Pre-Transaction · Magic Circle-Grade Framework

Intellectual Property
Due Diligence Playbook
for Bangladesh

Institutional IP Audit, FTO, Reps & Warranties Framework for M&A, IPOs, and PE / VC Fundraising

Authored by LegalSeba LLP | Leading Law Firm in Bangladesh

Overview: IP Due Diligence in Bangladesh

In modern corporate transactions—whether a strategic acquisition (M&A), an Initial Public Offering (IPO), a carve-out divestiture, a licensing deal, or early-stage fundraising (Series A/B)—conducting a thorough IP Due Diligence and intellectual property compliance audit is rarely a checkbox item. In knowledge-intensive deals, IP findings drive valuation, dictate the architecture of representations and warranties, determine the size of indemnity caps and escrows, and—not infrequently—break deals.

As a leading law firm in Bangladesh, LegalSeba LLP deploys an institutional-grade IP audit framework modelled on the methodologies used by Magic Circle firms (Allen & Overy, Clifford Chance, Linklaters, Freshfields, Slaughter and May), adapted to Practical Law / LexisNexis market-standard checklists, and overlaid with the specific recordal, registration, and enforcement quirks of Bangladeshi law: the Trademarks Act, 2009, the Bangladesh Patent Act, 2023 (in force 27 February 2025), the Bangladesh Industrial Designs Act, 2023, the Copyright Act, 2023, and the administrative practice of the Department of Patents, Designs and Trademarks (DPDT) alongside the RJSC and Bangladesh Bank.

Why is an IP Portfolio Audit Required?

In knowledge-economy transactions—SaaS, fintech, pharma, fashion, FMCG, media—a target's enterprise value is overwhelmingly intangible. Routine and transactional IP diligence are commercial necessities required to:

  • 1. Validate Deal Valuation Verify that the core technology, brand equity, content library, or data asset driving the purchase price is actually owned by the target, registered in the correct jurisdictions, and not encumbered by liens, exclusive licences, or co-ownership arrangements.
  • 2. Uncover Deal-Breaking Liabilities Identify Freedom-to-Operate (FTO) exposures, latent infringement claims, unrecorded DPDT assignments rendering rights unenforceable against third parties, viral open-source contamination, AI-training-data provenance issues, and restrictive covenants that survive closing.
  • 3. Architect Reps, Warranties & Indemnities Translate diligence findings into the IP schedule of the SPA: ownership reps, sufficiency reps, non-infringement reps, data-protection reps; specific indemnities for known risks; survival periods, caps, and baskets calibrated to materiality.
  • 4. Structure Pre-Close Remediation Pre-closing covenants for: executing missing employee PIIAs and contractor assignments, recording assignments at DPDT, obtaining licensor consents to change-of-control, releasing IP-secured liens, and curing OSS contamination. R&W insurance underwriters will require this to bind cover.
  • 5. Ensure IPO & Fundraising Readiness Underwriters, prospectus reviewers, the BSEC, and institutional VCs require a clean IP report. Foreign investment and fund repatriation mechanics under Bangladesh Bank approvals also turn on clean intangible-asset title.
  • 6. R&W Insurance Underwriting Where the deal is insured, IP DD scope, materiality thresholds, and disclosure quality directly determine policy retention (typically 0.5–1% of EV), policy limit (10–20% of EV), and any IP-specific exclusions or sub-limits.

The Five Pillars of an IP Audit

  • 1.Existence: Does the IP exist as a legally recognised right (granted patent, registered mark, fixed copyrightable expression, qualifying trade secret)?
  • 2.Ownership / Chain of Title: Does the target hold clean, recorded, unbroken title—from inventor / author / first user through every assignment?
  • 3.Validity & Enforceability: Is the right legally robust—patent claims supported, marks not generic, trade secrets reasonably protected, copyrights original?
  • 4.Encumbrances: Liens, exclusive licences, ROFRs/ROFOs, MFNs, change-of-control triggers, security interests, registered users, co-ownership.
  • 5.Freedom to Operate (FTO): Does the target's business infringe third-party IP? Are there blocking patents, prior-user rights, or pending oppositions?

Buyer Type Drives Diligence Depth

🏢 Strategic Buyer (Trade)

Operates in adjacent or competing markets. Heightened FTO and antitrust focus; non-compete covenants in target licences scrutinised.

💼 Private Equity / Sponsor

Portfolio-company change-of-control issues; assignability of licences across sponsor's portfolio; exit-readiness; QoE-style "IP add-back" analysis.

📈 Venture Capital / Growth

Founder assignment, contractor IP, OSS, AI training data, data-privacy. House-cleaning focus over deep FTO. Typically Level 1–2 diligence.

