TechnologyResourcesCapital MarketsComing Soon
Back to ChecklistsTemplate

IP Assignment Verification Checklist

A detailed checklist for verifying the chain of title and completeness of intellectual property assignments during M&A diligence. Covers employee agreements, contractor assignments, open source compliance, and registration status.

40 items5 categories

1Employee IP Assignments

Verify that all current employees have signed IP assignment agreements (PIIAs or CIIAAs)

Critical

Confirm that founders executed IP assignment agreements at or before incorporation

Critical

Check whether state-specific carve-outs apply (California Labor Code Section 2870, Illinois, Washington, etc.)

Important

Review whether former employees who contributed to core IP signed assignment agreements before departure

Critical

Verify that employee invention disclosure procedures are documented and followed

Standard

Check for any employee claims to prior inventions listed in their PIIAs that overlap with company IP

Important

Confirm that IP assignments cover all forms of IP (patents, copyrights, trade secrets, moral rights)

Important

Review whether assignments include a present tense grant ("hereby assigns") rather than a future promise ("agrees to assign")

Important

2Contractor and Third-Party IP

Identify all contractors, consultants, and agencies who contributed to core product development

Critical

Verify that each contractor agreement includes an express IP assignment clause (work-for-hire alone is insufficient for many IP types)

Critical

Confirm that contractor agreements include work-for-hire language for copyrightable works where applicable

Important

Check whether any outsourced development firms retain licenses to reuse code or frameworks

Critical

Review whether university or research institution contributors have assigned or licensed their IP to the company

Important

Verify that all joint development agreements clearly allocate IP ownership

Important

Check for any government funding (SBIR, DARPA) that may create march-in rights or use restrictions

Important

Confirm that no contractor IP is subject to a prior assignment to a different entity

Standard

3Patent and Trademark Portfolio

Obtain and verify the complete patent portfolio (issued, pending, provisional) with assignment chain for each

Critical

Confirm all patent assignments are recorded with the USPTO and any relevant foreign patent offices

Critical

Verify maintenance fee payments are current for all issued patents

Important

Check whether any patents are subject to license-back obligations from prior acquisitions

Important

Review all trademark registrations and confirm chain of title from original applicant to current owner

Important

Identify any gaps in trademark use or registration that could affect enforceability

Standard

Verify that domain name registrations are held by the company (not founders or employees personally)

Important

Check for any IP encumbrances, liens, or security interests (especially from venture debt)

Critical

4Open Source and Third-Party Software

Conduct a software composition analysis (SCA) scan to identify all open source components

Critical

Flag any copyleft licenses (GPL, AGPL, LGPL) that could create obligations to disclose proprietary source code

Critical

Review compliance with attribution and notice requirements for all open source licenses

Important

Verify that the company has an open source usage policy and that engineers follow it

Standard

Check for any third-party commercial software licenses that are non-transferable in an acquisition

Important

Confirm that no open source contributions by employees created upstream obligations on company IP

Standard

Review whether any open source component has a license incompatible with the company's licensing model

Important

Verify that the company maintains a software bill of materials (SBOM) for its products

Standard

5Trade Secrets and Data Assets

Verify that reasonable measures are in place to protect trade secrets (access controls, NDAs, clean rooms)

Critical

Confirm that proprietary data sets, training data, and algorithms are properly classified and protected

Critical

Review whether any departing employees had access to trade secrets and signed adequate post-employment obligations

Important

Check for any pending or threatened trade secret misappropriation claims

Important

Verify that data room access logs demonstrate controlled distribution of sensitive IP materials

Standard

Confirm that the company's data collection practices comply with privacy laws and that data sets can be transferred

Important

Review whether any trade secrets were disclosed in patent applications without adequate protection

Standard

Check physical and digital security measures for source code repositories

Standard

Download this checklist as PDF

Enter your details to get a downloadable version of this checklist for your next deal.