Negotiated Data Solutions LLC; Analysis of Proposed Consent Order to Aid Public Comment, 5846-5855 [E8-1801]

Download as PDF rwilkins on PROD1PC63 with NOTICES 5846 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices Form No.: FCC Form 731. Type of Review: Revision of a currently approved collection. Respondents: Business or other forprofit. Number of Respondents: 600 respondents; 10,000 responses. Estimated Time per Response: 25 hours. Frequency of Response: On occasion reporting requirement and third party disclosure requirement. Obligation to Respond: Required to obtain or retain benefits. Total Annual Burden: 250,000 hours. Total Annual Cost: $11,017,500. Privacy Act Impact Assessment: N/A. Nature and Extent of Confidentiality: Minimal exemption from the Freedom of Information Act (FOIA) under 5 U.S.C. 552(b)(4) and FCC rules under 47 CFR 0.457(d) is granted for trade secrets which may be submitted as attachments to the application FCC Form 731. No other assurances of confidentiality are provided to respondents. Needs and Uses: The Commission will submit this information collection to the OMB as a revision during this comment period to obtain the full threeyear clearance from them. There is an increase in the number of responses, burden hours and annual costs due recalculations of the burden estimates. On April 23, 2007, the FCC adopted and released a Second Report and Order, FCC 07–56, ET Docket No. 03– 201 that modified Parts 2 and 15 of the Commission’s rules for equipment approval and unlicensed devices. The amended rules provide for more efficient equipment authorization of both existing modular transmitter devices and emerging partitioned (or ‘‘split’’) modular transmitter devices. These rule changes will benefit manufacturers by allowing greater flexibility in certifying equipment and providing relief from the need to obtain a new equipment authorization each time the same transmitter is installed in a different final product. The rule changes will also enable manufacturers to develop more flexible and more advanced unlicensed transmitter technologies. To effectively implement the provisions of the new rules, various modifications to the existing FCC Form 731 are required. The changes are intended to simplify the filing process, however, there is no anticipated change in the per application burden for FCC Form 731 submittal. The following specific changes are proposed on the FCC Form 731 to accommodate modifications (revisions) and simplify filing processes: VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 (1) Modular Type field addition—a new required field will be added to Section 1 of the form entitled ‘‘Modular Type’’. (2) Equipment Authorization Waiver—a new field set requesting information on equipment authorization waivers will be added. The first question ‘‘Is there an equipment authorization waiver associated with this application?’’ will have a default value set to ‘‘No’’. If the user answers ‘‘Yes’’, a second question ‘‘* * * has the associated waiver been approved and all information uploaded?’’ requires a positive response. (3) FCC ID Related Fields—additional instances of the ‘‘Related FCC ID’’ field will be added, to allow the user to inform the FCC of more than one application associated with the current application. (4) Short-Term Confidentiality Modifications—Short Term Confidentiality questions will be modified to allow the applicant to request Short-Term Confidentiality on the FCC Form 731, and to request a Short-Term confidentiality date no greater than 180 days from the date of Grant. (5) Knowledge Data Base (KDB) Associated Question—a new field group will be added to the form that captures KDB inquiry information related to the FCC Form 731 application filing. The applicant will be asked ‘‘Is there a KDB inquiry associated with this application?’’ The default response is ‘‘No’’, and if the applicant responds ‘‘Yes’’, the user will be required to enter a valid KDB inquiry tracking number. In addition to the changes to the FCC Form 731 which are necessary to implement the requirements of the new rules, an increase in the burden hours is requested in anticipation of a continuing increase of the greater than 10% annually in the number of applications requiring equipment authorization. This 10% increase is reflected in application submittals directly to the FCC, and to Telecommunications Certification Bodies (TCBs) that act on behalf of the FCC to review application submittals and issue equipment authorization grants. The Commission will use the information gathered on the FCC Form 731 to determine compliance of the proposed equipment with the Commission’s rules. Following authorization of the equipment for marketing by either the FCC or the TCB on behalf of the FCC, the information may also be used to determine: (a) Whether the operation of the equipment is consistent with the PO 00000 Frm 00058 Fmt 4703 Sfmt 4703 information supplied at the time of authorization, and (b) whether the equipment marketed complies with the terms of the equipment authorization. Federal Communications Commission. Marlene H. Dortch, Secretary. [FR Doc. E8–1791 Filed 1–30–08; 8:45 am] BILLING CODE 6712–01–P FEDERAL TRADE COMMISSION [File No. 051 0094] Negotiated Data Solutions LLC; Analysis of Proposed Consent Order to Aid Public Comment Federal Trade Commission. Proposed Consent Agreement. AGENCY: ACTION: SUMMARY: The consent agreement in this matter settles alleged violations of federal law prohibiting unfair or deceptive acts or practices or unfair methods of competition. The attached Analysis to Aid Public Comment describes both the allegations in the draft complaint and the terms of the consent order—embodied in the consent agreement—that would settle these allegations. Comments must be received on or before February 22, 2008. ADDRESSES: Interested parties are invited to submit written comments. Comments should refer to ‘‘Negotiated Data Solutions, File No. 051 0094,’’ to facilitate the organization of comments. A comment filed in paper form should include this reference both in the text and on the envelope, and should be mailed or delivered to the following address: Federal Trade Commission/ Office of the Secretary, Room 135-H (Annex D), Pennsylvania Avenue, NW, Washington, D.C. 20580. Comments containing confidential material must be filed in paper form, must be clearly labeled ‘‘Confidential,’’ and must comply with Commission Rule 4.9(c). 16 CFR 4.9(c) (2005).1 The FTC is requesting that any comment filed in paper form be sent by courier or overnight service, if possible, because U.S. postal mail in the Washington area and at the Commission is subject to delay due to heightened security DATES: 1 The comment must be accompanied by an explicit request for confidential treatment, including the factual and legal basis for the request, and must identify the specific portions of the comment to be withheld from the public record. The request will be granted or denied by the Commission’s General Counsel, consistent with applicable law and the public interest. See Commission Rule 4.9(c), 16 CFR 4.9(c). E:\FR\FM\31JAN1.SGM 31JAN1 rwilkins on PROD1PC63 with NOTICES Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices precautions. Comments that do not contain any nonpublic information may instead be filed in electronic form by following the instructions on the webbased form at https:// secure.commentworks.com/ftcNegotiatedDataSolutions. To ensure that the Commission considers an electronic comment, you must file it on that webbased form. The FTC Act and other laws the Commission administers permit the collection of public comments to consider and use in this proceeding as appropriate. All timely and responsive public comments, whether filed in paper or electronic form, will be considered by the Commission, and will be available to the public on the FTC website, to the extent practicable, at www.ftc.gov. As a matter of discretion, the FTC makes every effort to remove home contact information for individuals from the public comments it receives before placing those comments on the FTC website. More information, including routine uses permitted by the Privacy Act, may be found in the FTC’s privacy policy, at https://www.ftc.gov/ ftc/privacy.htm. FOR FURTHER INFORMATION CONTACT: Kent E. Cox (202) 326-2058, Bureau of Competition, Room NJ-6213, 600 Pennsylvania Avenue, NW, Washington, D.C. 20580. SUPPLEMENTARY INFORMATION: Pursuant to section 6(f) of the Federal Trade Commission Act, 38 Stat. 721, 15 U.S.C. 46(f), and § 2.34 of the Commission Rules of Practice, 16 CFR 2.34, notice is hereby given that the above-captioned consent agreement containing a consent order to cease and desist, having been filed with and accepted, subject to final approval, by the Commission, has been placed on the public record for a period of thirty (30) days. The following Analysis to Aid Public Comment describes the terms of the consent agreement, and the allegations in the complaint. An electronic copy of the full text of the consent agreement package can be obtained from the FTC Home Page (for January 23, 2008), on the World Wide Web, at https:// www.ftc.gov/os/2008/01/index.htm. A paper copy can be obtained from the FTC Public Reference Room, Room 130H, 600 Pennsylvania Avenue, N.W., Washington, D.C. 20580, either in person or by calling (202) 326-2222. Public comments are invited, and may be filed with the Commission in either paper or electronic form. All comments should be filed as prescribed in the ADDRESSES section above, and must be received on or before the date specified in the DATES section. VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 Analysis of Agreement Containing Consent Order to Aid Public Comment The Federal Trade Commission (‘‘Commission’’) has accepted, subject to final approval, an Agreement Containing Consent Order (‘‘Agreement’’) with Negotiated Data Solutions LLC (‘‘N-Data’’), a limited liability company whose sole activity is to collect royalties in connection with a number of patents. The Agreement settles allegations that N-Data has violated Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45, by engaging in unfair methods of competition and unfair acts or practices relating to the Ethernet standard for local area networks. Pursuant to the Agreement, N-Data has agreed to be bound by a proposed consent order (‘‘Proposed Consent Order’’). The Proposed Consent Order has been placed on the public record for thirty (30) days for comments by interested persons. Comments received during this period will become part of the public record. After thirty (30) days, the Commission will again review the Agreement and the comments received and will decide whether it should withdraw from the Agreement or make final the Agreement’s Proposed Consent Order. The purpose of this analysis is to facilitate comment on the Proposed Consent Order. This analysis does not constitute an official interpretation of the Proposed Consent Order, and does not modify its terms in any way. The Agreement has been entered into for settlement purposes only, and does not constitute an admission by N-Data that the law has been violated as alleged or that the facts alleged, other than jurisdictional facts, are true. Background The Institute of Electrical and Electronics Engineers (‘‘IEEE’’) is a standard-setting organization active in a number of different industries. IEEE standards often enhance the interoperability of communications products. One important example, which is at issue here, is the 802 series of networking standards. Many of the standards in the 802 series allow users to reliably access and share information over communications systems by interconnecting many compatible products manufactured by different producers. The IEEE 802.3 standard, first published in 1983, and commonly referred to as ‘‘Ethernet,’’ applies to local area networks (‘‘LANs’’) built on copper, and more recently fiber optic, cables. That standard initially PO 00000 Frm 00059 Fmt 4703 Sfmt 4703 5847 accommodated a maximum data transmission rate of 10 megabits per second (10 Mbps) between networked devices. By 1994, the 802.3 Working Group was developing a new 802.3 standard for ‘‘Fast Ethernet,’’ which would transmit data across a copper wire at 100 Mbps. The Working Group determined that it would be desirable for Fast Ethernet equipment to be compatible, to the extent possible, with existing LAN equipment and with future generations of equipment. A technology, variously known as ‘‘autodetection’’ and ‘‘autonegotiation,’’ was developed that would permit such compatibility. Employees of National Semiconductor Corporation (‘‘National’’) were members and active participants in the 802.3 Working Group. In 1994, National proposed that the 802.3 Working Group adopt its autonegotiation technology, referred to as ‘‘NWay,’’ into the Fast Ethernet standard. At the time, National disclosed to the Working Group that it had already filed for patent protection for the technology. Several other participants also had developed competing technologies and the Working Group considered several alternatives, each having advantages and disadvantages compared to NWay. The 802.3 Working Group also considered adopting the Fast Ethernet standard without any autonegotiation feature. At IEEE meetings to determine which autonegotiation technology to include in 802.3, one or more representatives of National publicly announced that if NWay technology were chosen, National would license NWay to any requesting party for a one-time fee of $1,000. In a subsequent letter dated June 7, 1994, and addressed to the Chair of the 802.3 Working Group of IEEE, National wrote: In the event that the IEEE adopts an autodetection standard based upon National’s NWay technology, National will offer to license its NWay technology to any requesting party for the purpose of making and selling products which implement the IEEE standard. Such a license will be made available on a nondiscriminatory basis and will be paid-up and royalty-free after payment of a one-time fee of one thousand dollars ($1,000). Based on National’s licensing assurance, and following its normal balloting and voting procedures, IEEE incorporated NWay technology into the Fast Ethernet standard, which IEEE published in final form in July 1995. To maintain compatibility with the installed base of Ethernet and Fast Ethernet equipment, subsequent revisions of the 802.3 standard also have E:\FR\FM\31JAN1.SGM 31JAN1 rwilkins on PROD1PC63 with NOTICES 5848 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices incorporated NWay autonegotiation technology. The ‘‘Fast Ethernet’’ standard became the dominant standard for LANs, and users are now locked in to using NWay technology due to network effects and high switching costs. Therefore, today, autonegotiation technologies other than NWay are not attractive alternatives to NWay for manufacturers who want to include inter-generational compatibility in their Ethernet products. NWay contributed to the success of Fast Ethernet technology in the marketplace. An installed base of millions of Ethernet ports operating at 10 Mbps already existed when IEEE published the Fast Ethernet standard. The autonegotiation technology in the Fast Ethernet standard allowed owners of existing Ethernet-based LANs to purchase and install multi-speed, Fast Ethernet-capable equipment on a piecemeal basis without having to upgrade the entire LAN at once or buy extra equipment to ensure compatibility. National benefitted financially from its licensing assurance. The assurance accelerated sales of National products that conformed to the Fast Ethernet standard by first, allaying concerns about the future costs of autonegotiation, and so speeding completion of the standard, and second, making Fast Ethernet-compatible products backward compatible with Ethernet equipment already installed on existing LANs, increasing the demand for Fast Ethernet products by those with existing systems. In 1997, the United States Patent and Trademark Office issued U.S. Patent Nos. 5,617,418 and 5,687,174 (the ’418 and ’174 Patents) to National. Both patents arose from the patent application that National disclosed to the IEEE in 1994. National later received equivalent patents in other countries. In 1998, National assigned a number of patents, including the ’418 and the ’174 Patents, to Vertical Networks (‘‘Vertical’’), a telecommunications startup company founded by former National employees. Before the assignment, National gave Vertical a copy of the June 7, 1994 letter to the 802.3 Working Group. Vertical’s outside patent counsel, Mr. Alan Loudermilk, acknowledged in writing that National had informed him ‘‘that several of the patents may be ‘encumbered’’’ by actions National had taken with respect to the IEEE standards. The final agreement between Vertical and National stated that the assignment was ‘‘subject to any existing licenses that [National] may have granted.’’ It further provided, ‘‘Existing licenses shall VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 include . . . [p]atents that may be encumbered under standards such as an IEEE standard ... ’’ In 2001, Vertical turned to its intellectual property portfolio in an effort to generate new revenues by licensing its technology to third parties. One aspect of this strategy was Vertical’s effort to repudiate the $1,000 licensing term contained in National’s 1994 letter of assurance to the IEEE. On March 27, 2002, Vertical sent a letter to the IEEE that purported to ‘‘supersede’’ any previous licensing assurances provided by National. Vertical identified nine U.S. patents assigned to it by National, including the ’174 and ’418 patents, and promised to make available to any party a non-exclusive license ‘‘on a non-discriminatory basis and on reasonable terms and conditions including its then current royalty rates.’’ In the Spring of 2002, Vertical developed a list of ‘‘target companies’’ that practiced the IEEE 802.3 standard and which it believed infringed on the ‘174 and ‘418 patents. Vertical sought to enforce the new licensing terms on these companies. These companies, which included many large computer hardware manufacturers, represented a substantial majority of all producers of 802.3 ports. Vertical’s patent counsel, Mr. Loudermilk, sent letters to most of these companies between 2002 and 2004 offering a license for patents covering aspects of ‘‘the autonegotiation functionality’’ in networking products, including products compliant with IEEE 802.3. Vertical also filed suit against a number of companies alleging that ‘‘switches, hubs, routers, print servers, network adapters and networking kits’’ having autonegotiating compatibility, infringed its ’174 and ’418 patents. Vertical entered into several licensing agreements producing licensing fees far in excess of $1,000 from each licensed company. In late 2003, Vertical assigned some of its patent portfolio, including the ’174 and ’418 patents, to N-Data, a company owned and operated by Mr. Loudermilk.2 N-Data was aware of National’s June 7, 1994 letter of assurance to the IEEE when Vertical assigned those patents to N-Data. Yet it rejected requests from companies to license NWay technology for a one-time fee of $1,000. Instead, N-Data threatened to initiate, and in some cases prosecuted, legal actions against companies refusing to pay its royalty demands, which are far in excess of that amount. 