🏛 IPO / Public Markets

Disclosure-grade. Risk factors in prospectus; liability for material omissions; IP "sufficiency" rep critical for investor protection.

The Bangladesh Statutory IP Framework

Effective IP diligence in Bangladesh requires precise mapping of each asset class to its governing statute, registry, and recordal regime. The framework was substantially modernised in the 2022–2025 period in preparation for Bangladesh's graduation from Least Developed Country (LDC) status and TRIPS compliance:

Asset ClassGoverning StatuteRegistryRecordal Regime
Trade Marks (incl. service marks, certification marks, collective marks, trade dress)Trademarks Act, 2009 (Act XIX of 2009); Trademark Rules, 2015DPDT (Trade Marks Wing), Ministry of IndustriesSingle-class only. Initial term 7 years; renewals every 10 years. Assignments and licences (Registered User Agreements) must be recorded with DPDT to be effective against third parties (s.40, s.44).
PatentsBangladesh Patent Act, 2023 (Act 53 of 2023), in force 27 Feb 2025 (SRO 56-Law/2025)—repealing the 1911 Act and the 2022 ActDPDT (Patents Wing); Director General has powers akin to a civil court20-year term from filing; annuities mandatory; assignments require recordal; compulsory licensing and Bolar / research exceptions codified.
Industrial DesignsBangladesh Industrial Designs Act, 2023 (Act 22 of 2023)DPDT (Designs Wing)Protects shape, lines, colours, GUIs, calligraphy, ornamental features. Replaced the design provisions of the 1911 Act.
Copyright (literary, artistic, musical, dramatic, cinematographic, software, databases)Copyright Act, 2023 (succeeding Copyright Act, 2000)Bangladesh Copyright Office (BCO)Automatic on fixation; registration is prima facie evidence, not constitutive. Term: life of author + 60 years (most works). Assignments must be in writing.
Geographical Indications (GIs)Geographical Indications of Goods (Registration & Protection) Act, 2013DPDT (GI Wing)Collective right; producer associations register; e.g. Jamdani, Hilsha, Fazli Mango.
Trade Secrets / Know-HowNo standalone statute; protection via contract law (Contract Act, 1872) and the doctrine of breach of confidence; Penal Code provisions for theftNone (unregistered)Protection arises from "reasonable steps" to maintain secrecy: NDAs, access controls, marking, exit interviews, IT segregation.
Domain Names (.bd)BTRC policies; UDRP for international gTLDsBTCL (.bd ccTLD); ICANN-accredited registrars (gTLDs)Contractual; passing-off and trade-mark remedies for cybersquatting.
Personal Data & CybersecurityPersonal Data Protection Ordinance, 2025 (Ordinance 61 of 2025, 6 Nov 2025); Cyber Security Ordinance, 2025 (Ordinance 25 of 2025, 21 Jul 2025) — repealing the Cyber Security Act, 2023; ICT Act 2006 (s.66) for residual offencesNational Data Management Authority (PDPO); National Cyber Security Agency / NCERT / NSOC (CSO)PDPO codifies data-subject rights (access, portability, correction, erasure), consent, breach notification, 5-year record retention; sensitive PD and CII data must keep at least one synchronised real-time copy inside Bangladesh (s.29(7)(b)). Ch. III and ss.31–46 transition over 18 months from enactment.

Distinguishing Trade Marks, Copyrights & Patents — Why It Matters in Diligence

Many target assets exist in overlapping zones (a logo is both a copyrighted artistic work and a trade mark; a software UI is copyrighted code, copyrighted artwork, potentially a registered design, and possibly patentable). Sophisticated diligence treats each layer separately because the protection mechanism, term, recordal requirement, and breach analysis differ:

© Copyright (2023)

Protects: Original expression—software code, marketing copy, photographs, music, video, manuals, databases.

Arises: Automatically on fixation. No registration required for validity.

DD focus: Was the author an employee in the course of employment? If a contractor, was there a written assignment? Is the work original or derivative? Any moral-rights issues?

Trade Marks (2009)

Protects: Source identifiers in commerce—names, logos, slogans, packaging, trade dress.

Arises: Registration + use; common-law passing-off for unregistered marks with acquired distinctiveness.

DD focus: Single-class coverage gaps; renewals; 5-year non-use cancellation risk; recorded assignments and Registered User Agreements; opposition / cancellation history.

Patents (2023)

Protects: New, inventive, industrially applicable products and processes.

Arises: Examination + grant. 20-year term from filing.

