Title: Electronic Laboratory Notebooks: Requirements, Selection
1Electronic Laboratory Notebooks Requirements,
Selection Best Practices
John Gase Leydig, Voit Mayer, Ltd.
2Scope of the Presentation
- What is an Electronic Laboratory Notebook (ELN)?
- When might an ELN be used as evidence?
- Why are there concerns about using an ELN instead
of a traditional paper notebook? - What are the legal requirements for use of an ELN
in court or before the U.S. Patent and Trademark
Office? - How does an ELN try to satisfy the legal
requirements? - Other considerations
2
3What is an Electronic Laboratory Notebook (ELN)?
- An ELN is paperless system designed to replace
the traditional paper-based laboratory notebooks - An ELN is not
- Merely storing electronic copies of paper records
- Wet signed print-outs of computer-generated
pages
3
4Lab Notebooks as Evidence
- Whenever the Who What or When of
inventorship is called into question - Interference Proceedings (Conception, diligence,
reduction to practice) - Validity Challenges (Antedating prior art)
- Misappropriation of trade secrets correction of
inventorship - Issues might be raised in Federal Court or before
the U.S. Patent and Trademark Office
4
5Concerns
- Electronic evidence is routinely used in court
- Federal Rules of Evidence specifically provide
for the use of electronic evidence - Electronic evidence can be used in interferences
to the extent allowed by the federal rules - Still, ELNs have not been tested in court, and
there is uncertainty as to whether ELNs satisfy
legal evidentiary requirements
5
6Concerns
- Electronic evidence presents special problems
- Fear that information is easily changed, and that
changes are hard to detect - Sometimes difficult to determine authorship or
time of creation - As a result, electronic evidence can require a
rigorous foundation that can be difficult to
prove (e.g., AmEx Travel v. Vinhnee (9th Cir.
2005))
6
7Concerns
- If it is critical to the success of your case
to admit into evidence computer stored records,
it would be prudent to plan to authenticate the
record by the most rigorous standard that may be
applied. - - Judge Paul W. Grimm Lorraine v. Markle Am.
Ins. (D. Md. 2007)
7
8Legal Requirements
- Admissibility The Gatekeeper function of the
court, ensures a minimum threshold of quality and
reliability of evidence. - Relevant
- Authentic
- Not hearsay, or falls within an exception to the
hearsay rule
8
9Legal Requirements
- Credibility Once admitted, how much weight
is the evidence entitled - All factors can be considered, including the
criteria for admissibility - Bolster credibility by establishing the
trustworthiness and reliability of the evidence
and witnesses
9
10Legal Requirements
- Corroboration Legal standard applicable to an
inventors testimony regarding his or her own
invention - An inventors testimony regarding inventorship
must be corroborated by independent evidence - Example Notebook records signed by a
non-inventor who has read and understood the
record
10
11Legal Requirements
- Establishing the legal elements requires proof
that addresses the following questions - What is the record being offered?
- Who authored and witnessed the record?
- When was the record created?
- How was the record maintained, and has it changed?
11
12What is the record being offered?
- Traditional Notebook
- Looks and feels like a laboratory notebook
- Easily established by custodian or author
- Electronic Notebook
- Any of a variety of different formats
- Witness testimony that the printouts are accurate
copies of the data stored in the ELN
12
13Who authored or witnessed the record?
- Traditional Notebook Each page bears the
inventors and witnesses unique handwritten
signatures - ELNs No way to associate a traditional signature
with an entry, and must have an electronic
solution
13
14Electronic Signatures
- Key Functions of a signature
- Uniquely identifies the signor
- Associates the signor with a particular document
- By being an affirmative act, signifies approval
or consent - Electronic signature should perform these same
functions
14
15Electronic Signatures
- Electronic Signature encompasses a variety of
signing methods that have different levels of
integrity - Generally, an Electronic Signature must
- Assign a unique identifier to a user
- Authenticate the user to the ELN system
- By an affirmative act, associate the users
identifier with the document
15
16Soft E-Signatures
- Common Attributes
- An ID and password are assigned to a user
- The system authenticates the user, generally by a
login procedure using the ID and password - By an affirmative act (e.g., clicking a link),
the ELN signs a document and converts it to a
read only format - The user (by user ID) is linked to the signed
document through a log
16
17Soft E-Signatures
- Common problems
- ID/password combination identifies the user only
within a given system - Third-party cannot validate the signature (need
computer logs) - No way to verify what was signed except through
circumstantial evidence (e.g., access logs,
witnesses, etc.)