2 Vertical subsequently sold its remaining business assets and ceased operations. PO 00000 Frm 00060 Fmt 4703 Sfmt 4703 The Proposed Complaint Vertical and N-Data sought to exploit the fact that NWay had been incorporated into the 802.3 standard, and had been adopted by the industry for a number of years, by reneging on a known commitment made by their predecessor in interest. Even if their actions do not constitute a violation of the Sherman Act, they threatened to raise prices for an entire industry and to subvert the IEEE decisional process in a manner that could cast doubt on the viability of developing standards at the IEEE and elsewhere. The threatened or actual effects of N-Data’s conduct have been to increase the cost of practicing the IEEE standards, and potentially to reduce output of products incorporating the standards.3 N-Data’s conduct also threatens to reduce the incentive for firms to participate in IEEE and in other standard-setting activities, and to rely on standards established by standardsetting organizations. The Proposed Complaint alleges that this conduct violates Section 5 of the FTC Act in two ways: first, N-Data engaged in an unfair method of competition; and second, N-Data engaged in an unfair act or practice. 1. Unfair Method of Competition N-Data’s conduct constitutes an unfair method of competition. The Supreme Court in FTC v. Sperry & Hutchinson Co. endorsed an expansive reading of the ‘‘unfair method of competition’’ prong of Section 5, stating that the Commission is empowered to ‘‘define and proscribe an unfair competitive practice, even though the practice does not infringe either the letter or spirit of the antitrust laws’’ and to ‘‘proscribe practices as unfair ... in their effect on competition.’’4 That description of the 3 The conduct by Vertical and N-Data has led to, or threatened to lead to, increased prices in the markets for autonegotiation technology (1) used in 802.3 compliant products and (2) used in products that implement an IEEE standard enabling autonegotiation with 802.3 compliant products. 4FTC v. Sperry & Hutchinson Co., 405 U.S. 233, 239 (1972); see also FTC v. Ind. Fed’n of Dentists, 476 U.S. 447, 454 (1986). See generally Concurring Opinion of Commissioner Jon Leibowitz, In re Rambus, Inc., Docket No. 9302, available at https://www.ftc.gov/os/adjpro/d9302/060802 rambusconcurringopinionofcommissioner leibowitz.pdf; Statement of Commissioner J. Thomas Rosch, ‘‘Perspectives on Three Recent Votes: the Closing of the Adelphia Communications Investigation, the Issuance of the Valassis Complaint & the Weyerhaeuser Amicus Brief,’’ before the National Economic Research Associates 2006 Antitrust & Trade Regulation Seminar, Santa Fe, New Mexico (July 6, 2006) at 5-12, available at https://www.ftc.gov/speeches/rosch/Rosch-NERASpeech-July6-2006.pdf. E:\FR\FM\31JAN1.SGM 31JAN1 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices rwilkins on PROD1PC63 with NOTICES scope of Section 5 accords with the legislative history of Section 5.5 Notwithstanding that broad description, the unfair method of competition prong of Section 5 is subject to limiting principles. The first relates to the nature of the conduct. In OAG, the Second Circuit held that such a violation could not be found where the respondent ‘‘does not act coercively.’’6 Similarly, in Ethyl the Second Circuit held that ‘‘at least some indicia of oppressiveness must exist ...’’7 This requirement is met here, given N-Data’s efforts to exploit the power it enjoys over those practicing the Fast Ethernet standard and lacking any practical alternatives. This form of patent hold-up is inherently ‘‘coercive’’ and ‘‘oppressive’’ with respect to firms that are, as a practical matter, locked into a standard. The second limiting principle relates to the effects of the conduct. Although the Supreme Court has made it clear that the respondent’s conduct need not violate the letter (or even the spirit) of the antitrust laws to fall under Section 5, that does not mean that conduct can be considered an unfair method of competition if it has no adverse effect at all on competition. That requirement, however, is also satisfied here, given the conduct’s adverse impact on prices for autonegotiation technology and the threat that such conduct poses to standard-setting at IEEE and elsewhere. Respondent’s conduct here is particularly appropriate for Section 5 review. IEEE’s determination to include National’s technology in its standard rested on National’s commitment to limit royalties to $1,000. That commitment had substantial competitive significance because it extended not to a single firm, but rather to an industry-wide standard-setting organization. Indeed, in the standardsetting context—with numerous, injured third parties who lack privity with patentees and with the mixed incentives generated when members may be positioned to pass on royalties that raise costs market-wide—contract remedies may prove ineffective, and Section 5 intervention may serve an unusually important role. N-Data’s conduct, if allowed, would reduce the value of standard-setting by raising the possibility of opportunistic 5See, e.g., Cong. Rec. 12,153 (1914) (statement of Sen. Robinson) (‘‘unjust, inequitable or dishonest competition’’ proscribed), 51 Cong. Rec. 12,154 (1914) (statement of Sen. Newlands) (conduct that is ‘‘contrary to good morals’’ proscribed). 6Official Airline Guides v. FTC, 630 F.2d 920, 927 (2d Cir. 1980) (‘‘OAG’’). 7E.I. Du Pont v. de Nemours & Co. v. FTC, 729 F.2d 128, 139-40 (2d Cir. 1984) (‘‘Ethyl’’). VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 lawsuits or threats arising from the incorporation of patented technologies into the standard after a commitment by the patent holder. As a result, firms may be less likely to rely on standards, even standards that already exist. In the creation of new standards, standardsetting organizations may seek to avoid intellectual property entirely, potentially reducing the technical merit of those standards as well as their ultimate value to consumers. A mere departure from a previous licensing commitment is unlikely to constitute an unfair method of competition under Section 5. The commitment here was in the context of standard-setting. The Supreme Court repeatedly has recognized the procompetitive potential of standardsetting activities. However, because a standard may displace the normal give and take of competition, the Court has not hesitated to impose antitrust liability on conduct that threatens to undermine the standard-setting process or to render it anticompetitive.8 The conduct of N-Data (and Vertical) at issue here clearly has that potential.9 2. Unfair Act or Practice N-Data’s efforts to unilaterally change the terms of the licensing commitment also constitute unfair acts or practices under Section 5 of the FTC Act. The FTC Act states that ‘‘unfair or deceptive acts or practices in or affecting commerce[] are . . . unlawful.’’ An unfairness claim under this part of Section 5 must meet the following statutory criteria: The Commission shall have no authority . . . to declare unlawful an act or practice on the grounds that such act or practice is unfair unless the act or practice causes or is likely to cause substantial injury to consumers which is not reasonably avoidable by consumers themselves and not outweighed by countervailing benefits to consumers or to competition.10 The Commission may consider established public policies as evidence to be considered with all other evidence, though not as a primary basis 8See Standard Sanitary Mfg. Co. v. United States, 226 U.S. 20, 41 (1912); Allied Tube & Conduit Corp. v. Indian Head, Inc., 486 U.S. 492, 500 (1989); Am. Soc’y of Mech. Engineers, Inc. v. Hydrolevel Corp., 456 U.S. 556, 571 (1982). 9 It is worth noting that, because the proposed complaint alleges stand-alone violations of Section 5 rather than violations of Section 5 that are premised on violations of the Sherman Act, this action is not likely to lead to well-founded treble damage antitrust claims in federal court. See Herbert Hovenkamp, Federal Antitrust Policy at 588 (2d ed. 1999). 10 15 U.S.C. § 45(n) (1992). PO 00000 Frm 00061 Fmt 4703 Sfmt 4703 5849 for a determination of unfairness.11 As the Eleventh Circuit emphasized in Orkin Exterminating Co. v. FTC,12 the Commission has applied limiting principles requiring a showing that (1) the conduct caused ‘‘substantial consumer injury,’’ (2) that injury is ‘‘not . . . outweighed by any countervailing benefits to consumers or competition that the practice produces,’’ and (3) it is an injury that ‘‘consumers themselves could not reasonably have avoided.’’13 This Section 5 claim against the efforts of Vertical and N-Data to unilaterally increase the price for the relevant technology by knowingly reneging on National’s commitment meets these statutory criteria, and thus constitutes a violation of Section 5’s prohibition of unfair acts and practices. NWay was chosen for the standard on the basis of the assurances made by National to the IEEE 802.3 Working Group. Further, the industry relied, at least indirectly, on National’s assurances regarding pricing, and made substantial and potentially irreversible investments premised on those representations. After the standard became successful, and it became difficult, if not impossible, for the industry to switch away from the standard, Vertical and then N-Data took advantage of the investments made by these firms by reneging on National’s commitment. Because it is now no longer feasible for the industry to remove the technologies, the value that N-Data was able to extract from market participants was due to the opportunistic nature of its conduct rather than the value of the patents.14 Accordingly, an action against this conduct meets the criteria set forth in the statute and in Orkin. First, N-Data’s reneging on its pricing commitments here involved ‘‘substantial consumer injury.’’ The increase in royalties demanded by Vertical Networks and later N-Data could result in millions of dollars in excess payments from those 11Id. 12Orkin Exterminating Co. v. FTC, 849 F.2d 1354, 1364 (11th Cir. 1988). 13See Letter from Federal Trade Commission to Senators Ford and Danforth (Dec. 17, 1980), reprinted in H.R. Rep. No. 156, Pt. 1, 98th Cong., 1st Sess. 33-40 (1983) available at https:// www.ftc.gov/bcp/policystmt/ad-unfair.htm, appended to the Commission’s decision in International Harvester, 104 F.T.C. at 949, 1061 (1984), and subsequently codified by Congress at 15 U.S.C. § 45(n). 14 The IEEE designed its rules to avoid just such a result. IEEE’s stated purpose for requesting letters of assurance was to avoid giving ‘‘undue preferred status to a company’’ and to ensure that the adoption of a technology would not be ‘‘prohibitively costly or noncompetitive to a substantial part of the industry.’’ 1994 IEEE Standards Operations Manual §6.3. E:\FR\FM\31JAN1.SGM 31JAN1 5850 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices rwilkins on PROD1PC63 with NOTICES practicing the standard, not to mention the legal fees those firms might spend defending lawsuits.15 In addition, often in market-wide standard-setting contexts, the licensees have an incentive to pass along higher costs to the ultimate consumers who purchase the products.16 Thus, these end consumers who purchase products using N-Data’s technology may face increased prices due to the higher royalties. Further, those demands also have no apparent ‘‘countervailing benefit’’— to those upon whom demands have been made, ultimate consumers, or to competition— so the second requirement is also met. With respect to the third requirement, both the Commission and the Eleventh Circuit in Orkin stated that consumers ‘‘may act to avoid injury before it occurs if they have reason to anticipate the impending harm and the means to avoid it, or they may seek to mitigate the damage afterward if they are aware of potential avenues to that end.’’17 Here, those who created the standard had no way to anticipate the repudiation of the price commitment before it occurred and, apart from expensive litigation, those locked into the standard had no way to avoid the threatened injury posed by the demands that they faced. Thus, those practicing the standard were locked in to even a greater extent than the consumers in Orkin. Put simply, this is a form of what has been described as ‘‘patent hold-up.’’ The facts alleged in the complaint here are similar to those found in the Commission’s decision in Orkin, which was affirmed by the Eleventh Circuit.18 In that case, the respondent signed contracts with consumers to supply lifetime extermination services at a fixed annual renewal fee. Years later, the respondent unilaterally increased these fees. Consumers needing extermination services had no reason to anticipate Orkin’s unilateral price increase and there was no evidence that 15 The Commission has a ‘‘longstanding position that the statutory prohibition against ‘unfair or deceptive acts or practices’ includes practices that victimize businesspersons as well as those who purchase products for their own personal or household use,’’ given that businesses ‘‘clearly do consume goods and services that may be marketed by means of deception and unfairness.’’ Brief of Federal Trade Commission as Amicus Curiae at 34, 8-9, Vermont v. International Collection Service, Inc., 594 A.2d 426 (Vt. 1991) (citing cases); see also, e.g., 16 C.F.R. § 436.1 (FTC rule protecting franchisees); United States Retail Credit Ass’n v. FTC, 300 F.2d 212 (4th Cir. 1962) (deception involving business clients); United States Ass’n of Credit Bureaus, Inc. v. FTC, 299 F.2d 220 (4th Cir. 1962) (same). 16 Susan A. Creighton, Cheap Exclusion, 72 ANTITRUST L.J. 975, 994 (2005). 17Orkin, 849 F.2d at 1365. 18In re Orkin Exterminating Co., 108 F.T.C. 263 (1986), aff’d, 849 F.2d 1354 (11th Cir. 1988). VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 they could contract with Orkin’s competitors on terms similar to Orkin’s initial terms. The Commission held, and the Eleventh Circuit agreed, that Orkin’s unilateral price increase was an unfair act or practice under Section 5. Similarly, National made non-expiring royalty commitments that Vertical and N-Data later repudiated with unilateral increases, which the industry could not have reasonably anticipated before the market wide adoption of the standard and which consumers had no chance of avoiding due to network effects and lock-in. Clearly, merely breaching a prior commitment is not enough to constitute an unfair act or practice under Section 5. The standard-setting context in which National made its commitment is critical to the legal analysis. As described above, the lock-in effect resulting from adoption of the NWay patent in the standard and its widespread use are important factors in this case. In addition, the established public policy of supporting efficient standard-setting activities is an important consideration in this case.19 Similarly, it must be stressed that not all breaches of commitments made by owners of intellectual property during a standard-setting process will constitute an unfair act or practice under Section 5. For example, if the commitment were immaterial to the adoption of the standard or if those practicing the standard could exercise countermeasures to avoid injury from the breach, the statutory requirements most likely would not be met. Finally, it needs to be emphasized that not all departures from those commitments will be treated as a breach. The Orkin court suggested that there might be a distinction between an open-ended commitment and a contract having a fixed duration.20 That distinction does not apply here because the context of the commitment made it plain that it was for the duration of National’s patents. However, most such commitments, including the one here, are simply to offer the terms specified. Indeed, those principles are reflected in the remedy set forth in the consent decree. The Proposed Consent Order The Proposed Consent Order prohibits N-Data from enforcing the Relevant Patents, defined in the order, unless it has first offered to license them on terms specified by the order. The 19See Allied Tube & Conduit Corp. v. Indian Head, Inc., 486 U.S. 492, 500-01 (1998) (regarding the potential procompetitive advantages of private associations promulgating safety standards). 20Orkin, 849 F.2d at 1361. PO 00000 Frm 00062 Fmt 4703 Sfmt 4703 terms of that license follow from those promised by National Semiconductor in its letter of June 7, 1994, to the IEEE. Specifically, N-Data must offer a paidup, royalty-free license to the Relevant Patents in the Licensed Field of Use in exchange for a one-time fee of $1,000. The form of this license is attached as Appendix C to the order. The Licensed Field of Use is defined in the license as the ‘‘use of NWay Technology to implement an IEEE Standard,’’ and this includes ‘‘optimization and enhancement features’’ that are consistent with such use. NWay Technology is defined in the license to have the same meaning as it did in the June 7, 1994 letter, and the license gives examples of documents describing the use of NWay Technology. The Commission recognizes that some firms may inadvertently allow the $1,000 offer from N-Data to languish. Therefore, if an offeree has failed to accept such an offer within 120 days, the Proposed Consent Order allows NData to sue to enforce the Relevant Patents. At the time N-Data files suit, however, it must make a second offer. This second offer provides a prospective licensee with an opportunity to accept the patent license specified by the order in return for a payment of thirty-five thousand dollars ($35,000). The requirement that the second offer be delivered in the context of litigation gives N-Data an incentive to pursue patent enforcement only against companies over which it has a reasonable likelihood of prevailing in court. It will also ensure that the second offer will receive the full attention of knowledgeable counsel for the offeree. A $35,000 license fee will offset some of N-Data’s costs of litigation, and it will discourage recipients of an initial offer from simply waiting to be sued, and then accepting the first offer. The offeree’s time to accept the second offer expires with the time to file a responsive pleading to the filing that accompanies the second offer. After that, the amount that N-Data can collect from an accused infringer is not limited by the order. The Proposed Consent Order requires N-Data to distribute copies of the complaint and the Proposed Consent Order to specified persons. It also prohibits N-Data from transferring any of the Relevant Patents, except to a single person who has agreed to be bound by the Proposed Consent Order and by the patent licenses formed thereunder. The Proposed Consent Order also contains standard reporting, notification and access provisions designed to allow the Commission to monitor compliance. It terminates E:\FR\FM\31JAN1.SGM 31JAN1 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices twenty (20) years after the date it becomes final. rwilkins on PROD1PC63 with NOTICES STATEMENT OF THE FEDERAL TRADE COMMISSION The Federal Trade Commission (‘‘Commission’’) has voted to issue a Complaint against Negotiated Data Solutions LLC (‘‘N-Data’’) and to accept the proposed consent agreement settling it.1 The Complaint in this matter alleges that N-Data reneged on a prior licensing commitment to a standard-setting body and thereby was able to increase the price of an Ethernet technology used by almost every American consumer who owns a computer. Based on the facts developed by staff during the investigation, we find reason to believe that this conduct violated Section 5 of the FTC Act.2 The impact of Respondent’s alleged actions, if not stopped, could be enormously harmful to standardsetting.3 Standard-setting organization participants have long worried about the impact of firms failing to disclose their intellectual property until after industry lock-in. Many standard-setting organizations have begun to develop policies to deal with that problem. But if N-Data’s conduct became the accepted way of doing business, even the most diligent standard-setting organizations would not be able to rely on the good faith assurances of respected companies. The possibility exists that those companies would exit the business, and that their patent portfolios would make their way to others who are less interested in honoring commitments than in exploiting industry lock-in.4 Congress created the Commission precisely to challenge just this sort of conduct. To prohibit such unacceptable behavior, the Commission today accepts a proposed consent agreement premised 1 Commissioners Harbour, Leibowitz, and Rosch support the issuance of the Complaint and proposed consent agreement and join in this statement. 