DD focus: Claim scope vs. competitor design-arounds; prosecution-history estoppel; annuity payments; co-inventor entitlement; government/academic funding strings; FTO against blocking patents.

Transaction-Type Calibration

Skadden / Practical Law and Magic Circle practice both emphasise that "one size does not fit all": the deal structure dictates the diligence depth and which IP issues are dispositive. The five-level framework below is adapted from the Association of Corporate Counsel ("ACC") taxonomy and aligns with how LegalSeba LLP scopes IP DD engagements.

The Five Levels of IP Diligence Depth

1

Level 1 — Catalogue / Inventory

Schedule of all registered IP, applications, domains, and material unregistered rights. Confirm the target knows what it owns. Used for: seed rounds, asset-listing exercises, internal IP audits.

2

Level 2 — Ownership & Chain of Title

Verify clean, recorded title. Founder assignments, employee PIIAs, contractor work-for-hire, recorded DPDT assignments, lien searches. Used for: Series A/B, internal restructuring, IPO readiness.

3

Level 3 — Validity, Encumbrances & Commercial Review

Level 2 + scope/strength of registrations, claim breadth, licence-in/-out review, change-of-control analysis, OSS scans, dispute history. Used for: most M&A, mid-market PE, growth equity.

4

Level 4 — Freedom-to-Operate (FTO)

Affirmative search for blocking third-party rights: patent landscaping, trade-mark clearance in expansion markets, design-around analysis, prior-art searches. Often skipped at lower levels because of cost. Used for: large strategic M&A, PE platform deals, product launches.

5

Level 5 — Strategic / Valuation

Income-approach IP valuation, royalty-stacking analysis, competitor patent benchmarking, R&D pipeline mapping, AI-model and data-asset appraisal. Conducted with valuation specialists. Used for: bet-the-company deals, IP-only acquisitions, contested transactions.

Deal Structure → IP Diligence Implications

StructureAnti-Assignment / CoC RiskSchedule GranularityTypical Pitfalls
Asset PurchaseHIGH — most licences contain anti-assignment clauses triggered by a deemed transfer of contract.Maximum — every IP asset transferred must be itemised. Items not on the schedule do not transfer.Stranded IP; missed domain names, social media handles, GI registrations, or unregistered marks; non-transferable Registered User Agreements at DPDT.
Share / Stock PurchaseMEDIUM — depends on each licence's change-of-control language; some clauses bite, others do not.Lower — IP follows the entity automatically.CoC consents from key licensors; loss of public-sector / SOE contracts that require change-of-control notification.
Reverse MergerLOW–MEDIUM — survives more scrutiny than asset deals but anti-assignment clauses can still fire depending on drafting and equities (especially if buyer is a competitor).Lower.Public-company-disclosure quality; uplift to listed-company representation standards.
Carve-Out / DivestitureHIGH — shared IP and IT systems with retained business; transitional services; perimeter definition.Maximum — must clearly delineate retained vs. divested IP, including jointly developed and shared platform technology.Shared "platform" IP; enterprise software licences not portable; trade secrets walking with retained employees; domain-name confusion.
Joint VentureMEDIUM — IP contribution agreements; background vs. foreground IP allocation.Targeted — focus on contributed IP and JV-developed IP allocation rules.Background-IP grant scope; improvements / grant-back; JV exit IP-allocation; field-of-use restrictions.
Licence-In / Tech TransferN/A (the deal is a licence)High — claim mapping, field of use, sublicensing, exclusivity, royalty stack.Licensor's title to the licensed IP; chain-of-title back to inventors; royalty audit rights; sublicensing prohibitions.

Industry-Specific Diligence Overlays

Each industry layers additional diligence requirements on top of the core IP audit. LegalSeba LLP staffs accordingly:

🧬 Pharma / Biotech / Life Sciences

Patent term restoration, regulatory exclusivities, Bolar exemption (s.s. of the Patent Act 2023), compulsory licensing exposure, clinical-trial data exclusivity, DGDA approvals, Hatch-Waxman-style certifications in export markets, biosimilar pathways.

💾 Software / SaaS / Tech

OSS dependency tree analysis (Black Duck / FOSSA / Snyk), copyleft contamination, source-code escrow, SaaS uptime SLAs, multi-tenant architecture title, AI training data provenance, API terms.

👕 Consumer / Retail / FMCG

Trade-mark portfolio breadth across classes; trade dress and get-up; advertising claims substantiation; influencer / endorsement agreements; GI exposure (e.g. Jamdani, Hilsha); customs IPR recordal.

🎬 Media / Entertainment / Publishing

Underlying-rights chain (option, screenplay, music synchronisation), guild and union obligations, residuals, public-performance royalties, format rights, talent likeness, music clearance.