17
18Digital Signatures
- Common Attributes
- Unique encryption key pair is assigned to a user
by a Certification Authority (CA) - Key pair private key used by the signor to sign
a document, and a public key used by any third
party to verify the signature - System is known as Public Key Infrastructure (PKI)
18
19Digital Signing Process
20Digital Verification Process
21Digital Signatures
- Advantages of Digital Signature using PKI
- Unique to a high degree of probability without
regard to the system used - Verifiable by third-parties independent of the
system used to create the signature - Signature is inextricably associated with the
document itself - A valid signature confirms the integrity of the
document
21
22Strength of Electronic Signatures
- Other factors affecting strength
- Identity Vetting How is the identity of a user
verified before issuing a user ID or PKI
Certificate? - User Authentication How does the ELN identify
the user? - Weak Private key resides on a server and is
password protected - Strong (Multi-Factor) Private key resides on
a hardware token protected by a password
22
23When was the record created?
- Traditional Notebook
- Each page bears the inventors handwritten date
and a witnesss handwritten date - In a continuous, bound volume of dated materials,
a dated page has some degree of trustworthiness
23
24When was the record created? (contd)
- Electronic Records
- Most often dated by the computer or server on
which they reside - Dates can change with duplication
- A computer or server date clock is subject to
failure and easily manipulated - May need circumstantial evidence to date the
document
24
25Digital Timestamp
- Third-Party Timestamp Authority (TSA) is a
widely-used, trusted time/date clock - Using its own digital key pair (PKI), the TSA
digitally timestamps and signs the document - Digital timestamp is associated with the document
in the same manner as a digital signature
25
26Digital Timestamp Process
27Digital Timestamp Process
28Digital Timestamp (contd)
- Advantages of Digital Timestamps
- Inextricably associated with the document itself
- Any change to the document invalidates the
Timestamp - Thus, a valid timestamp verifies no changes were
made after the timestamp was applied
28
29How was the record maintained, and has it changed?
- Regardless of the system, witnesses must be
available to testify as to the policies and
procedures for creating and keeping records - Controlled access to laboratory notebooks is
important - The ability to detect changes is key
29
30How was the record maintained, and has it
changed? (contd)
- Handwritten documents Changes can be discovered
forensically by examining the document itself - Electronic records Some changes can be
discovered forensically by examining computer
logs, metadata, etc.
30
31How was the record maintained, and has it
changed? (contd)
- Digital Signatures with digital timestamps offer
a major advantage Any change to a signed
document will invalidate the digital signature
and timestamp - Thus, the validity of the signature and timestamp
itself provides evidence that the document has
not been altered
31
32Legal Requirements - Conclusions
- An ELN employing true digital signatures and
timestamps should satisfy the requirements of
admissible evidence, but its a sliding scale
32
33Legal Requirements - Conclusions
-
- Improve chances of success by
- Digital signatures and timestamps, using (PKI) or
equivalent - A reputable and widely-used Certificate Authority
and Timestamp Authority - Strong user authentication
- Controlled access to stored documents
- People knowledgeable about the systems who can
serve as witnesses
33
34Other Considerations
- Obsolescence Aside from the storage medium,
consider whether the format of the electronic
document (e.g., .pdf) will be accessible
long-term - Content Be conscious of how the system treats
embedded/hyperlinked materials when a page is
signed or document closed for storage - Hybrid systems If wet signed printouts of
an ELN are used, consider serial numbers or other
method to replicate the bound and continuous
characteristic of traditional lab notebooks
34
35Questions?
36Thank You
John L. Gase (312) 616-5644 jgase_at_leydig.com www.l
eydig.com
37Seattle1420 Fifth Avenue Suite 3670 Seattle,
Washington 98101-4011Tel (206) 428-3100Fax
(312) 616-5700Washington, D.C.700 Thirteenth
Street N.W.Suite 300Washington, D.C.
20005-3960Tel (202) 737-6770Fax (202)
737-6776
ChicagoTwo Prudential Plaza, Suite 4900180
North Stetson AvenueChicago, Illinois
60601-6731Tel (312) 616-5600Fax (312)
616-5700Rockford6815 Weaver RoadSuite
300Rockford, Illinois 61114-8018Tel (815)
963-7661Fax (815) 963-7664www.leydig.com