2 Section 5 of the FTC Act prohibits ‘‘unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce.’’ 15 USC § 45(a)(1). 3 One dissent recites a different set of facts than those alleged in the Complaint. We do not agree with that version of the facts. Rather, we believe that staff’s investigation, as described in the Analysis to Aid Public Comment, accurately depicts the facts in this case. 4 See generally Fed. Trade Comm’n , To Promote Innovation: The Proper Balance of Competition and Patent Law and Policy ch. 2 at 31, n. 220; ch. 3 at 38-41, available at https://www.ftc.gov/os/2003/10/ innovationrpt.pdf (2003) (conduct by ‘‘nonproducing entities’’—sometimes referred to as ‘patent trolls’—may harm consumers when such firms force manufacturers to agree to licenses after the manufacturers have sunk substantial investments into technologies). VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 on a Complaint that identifies two separate violations. First, we find that N-Data’s alleged conduct is an unfair method of competition. Second, we find that this conduct is also an unfair act or practice. There is little doubt that N-Data’s conduct constitutes an unfair method of competition.5 The legislative history from the debate regarding the creation of the Commission is replete with references to the types of conduct that 5 See, e.g., E.I. du Pont de Nemours & Co. v. FTC, 729 F.2d 128 (2d Cir. 1984) (‘‘Ethyl’’); Official Airline Guides v. FTC, 630 F.2d 920 (2d Cir. 1980). The conduct falls squarely within the parameters of cases like Ethyl. One dissent quotes a passage from the Ethyl decision; even that excerpt makes clear that a Section 5 violation can be found when there are ‘‘some indicia of oppressiveness’’ such as ‘‘coercive...conduct.’’ For the reasons stated in the Analysis to Aid Public Comment, we find reason to believe that Respondent engaged in conduct that was both oppressive and coercive when it engaged in efforts to exploit licensees that were locked into a technology by the adoption of a standard. We believe the Analysis to Aid Public comment adequately describes the limiting principles applicable here. See generally Statement of Commissioner J. Thomas Rosch, Perspectives on Three Recent Votes: the Closing of the Adelphia Communications Investigation, the Issuance of the Valassis Complaint & the Weyerhaeuser Amicus Brief, before the National Economic Research Associates 2006 Antitrust & Trade Regulation Seminar, Santa Fe, New Mexico (July 6, 2006) at 512, available at https://www.ftc.gov/speeches/rosch/ Rosch-NERA-Speech-July6-2006.pdf; Concurring Opinion of Commissioner Jon Leibowitz, In re Rambus, Inc., Docket No. 9302, available at https://www.ftc.gov/os/adjpro/d9302/060802 rambusconcurringopinionofcommissioner leibowitz.pdf. One dissent cites the Areeda and Hovenkamp antitrust treatise as well as several other sources to mistakenly suggest that there is a ‘‘scholarly consensus’’ that an unfair method of competition cannot be found under Section 5 unless there is liability under the antitrust laws. Most of the sources cited by the dissent, however, actually support the Analysis to Aid Public Comment, which notes that, although Section 5 extends beyond the antitrust laws, there are limitations on its reach. Indeed, Professor Hovenkamp has explicitly acknowledged that there is a lack of consensus on the scope and application of Section 5. See HERBERT HOVENKAMP, FEDERAL ANTITRUST POLICY at 596-97 (3d ed. 2005). Professor Hovenkamp states that ‘‘[t]here are two views about the wisdom of the FTC’s use of Section 5’’ and goes on to discuss ‘‘[A]n alternative view, perfectly consistent with the proposition that the FTC’s antitrust concern should be limited to identifying practices that are economically anticompetitive.’’ Under that alternative view, it is appropriate to apply ‘‘the FTC Act to practices that do not violate the other antitrust laws . . . when (1) the practice seems anticompetitive but is not technically covered by the antitrust laws; and (2) the social cost of an error seems to be relatively small.’’ The social cost of an error here is small given the nature of the remedy and the low likelihood that a Commission consent order will be followed by a valid antitrust-based class action suit. See id. (‘‘Findings of violations of the FTC Act that are not also antitrust violations will not support subsequent private actions for treble damages’’). We nevertheless recognize Commissioner Kovacic’s concern that FTC ‘‘unfair methods’’ cases may support private actions based on state law, and join him in encouraging comment on that issue. PO 00000 Frm 00063 Fmt 4703 Sfmt 4703 5851 Congress intended the Commission to challenge. See, e.g., 51 Cong. Rec. 12,153 (1914) (statement of Sen. Robinson) (‘‘unjust, inequitable or dishonest competition’’), 51 Cong. Rec. 12,154 (1914) (statement of Sen. Newlands) (conduct that is ‘‘contrary to good morals’’). The Supreme Court apparently agrees as it has found that the standard for ‘‘unfairness’’ under the FTC Act is ‘‘by necessity, an elusive one, encompassing not only practices that violate the Sherman Act and the other antitrust laws, but also practices that the Commission determines are against public policy for other reasons.’’ F.T.C. v. Ind. Fed’n of Dentists, 476 U.S. 477, 454 (1986); see also F.T.C. v. Sperry & Hutchinson Co., 405 U.S. 233, 242 (1972) (FTC has authority to constrain, among other things ‘‘deception, bad faith, fraud or oppression’’). We also have no doubt that the type of behavior engaged in by N-Data harms consumers. The process of establishing a standard displaces competition; therefore, bad faith or deceptive behavior that undermines the process may also undermine competition in an entire industry, raise prices to consumers, and reduce choices.6 We have previously noted that ‘‘[i]ndustry standards are widely acknowledged to be one of the engines driving the modern economy.’’7 Conduct like NData’s—which undermines standardsetting—threatens to stall that engine to the detriment of all consumers. N-Data’s conduct is also an unfair act or practice under Section 5(n) of the FTC Act and Orkin Exterminating Co., 108 F.T.C. 263 (1986), aff’d, 849 F.2d 1354 (11th Cir. 1988). This Commission—unanimously—has often found an unfair act or practice proscribed by Section 5 in conduct that victimizes businesses (as well as individuals) who are consumers. The dissent would distinguish those cases on the ground that the businesses here are all ‘‘large, sophisticated computer manufacturers’’ who are able to protect themselves. There is no basis for that distinction in Section 5. In any event, moreover, there is no basis in the record of this investigation for describing all of the ‘‘locked in’’ licensees that way. 6 See Allied Tube & Conduit Corp. v. Indian Head, Inc., 486 U.S. 492, 500 (1989); Am. Soc’y of Mech. Engineers, Inc. v. Hydrolevel Corp., 456 U.S. 556, 571 (1982); Standard Sanitary Mfg. Co. v. United States, 226 U.S. 20, 41 (1912). See generally Broadcom Corp. v. Qualcomm Inc., 501 F.3d 297, 310-314 (3d Cir. 2007). 7 U.S. Dep’t of Justice & Fed. Trade Comm’n, Antitrust Enforcement And Intellectual Property Rights: Promoting Innovation And Competition 33, available at https://www.ftc.gov/reports/innovation/ P040101PromotingInnovationandCompetition rpt0704.pdf (2007). E:\FR\FM\31JAN1.SGM 31JAN1 5852 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices Similarly, as discussed in detail in the Analysis to Aid Public Comment, no meaningful distinction can be drawn between the circumstances in Orkin, where the respondent sought to exploit consumers who were ‘‘locked into’’ long term contracts, and the unique circumstances of this case, where licensees are ‘‘locked into’’ the standard containing technology controlled by this Respondent. We recognize that some may criticize the Commission for broadly (but appropriately) applying our unfairness authority to stop the conduct alleged in this Complaint. But the cost of ignoring this particularly pernicious problem is too high. Using our statutory authority to its fullest extent is not only consistent with the Commission’s obligations, but also essential to preserving a free and dynamic marketplace. By direction of the Commission, Chairman Majoras and Commissioner Kovacic dissenting. Donald S. Clark Secretary DISSENTING STATEMENT OF CHAIRMAN MAJORAS rwilkins on PROD1PC63 with NOTICES I respectfully dissent from the decision to lodge a Complaint in this matter and to accept the settlement described in the majority’s Analysis of Proposed Consent Order to Aid Public Comment (‘‘Analysis’’). The facts do not support a determination of antitrust liability. The preconditions for use of stand-alone Section 5 authority to find an ‘‘unfair method of competition’’ are not present. And the novel use of our consumer protection authority to protect large corporate members of a standardsetting organization (‘‘SSO’’) is insupportable. This case presents issues that appear on first inspection to resemble those in our line of standard-setting ‘‘hold up’’ challenges, including Unocal,1Dell,2 and Rambus.3 As we and the Justice Department have explained jointly, ‘‘multiple technologies may compete to be incorporated into the standard under consideration’’4 by an SSO. Once a 1 In re Union Oil Company of California, 2004 FTC LEXIS 115 (FTC 2004) (‘‘Unocal’’), available at https://www.ftc.gov/os/adjpro/d9305/ 040706commissionopinion.pdf. 2 In re Dell, 121 F.T.C. 616 (1996). 3 In re Rambus, FTC Dkt. No. 9302 (Liability Opinion, July 31, 2006), appeal pending, Docket Nos. 07-1086, 07-1124 (D.C. Cir. 2007). 4 U.S. Department of Justice and Federal Trade Commission, ANTITRUST ENFORCEMENT AND INTELLECTUAL PROPERTY RIGHTS: PROMOTING INNOVATION AND COMPETITION (April 2007) at 35-36 [hereinafter ‘‘DOJ/FTC Intellectual Property Report’’], available at https://www.ftc.gov/reports/ innovation/P040101 VerDate Aug<31>2005 19:05 Jan 30, 2008 Jkt 214001 technology has been selected and the standard that incorporates the technology has been specified, however, the standard’s adopters often will face significant relative costs in switching to an alternative standard. ‘‘[T]he chosen technology may lack effective substitutes precisely because the SSO chose it as the standard. Thus, . . . the owner of a patented technology necessary to implement the standard may have the power to extract higher royalties or other licensing terms that reflect the absence of competitive alternatives. Consumers of the products using the standard would be harmed if those higher royalties were passed on in the form of higher prices.’’5 In an effort to avoid the hold-up problem, some SSOs take measures to protect their members, such as imposing patent disclosure rules or securing agreement on licensing terms.6 This case departs materially from the prior line, however, in that there is no allegation that National engaged in improper or exclusionary conduct to induce IEEE to specify its NWay technology in the 802.3u standard. No one contends that National deceived SSO members at the time of its initial licensing offer in 1994. Further, from the time National submitted its letter of assurance in 1994 and at least until 2002, some patent holders changed or clarified the terms of their letters of assurance—even after the relevant standard was approved. And although a new IEEE bylaw, passed in January 2002, purported to make patent letters irrevocable, it did not address whether it was to apply retroactively. When Vertical submitted its 2002 proposal under which it would offer its entire patent portfolio that originated with National for license on reasonable and nondiscriminatory terms, the IEEE’s Patent Administrator did not object to the departure from the $1,000 commitment, even while requesting and securing specific changes to Vertical’s proposal. The IEEE then appeared to have accepted the revised proposal by posting Vertical’s letter on its web site along with National’s June 7, 1994 letter. There is also a substantial question as to whether N-Data enjoyed measurable PromotingInnovationandCompetitionrpt 0704.pdf. 5 Id. at 36. See also Chairman Deborah Platt Majoras, Recognizing the Procompetitive Potential of Royalty Discussions in Standard Setting, Remarks before the Stanford University Conference on Standardization and the Law: Developing the Golden Mean for Global Trade (September 2005), available at https://www.ftc.gov/speeches/majoras/ 050923stanford.pdf. 6 DOJ/FTC Intellectual Property Report, supra note 4, at 36. PO 00000 Frm 00064 Fmt 4703 Sfmt 4703 market power, even with the adoption of the IEEE standard. Under the terms of the standard, the NWay technology was an optional technique. Although National in 1994 had offered to grant a paid-up, royalty-free license to the technology for $1,000 to anyone seeking to practice the standard, no company had sought to accept the offer until after publication of the 2002 revision on the IEEE web site. And despite ongoing licensing efforts by National’s successors, Vertical and N-Data, only one company paid materially more than the originally-quoted $1,000 for rights to the NWay technology.7 Most users evidently have preferred to infringe, running the risk of presumably minimal patent damages that they might face at the outcome of litigation. Thus, the facts do not support antitrust liability here. The majority evidently agrees that respondent’s conduct does not amount to improper acquisition or maintenance of monopoly power so as to fall within the ambit of Section 2 of the Sherman Act. Instead, the majority seeks to find liability purely under Section 5 of the FTC Act. This is not advisable as a matter of policy or prosecutorial discretion. The majority’s first theory is that NData engaged in an unfair method of competition. Although Section 5 enables the Commission to reach conduct that is not actionable under the Sherman or Clayton Acts, we have largely limited ourselves to matters in which respondents took actions short of a fully consummated Section 1 violation (but with clear potential to harm competition), such as invitations to collude.8 This limitation is partly self7 Paragraph 31 of the Complaint alleges that ‘‘several companies’’ entered into license agreements that have produced fees ‘‘far in excess’’ of $1,000 per company. In fact, three companies entered into license agreements (with Vertical) for the patents. N-Data has never received royalties or fees from those agreements, nor, as I understand it, has it collected any royalties for the relevant patents on terms inconsistent with those offered in the 1994 letter. N-Data itself has initiated suit against one company, with which it had a dispute involving numerous patents other than those at issue in this case. 8 See, e.g., In re Valassis Communications, Inc., Docket No. C-4160, FTC File No. 051 008 (Complaint), available at https://www.ftc.gov/os/ caselist/0510008/0510008c4160Valassis Complaint.pdf. In its Analysis, the Commission explained that competition would not be adequately protected if antitrust enforcement were directed only at consummated cartel agreements. The Commission further explicated the several legal (including precedent) and economic justifications that support the imposition of liability upon firms that communicate an invitation to collude where acceptance cannot be proven. Prior to the Valassis case, the Commission entered into consent agreements in several cases alleging that an invitation to collude—though unaccepted by the E:\FR\FM\31JAN1.SGM 31JAN1 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices rwilkins on PROD1PC63 with NOTICES imposed, reflecting the Commission’s recognition of the scholarly consensus that finds the Sherman and Clayton Acts, as currently interpreted, to be sufficiently encompassing to address nearly all matters that properly warrant competition policy enforcement.9 But the limitation also reflects the insistence of the appellate courts that the Commission’s discretion is bounded and must adhere to limiting principles. In E.I. du Pont de Nemours & Co. v. FTC, for example, the Second Circuit stated: ‘‘[w]hen a business practice is challenged by the Commission, even though, as here, it does not violate the antitrust or other laws and is not collusive, coercive, predatory or exclusionary in character, standards for determining whether it is ‘unfair’ within the meaning of § 5 must be formulated to discriminate between normally acceptable business behavior and conduct that is unreasonable or unacceptable.’’10 Writing in the context of a challenge to parallel conduct that did not arise from an agreement but that facilitated oligopolistic coordination, the Second Circuit adopted this test: In our view, before business competitor—violated Section 5 of the FTC Act. MacDermid, Inc., Docket No. C-3911, FTC File No. 991 0167 (Decision & Order), available at https:// www.ftc.gov/os/2000/02/macdermid.do.htm; Stone Container Corp., 125 F.T.C. 853 (1998); Precision Moulding Co., 122 F.T.C. 104 (1996); YKK (USA) Inc., 116 F.T.C. 628 (1993); A.E. Clevite, Inc., 116 F.T.C. 389 (1993); Quality Trailer Products Corp., 115 F.T.C. 944 (1992). 9 See, e.g., 5 JULIAN O. VON KALINOSKI, PETER SULLIVAN & MAUREEN MCGUIRL, ANTITRUST LAWS AND TRADE REGULATION, § 77.02 at 77-3 (2007) (‘‘the prevailing view is that there are limitations on Section 5’s applicability to conduct which stretches beyond the letter of [the Sherman or Clayton Acts].’’); 2 PHILIP AREEDA & HERBERT HOVENKAMP, ANTITRUST LAW ¶ 302(h) (2006) (‘‘Apart from possible historical anachronisms in the application of those statutes, the Sherman and Clayton Acts are broad enough to cover any anti-competitive agreement or monopolistic situation that ought to be attacked whether ‘completely full blown or not.’’’); Richard A. Posner, The Federal Trade Commission: A Retrospective, 72 ANTITRUST L.J. 761, 766 (2005) (‘‘It used to be thought that ‘unfair methods of competition’ swept further than the practices forbidden by the Sherman and Clayton Acts, and you find this point repeated occasionally even today, but it is no longer tenable. The Sherman and Clayton Acts have been interpreted so broadly that they no longer contain gaps that a broad interpretation of Section 5 of the FTC Act might be needed to fill.’’); John F. Graybeal, Unfair Trade Practices, Antitrust And Consumer Welfare In North Carolina, 80 N.C. L. REV. 1927, 1949 (2002) (‘‘Undoubtedly, the FTC today will proceed with great caution under section 5 to claim as an unfair method of competition any conduct that does not violate the Sherman or Clayton Acts.’’). See also ABA SECTION OF ANTITRUST LAW, ANTITRUST LAW DEVELOPMENTS (6th ed. 2007) (‘‘FTC decisions have been overturned despite proof of anticompetitive effect where the courts have concluded that the agency’s legal standard did not draw a sound distinction between conduct that should be proscribed and conduct that should not.’’). 