🏦 Financial Services / Fintech

Bangladesh Bank licensing, payment-system patents, customer-data ownership, model-IP for credit-scoring algorithms, AML/KYC vendor IP, core-banking software escrow.

🏭 Manufacturing / Industrial

Process patents, design registrations, trade-secret manufacturing know-how, jigs and tooling, inbound technology-transfer agreements, BoI/BIDA tech-transfer notifications, BERC where applicable.

IP Asset Profiling & Audit Focus

The focus of an IP portfolio audit in Bangladesh shifts dramatically based on the nature of the target. A "cookie-cutter" approach fails. The materiality of each IP class is driven by: (i) current revenue attributable to the IP; (ii) royalty streams; (iii) competitive moat; (iv) lack of commercial alternatives; and (v) replacement cost.

Deep Tech / SaaS

Patents / Hardware40% Trade Secrets / Algorithms35% Copyright15% Trade Marks / Brand10%

Consumer / Retail

Patents / Hardware5% Trade Secrets / Algorithms10% Copyright15% Trade Marks / Brand70%

Pharma / Life Sciences

Patents / Hardware55% Trade Secrets / Algorithms20% Copyright10% Trade Marks / Brand15%

Media / Content

Patents / Hardware5% Trade Secrets / Algorithms15% Copyright60% Trade Marks / Brand20%
💡 Deep Tech / SaaSTrade secrets and software copyright dominate. Open-source compliance and AI/training-data provenance are co-equal deal-killers. Patents form a defensive moat in deep tech / hardware.
💡 Consumer / RetailTrade marks dominate. Critical: single-class coverage gaps (Bangladesh does not allow multi-class), 5-year non-use cancellation (s.42 Trademarks Act 2009), customs IPR recordal at DCII, and GI exposure for traditional products.
💡 Pharma / Life SciencesPatents are everything—claim scope, term, annuity status, family-tree across export markets. Bolar exemption and compulsory-licensing risk loom larger post-LDC graduation. Trade secrets matter for manufacturing know-how.
💡 Media / ContentCopyright dominates—underlying-rights chain (option, screenplay, music sync), guild and union obligations, residuals, format rights. Trade marks for show titles, characters, talent likeness.

Master Diligence Checklist

The execution framework below replicates the depth of a Practical Law / LexisNexis IP DD checklist, the document-request architecture used by Skadden Arps, and the Bangladesh-specific recordal requirements that must be navigated at the DPDT and BCO.

⚖ Drafting note: The headings below mirror the structure of an institutional IP DD report. Each module yields findings that flow into (i) the Disclosure Letter; (ii) the IP Schedule of the SPA; (iii) IP-specific reps & warranties; (iv) specific indemnities; and (v) pre-closing covenants.
1 Chain of Title, Creation & Ownership Verification

Objective: Establish that the target holds clean, unbroken legal title—from inventor or first author, through every assignment and merger, to the entity being acquired—across every jurisdiction where IP is registered or material. Title defects are the single most common reason deals fall through or attract major price chips.

