.4.5. Duration
Trademark registration can theoretically remain effective as long as use of the mark continues in connection with the products and services claimed in the registration, periodic affidavits and declarations are filed when required, and the trademark is not “abandoned.” A trademark can become abandoned if it is not used, and a federally registered trademark may be presumed to be abandoned after three consecutive years of non-use. Trademark protection can also be lost if the trademark owner engages in “naked licensing” (i.e., not adequately monitoring the use of the mark by its licensees) or fails to take adequate steps to prevent unauthorized use by others. For example, because the owners of the marks “aspirin” and “escalator” did not take steps to protect against infringements, the names ultimately became generic terms available for anyone to use.
2.5. Trade Secrets
2.5.1. What Law Governs?
Trade secrets have traditionally been protected and enforced under state law. Virtually all states have adopted the Uniform Trade Secrets Act (U.T.S.A.) and many courts still refer to guidance under section 757 of the original Restatement of Torts or section 39 of the Restatement of Unfair Competition. As of May 11, 2016, federal law recognizes a cause of action for misappropriation of trade secrets under the Defend Trade Secrets Act of 2016 (D.T.S.A.). While virtually all states have adopted a variation of the Uniform Trade Secrets Act (U.T.S.A.), many courts still refer to guidance under section 757 of the original Restatement of Torts or section 39 of the Restatement of Unfair Competition.
2.5.2. What Is a Trade Secret?
Trade secrets are defined in the U.T.S.A. as information that derives independent value from not being generally known or readily ascertainable by proper means by others (the novelty test) and that is the subject of reasonable efforts to maintain its secrecy (the secrecy test). If both tests are met, information such as formulas, patterns, programs, methods, devices, techniques, and processes are cited by the U.T.S.A. as potential trade secrets. Often information that would not qualify as a true trade secret because it fails to satisfy the novelty or secrecy test can be protected by contractual non-disclosure agreements or covenants not to compete from employees (if permitted under applicable state law).
Unlike a patent, which permits the owner to exclude others from using the patented information, ownership of a trade secret does not prevent the independent development of the same information by others. Accordingly, a trade secret is only protected against “misappropriation”—the acquisition of a trade secret by “improper means,” such as industrial espionage, breach of a confidentiality agreement, or theft by an employee. The U.T.S.A. does not, however, expressly prohibit a company’s competitor from analyzing or reverse-engineering the company’s product or process in order to use it in the competitor’s own business; reverse engineering by itself is not considered improper means. If a trade secret is incorporated into a product that will be publicly used or distributed, the owner may consider protecting it under patent law (if possible) rather than attempting to claim it as a trade secret.
2.5.3. Maintaining a Trade Secret
Trade secrets cannot be protected by filing or registering them in any state or federal jurisdiction. Rather, the owner of a trade secret must take reasonable steps to maintain the secrecy of the information. In certain cases, those steps may include limiting access to the information to only those employees who have a need to know the information in the course and scope of their work, providing locks and other physical security to the location at which the information is held, or obtaining confidentiality agreements from vendors or contractors who must use the trade secret in performing services for the owner. Additionally, the owner of a trade secret may sue to enjoin another from revealing or utilizing its trade secrets. Under the U.T.S.A. as adopted in most states, in an appropriate case the owner would be entitled to enjoin the use or distribution of the trade secret and would also be able to recover damages for misappropriation.
2.5.4. Duration
A trade secret will last as long as the owner is able to maintain the secrecy of the information so that it does not become lawfully available to the public.
2.6. Domain Names
2.6.1. What Law Governs?
Ownership of domain names is governed by state common law. The use of domain names and websites may be subject to regulation under federal law, however, as well as rules established by international organizations, such as the Internet Corporation for Assigned Names and Numbers (ICANN).