10 729 F.2d 128, 138 (2d Cir. 1984). VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 conduct in an oligopolistic industry may be labelled ‘‘unfair’’ within the meaning of § 5 a minimum standard demands that, absent a tacit agreement, at least some indicia of oppressiveness must exist such as (1) evidence of anticompetitive intent or purpose on the part of the producer charged, or (2) the absence of an independent legitimate business reason for its conduct. . . . In short, in the absence of proof of a violation of the antitrust laws or evidence of collusive, coercive, predatory, or exclusionary conduct, business practices are not ‘‘unfair’’ in violation of § 5 unless those practices either have an anticompetitive purpose or cannot be supported by an independent legitimate reason.11 In its Analysis, the majority extends the du Pont formulation to the monopolization family, asserting that respondent’s conduct was ‘‘coercive’’ and ‘‘oppressive’’ and had an ‘‘adverse impact on prices for autonegotiation technology[.]’’12 These assertions are impossible to prove on the evidence we have. N-Data asserts that its renegotiation of its licensing terms was motivated by nothing other than an independent, business reason—that is, the aim of collecting royalties for a new bundle of intellectual property rights on reasonable and non-discriminatory terms. Even if N-Data were motivated by a desire to strike a better bargain than National made several years earlier, that alone should not be considered a competition-related offense. If the majority’s theory is that the evasion of contractual price constraints triggers liability under Section 5 without a concurrent determination that the conduct violates the Sherman Act, then we are headed down a slippery slope, and I take no comfort from the majority’s representation to the contrary. Parties often enter into contractual commitments involving asset-specific investments, creating the potential for opportunism. The majority has not identified a meaningful limiting principle that indicates when an action—taken in the standard-setting context or otherwise—will be considered an ‘‘unfair method of competition.’’ Pursuing a second theory, the majority invokes consumer protection doctrine to find that respondent has engaged in an ‘‘unfair act or practice’’ in violation of Sections 5(a) and (n) of the 11 12 PO 00000 Id. at 139-140. Analysis at 5. Frm 00065 Fmt 4703 Sfmt 4703 5853 FTC Act.13 Section 5(n) provides a clear limitation of the Commission’s authority: ‘‘[t]he Commission shall have no authority under this section or section 57a of this title to declare unlawful an act or practice on the grounds that such act or practice is unfair unless the act or practice causes or is likely to cause substantial injury to consumers which is not reasonably avoidable by consumers themselves and not outweighed by countervailing benefits to consumers or to competition.’’14 The evidence simply does not support the requisite findings. In particular, finding ‘‘substantial consumer injury’’ here requires the majority to treat large, sophisticated computer manufacturers as ‘‘consumers.’’ I do not agree with such a characterization, and I have serious policy concerns about using our consumer protection authority to intervene in a commercial transaction to protect the alleged ‘‘victims’’ here. The Analysis accurately states that the FTC has used its authority under Section 5 to protect small businesses against unfair acts and practices. We have taken care to exercise this authority judiciously, however, to protect small businesses, non-profits, churches, and ‘‘mom and pop’’ operations15 that lack 13 In Rambus, the Commission drew upon its experience with the law regarding deceptive acts or practices, which has been developed largely in consumer protection contexts, to inform our analysis of deception before an SSO as part of an exclusionary course of conduct. Rambus, supra note 3, at 29-30. We did so, however, within a framework based on Sherman Act jurisprudence, recognizing, inter alia, the need to examine competitive effects. Id. at 28-31. The majority’s extension of our authority over unfair acts or practices, which Congress has specifically limited in Section 5(n), raises altogether different issues. 14 15 U.S.C. § 45(n) (2000). See also International Harvester Co., 104 F.T.C. 949, 1061 (1984). 15 See, e.g., FTC v. Websource Media, LLC, No. H-06-1980 (S.D. Tex. filed June 12, 2006) (unfair practice of ‘‘cramming’’ unauthorized charges onto the telephone bills of small businesses); FTC v. Certified Merchant Services, Ltd., No. 4:02CV44 (E.D. Tex. filed February 11, 2002) (unfair practice of unilaterally inserting additional pages that describe substantial, undisclosed charges into credit card processing contracts with small business merchants); FTC v. IFC Credit Corp., No. 07C3155 (N.D. Ill. filed June 6, 2007) (unfair practice of accepting and collecting on invalid, fraudulently induced equipment contracts with small businesses and religious and other nonprofit organizations). The majority cites to the Franchise Rule as another example of the Commission using its Section 5 consumer protection authority to protect small businesses from deceptive practices. While the Franchise Rule, which requires certain disclosures prior to the sale of a franchise, sometimes protects businesses, it typically protects individual consumers that are purchasing franchises rather than sophisticated corporations. In adopting amendments to the Franchise Rule earlier this year, the Commission exempted from the Rule’s coverage several categories of sophisticated investors. 16 C.F.R. § 436.8(a). E:\FR\FM\31JAN1.SGM 31JAN1 5854 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices rwilkins on PROD1PC63 with NOTICES the resources and, in some cases, the experience or understanding to defend themselves adequately against fraud. Indeed, certain of these small business owners, non-profit volunteers, and clergy had personally guaranteed the contracts at issue. There is a clear qualitative difference between these entities and the computer manufacturers that the majority treats as injured consumers in this matter.16 As I stated above, I am not convinced that any party was injured. And certainly the evidence does not support the finding that the alleged injury here was ‘‘not reasonably avoidable’’ (assuming, of course, that injury can be made out at all). The membership of IEEE includes computer networking equipment manufacturers and telecommunications companies. IEEE knew that its members sometimes made or attempted to make changes in patent commitment letters, and it could have acted sooner to protect its members from potentially adverse changes to commitment letters. IEEE also could have objected to Vertical’s revisions, but instead it accepted and published them without objection. Moreover, any individual company could have entered into a binding agreement with National, but none sought timely to accept the 1994 royalty offer. In re Orkin Exterminating Co., Inc.,17 on which the majority relies, is fundamentally different from the instant matter. Orkin unilaterally increased its fees for more than 200,000 consumers, all of whom had signed written contracts that could readily be understood to be binding and that committed to a lifetime fee structure that would not increase.18 If consumers paid the amount specified in their contracts, Orkin’s policy was to return the payments. Thus, unlike the situation here, Orkin involved both (a) large numbers of individual consumers, and (b) widespread injury that the consumers could not reasonably avoid. For all of these reasons, I respectfully dissent. 16 Some may argue that the Commission has already made the policy decision to treat businesses as consumers, and that there is no rational distinction between the companies we have protected and large corporations. I disagree. Although it is important to draw lines, there is such a vast difference between sophisticated corporations, on the one hand, and storefront shops, on the other, that we do not need to draw a bright line to distinguish this matter from previous cases the Commission has brought to protect small businesses. 17 108 F.T.C. 263 (1986), aff’d, FTC v. Orkin, 849 F.2d 1354 (11th Cir. 1988). 18 Orkin pamphlets echoed this commitment, promising that the annual fee would ‘‘never increase.’’ 108 F.T.C. at 356. VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 DISSENTING STATEMENT OF COMMISSIONER KOVACIC I oppose the Commission’s decision to accept for comment the settlement described in the Analysis to Aid Public Comment (‘‘Analysis’’). Like Chairman Majoras,1 I would not find that the Respondent engaged in an unfair method of competition or an unfair act or practice within the meaning of Section 5 of the Federal Trade Commission Act. Below I discuss two of the considerations that have influenced my thinking about this matter. These can serve as focal points for public comment before the Commission votes on whether to make the provisional settlement final. Effect on Private Rights of Action The Commission concludes that the respondent did not violate the Sherman Act or the Clayton Act. The Commission finds that the respondent violated Section 5 of the Federal Trade Commission Act because its conduct constituted both an unfair method of competition and an unfair act or deceptive practice. One reason the Commission gives for basing liability on Section 5 alone is that, unlike liability theories premised on infringements of the Sherman or Clayton Acts, private parties cannot use FTC intervention premised on Section 5 alone to support claims for treble damages in subsequent federal antitrust suits. The Commission’s assumption that a pure Section 5 theory will have no spillover effects seems to be important to the result it reaches. Footnote 8 of the Analysis says: It is worth noting that, because the proposed complaint alleges standalone violations of Section 5 rather than violations of Section 5 that are premised on violations of the Sherman Act, this action is not likely to lead to well-founded treble damage antitrust claims in federal court. If the absence of spillover effects in private litigation is important to the Commission’s decision, then the proposed settlement must account for the impact of FTC decisions upon the prosecution of claims based on state, as well as federal, causes of action. The Commission overlooks how the proposed settlement could affect the application of state statutes that are modeled on the FTC Act and prohibit unfair methods of competition (‘‘UMC’’) or unfair acts or practices (‘‘UAP’’). The federal and state UMC and UAP systems 1 Dissenting Statement of Chairman Majoras, In the Matter of Negotiated Data Solutions LLC, File No. 0510094. PO 00000 Frm 00066 Fmt 4703 Sfmt 4703 do not operate in watertight compartments. As commentators have documented, the federal and state regimes are interdependent. See, e.g., Dee Pridgen, Consumer Protection and the Law 214-22 (2007 Edition) (discussing use of FTC precedent to interpret state consumer protection statutes); Lawrence Fullerton et al., Reliance on FTC Consumer Protection Law Precedents in Other Legal Forums (American Bar Association, Section of Antitrust Law, Working Paper No. 1, July 1988) (describing how FTC consumer protection actions inform application of state law). By statute or judicial decision, courts in many states interpret the state UMC and UDP laws in light of FTC decisions, including orders. As a consequence, such states might incorporate the theories of liability in the settlement and order proposed here into their own UMC or UAP jurisprudence. A number of states that employ this incorporation principle have authorized private parties to enforce their UMC and UAP statutes in suits that permit the court to impose treble damages for infringements. If the Commission desires to deny the reasoning of its approach to private treble damage litigants, the proposed settlement does not necessarily do so. If the Commission’s assumption of no spillover effects is important to its decision, a rethink of the proposed settlement and order seems unavoidable. The Basis of Liability The proposed settlement treats the Respondent’s conduct as both an unfair method of competition and an unfair act or practice. When a public agency pleads alternative theories of liability, especially in a settlement with a party that appears to lack the means to threaten credibly to litigate, it should specify the distinctive contributions of each theory to the prosecution of the matter. Suppose that an agency comfortably could premise its allegation of infringement upon theory A. If the agency decides to premise liability upon theory B as well as theory A, it is good practice for the agency to explain what theory B adds to the mix. The Analysis here does not discuss why the Commission endorses separate UMC and UAP claims. The Analysis does not integrate the two theories of liability. A fuller effort to explain the relationship between the theories of liability in the Analysis would have led the Commission to confront anomalies in its exposition of the decision to prosecute. For example, the framework that the Analysis presents for analyzing the challenged conduct as an unfair act E:\FR\FM\31JAN1.SGM 31JAN1 Federal Register / Vol. 73, No. 21 / Thursday, January 31, 2008 / Notices or practice would appear to encompass all behavior that could be called a UMC or a violation of the Sherman or Clayton Acts. The Commission’s discussion of the UAP liability standard accepts the view that all business enterprises— including large companies—fall within the class of consumers whose injury is a worthy subject of unfairness scrutiny. If UAP coverage extends to the full range of business-to-business transactions, it would seem that the three-factor test prescribed for UAP analysis would capture all actionable conduct within the UMC prohibition and the proscriptions of the Sherman and Clayton Acts. Well-conceived antitrust cases (or UMC cases) typically address instances of substantial actual or likely harm to consumers. The FTC ordinarily would not prosecute behavior whose adverse effects could readily be avoided by the potential victims—either business entities or natural persons. And the balancing of harm against legitimate business justifications would encompass the assessment of procompetitive rationales that is a core element of a rule of reason analysis in cases arising under competition law. The prospect of a settlement can lead one to relax the analytical standards that ordinarily would discipline the decision to prosecute if the litigation of asserted claims was certain or likely. This is particularly the case when, as in this matter, the respondent has indicated during negotiations that, for various reasons, it will not litigate and will accept a settlement. If the Commission had in mind specific analytical grounds for including both theories of liability (for example, because each theory standing alone contained weaknesses as foundations for the settlement), the Analysis omits them. In the logic of the Analysis, the UAP theory subsumes the UMC standard and makes the UMC provision superfluous. If the UAP concept is so broad, it is not evident what reasoning in this case supports the parallel inclusion of the UMC claim. More generally, it seems that the Commission’s view of unfairness would permit the FTC in the future to plead all of what would have been seen as competition-related infringements as constituting unfair acts or practices. rwilkins on PROD1PC63 with NOTICES [FR Doc. E8–1801 Filed 1–30–08: 8:45 am] [Billing Code: 6750–01–S] VerDate Aug<31>2005 18:07 Jan 30, 2008 Jkt 214001 DEPARTMENT OF HEALTH AND HUMAN SERVICES Health Resources and Services Administration Advisory Committee on Organ Transplantation Request for Nominations for Voting Members Health Resources and Services Administration, HHS. ACTION: Notice. AGENCY: SUMMARY: The Health Resources and Services Administration (HRSA) is requesting nominations to fill vacancies on the Advisory Committee on Organ Transplantation (ACOT). The ACOT was established by the Amended Final Rule of the Organ Procurement and Transplantation Network (OPTN) (42 CFR part 121) and, in accordance with Public Law 92–463, was chartered on September 1, 2000. DATES: The agency must receive nominations on or before March 3, 2008. All nominations should be submitted to the Executive Secretary, Advisory Committee on Organ Transplantation, Healthcare Systems Bureau, HRSA, Parklawn Building, Room 12C–06, 5600 Fishers Lane, Rockville, Maryland 20857. Federal Express, Airborne, UPS, etc., mail delivery should be addressed to Executive Secretary, Advisory Committee on Organ Transplantation, Healthcare Systems Bureau, HRSA, at the above address. FOR FURTHER INFORMATION CONTACT: Gregory Fant, Ph.D., Executive Secretary, Advisory Committee on Organ Transplantation, at (301) 443– 8728 or e-mail Gregory.Fant@hrsa.hhs.gov. ADDRESSES: As provided by 42 CFR 121.12 (64 FR 56661), the Secretary established the Advisory Committee on Organ Transplantation. The Committee is governed by the Federal Advisory Committee Act (5 U.S.C. Appendix 2), which sets forth standards for the formation and use of advisory committees. The ACOT advises the Secretary, acting through the Administrator, HRSA, on all aspects of organ procurement, allocation, and transplantation, and on other such matters that the Secretary determines. One of its principal functions is to advise the Secretary on ways to maximize Federal efforts to increase living and deceased organ donation nationally. Other matters that have been reviewed by the ACOT include: SUPPLEMENTARY INFORMATION: PO 00000 Frm 00067 Fmt 4703 Sfmt 4703 5855 • Concerns about U.S. citizens traveling abroad in order to receive organ transplants (also known as transplant tourism); • Collection of data on the long-term health status of living donors; • Organ Procurement and Transplantation Network development and distribution within the transplant community a set of practice guidelines to be followed with respect to public solicitation of organ donors, both living and deceased; • Standards of coverage for living donors relating to future adverse events; and • CMS reimbursement of organ procurement organizations for donation after cardiac death. The ACOT consists of up to 25 members, including the Chair. Members and Chair shall be selected by the Secretary from individuals knowledgeable in such fields as organ donation, health care public policy, transplantation medicine and surgery, critical care medicine and other medical specialties involved in the identification and referral of donors, non-physician transplant professions, nursing, epidemiology, immunology, law and bioethics, behavioral sciences, economics and statistics, as well as representatives of transplant candidates, transplant recipients, organ donors, and family members. To the extent practicable, Committee members should represent the minority, gender and geographic diversity of transplant candidates, transplant recipients, organ donors and family members served by the OPTN. In addition, the Director, Centers for Disease Control and Prevention; the Administrator, Centers for Medicare and Medicaid Services; the Commissioner, Food and Drug Administration; the Director, National Institutes of Health; and the Director, Agency for Healthcare Research and Quality (or the designees of such officials) serve as non-voting ex officio members. Specifically, HRSA is requesting nominations for voting members of the ACOT representing: Health care public policy; transplantation medicine and surgery, including pediatrics; critical care medicine; nursing; epidemiology and applied statistics; immunology; law and bioethics; behavioral sciences; economics and econometrics; organ procurement organizations; transplant candidates/recipients; transplant/donor family members; and living donors. Nominees will be invited to serve a 4year term beginning between January and July 2009. HHS will consider nominations of all qualified individuals with a view to E:\FR\FM\31JAN1.SGM 31JAN1