A. Registered Rights — Schedules & Verification
  • Comprehensive registered IP schedule, broken out by jurisdiction, with: registration / application number; filing date; grant / publication date; current owner of record; beneficial owner (if different); class(es) and goods/services; status (registered / pending / opposed / suspended / abandoned / expired); next renewal or annuity date; and the firm acting as IP agent.
  • DPDT register extracts for every Bangladesh registration—not the target's internal records, which are routinely out of date. LegalSeba LLP conducts independent searches on the DPDT online database and at the registry to confirm the registered proprietor of record matches the target.
  • Foreign IP office searches (USPTO, EUIPO, IP India, CIPO, IP Australia, JPO, KIPO, CNIPA, WIPO Madrid) for marks and patents claimed in the schedule, with attention to: standing in the name of a predecessor-in-interest; unrecorded assignments; lapsed annuities; security interests.
  • Domain-name registrar reports via ICANN WHOIS / RDAP and the BTCL .bd registry — confirming registrant, admin contact, technical contact, expiry date, transfer-lock status, DNSSEC.
  • Social-media handle audit: verify the target's name on Facebook, Instagram, LinkedIn, X, YouTube, TikTok is owned by a corporate account (not an individual employee's personal account, a perennial founder-error in Bangladesh startups).
B. Bangladesh-Specific Recordal Verification (Critical)
  • DPDT recordal of every historical assignment. Per Trademarks Act 2009, s.40, an unrecorded trade-mark assignment is not effective against third parties; the target may believe it owns the mark, but a competitor could acquire superior rights from the original registered proprietor. This is the most common Bangladesh-specific red flag in M&A.
  • Form TM-23 / TM-24 chain for assignments; Form TM-16 / TM-33 for name and address changes; Form TM-20 for licence recordal as a Registered User.
  • Patent assignment recordal at DPDT under the Bangladesh Patent Act, 2023; verify recordal certificates exist for every transfer post-grant.
  • Industrial design assignment recordal under the Industrial Designs Act, 2023—a frequently overlooked register.
  • BCO copyright assignment register—note that copyright assignments in Bangladesh do not require BCO recordal to be valid, but registration provides strong prima facie evidence in disputes.
C. Founder, Employee & Contractor Assignments
  • Founder IP Assignment Agreements covering all IP created from inception through to the date of formal company incorporation—often the largest single liability in a startup acquisition. A solid Founders' Agreement with a present-tense, irrevocable assignment closes this gap.
  • Standard form Proprietary Information & Inventions Assignment Agreement (PIIA) for employees — examine the present-assignment language ("hereby assigns"), scope (during employment + reasonable post-employment "trailer"), and carve-outs (employee's pre-existing inventions disclosed in a schedule).
  • Roster reconciliation: HR list of every current and former employee → cross-check against signed PIIAs. Identify gaps.
  • Independent contractor / agency agreements—verify (i) explicit work-for-hire language, (ii) backstop assignment ("to the extent the foregoing is not work-for-hire, contractor irrevocably assigns…"), (iii) waiver of moral rights (where permitted).
  • Government-funded R&D: BCSIR collaborations, ICT Division grants, university JV outputs—government funders or universities may retain marching rights, royalty entitlements, or co-ownership.
  • Joint development / collaboration agreements—identify foreground IP allocation, licences-back, improvements ownership.
📄 Document Request List (extract): (i) full IP schedule in editable form; (ii) signed copies of all assignments; (iii) DPDT recordal certificates; (iv) standard form PIIA + log of executed PIIAs; (v) all contractor IP agreements; (vi) founders' agreement; (vii) any university / government R&D grant terms.
⚠ Red Flag — Deal-Breaker: Trade mark acquired from a third party in 2018 was never recorded with DPDT. Per s.40 Trademarks Act 2009, the target's rights are unenforceable against a bona fide subsequent assignee. Remediation: file the historic recordal pre-closing as a closing condition (not a covenant) and obtain a confirmatory deed of assignment from the original assignor.
2 Validity, Enforceability & Maintenance

Objective: Even owned IP can be invalid, vulnerable to cancellation, or about to lapse. Validity diligence ensures the rights are not paper tigers.

A. Trade Marks (Trademarks Act 2009)
  • Single-class coverage gap analysis: Bangladesh does not permit multi-class applications. Confirm a separate registration exists for each class of goods/services in which the target operates—especially core (e.g. Class 9, 35, 41, 42 for tech) and defensive classes.
  • Renewal calendar: initial 7-year term, then 10-year cycles (s.18 Trademarks Act 2009). Identify any registrations expiring within 12 months post-closing and add renewal as a closing covenant.
  • 5-year non-use cancellation exposure: per s.42 Trademarks Act 2009, any registered mark not in bona fide commercial use for a continuous 5-year period can be removed on application of an aggrieved person. Assess defensive use, token use, and evidence of use (invoices, advertising, product samples).
  • Pending oppositions and rectification proceedings at DPDT—note opposition window is 60 days from publication in the Trade Marks Journal under the current law.
  • Genericism / dilution: any sign that the mark is becoming a generic term for the goods.
  • Distinctiveness: descriptive marks claiming acquired distinctiveness need supporting evidence.
  • Foreign / Madrid registrations—Bangladesh is not a Madrid Protocol member, so each foreign filing is national.
B. Patents (Bangladesh Patent Act, 2023)
  • Annuity / maintenance-fee status: lapsed annuities cannot generally be revived after grace periods. Obtain agent's confirmation of fees paid through the next renewal date.
  • Claim mapping to commercialised products—a target may claim "30 patents" but only 6 read on actual revenue-generating products.
  • Prosecution history estoppel: review the file wrapper for narrowing amendments that limit the doctrine of equivalents.
  • Subject-matter eligibility: the 2023 Act excludes scientific discoveries, mathematical methods, medical methods, biological resources in their natural form, and matter contrary to public health/morality. Verify granted claims are not vulnerable to revocation on subject-matter grounds.
  • Compulsory licence / Bolar exemption exposure—particularly relevant for pharma targets in light of LDC graduation.
  • Co-inventorship and entitlement—incorrect inventorship can render a patent unenforceable; verify all inventors signed assignments.
  • Foreign counterparts and family-tree: PCT national-phase entries, EP designations, Paris Convention claims; consistency of claim scope across jurisdictions.
C. Copyright (Copyright Act, 2023 — successor to 2000)
  • Originality and authorship—particularly for compilation works, databases, AI-assisted works.
  • Term calculations: life + 60 years for most works; corporate/anonymous works have separate terms.
  • Moral rights—paternity and integrity rights; not assignable; can be waived.
  • BCO registration—not constitutive but valuable for evidence; identify which works are registered.
  • Derivative-works rights for translations, adaptations, screen-versions.
D. Industrial Designs (Industrial Designs Act, 2023)
  • Novelty and individual-character requirements; prior-art disclosures.
  • Renewal cycle and term.
  • Registered design vs. unregistered design rights / passing-off overlay for product shape.
📄 Document Request List (extract): (i) IP agent's annuity / renewal confirmations through next 24 months; (ii) prosecution-history file wrappers for material patents; (iii) evidence-of-use packages for trade marks at risk of non-use cancellation; (iv) all opposition / cancellation pleadings; (v) co-inventor declarations.
⚠ Common Issue: Target's "patent portfolio" comprises 30 issued patents, but 18 have lapsed for non-payment of annuities, 6 are vulnerable to subject-matter challenge, and only 4 actually read on revenue-generating products. Adjust the IP-portfolio rep accordingly and require a closing certificate confirming annuity status.
3 IP-Related Agreements: Licences-In, Licences-Out & Encumbrances

