IP Assignment Verification Checklist
A detailed checklist for verifying the chain of title and completeness of intellectual property assignments during M&A diligence. Covers employee agreements, contractor assignments, open source compliance, and registration status.
1Employee IP Assignments
Verify that all current employees have signed IP assignment agreements (PIIAs or CIIAAs)
CriticalConfirm that founders executed IP assignment agreements at or before incorporation
CriticalCheck whether state-specific carve-outs apply (California Labor Code Section 2870, Illinois, Washington, etc.)
ImportantReview whether former employees who contributed to core IP signed assignment agreements before departure
CriticalVerify that employee invention disclosure procedures are documented and followed
StandardCheck for any employee claims to prior inventions listed in their PIIAs that overlap with company IP
ImportantConfirm that IP assignments cover all forms of IP (patents, copyrights, trade secrets, moral rights)
ImportantReview whether assignments include a present tense grant ("hereby assigns") rather than a future promise ("agrees to assign")
Important2Contractor and Third-Party IP
Identify all contractors, consultants, and agencies who contributed to core product development
CriticalVerify that each contractor agreement includes an express IP assignment clause (work-for-hire alone is insufficient for many IP types)
CriticalConfirm that contractor agreements include work-for-hire language for copyrightable works where applicable
ImportantCheck whether any outsourced development firms retain licenses to reuse code or frameworks
CriticalReview whether university or research institution contributors have assigned or licensed their IP to the company
ImportantVerify that all joint development agreements clearly allocate IP ownership
ImportantCheck for any government funding (SBIR, DARPA) that may create march-in rights or use restrictions
ImportantConfirm that no contractor IP is subject to a prior assignment to a different entity
Standard3Patent and Trademark Portfolio
Obtain and verify the complete patent portfolio (issued, pending, provisional) with assignment chain for each
CriticalConfirm all patent assignments are recorded with the USPTO and any relevant foreign patent offices
CriticalVerify maintenance fee payments are current for all issued patents
ImportantCheck whether any patents are subject to license-back obligations from prior acquisitions
ImportantReview all trademark registrations and confirm chain of title from original applicant to current owner
ImportantIdentify any gaps in trademark use or registration that could affect enforceability
StandardVerify that domain name registrations are held by the company (not founders or employees personally)
ImportantCheck for any IP encumbrances, liens, or security interests (especially from venture debt)
Critical4Open Source and Third-Party Software
Conduct a software composition analysis (SCA) scan to identify all open source components
CriticalFlag any copyleft licenses (GPL, AGPL, LGPL) that could create obligations to disclose proprietary source code
CriticalReview compliance with attribution and notice requirements for all open source licenses
ImportantVerify that the company has an open source usage policy and that engineers follow it
StandardCheck for any third-party commercial software licenses that are non-transferable in an acquisition
ImportantConfirm that no open source contributions by employees created upstream obligations on company IP
StandardReview whether any open source component has a license incompatible with the company's licensing model
ImportantVerify that the company maintains a software bill of materials (SBOM) for its products
Standard5Trade Secrets and Data Assets
Verify that reasonable measures are in place to protect trade secrets (access controls, NDAs, clean rooms)
CriticalConfirm that proprietary data sets, training data, and algorithms are properly classified and protected
CriticalReview whether any departing employees had access to trade secrets and signed adequate post-employment obligations
ImportantCheck for any pending or threatened trade secret misappropriation claims
ImportantVerify that data room access logs demonstrate controlled distribution of sensitive IP materials
StandardConfirm that the company's data collection practices comply with privacy laws and that data sets can be transferred
ImportantReview whether any trade secrets were disclosed in patent applications without adequate protection
StandardCheck physical and digital security measures for source code repositories
StandardDownload this checklist as PDF
Enter your details to get a downloadable version of this checklist for your next deal.