2.6.2. What Is a Domain Name?
A domain name is a part of the address of a website on the internet that helps a user to access the site. The complete address, including the domain name, is known as a URL, for Uniform Resource Locator. The domain name is the part of the address consisting of a single word, followed by a period and a short alphabetical indicator known as a top-level domain. For example, americanbar.org is a domain name and org is the top-level domain. Every computer or device on the internet has a unique internet address, consisting of a string of numbers, that allows it to connect with others. The domain name system allows more comprehensible letters and words to be associated with the numeric internet addresses. The creation, registration, and use of a domain name, along with the operation and maintenance of the website, generally involves an interlocking set of contracts among the owner, the domain name registrar, internet service providers, network operators, and the like.
2.6.3. Registration
Domain names are registered with one of several registrars recognized by ICANN, and the registration can be transferred from one registrar to another. Most courts have considered a registered domain name to constitute intangible personal property, although a few have held that domain names are contractual rights. The owner of a domain name may also have trademark rights in the name if it is used in marketing the owner’s business.
2.6.4. Duration
Registration is effective for the period provided in the registrar’s contract for services. Ten years is a common period, and renewal is generally permitted.
3. U.C.C. Article 9—Basic Concepts and Terminology
3.1. Overview
The U.C.C. as a whole is generally intended to simplify, clarify, and modernize the law governing various kinds of commercial transactions and to make that law uniform among the various jurisdictions. One of the ways that U.C.C. Article 9 simplified commercial finance transactions was by collecting and consolidating various traditional but somewhat uncertain methods of using personal property as security. The term “security interest” was created as a generic replacement for all those common law arrangements, including chattel mortgages, installment sales, title retention, conditional assignments, collateral assignments, and the like. Since its creation in the mid-twentieth century, Article 9 has been revised several times to maintain its modern outlook, and was comprehensively revised in 2001.
In reality, Article 9 is quite complex, not necessarily uniform, and definitely not simple. The following is a brief overview of the Article 9 concepts that are most relevant in discussing issues affecting the use of IP assets (especially federally registered intellectual property) as collateral.
Like the federal IP legal systems, U.C.C. Article 9 has its own terminology; both the differences and the unintended similarities can cause confusion when IP interests are used as collateral.
3.2. Security Interests
Under Article 9, a debtor enters into a security agreement that grants a security interest in personal property collateral to a secured party, generally to secure the payment or performance of an obligation of the debtor to the secured party. Article 9 honors substance over form; any transaction creating a security interest (regardless of how the interest may be described) is subject to Article 9 unless excepted.
3.3. Attachment and Title
A security interest attaches to, and becomes enforceable against, whatever rights the debtor has in the collateral described in a signed security agreement once value has been given; the title to the collateral is not necessarily determinative. The security agreement must reasonably identify the collateral, but in most cases does not need to be specific, and can even use the collateral types defined in Article 9 (accounts, goods, general intangibles, inventory, etc.) The security agreement can cover collateral acquired later by the debtor. For example, the description of the collateral in the security agreement can be as general as “all present and future copyrights” of the debtor.
3.4. Perfection
The secured party perfects its security interest in most kinds of collateral under Article 9 by filing an appropriate financing statement in the appropriate filing office in the applicable state or other jurisdiction determined under Article 9’s governing law rules. Perfection helps protect the secured party’s rights in the collateral against claims by other creditors. A financing statement must contain the names of the debtor and the secured party and must “indicate” the collateral. In almost all cases, the financing statement need not describe the collateral specifically, and can even indicate only that the collateral consists of all the debtor’s personal property (an “all-assets” filing). If authorized by the debtor, the financing statement can be filed before the security interest is created. Financing statements are indexed by the name of the debtor, not the nature or type of collateral; potential creditors need only search under the debtor’s name to find any financing statements filed with respect to the debtor’s personal property.