Objective: Material IP appears not only in agreements titled "Licence" but also in R&D, JV, supply, manufacturing, distribution, sponsorship, settlement, and inter-company agreements. The Skadden/Practical Law standard is to summarise every material IP-related agreement on a Due Diligence Summary Template.

A. Universe of Agreements to Capture
  • In-bound IP licences (software, patents, trade marks, copyrighted content, trade secrets).
  • Out-bound IP licences (revenue-generating; affect post-closing freedom).
  • Cross-licences and patent-pool memberships.
  • Settlement agreements, covenants not to sue, consents to use, co-existence agreements.
  • R&D and collaboration / consortium agreements.
  • JV and strategic-partnership agreements containing IP contribution / allocation.
  • Manufacturing, supply, and distribution agreements with IP grants or restrictions.
  • Sponsorship, endorsement, and influencer agreements.
  • Inter-company IP-licensing arrangements (especially in groups using IP-holding-company structures).
  • Source-code escrow agreements.
  • SaaS, hosting, and cloud-services agreements.
  • Open-source licences (treated separately—see Module 4).
  • Security agreements and IP-pledge documents.
B. Key Terms to Summarise on Each Agreement
  • Parties — including which entity in the target group is signatory (matters for anti-assignment analysis).
  • IP scope — specific patents/marks/copyrights, or "all IP necessary for…"; defined-term scope creep.
  • Field of use and other use restrictions.
  • Territory.
  • Exclusivity — exclusive, sole, non-exclusive; exclusive against the licensor itself?
  • Sublicensing rights.
  • Improvements / grant-back.
  • Royalty terms — running royalty, minimums, milestones, audit rights, royalty stacking.
  • ROFR / ROFO / Option for further rights or future-developed IP.
  • Most-Favoured-Nation (MFN) clauses — one of the most operationally damaging provisions post-closing.
  • Term and termination — including for convenience, for cause, and on insolvency.
  • Assignment / Change of Control — the single most important provision in M&A diligence (see C below).
  • Indemnities given or received (IP infringement indemnities flow with the contract).
  • Governing law and dispute resolution.
  • Recordal status at DPDT (for trade-mark licences—see C below).
C. Bangladesh-Specific: Registered User Agreements (s.44 Trademarks Act 2009)
  • Trade-mark licences in Bangladesh are termed "Registered User Agreements". To be enforceable, the licensee must be recorded as a Registered User at DPDT.
  • The recordal application must be filed within 1 year of the date of the licence agreement for permitted use to count as use by the proprietor (a key element in defending against non-use cancellation).
  • Failure to record means the licensor cannot rely on the licensee's use to defeat non-use cancellation, and the licensee may have difficulty enforcing rights in its own name.
  • In M&A, audit every trade-mark licence the target has granted (out-bound) and received (in-bound) for Registered User recordal; unrecorded arrangements are a remediation item.
D. Anti-Assignment & Change-of-Control Analysis
  • Asset deal / forward merger: any transfer-of-contract clause is engaged; a deemed assignment occurs.
  • Reverse merger: less likely to trigger an anti-assignment clause, but may trigger a change-of-control clause depending on drafting and equities.
  • Share / stock purchase: anti-assignment clauses generally do not bite (no transfer of contract); change-of-control clauses do.
  • "Successor and assigns" boilerplate: not always sufficient to permit assignment without consent; read together with the express anti-assignment language.
  • Consent strategy: identify which licences need consent, prioritise by materiality, draft a consent-and-acknowledgement template, and start the licensor outreach as a closing condition where critical.
E. Encumbrances
  • Security interests over IP (registered at DPDT for trade marks; registered at RJSC for charges over the company's intangible assets generally).
  • Bank loan covenants restricting IP transfers.
  • Exclusive out-licences that limit the buyer's post-closing freedom.
  • Government-grant clawback rights.
📄 Document Request List (extract): (i) all material IP-related agreements (no $ threshold for core IP); (ii) DPDT Registered User certificates; (iii) RJSC charge searches; (iv) royalty audit reports; (v) any cease-and-desist correspondence with licensors / licensees.
⚠ Common Issue: Critical inbound SaaS licence underpinning the target's core product contains a "termination upon change of control" clause and the licensor is a competitor of the buyer. Remediation: (a) pre-close consent (often with a fee); (b) re-paper licence in target sub-entity not subject to CoC; (c) deal-structure change to share purchase to avoid anti-assignment; or (d) renegotiate post-closing — typically with leverage loss.
4 Software, Open Source, IT Systems & SaaS