Agencies

[Federal Register Volume 73, Number 21 (Thursday, January 31, 2008)]
[Notices]
[Pages 5846-5855]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-1801]


=======================================================================
-----------------------------------------------------------------------

FEDERAL TRADE COMMISSION

[File No. 051 0094]


Negotiated Data Solutions LLC; Analysis of Proposed Consent Order 
to Aid Public Comment

AGENCY: Federal Trade Commission.

ACTION: Proposed Consent Agreement.

-----------------------------------------------------------------------

SUMMARY: The consent agreement in this matter settles alleged 
violations of federal law prohibiting unfair or deceptive acts or 
practices or unfair methods of competition. The attached Analysis to 
Aid Public Comment describes both the allegations in the draft 
complaint and the terms of the consent order--embodied in the consent 
agreement--that would settle these allegations.

DATES: Comments must be received on or before February 22, 2008.

ADDRESSES: Interested parties are invited to submit written comments. 
Comments should refer to ``Negotiated Data Solutions, File No. 051 
0094,'' to facilitate the organization of comments. A comment filed in 
paper form should include this reference both in the text and on the 
envelope, and should be mailed or delivered to the following address: 
Federal Trade Commission/Office of the Secretary, Room 135-H (Annex D), 
Pennsylvania Avenue, NW, Washington, D.C. 20580. Comments containing 
confidential material must be filed in paper form, must be clearly 
labeled ``Confidential,'' and must comply with Commission Rule 4.9(c). 
16 CFR 4.9(c) (2005).\1\ The FTC is requesting that any comment filed 
in paper form be sent by courier or overnight service, if possible, 
because U.S. postal mail in the Washington area and at the Commission 
is subject to delay due to heightened security

[[Page 5847]]

precautions. Comments that do not contain any nonpublic information may 
instead be filed in electronic form by following the instructions on 
the web-based form at https://secure.commentworks.com/ftc-
NegotiatedDataSolutions. To ensure that the Commission considers an 
electronic comment, you must file it on that web-based form.
---------------------------------------------------------------------------

    \1\ The comment must be accompanied by an explicit request for 
confidential treatment, including the factual and legal basis for 
the request, and must identify the specific portions of the comment 
to be withheld from the public record. The request will be granted 
or denied by the Commission's General Counsel, consistent with 
applicable law and the public interest. See Commission Rule 4.9(c), 
16 CFR 4.9(c).
---------------------------------------------------------------------------

    The FTC Act and other laws the Commission administers permit the 
collection of public comments to consider and use in this proceeding as 
appropriate. All timely and responsive public comments, whether filed 
in paper or electronic form, will be considered by the Commission, and 
will be available to the public on the FTC website, to the extent 
practicable, at www.ftc.gov. As a matter of discretion, the FTC makes 
every effort to remove home contact information for individuals from 
the public comments it receives before placing those comments on the 
FTC website. More information, including routine uses permitted by the 
Privacy Act, may be found in the FTC's privacy policy, at https://
www.ftc.gov/ftc/privacy.htm.

FOR FURTHER INFORMATION CONTACT: Kent E. Cox (202) 326-2058, Bureau of 
Competition, Room NJ-6213, 600 Pennsylvania Avenue, NW, Washington, 
D.C. 20580.

SUPPLEMENTARY INFORMATION: Pursuant to section 6(f) of the Federal 
Trade Commission Act, 38 Stat. 721, 15 U.S.C. 46(f), and Sec.  2.34 of 
the Commission Rules of Practice, 16 CFR 2.34, notice is hereby given 
that the above-captioned consent agreement containing a consent order 
to cease and desist, having been filed with and accepted, subject to 
final approval, by the Commission, has been placed on the public record 
for a period of thirty (30) days. The following Analysis to Aid Public 
Comment describes the terms of the consent agreement, and the 
allegations in the complaint. An electronic copy of the full text of 
the consent agreement package can be obtained from the FTC Home Page 
(for January 23, 2008), on the World Wide Web, at https://www.ftc.gov/
os/2008/01/index.htm. A paper copy can be obtained from the FTC Public 
Reference Room, Room 130-H, 600 Pennsylvania Avenue, N.W., Washington, 
D.C. 20580, either in person or by calling (202) 326-2222.
    Public comments are invited, and may be filed with the Commission 
in either paper or electronic form. All comments should be filed as 
prescribed in the ADDRESSES section above, and must be received on or 
before the date specified in the DATES section.

Analysis of Agreement Containing Consent Order to Aid Public Comment

    The Federal Trade Commission (``Commission'') has accepted, subject 
to final approval, an Agreement Containing Consent Order 
(``Agreement'') with Negotiated Data Solutions LLC (``N-Data''), a 
limited liability company whose sole activity is to collect royalties 
in connection with a number of patents. The Agreement settles 
allegations that N-Data has violated Section 5 of the Federal Trade 
Commission Act, 15 U.S.C. Sec.  45, by engaging in unfair methods of 
competition and unfair acts or practices relating to the Ethernet 
standard for local area networks. Pursuant to the Agreement, N-Data has 
agreed to be bound by a proposed consent order (``Proposed Consent 
Order'').
    The Proposed Consent Order has been placed on the public record for 
thirty (30) days for comments by interested persons. Comments received 
during this period will become part of the public record. After thirty 
(30) days, the Commission will again review the Agreement and the 
comments received and will decide whether it should withdraw from the 
Agreement or make final the Agreement's Proposed Consent Order.
    The purpose of this analysis is to facilitate comment on the 
Proposed Consent Order. This analysis does not constitute an official 
interpretation of the Proposed Consent Order, and does not modify its 
terms in any way. The Agreement has been entered into for settlement 
purposes only, and does not constitute an admission by N-Data that the 
law has been violated as alleged or that the facts alleged, other than 
jurisdictional facts, are true.

Background

    The Institute of Electrical and Electronics Engineers (``IEEE'') is 
a standard-setting organization active in a number of different 
industries. IEEE standards often enhance the interoperability of 
communications products. One important example, which is at issue here, 
is the 802 series of networking standards. Many of the standards in the 
802 series allow users to reliably access and share information over 
communications systems by interconnecting many compatible products 
manufactured by different producers.
    The IEEE 802.3 standard, first published in 1983, and commonly 
referred to as ``Ethernet,'' applies to local area networks (``LANs'') 
built on copper, and more recently fiber optic, cables. That standard 
initially accommodated a maximum data transmission rate of 10 megabits 
per second (10 Mbps) between networked devices. By 1994, the 802.3 
Working Group was developing a new 802.3 standard for ``Fast 
Ethernet,'' which would transmit data across a copper wire at 100 Mbps. 
The Working Group determined that it would be desirable for Fast 
Ethernet equipment to be compatible, to the extent possible, with 
existing LAN equipment and with future generations of equipment. A 
technology, variously known as ``autodetection'' and 
``autonegotiation,'' was developed that would permit such 
compatibility.
    Employees of National Semiconductor Corporation (``National'') were 
members and active participants in the 802.3 Working Group. In 1994, 
National proposed that the 802.3 Working Group adopt its 
autonegotiation technology, referred to as ``NWay,'' into the Fast 
Ethernet standard. At the time, National disclosed to the Working Group 
that it had already filed for patent protection for the technology. 
Several other participants also had developed competing technologies 
and the Working Group considered several alternatives, each having 
advantages and disadvantages compared to NWay. The 802.3 Working Group 
also considered adopting the Fast Ethernet standard without any 
autonegotiation feature.
    At IEEE meetings to determine which autonegotiation technology to 
include in 802.3, one or more representatives of National publicly 
announced that if NWay technology were chosen, National would license 
NWay to any requesting party for a one-time fee of $1,000. In a 
subsequent letter dated June 7, 1994, and addressed to the Chair of the 
802.3 Working Group of IEEE, National wrote:
    In the event that the IEEE adopts an autodetection standard based 
upon National's NWay technology, National will offer to license its 
NWay technology to any requesting party for the purpose of making and 
selling products which implement the IEEE standard. Such a license will 
be made available on a nondiscriminatory basis and will be paid-up and 
royalty-free after payment of a one-time fee of one thousand dollars 
($1,000).
    Based on National's licensing assurance, and following its normal 
balloting and voting procedures, IEEE incorporated NWay technology into 
the Fast Ethernet standard, which IEEE published in final form in July 
1995. To maintain compatibility with the installed base of Ethernet and 
Fast Ethernet equipment, subsequent revisions of the 802.3 standard 
also have

