Intellectual Property Advisory Services
Kroll’s advice helps businesses worldwide protect and monetize their IP and intangible assets more effectively. We offer clear, current and informed advice across a breadth of issues around IP valuation, licensing, economics, transfer pricing and transaction advice. Our interdisciplinary team boasts expertise spanning various industries, covering IP licensing, strategy, transactions and disputes. We also offer expert witness testimony in cases centered on IP infringement.
Kroll’s Data Insights and Forensics practice focuses on due diligence during IP acquisition and creation, support in securing protection rights, managing trade secrets and cybersecurity, monitoring for IP right infringement or license misuse; and support during the compliance and renewals processes to ensure continuity of protection.
Intellectual Property Disputes and Damages Analysis
Our testifying experts support and advise clients in IP disputes and have been called on to provide independent damages analyses, expert reports and expert testimony in courts across the U.S. and Canada, at the International Trade Commission, and across global arbitration venues, including the LCIA, ICC, ICSID, SCC, HKIAC, CIETAC and SIAC.
Kroll experts are renowned for delivering analysis and testimony pivotal to the outcomes of high stakes litigation. This includes cases involving infringement of patents (including Georgia-Pacific factors for determining reasonable royalties and Panduit factors for lost profits), copyrights, trademarks and Lanham Act, trade secrets (including the UTSA) and international trade (including exclusion orders and domestic industry at the International Trade Commission).
Intellectual Property Investigations
Kroll’s IP Investigations practice provides a comprehensive approach to mitigating and responding to patent infringement, IP theft, counterfeiting, unauthorized gray market diversion, illicit trade, leaks of confidential information and misinformation/disinformation. We help companies identify threats to IP and confidential information internally and throughout their supply chain, develop the appropriate mitigation strategies and carry out IP investigations to identify suspected infringements. When infringements occur, we use the most sophisticated techniques to establish the harm inflicted.