Objective: Even non-tech targets run on software. For tech targets, software diligence is the single largest workstream. The goal is to verify (i) the target lawfully uses third-party software; (ii) the target's proprietary code is not contaminated by viral OSS; (iii) IT continuity is robust; and (iv) software-related licence terms transfer cleanly.

A. Software Inventory
  • Proprietary software developed by or for the target—source code repositories, ownership of repositories, contributors, commit-log analysis.
  • Customised software (third-party platforms with material customisations).
  • Off-the-shelf commercial software—Microsoft, Adobe, Atlassian, Slack, etc. Confirm licence count, deployment, true-up status (audit risk from BSA / vendor compliance teams).
  • SaaS subscriptions (Salesforce, HubSpot, AWS, GCP, Azure, Snowflake, etc.)—per-seat counts, data-processing scope, region.
  • Mobile app store distribution agreements (Apple, Google Play)—account ownership, transferability of apps, in-app-purchase economics.
  • API consumption (third-party APIs that the target relies on—Stripe, Twilio, Sendgrid, OpenAI, etc.) and rate-limit / ToS exposure.
B. Open-Source Software (OSS) Compliance — The Single Biggest Tech-Deal Risk
  • OSS scan reports: require a recent run of an SCA tool—Black Duck, FOSSA, Snyk, Mend (WhiteSource), or Sonatype—covering every binary shipped to customers and every component of the build pipeline.
  • Copyleft contamination analysis: identify any GPLv2 / GPLv3 / AGPL / LGPL components and map their linkage to proprietary code (static linking, dynamic linking, network use). AGPL is uniquely viral for SaaS deployments.
  • Compliance with permissive licences: MIT, BSD, Apache 2.0 require notice-attribution; failure to ship notice files is technical breach, though commercially low-risk.
  • OSS policy and approval workflow: written policy; designated approver; log of approved components; developer training records.
  • Contribution to OSS projects: developers may have contributed code containing trade secrets; CLA / DCO compliance.
  • Bundled distributions / SDKs: shipping third-party OSS bundled in the target's product (NOTICE.txt, LICENSE files).
C. IT Systems & Continuity
  • Source-code escrow agreements—identify beneficiaries, release events, last verified deposit.
  • Disaster recovery and business continuity plans; RPO / RTO targets; tested?
  • Recent IT incidents: outages, ransomware, data breaches, DDoS.
  • Backups, encryption at rest and in transit, identity management (SSO, MFA), secrets management.
  • Software-development lifecycle: code review, secure-coding, vulnerability management, penetration-test reports.
  • Customer SLA exposure: penalty clauses and service credits for IT outages.
D. Carve-Out IT Specifics
  • Enterprise licences (e.g. ServiceNow, SAP) granted to the seller group: which entitlements transfer? Re-licensing fees on day 1?
  • Shared infrastructure—how is it severed? Transitional services agreement (TSA) scope and pricing.
  • Data migration plan and customer-consent architecture.
📄 Document Request List (extract): (i) recent SCA scan report; (ii) OSS policy + approved-component log; (iii) all SaaS / cloud / API agreements; (iv) penetration-test report for last 12 months; (v) DR/BCP plan + last test report; (vi) source-code escrow agreements; (vii) IT incident log.
⚠ Red Flag — Deal-Breaker: AGPLv3 component is statically linked into the target's commercial SaaS platform. Customers accessing the SaaS are deemed "users" under AGPL §13, triggering source-code disclosure obligations. Remediation: (a) factor-out and replace the component (often weeks of engineering); (b) commercial dual-licence from the original author; (c) negotiate a price chip and indemnity reflecting residual disclosure risk.
5 Artificial Intelligence, Models & Training Data