[[Page 5848]]

incorporated NWay autonegotiation technology. The ``Fast Ethernet'' 
standard became the dominant standard for LANs, and users are now 
locked in to using NWay technology due to network effects and high 
switching costs. Therefore, today, autonegotiation technologies other 
than NWay are not attractive alternatives to NWay for manufacturers who 
want to include inter-generational compatibility in their Ethernet 
products.
    NWay contributed to the success of Fast Ethernet technology in the 
marketplace. An installed base of millions of Ethernet ports operating 
at 10 Mbps already existed when IEEE published the Fast Ethernet 
standard. The autonegotiation technology in the Fast Ethernet standard 
allowed owners of existing Ethernet-based LANs to purchase and install 
multi-speed, Fast Ethernet-capable equipment on a piecemeal basis 
without having to upgrade the entire LAN at once or buy extra equipment 
to ensure compatibility.
    National benefitted financially from its licensing assurance. The 
assurance accelerated sales of National products that conformed to the 
Fast Ethernet standard by first, allaying concerns about the future 
costs of autonegotiation, and so speeding completion of the standard, 
and second, making Fast Ethernet-compatible products backward 
compatible with Ethernet equipment already installed on existing LANs, 
increasing the demand for Fast Ethernet products by those with existing 
systems.
    In 1997, the United States Patent and Trademark Office issued U.S. 
Patent Nos. 5,617,418 and 5,687,174 (the '418 and '174 Patents) to 
National. Both patents arose from the patent application that National 
disclosed to the IEEE in 1994. National later received equivalent 
patents in other countries.
    In 1998, National assigned a number of patents, including the '418 
and the '174 Patents, to Vertical Networks (``Vertical''), a 
telecommunications start-up company founded by former National 
employees. Before the assignment, National gave Vertical a copy of the 
June 7, 1994 letter to the 802.3 Working Group. Vertical's outside 
patent counsel, Mr. Alan Loudermilk, acknowledged in writing that 
National had informed him ``that several of the patents may be 
`encumbered''' by actions National had taken with respect to the IEEE 
standards. The final agreement between Vertical and National stated 
that the assignment was ``subject to any existing licenses that 
[National] may have granted.'' It further provided, ``Existing licenses 
shall include . . . [p]atents that may be encumbered under standards 
such as an IEEE standard ... ''
    In 2001, Vertical turned to its intellectual property portfolio in 
an effort to generate new revenues by licensing its technology to third 
parties. One aspect of this strategy was Vertical's effort to repudiate 
the $1,000 licensing term contained in National's 1994 letter of 
assurance to the IEEE. On March 27, 2002, Vertical sent a letter to the 
IEEE that purported to ``supersede'' any previous licensing assurances 
provided by National. Vertical identified nine U.S. patents assigned to 
it by National, including the '174 and '418 patents, and promised to 
make available to any party a non-exclusive license ``on a non-
discriminatory basis and on reasonable terms and conditions including 
its then current royalty rates.''
    In the Spring of 2002, Vertical developed a list of ``target 
companies'' that practiced the IEEE 802.3 standard and which it 
believed infringed on the `174 and `418 patents. Vertical sought to 
enforce the new licensing terms on these companies. These companies, 
which included many large computer hardware manufacturers, represented 
a substantial majority of all producers of 802.3 ports. Vertical's 
patent counsel, Mr. Loudermilk, sent letters to most of these companies 
between 2002 and 2004 offering a license for patents covering aspects 
of ``the auto-negotiation functionality'' in networking products, 
including products compliant with IEEE 802.3. Vertical also filed suit 
against a number of companies alleging that ``switches, hubs, routers, 
print servers, network adapters and networking kits'' having 
autonegotiating compatibility, infringed its '174 and '418 patents. 
Vertical entered into several licensing agreements producing licensing 
fees far in excess of $1,000 from each licensed company.
    In late 2003, Vertical assigned some of its patent portfolio, 
including the '174 and '418 patents, to N-Data, a company owned and 
operated by Mr. Loudermilk.\2\ N-Data was aware of National's June 7, 
1994 letter of assurance to the IEEE when Vertical assigned those 
patents to N-Data. Yet it rejected requests from companies to license 
NWay technology for a one-time fee of $1,000. Instead, N-Data 
threatened to initiate, and in some cases prosecuted, legal actions 
against companies refusing to pay its royalty demands, which are far in 
excess of that amount.
---------------------------------------------------------------------------

    \2\ Vertical subsequently sold its remaining business assets and 
ceased operations.
---------------------------------------------------------------------------

The Proposed Complaint

    Vertical and N-Data sought to exploit the fact that NWay had been 
incorporated into the 802.3 standard, and had been adopted by the 
industry for a number of years, by reneging on a known commitment made 
by their predecessor in interest. Even if their actions do not 
constitute a violation of the Sherman Act, they threatened to raise 
prices for an entire industry and to subvert the IEEE decisional 
process in a manner that could cast doubt on the viability of 
developing standards at the IEEE and elsewhere. The threatened or 
actual effects of N-Data's conduct have been to increase the cost of 
practicing the IEEE standards, and potentially to reduce output of 
products incorporating the standards.\3\ N-Data's conduct also 
threatens to reduce the incentive for firms to participate in IEEE and 
in other standard-setting activities, and to rely on standards 
established by standard-setting organizations.
---------------------------------------------------------------------------

    \3\ The conduct by Vertical and N-Data has led to, or threatened 
to lead to, increased prices in the markets for autonegotiation 
technology (1) used in 802.3 compliant products and (2) used in 
products that implement an IEEE standard enabling autonegotiation 
with 802.3 compliant products.
---------------------------------------------------------------------------

    The Proposed Complaint alleges that this conduct violates Section 5 
of the FTC Act in two ways: first, N-Data engaged in an unfair method 
of competition; and second, N-Data engaged in an unfair act or 
practice.

1. Unfair Method of Competition

    N-Data's conduct constitutes an unfair method of competition. The 
Supreme Court in FTC v. Sperry & Hutchinson Co. endorsed an expansive 
reading of the ``unfair method of competition'' prong of Section 5, 
stating that the Commission is empowered to ``define and proscribe an 
unfair competitive practice, even though the practice does not infringe 
either the letter or spirit of the antitrust laws'' and to ``proscribe 
practices as unfair ... in their effect on competition.''\4\ That 
description of the

[[Page 5849]]

scope of Section 5 accords with the legislative history of Section 
5.\5\
---------------------------------------------------------------------------

    \4\FTC v. Sperry & Hutchinson Co., 405 U.S. 233, 239 (1972); see 
also FTC v. Ind. Fed'n of Dentists, 476 U.S. 447, 454 (1986). See 
generally Concurring Opinion of Commissioner Jon Leibowitz, In re 
Rambus, Inc., Docket No. 9302, available at https://www.ftc.gov/os/
adjpro/d9302/060802 rambusconcurringopinionofcommissioner 
leibowitz.pdf; Statement of Commissioner J. Thomas Rosch, 
``Perspectives on Three Recent Votes: the Closing of the Adelphia 
Communications Investigation, the Issuance of the Valassis Complaint 
& the Weyerhaeuser Amicus Brief,'' before the National Economic 
Research Associates 2006 Antitrust & Trade Regulation Seminar, Santa 
Fe, New Mexico (July 6, 2006) at 5-12, available at https://
www.ftc.gov/speeches/rosch/Rosch-NERA-Speech-July6-2006.pdf.
    \5\See, e.g., Cong. Rec. 12,153 (1914) (statement of Sen. 
Robinson) (``unjust, inequitable or dishonest competition'' 
proscribed), 51 Cong. Rec. 12,154 (1914) (statement of Sen. 
Newlands) (conduct that is ``contrary to good morals'' proscribed).
---------------------------------------------------------------------------

    Notwithstanding that broad description, the unfair method of 
competition prong of Section 5 is subject to limiting principles. The 
first relates to the nature of the conduct. In OAG, the Second Circuit 
held that such a violation could not be found where the respondent 
``does not act coercively.''\6\ Similarly, in Ethyl the Second Circuit 
held that ``at least some indicia of oppressiveness must exist ...''\7\ 
This requirement is met here, given N-Data's efforts to exploit the 
power it enjoys over those practicing the Fast Ethernet standard and 
lacking any practical alternatives. This form of patent hold-up is 
inherently ``coercive'' and ``oppressive'' with respect to firms that 
are, as a practical matter, locked into a standard.
---------------------------------------------------------------------------

    \6\Official Airline Guides v. FTC, 630 F.2d 920, 927 (2d Cir. 
1980) (``OAG'').
    \7\E.I. Du Pont v. de Nemours & Co. v. FTC, 729 F.2d 128, 139-40 
(2d Cir. 1984) (``Ethyl'').
---------------------------------------------------------------------------

    The second limiting principle relates to the effects of the 
conduct. Although the Supreme Court has made it clear that the 
respondent's conduct need not violate the letter (or even the spirit) 
of the antitrust laws to fall under Section 5, that does not mean that 
conduct can be considered an unfair method of competition if it has no 
adverse effect at all on competition. That requirement, however, is 
also satisfied here, given the conduct's adverse impact on prices for 
autonegotiation technology and the threat that such conduct poses to 
standard-setting at IEEE and elsewhere.
    Respondent's conduct here is particularly appropriate for Section 5 
review. IEEE's determination to include National's technology in its 
standard rested on National's commitment to limit royalties to $1,000. 
That commitment had substantial competitive significance because it 
extended not to a single firm, but rather to an industry-wide standard-
setting organization. Indeed, in the standard-setting context--with 
numerous, injured third parties who lack privity with patentees and 
with the mixed incentives generated when members may be positioned to 
pass on royalties that raise costs market-wide--contract remedies may 
prove ineffective, and Section 5 intervention may serve an unusually 
important role.
    N-Data's conduct, if allowed, would reduce the value of standard-
setting by raising the possibility of opportunistic lawsuits or threats 
arising from the incorporation of patented technologies into the 
standard after a commitment by the patent holder. As a result, firms 
may be less likely to rely on standards, even standards that already 
exist. In the creation of new standards, standard-setting organizations 
may seek to avoid intellectual property entirely, potentially reducing 
the technical merit of those standards as well as their ultimate value 
to consumers.
    A mere departure from a previous licensing commitment is unlikely 
to constitute an unfair method of competition under Section 5. The 
commitment here was in the context of standard-setting. The Supreme 
Court repeatedly has recognized the procompetitive potential of 
standard-setting activities. However, because a standard may displace 
the normal give and take of competition, the Court has not hesitated to 
impose antitrust liability on conduct that threatens to undermine the 
standard-setting process or to render it anticompetitive.\8\ The 
conduct of N-Data (and Vertical) at issue here clearly has that 
potential.\9\
---------------------------------------------------------------------------

    \8\See Standard Sanitary Mfg. Co. v. United States, 226 U.S. 20, 
41 (1912); Allied Tube & Conduit Corp. v. Indian Head, Inc., 486 
U.S. 492, 500 (1989); Am. Soc'y of Mech. Engineers, Inc. v. 
Hydrolevel Corp., 456 U.S. 556, 571 (1982).
    \9\ It is worth noting that, because the proposed complaint 
alleges stand-alone violations of Section 5 rather than violations 
of Section 5 that are premised on violations of the Sherman Act, 
this action is not likely to lead to well-founded treble damage 
antitrust claims in federal court. See Herbert Hovenkamp, Federal 
Antitrust Policy at 588 (2d ed. 1999).
---------------------------------------------------------------------------

2. Unfair Act or Practice

    N-Data's efforts to unilaterally change the terms of the licensing 
commitment also constitute unfair acts or practices under Section 5 of 
the FTC Act. The FTC Act states that ``unfair or deceptive acts or 
practices in or affecting commerce[] are . . . unlawful.'' An 
unfairness claim under this part of Section 5 must meet the following 
statutory criteria:
     The Commission shall have no authority . . . to declare unlawful 
an act or practice on the grounds that such act or practice is unfair 
unless the act or practice causes or is likely to cause substantial 
injury to consumers which is not reasonably avoidable by consumers 
themselves and not outweighed by countervailing benefits to consumers 
or to competition.\10\
---------------------------------------------------------------------------

    \10\ 15 U.S.C. Sec.  45(n) (1992).
---------------------------------------------------------------------------

    The Commission may consider established public policies as evidence 
to be considered with all other evidence, though not as a primary basis 
for a determination of unfairness.\11\ As the Eleventh Circuit 
emphasized in Orkin Exterminating Co. v. FTC,\12\ the Commission has 
applied limiting principles requiring a showing that (1) the conduct 
caused ``substantial consumer injury,'' (2) that injury is ``not . . . 
outweighed by any countervailing benefits to consumers or competition 
that the practice produces,'' and (3) it is an injury that ``consumers 
themselves could not reasonably have avoided.''\13\
---------------------------------------------------------------------------

    \11\Id.
    \12\Orkin Exterminating Co. v. FTC, 849 F.2d 1354, 1364 (11th 
Cir. 1988).
    \13\See Letter from Federal Trade Commission to Senators Ford 
and Danforth (Dec. 17, 1980), reprinted in H.R. Rep. No. 156, Pt. 1, 
98th Cong., 1st Sess. 33-40 (1983) available at https://www.ftc.gov/
bcp/policystmt/ad-unfair.htm, appended to the Commission's decision 
in International Harvester, 104 F.T.C. at 949, 1061 (1984), and 
subsequently codified by Congress at 15 U.S.C. Sec.  45(n).
---------------------------------------------------------------------------

    This Section 5 claim against the efforts of Vertical and N-Data to 
unilaterally increase the price for the relevant technology by 
knowingly reneging on National's commitment meets these statutory 
criteria, and thus constitutes a violation of Section 5's prohibition 
of unfair acts and practices. NWay was chosen for the standard on the 
basis of the assurances made by National to the IEEE 802.3 Working 
Group. Further, the industry relied, at least indirectly, on National's 
assurances regarding pricing, and made substantial and potentially 
irreversible investments premised on those representations. After the 
standard became successful, and it became difficult, if not impossible, 
for the industry to switch away from the standard, Vertical and then N-
Data took advantage of the investments made by these firms by reneging 
on National's commitment. Because it is now no longer feasible for the 
industry to remove the technologies, the value that N-Data was able to 
extract from market participants was due to the opportunistic nature of 
its conduct rather than the value of the patents.\14\
---------------------------------------------------------------------------

    \14\ The IEEE designed its rules to avoid just such a result. 
IEEE's stated purpose for requesting letters of assurance was to 
avoid giving ``undue preferred status to a company'' and to ensure 
that the adoption of a technology would not be ``prohibitively 
costly or noncompetitive to a substantial part of the industry.'' 
1994 IEEE Standards Operations Manual Sec. 6.3.
---------------------------------------------------------------------------

    Accordingly, an action against this conduct meets the criteria set 
forth in the statute and in Orkin. First, N-Data's reneging on its 
pricing commitments here involved ``substantial consumer injury.'' The 
increase in royalties demanded by Vertical Networks and later N-Data 
could result in millions of dollars in excess payments from those

[[Page 5850]]

practicing the standard, not to mention the legal fees those firms 
might spend defending lawsuits.\15\ In addition, often in market-wide 
standard-setting contexts, the licensees have an incentive to pass 
along higher costs to the ultimate consumers who purchase the 
products.\16\ Thus, these end consumers who purchase products using N-
Data's technology may face increased prices due to the higher 
royalties. Further, those demands also have no apparent 
``countervailing benefit''-- to those upon whom demands have been made, 
ultimate consumers, or to competition--so the second requirement is 
also met. With respect to the third requirement, both the Commission 
and the Eleventh Circuit in Orkin stated that consumers ``may act to 
avoid injury before it occurs if they have reason to anticipate the 
impending harm and the means to avoid it, or they may seek to mitigate 
the damage afterward if they are aware of potential avenues to that 
end.''\17\ Here, those who created the standard had no way to 
anticipate the repudiation of the price commitment before it occurred 
and, apart from expensive litigation, those locked into the standard 
had no way to avoid the threatened injury posed by the demands that 
they faced. Thus, those practicing the standard were locked in to even 
a greater extent than the consumers in Orkin. Put simply, this is a 
form of what has been described as ``patent hold-up.''
---------------------------------------------------------------------------