3.5. After-Acquired Collateral
A filed financing statement is effective against the indicated collateral at the time the security interest attaches to the collateral, even if attachment comes after the financing statement is filed. This means that a secured party can file a single financing statement covering present and future items of collateral, without having to refile or specifically describe after-acquired property. For example, if a security agreement covers the debtor’s interests in all present and future patents, and the financing statement indicates “all patents” as the collateral, then the security interest will be enforceable against (i.e., will attach to) the debtor’s rights in both those patents existing when the security agreement is signed and any patents issued after that date, even if the invention is created and the patent granted after the financing statement is filed.
3.6. Priority
Article 9 has extensive rules to determine which creditors have priority—that is, the right to satisfy their obligations out of the collateral before other creditors. The priority rules depend on many factors, including the type of collateral, method of perfection, and the nature of the transaction. Generally, however, and subject to several exceptions and conditions:
A security interest has priority over a general unsecured claim.
A perfected security interest has priority over an unperfected security interest.
A perfected security interest has priority over the claims of a person (including a bankruptcy trustee) who becomes a lien creditor after the security interest is perfected.
A perfected security interest has priority over a later-perfected security interest.
The most prominent exceptions to these rules are:
A secured party who finances the debtor’s acquisition of some kinds of tangible property or software may, by following certain procedures, have priority as to that property over an earlier-perfected security interest.
Third parties acquiring collateral subject to an existing security interest, including a buyer of goods in the ordinary course of business and a “licensee in the ordinary course of business,” may take the collateral free of the security interest in certain circumstances.
3.7. Override of Anti-Assignment Clauses
Article 9 overrides certain contractual restrictions on a debtor’s ability to use certain intangible property as collateral. Many contracts contain “anti-assignment” provisions that prohibit a party from “assigning” its contract rights to a third party without the other party’s consent, and provisions of state or federal law may prohibit “assignment” of governmental permits or licenses without the consent of the governmental authority. Such provisions often do not clearly distinguish between a party’s absolutely assigning away its rights under contracts or permits and merely granting a security interest in those rights.
Article 9 facilitates a debtor’s ability to pledge these intangible assets by making certain anti-assignment provisions included in contracts or created by law ineffective to prevent the creation, attachment, perfection, or, in some cases, enforcement of a security interest in these assets.
The extent to which Article 9 overrides an anti-assignment clause depends in part on the nature of the collateral. If the collateral is a right to payment from a third party (an “account” or “payment intangible”), an anti-assignment provision is ineffective to prevent a secured party taking a security interest in those rights and, in some circumstances, collecting payments in place of the debtor after default.
For collateral consisting of “general intangibles” (a catch-all category of intangible assets that would include copyrights, patents, trademarks, software, IP licenses, and some other forms of intellectual property), the secured party can take a security interest in the debtor’s rights in the general intangibles, despite an anti-assignment clause, but the secured party’s enforcement rights will be significantly limited. Generally, without consent from the other party to the contract:
The secured party cannot enforce the security interest against the other party;
The other party does not assume any duty to the secured party;
The other party does not have to recognize the security interest, render performance to the secured party, or accept performance by the secured party; and
The secured party may not use or assign the debtor’s rights under the contract.
3.8. Enforcement
Under Article 9, after default, a secured party may sell, lease, license, or otherwise dispose of collateral, subject to certain conditions. The disposition can be private or public, but every aspect of the disposition must be commercially reasonable. While the requirement of commercial reasonableness cannot be waived, the security agreement may set the standards by which commercial reasonableness will be measured, provided that the standards are not themselves manifestly unreasonable.
The secured party generally cannot purchase the collateral at a private sale, and it cannot simply take or keep the collateral to satisfy the secured debt without satisfying certain conditions, including the debtor’s written consent after the default.
The secured party may also collect amounts payable on the collateral and enforce the debtor’s rights under contracts included in the collateral. The se cured party’s rights to enforce a contract against the other party will generally be subject to the other party’s defenses and rights of setoff against the debtor, and it may be further restricted if the contract prohibits assignment by the debtor.