    \15\ The Commission has a ``longstanding position that the 
statutory prohibition against `unfair or deceptive acts or 
practices' includes practices that victimize businesspersons as well 
as those who purchase products for their own personal or household 
use,'' given that businesses ``clearly do consume goods and services 
that may be marketed by means of deception and unfairness.'' Brief 
of Federal Trade Commission as Amicus Curiae at 3-4, 8-9, Vermont v. 
International Collection Service, Inc., 594 A.2d 426 (Vt. 1991) 
(citing cases); see also, e.g., 16 C.F.R. Sec.  436.1 (FTC rule 
protecting franchisees); United States Retail Credit Ass'n v. FTC, 
300 F.2d 212 (4th Cir. 1962) (deception involving business clients); 
United States Ass'n of Credit Bureaus, Inc. v. FTC, 299 F.2d 220 
(4th Cir. 1962) (same).
    \16\ Susan A. Creighton, Cheap Exclusion, 72 Antitrust L.J. 975, 
994 (2005).
    \17\Orkin, 849 F.2d at 1365.
---------------------------------------------------------------------------

    The facts alleged in the complaint here are similar to those found 
in the Commission's decision in Orkin, which was affirmed by the 
Eleventh Circuit.\18\ In that case, the respondent signed contracts 
with consumers to supply lifetime extermination services at a fixed 
annual renewal fee. Years later, the respondent unilaterally increased 
these fees. Consumers needing extermination services had no reason to 
anticipate Orkin's unilateral price increase and there was no evidence 
that they could contract with Orkin's competitors on terms similar to 
Orkin's initial terms. The Commission held, and the Eleventh Circuit 
agreed, that Orkin's unilateral price increase was an unfair act or 
practice under Section 5. Similarly, National made non-expiring royalty 
commitments that Vertical and N-Data later repudiated with unilateral 
increases, which the industry could not have reasonably anticipated 
before the market wide adoption of the standard and which consumers had 
no chance of avoiding due to network effects and lock-in.
---------------------------------------------------------------------------

    \18\In re Orkin Exterminating Co., 108 F.T.C. 263 (1986), aff'd, 
849 F.2d 1354 (11th Cir. 1988).
---------------------------------------------------------------------------

    Clearly, merely breaching a prior commitment is not enough to 
constitute an unfair act or practice under Section 5. The standard-
setting context in which National made its commitment is critical to 
the legal analysis. As described above, the lock-in effect resulting 
from adoption of the NWay patent in the standard and its widespread use 
are important factors in this case. In addition, the established public 
policy of supporting efficient standard-setting activities is an 
important consideration in this case.\19\ Similarly, it must be 
stressed that not all breaches of commitments made by owners of 
intellectual property during a standard-setting process will constitute 
an unfair act or practice under Section 5. For example, if the 
commitment were immaterial to the adoption of the standard or if those 
practicing the standard could exercise countermeasures to avoid injury 
from the breach, the statutory requirements most likely would not be 
met. Finally, it needs to be emphasized that not all departures from 
those commitments will be treated as a breach. The Orkin court 
suggested that there might be a distinction between an open-ended 
commitment and a contract having a fixed duration.\20\ That distinction 
does not apply here because the context of the commitment made it plain 
that it was for the duration of National's patents. However, most such 
commitments, including the one here, are simply to offer the terms 
specified. Indeed, those principles are reflected in the remedy set 
forth in the consent decree.
---------------------------------------------------------------------------

    \19\See Allied Tube & Conduit Corp. v. Indian Head, Inc., 486 
U.S. 492, 500-01 (1998) (regarding the potential procompetitive 
advantages of private associations promulgating safety standards).
    \20\Orkin, 849 F.2d at 1361.
---------------------------------------------------------------------------

The Proposed Consent Order

    The Proposed Consent Order prohibits N-Data from enforcing the 
Relevant Patents, defined in the order, unless it has first offered to 
license them on terms specified by the order. The terms of that license 
follow from those promised by National Semiconductor in its letter of 
June 7, 1994, to the IEEE. Specifically, N-Data must offer a paid-up, 
royalty-free license to the Relevant Patents in the Licensed Field of 
Use in exchange for a one-time fee of $1,000. The form of this license 
is attached as Appendix C to the order. The Licensed Field of Use is 
defined in the license as the ``use of NWay Technology to implement an 
IEEE Standard,'' and this includes ``optimization and enhancement 
features'' that are consistent with such use. NWay Technology is 
defined in the license to have the same meaning as it did in the June 
7, 1994 letter, and the license gives examples of documents describing 
the use of NWay Technology.
    The Commission recognizes that some firms may inadvertently allow 
the $1,000 offer from N-Data to languish. Therefore, if an offeree has 
failed to accept such an offer within 120 days, the Proposed Consent 
Order allows N-Data to sue to enforce the Relevant Patents. At the time 
N-Data files suit, however, it must make a second offer. This second 
offer provides a prospective licensee with an opportunity to accept the 
patent license specified by the order in return for a payment of 
thirty-five thousand dollars ($35,000). The requirement that the second 
offer be delivered in the context of litigation gives N-Data an 
incentive to pursue patent enforcement only against companies over 
which it has a reasonable likelihood of prevailing in court. It will 
also ensure that the second offer will receive the full attention of 
knowledgeable counsel for the offeree. A $35,000 license fee will 
offset some of N-Data's costs of litigation, and it will discourage 
recipients of an initial offer from simply waiting to be sued, and then 
accepting the first offer. The offeree's time to accept the second 
offer expires with the time to file a responsive pleading to the filing 
that accompanies the second offer. After that, the amount that N-Data 
can collect from an accused infringer is not limited by the order.
    The Proposed Consent Order requires N-Data to distribute copies of 
the complaint and the Proposed Consent Order to specified persons. It 
also prohibits N-Data from transferring any of the Relevant Patents, 
except to a single person who has agreed to be bound by the Proposed 
Consent Order and by the patent licenses formed thereunder. The 
Proposed Consent Order also contains standard reporting, notification 
and access provisions designed to allow the Commission to monitor 
compliance. It terminates

[[Page 5851]]

twenty (20) years after the date it becomes final.

STATEMENT OF THE FEDERAL TRADE COMMISSION

    The Federal Trade Commission (``Commission'') has voted to issue a 
Complaint against Negotiated Data Solutions LLC (``N-Data'') and to 
accept the proposed consent agreement settling it.\1\ The Complaint in 
this matter alleges that N-Data reneged on a prior licensing commitment 
to a standard-setting body and thereby was able to increase the price 
of an Ethernet technology used by almost every American consumer who 
owns a computer. Based on the facts developed by staff during the 
investigation, we find reason to believe that this conduct violated 
Section 5 of the FTC Act.\2\
---------------------------------------------------------------------------

    \1\ Commissioners Harbour, Leibowitz, and Rosch support the 
issuance of the Complaint and proposed consent agreement and join in 
this statement.
    \2\ Section 5 of the FTC Act prohibits ``unfair methods of 
competition in or affecting commerce, and unfair or deceptive acts 
or practices in or affecting commerce.'' 15 USC Sec.  45(a)(1).
---------------------------------------------------------------------------

    The impact of Respondent's alleged actions, if not stopped, could 
be enormously harmful to standard-setting.\3\ Standard-setting 
organization participants have long worried about the impact of firms 
failing to disclose their intellectual property until after industry 
lock-in. Many standard-setting organizations have begun to develop 
policies to deal with that problem. But if N-Data's conduct became the 
accepted way of doing business, even the most diligent standard-setting 
organizations would not be able to rely on the good faith assurances of 
respected companies. The possibility exists that those companies would 
exit the business, and that their patent portfolios would make their 
way to others who are less interested in honoring commitments than in 
exploiting industry lock-in.\4\ Congress created the Commission 
precisely to challenge just this sort of conduct.
---------------------------------------------------------------------------

    \3\ One dissent recites a different set of facts than those 
alleged in the Complaint. We do not agree with that version of the 
facts. Rather, we believe that staff's investigation, as described 
in the Analysis to Aid Public Comment, accurately depicts the facts 
in this case.
    \4\ See generally Fed. Trade Comm'n , To Promote Innovation: The 
Proper Balance of Competition and Patent Law and Policy ch. 2 at 31, 
n. 220; ch. 3 at 38-41, available at https://www.ftc.gov/os/2003/10/
innovationrpt.pdf (2003) (conduct by ``non-producing entities''--
sometimes referred to as `patent trolls'--may harm consumers when 
such firms force manufacturers to agree to licenses after the 
manufacturers have sunk substantial investments into technologies).
---------------------------------------------------------------------------

    To prohibit such unacceptable behavior, the Commission today 
accepts a proposed consent agreement premised on a Complaint that 
identifies two separate violations. First, we find that N-Data's 
alleged conduct is an unfair method of competition. Second, we find 
that this conduct is also an unfair act or practice.
    There is little doubt that N-Data's conduct constitutes an unfair 
method of competition.\5\ The legislative history from the debate 
regarding the creation of the Commission is replete with references to 
the types of conduct that Congress intended the Commission to 
challenge. See, e.g., 51 Cong. Rec. 12,153 (1914) (statement of Sen. 
Robinson) (``unjust, inequitable or dishonest competition''), 51 Cong. 
Rec. 12,154 (1914) (statement of Sen. Newlands) (conduct that is 
``contrary to good morals''). The Supreme Court apparently agrees as it 
has found that the standard for ``unfairness'' under the FTC Act is 
``by necessity, an elusive one, encompassing not only practices that 
violate the Sherman Act and the other antitrust laws, but also 
practices that the Commission determines are against public policy for 
other reasons.''  F.T.C. v. Ind. Fed'n of Dentists, 476 U.S. 477, 454 
(1986); see also F.T.C. v. Sperry & Hutchinson Co., 405 U.S. 233, 242 
(1972) (FTC has authority to constrain, among other things ``deception, 
bad faith, fraud or oppression'').
---------------------------------------------------------------------------

    \5\ See, e.g., E.I. du Pont de Nemours & Co. v. FTC, 729 F.2d 
128 (2d Cir. 1984) (``Ethyl''); Official Airline Guides v. FTC, 630 
F.2d 920 (2d Cir. 1980). The conduct falls squarely within the 
parameters of cases like Ethyl. One dissent quotes a passage from 
the Ethyl decision; even that excerpt makes clear that a Section 5 
violation can be found when there are ``some indicia of 
oppressiveness'' such as ``coercive...conduct.'' For the reasons 
stated in the Analysis to Aid Public Comment, we find reason to 
believe that Respondent engaged in conduct that was both oppressive 
and coercive when it engaged in efforts to exploit licensees that 
were locked into a technology by the adoption of a standard. We 
believe the Analysis to Aid Public comment adequately describes the 
limiting principles applicable here. See generally Statement of 
Commissioner J. Thomas Rosch, Perspectives on Three Recent Votes: 
the Closing of the Adelphia Communications Investigation, the 
Issuance of the Valassis Complaint & the Weyerhaeuser Amicus Brief, 
before the National Economic Research Associates 2006 Antitrust & 
Trade Regulation Seminar, Santa Fe, New Mexico (July 6, 2006) at 5-
12, available at https://www.ftc.gov/speeches/rosch/Rosch-NERA-
Speech-July6-2006.pdf; Concurring Opinion of Commissioner Jon 
Leibowitz, In re Rambus, Inc., Docket No. 9302, available at https://
www.ftc.gov/os/adjpro/d9302/060802 
rambusconcurringopinionofcommissioner leibowitz.pdf.
    One dissent cites the Areeda and Hovenkamp antitrust treatise as 
well as several other sources to mistakenly suggest that there is a 
``scholarly consensus'' that an unfair method of competition cannot 
be found under Section 5 unless there is liability under the 
antitrust laws. Most of the sources cited by the dissent, however, 
actually support the Analysis to Aid Public Comment, which notes 
that, although Section 5 extends beyond the antitrust laws, there 
are limitations on its reach. Indeed, Professor Hovenkamp has 
explicitly acknowledged that there is a lack of consensus on the 
scope and application of Section 5. See Herbert Hovenkamp, Federal 
Antitrust Policy at 596-97 (3d ed. 2005). Professor Hovenkamp states 
that ``[t]here are two views about the wisdom of the FTC's use of 
Section 5'' and goes on to discuss ``[A]n alternative view, 
perfectly consistent with the proposition that the FTC's antitrust 
concern should be limited to identifying practices that are 
economically anticompetitive.'' Under that alternative view, it is 
appropriate to apply ``the FTC Act to practices that do not violate 
the other antitrust laws . . . when (1) the practice seems 
anticompetitive but is not technically covered by the antitrust 
laws; and (2) the social cost of an error seems to be relatively 
small.'' The social cost of an error here is small given the nature 
of the remedy and the low likelihood that a Commission consent order 
will be followed by a valid antitrust-based class action suit. See 
id. (``Findings of violations of the FTC Act that are not also 
antitrust violations will not support subsequent private actions for 
treble damages''). We nevertheless recognize Commissioner Kovacic's 
concern that FTC ``unfair methods'' cases may support private 
actions based on state law, and join him in encouraging comment on 
that issue.
---------------------------------------------------------------------------

    We also have no doubt that the type of behavior engaged in by N-
Data harms consumers. The process of establishing a standard displaces 
competition; therefore, bad faith or deceptive behavior that undermines 
the process may also undermine competition in an entire industry, raise 
prices to consumers, and reduce choices.\6\ We have previously noted 
that ``[i]ndustry standards are widely acknowledged to be one of the 
engines driving the modern economy.''\7\ Conduct like N-Data's--which 
undermines standard-setting--threatens to stall that engine to the 
detriment of all consumers.
---------------------------------------------------------------------------

    \6\ See Allied Tube & Conduit Corp. v. Indian Head, Inc., 486 
U.S. 492, 500 (1989); Am. Soc'y of Mech. Engineers, Inc. v. 
Hydrolevel Corp., 456 U.S. 556, 571 (1982); Standard Sanitary Mfg. 
Co. v. United States, 226 U.S. 20, 41 (1912). See generally Broadcom 
Corp. v. Qualcomm Inc., 501 F.3d 297, 310-314 (3d Cir. 2007).
    \7\ U.S. Dep't of Justice & Fed. Trade Comm'n, Antitrust 
Enforcement And Intellectual Property Rights: Promoting Innovation 
And Competition 33, available at https://www.ftc.gov/reports/
innovation/ P040101PromotingInnovationandCompetition rpt0704.pdf 
(2007).
---------------------------------------------------------------------------

    N-Data's conduct is also an unfair act or practice under Section 
5(n) of the FTC Act and Orkin Exterminating Co., 108 F.T.C. 263 (1986), 
aff'd, 849 F.2d 1354 (11th Cir. 1988). This Commission--unanimously--
has often found an unfair act or practice proscribed by Section 5 in 
conduct that victimizes businesses (as well as individuals) who are 
consumers. The dissent would distinguish those cases on the ground that 
the businesses here are all ``large, sophisticated computer 
manufacturers'' who are able to protect themselves. There is no basis 
for that distinction in Section 5. In any event, moreover, there is no 
basis in the record of this investigation for describing all of the 
``locked in'' licensees that way.

[[Page 5852]]

Similarly, as discussed in detail in the Analysis to Aid Public 
Comment, no meaningful distinction can be drawn between the 
circumstances in Orkin, where the respondent sought to exploit 
consumers who were ``locked into'' long term contracts, and the unique 
circumstances of this case, where licensees are ``locked into'' the 
standard containing technology controlled by this Respondent.
    We recognize that some may criticize the Commission for broadly 
(but appropriately) applying our unfairness authority to stop the 
conduct alleged in this Complaint. But the cost of ignoring this 
particularly pernicious problem is too high. Using our statutory 
authority to its fullest extent is not only consistent with the 
Commission's obligations, but also essential to preserving a free and 
dynamic marketplace.
    By direction of the Commission, Chairman Majoras and Commissioner 
Kovacic dissenting.

Donald S. Clark
Secretary

DISSENTING STATEMENT OF CHAIRMAN MAJORAS

    I respectfully dissent from the decision to lodge a Complaint in 
this matter and to accept the settlement described in the majority's 
Analysis of Proposed Consent Order to Aid Public Comment 
(``Analysis''). The facts do not support a determination of antitrust 
liability. The preconditions for use of stand-alone Section 5 authority 
to find an ``unfair method of competition'' are not present. And the 
novel use of our consumer protection authority to protect large 
corporate members of a standard-setting organization (``SSO'') is 
insupportable.
    This case presents issues that appear on first inspection to 
resemble those in our line of standard-setting ``hold up'' challenges, 
including Unocal,\1\Dell,\2\ and Rambus.\3\ As we and the Justice 
Department have explained jointly, ``multiple technologies may compete 
to be incorporated into the standard under consideration''\4\ by an 
SSO. Once a technology has been selected and the standard that 
incorporates the technology has been specified, however, the standard's 
adopters often will face significant relative costs in switching to an 
alternative standard. ``[T]he chosen technology may lack effective 
substitutes precisely because the SSO chose it as the standard. Thus, . 
. . the owner of a patented technology necessary to implement the 
standard may have the power to extract higher royalties or other 
licensing terms that reflect the absence of competitive alternatives. 
Consumers of the products using the standard would be harmed if those 
higher royalties were passed on in the form of higher prices.''\5\ In 
an effort to avoid the hold-up problem, some SSOs take measures to 
protect their members, such as imposing patent disclosure rules or 
securing agreement on licensing terms.\6\
---------------------------------------------------------------------------

    \1\ In re Union Oil Company of California, 2004 FTC LEXIS 115 
(FTC 2004) (``Unocal''), available at https://www.ftc.gov/os/adjpro/
d9305/040706commissionopinion.pdf.
    \2\ In re Dell, 121 F.T.C. 616 (1996).
    \3\ In re Rambus, FTC Dkt. No. 9302 (Liability Opinion, July 31, 
2006), appeal pending, Docket Nos. 07-1086, 07-1124 (D.C. Cir. 
2007).
    \4\ U.S. Department of Justice and Federal Trade Commission, 
Antitrust Enforcement And Intellectual Property Rights: Promoting 
Innovation And Competition (April 2007) at 35-36 [hereinafter ``DOJ/
FTC Intellectual Property Report''], available at https://
www.ftc.gov/reports/innovation/P040101 
PromotingInnovationandCompetitionrpt 0704.pdf.
    \5\ Id. at 36. See also Chairman Deborah Platt Majoras, 
Recognizing the Procompetitive Potential of Royalty Discussions in 
Standard Setting, Remarks before the Stanford University Conference 
on Standardization and the Law: Developing the Golden Mean for 
Global Trade (September 2005), available at https://www.ftc.gov/
speeches/majoras/050923stanford.pdf.
    \6\ DOJ/FTC Intellectual Property Report, supra note 4, at 36.
---------------------------------------------------------------------------

    This case departs materially from the prior line, however, in that 
there is no allegation that National engaged in improper or 
exclusionary conduct to induce IEEE to specify its NWay technology in 
the 802.3u standard. No one contends that National deceived SSO members 
at the time of its initial licensing offer in 1994. Further, from the 
time National submitted its letter of assurance in 1994 and at least 
until 2002, some patent holders changed or clarified the terms of their 
letters of assurance--even after the relevant standard was approved. 
And although a new IEEE bylaw, passed in January 2002, purported to 
make patent letters irrevocable, it did not address whether it was to 
apply retroactively. When Vertical submitted its 2002 proposal under 
which it would offer its entire patent portfolio that originated with 
National for license on reasonable and nondiscriminatory terms, the 
IEEE's Patent Administrator did not object to the departure from the 
$1,000 commitment, even while requesting and securing specific changes 
to Vertical's proposal. The IEEE then appeared to have accepted the 
revised proposal by posting Vertical's letter on its web site along 
with National's June 7, 1994 letter.
    There is also a substantial question as to whether N-Data enjoyed 
measurable market power, even with the adoption of the IEEE standard. 
Under the terms of the standard, the NWay technology was an optional 
technique. Although National in 1994 had offered to grant a paid-up, 
royalty-free license to the technology for $1,000 to anyone seeking to 
practice the standard, no company had sought to accept the offer until 
after publication of the 2002 revision on the IEEE web site. And 
despite ongoing licensing efforts by National's successors, Vertical 
and N-Data, only one company paid materially more than the originally-
quoted $1,000 for rights to the NWay technology.\7\ Most users 
evidently have preferred to infringe, running the risk of presumably 
minimal patent damages that they might face at the outcome of 
litigation.
---------------------------------------------------------------------------

    \7\ Paragraph 31 of the Complaint alleges that ``several 
companies'' entered into license agreements that have produced fees 
``far in excess'' of $1,000 per company. In fact, three companies 
entered into license agreements (with Vertical) for the patents. N-
Data has never received royalties or fees from those agreements, 
nor, as I understand it, has it collected any royalties for the 
relevant patents on terms inconsistent with those offered in the 
1994 letter. N-Data itself has initiated suit against one company, 
with which it had a dispute involving numerous patents other than 
those at issue in this case.
---------------------------------------------------------------------------

    Thus, the facts do not support antitrust liability here.
    The majority evidently agrees that respondent's conduct does not 
amount to improper acquisition or maintenance of monopoly power so as 
to fall within the ambit of Section 2 of the Sherman Act. Instead, the 
majority seeks to find liability purely under Section 5 of the FTC Act. 
This is not advisable as a matter of policy or prosecutorial 
discretion.
    The majority's first theory is that N-Data engaged in an unfair 
method of competition. Although Section 5 enables the Commission to 
reach conduct that is not actionable under the Sherman or Clayton Acts, 
we have largely limited ourselves to matters in which respondents took 
actions short of a fully consummated Section 1 violation (but with 
clear potential to harm competition), such as invitations to 
collude.\8\ This limitation is partly self-

[[Page 5853]]

imposed, reflecting the Commission's recognition of the scholarly 
consensus that finds the Sherman and Clayton Acts, as currently 
interpreted, to be sufficiently encompassing to address nearly all 
matters that properly warrant competition policy enforcement.\9\ But 
the limitation also reflects the insistence of the appellate courts 
that the Commission's discretion is bounded and must adhere to limiting 
principles. In E.I. du Pont de Nemours & Co. v. FTC, for example, the 
Second Circuit stated: ``[w]hen a business practice is challenged by 
the Commission, even though, as here, it does not violate the antitrust 
or other laws and is not collusive, coercive, predatory or exclusionary 
in character, standards for determining whether it is `unfair' within 
the meaning of Sec.  5 must be formulated to discriminate between 
normally acceptable business behavior and conduct that is unreasonable 
or unacceptable.''\10\ Writing in the context of a challenge to 
parallel conduct that did not arise from an agreement but that 
facilitated oligopolistic coordination, the Second Circuit adopted this 
test:
---------------------------------------------------------------------------

    \8\ See, e.g., In re Valassis Communications, Inc., Docket No. 
C-4160, FTC File No. 051 008 (Complaint), available at https://
www.ftc.gov/os/caselist/0510008/0510008c4160Valassis Complaint.pdf. 
In its Analysis, the Commission explained that competition would not 
be adequately protected if antitrust enforcement were directed only 
at consummated cartel agreements. The Commission further explicated 
the several legal (including precedent) and economic justifications 
that support the imposition of liability upon firms that communicate 
an invitation to collude where acceptance cannot be proven. Prior to 
the Valassis case, the Commission entered into consent agreements in 
several cases alleging that an invitation to collude--though 
unaccepted by the competitor--violated Section 5 of the FTC Act. 
MacDermid, Inc., Docket No. C-3911, FTC File No. 991 0167 (Decision 
& Order), available at https://www.ftc.gov/os/2000/02/
macdermid.do.htm; Stone Container Corp., 125 F.T.C. 853 (1998); 
Precision Moulding Co., 122 F.T.C. 104 (1996); YKK (USA) Inc., 116 
F.T.C. 628 (1993); A.E. Clevite, Inc., 116 F.T.C. 389 (1993); 
Quality Trailer Products Corp., 115 F.T.C. 944 (1992).
    \9\ See, e.g., 5 Julian O. Von Kalinoski, Peter Sullivan & 
Maureen McGuirl, Antitrust Laws and Trade Regulation, Sec.  77.02 at 
77-3 (2007) (``the prevailing view is that there are limitations on 
Section 5's applicability to conduct which stretches beyond the 
letter of [the Sherman or Clayton Acts].''); 2 Philip Areeda & 
Herbert Hovenkamp, Antitrust Law ] 302(h) (2006) (``Apart from 
possible historical anachronisms in the application of those 
statutes, the Sherman and Clayton Acts are broad enough to cover any 
anti-competitive agreement or monopolistic situation that ought to 
be attacked whether `completely full blown or not.'''); Richard A. 
Posner, The Federal Trade Commission: A Retrospective, 72 Antitrust 
L.J. 761, 766 (2005) (``It used to be thought that `unfair methods 
of competition' swept further than the practices forbidden by the 
Sherman and Clayton Acts, and you find this point repeated 
occasionally even today, but it is no longer tenable. The Sherman 
and Clayton Acts have been interpreted so broadly that they no 
longer contain gaps that a broad interpretation of Section 5 of the 
FTC Act might be needed to fill.''); John F. Graybeal, Unfair Trade 
Practices, Antitrust And Consumer Welfare In North Carolina, 80 N.C. 
L. Rev. 1927, 1949 (2002) (``Undoubtedly, the FTC today will proceed 
with great caution under section 5 to claim as an unfair method of 
competition any conduct that does not violate the Sherman or Clayton 
Acts.''). See also ABA Section of Antitrust Law, Antitrust Law 
Developments (6th ed. 2007) (``FTC decisions have been overturned 
despite proof of anticompetitive effect where the courts have 
concluded that the agency's legal standard did not draw a sound 
distinction between conduct that should be proscribed and conduct 
that should not.'').
    \10\ 729 F.2d 128, 138 (2d Cir. 1984).
---------------------------------------------------------------------------

     In our view, before business conduct in an oligopolistic industry 
may be labelled ``unfair'' within the meaning of Sec.  5 a minimum 
standard demands that, absent a tacit agreement, at least some indicia 
of oppressiveness must exist such as (1) evidence of anticompetitive 
intent or purpose on the part of the producer charged, or (2) the 
absence of an independent legitimate business reason for its conduct. . 
. . In short, in the absence of proof of a violation of the antitrust 
laws or evidence of collusive, coercive, predatory, or exclusionary 
conduct, business practices are not ``unfair'' in violation of Sec.  5 
unless those practices either have an anticompetitive purpose or cannot 
be supported by an independent legitimate reason.\11\
---------------------------------------------------------------------------

    \11\ Id. at 139-140.
---------------------------------------------------------------------------

    In its Analysis, the majority extends the du Pont formulation to 
the monopolization family, asserting that respondent's conduct was 
``coercive'' and ``oppressive'' and had an ``adverse impact on prices 
for autonegotiation technology[.]''\12\ These assertions are impossible 
to prove on the evidence we have. N-Data asserts that its renegotiation 
of its licensing terms was motivated by nothing other than an 
independent, business reason--that is, the aim of collecting royalties 
for a new bundle of intellectual property rights on reasonable and non-
discriminatory terms. Even if N-Data were motivated by a desire to 
strike a better bargain than National made several years earlier, that 
alone should not be considered a competition-related offense. If the 
majority's theory is that the evasion of contractual price constraints 
triggers liability under Section 5 without a concurrent determination 
that the conduct violates the Sherman Act, then we are headed down a 
slippery slope, and I take no comfort from the majority's 
representation to the contrary. Parties often enter into contractual 
commitments involving asset-specific investments, creating the 
potential for opportunism. The majority has not identified a meaningful 
limiting principle that indicates when an action--taken in the 
standard-setting context or otherwise--will be considered an ``unfair 
method of competition.''
---------------------------------------------------------------------------

    \12\ Analysis at 5.
---------------------------------------------------------------------------

    Pursuing a second theory, the majority invokes consumer protection 
doctrine to find that respondent has engaged in an ``unfair act or 
practice'' in violation of Sections 5(a) and (n) of the FTC Act.\13\ 
Section 5(n) provides a clear limitation of the Commission's authority: 
``[t]he Commission shall have no authority under this section or 
section 57a of this title to declare unlawful an act or practice on the 
grounds that such act or practice is unfair unless the act or practice 
causes or is likely to cause substantial injury to consumers which is 
not reasonably avoidable by consumers themselves and not outweighed by 
countervailing benefits to consumers or to competition.''\14\ The 
evidence simply does not support the requisite findings.
---------------------------------------------------------------------------

    \13\ In Rambus, the Commission drew upon its experience with the 
law regarding deceptive acts or practices, which has been developed 
largely in consumer protection contexts, to inform our analysis of 
deception before an SSO as part of an exclusionary course of 
conduct. Rambus, supra note 3, at 29-30. We did so, however, within 
a framework based on Sherman Act jurisprudence, recognizing, inter 
alia, the need to examine competitive effects.  Id. at 28-31. The 
majority's extension of our authority over unfair acts or practices, 
which Congress has specifically limited in Section 5(n), raises 
altogether different issues.
    \14\ 15 U.S.C. Sec.  45(n) (2000). See also International 
Harvester Co., 104 F.T.C. 949, 1061 (1984).
---------------------------------------------------------------------------

    In particular, finding ``substantial consumer injury'' here 
requires the majority to treat large, sophisticated computer 
manufacturers as ``consumers.'' I do not agree with such a 
characterization, and I have serious policy concerns about using our 
consumer protection authority to intervene in a commercial transaction 
to protect the alleged ``victims'' here. The Analysis accurately states 
that the FTC has used its authority under Section 5 to protect small 
businesses against unfair acts and practices. We have taken care to 
exercise this authority judiciously, however, to protect small 
businesses, non-profits, churches, and ``mom and pop'' operations\15\ 
that lack

[[Page 5854]]

the resources and, in some cases, the experience or understanding to 
defend themselves adequately against fraud. Indeed, certain of these 
small business owners, non-profit volunteers, and clergy had personally 
guaranteed the contracts at issue. There is a clear qualitative 
difference between these entities and the computer manufacturers that 
the majority treats as injured consumers in this matter.\16\
---------------------------------------------------------------------------

    \15\ See, e.g., FTC v. Websource Media, LLC, No. H-06-1980 (S.D. 
Tex. filed June 12, 2006) (unfair practice of ``cramming'' 
unauthorized charges onto the telephone bills of small businesses); 
FTC v. Certified Merchant Services, Ltd., No. 4:02CV44 (E.D. Tex. 
filed February 11, 2002) (unfair practice of unilaterally inserting 
additional pages that describe substantial, undisclosed charges into 
credit card processing contracts with small business merchants); FTC 
v. IFC Credit Corp., No. 07C3155 (N.D. Ill. filed June 6, 2007) 
(unfair practice of accepting and collecting on invalid, 
fraudulently induced equipment contracts with small businesses and 
religious and other nonprofit organizations). The majority cites to 
the Franchise Rule as another example of the Commission using its 
Section 5 consumer protection authority to protect small businesses 
from deceptive practices. While the Franchise Rule, which requires 
certain disclosures prior to the sale of a franchise, sometimes 
protects businesses, it typically protects individual consumers that 
are purchasing franchises rather than sophisticated corporations. In 
ado
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.