Objective: AI is the fastest-evolving DD area. Training-data provenance, model-weights ownership, generative-AI use in development, and contractor-vendor data flows are now standard items in any tech transaction.

A. Training Data Provenance
  • Data source map: was data licensed (with documentation), scraped (terms-of-service compliance), purchased (chain-of-title from broker), user-generated (consent under privacy policy), or synthetic?
  • Scraped-data exposure: hiQ Labs v. LinkedIn, the NYT v. OpenAI litigation, and parallel European cases have changed the risk profile of bulk web-scraping; assess litigation risk.
  • User-generated content used for training: does the target's privacy policy and terms-of-service permit AI training on user inputs?
  • Copyright in training corpora: any rights cleared? Indemnities from data vendors?
B. Models & Foundation Models
  • Foundation-model dependencies: OpenAI, Anthropic, Google, Mistral, Meta Llama, etc.; enterprise vs. consumer terms.
  • "Zero-retention" guarantees from foundation-model providers—important for customer-data-into-LLM flows.
  • Open-weights models (Llama, Mistral, Qwen): note licence terms (Llama community licence has commercial-use thresholds; some "open" weights have RAIL-style use restrictions).
  • Fine-tuning records: what data was used? Was customer data used? Is the resulting fine-tuned model contaminated with restricted data?
  • Model evaluation reports, benchmarking, hallucination rates—relevant for product reps about performance.
C. Generative-AI in Product Development
  • Did developers use GitHub Copilot, Cursor, ChatGPT, or Claude to write production code? AI-generated code currently lacks copyright protection in most jurisdictions, which can affect the "originality" claim in the IP rep.
  • Marketing copy, design assets, audio content generated by AI—similar implications; check vendor terms on commercial use.
  • Internal AI-use policy and developer training; logs of approved tools.
D. Customer Data Through AI Pipelines
  • Customer data passed to LLM providers as prompts—data-processing agreements in place?
  • Data-residency obligations vs. LLM provider data-flow.
  • Whether customer data is used (or excluded) from foundation-model training.
📄 Document Request List (extract): (i) data-source register; (ii) all foundation-model and AI-vendor agreements (with DPAs); (iii) AI-use policy; (iv) model-card / model-evaluation reports; (v) any AI-related demand letters or claims.
⚠ Common Issue: Target's product features were "built with AI"—approximately 30% of production code shows generative-AI patterns. AI-generated code may not be copyrightable, undermining the "target owns all IP in the platform" rep. Remediation: (a) qualify the IP rep with knowledge / materiality qualifiers; (b) carve out AI-generated code from the IP definition; (c) factor in an indemnity and price chip; (d) post-closing, manually rewrite the AI-generated portions to establish human authorship.
6 Trade Secrets, Know-How & Confidential Information

Objective: Bangladesh has no standalone trade-secrets statute; protection rests on contract, breach of confidence (equity), and Penal Code provisions. The "reasonable steps" inquiry is therefore both factual and pivotal.

A. Trade-Secret Catalogue
  • Documented register of "crown-jewel" trade secrets: algorithms, customer lists, pricing models, recipes, manufacturing processes, supplier lists, drawings, jigs.
  • Trade-secret marking on documents and systems (e.g. "Confidential — Trade Secret").
  • Categorisation: business secrets, technical secrets, commercial secrets.
B. Reasonable Steps to Protect Secrecy
  • NDAs with every employee, contractor, vendor, prospective investor, M&A counterparty—dated, executed, retrievable.
  • Tiered access controls: not every engineer needs access to the source code repository; not every salesperson needs the full price book.
  • Physical security: locked premises, badge access, visitor logs, clean-desk policy.
  • IT security: encryption, MFA, DLP, USB blocking, activity monitoring, egress controls.
  • Onboarding: confidentiality clauses in employment contracts, secrecy training, signed acknowledgements.
  • Off-boarding: exit interviews, data-return certifications, garden-leave, non-compete and non-solicit (where enforceable—Bangladesh courts tend to construe restrictive covenants narrowly).
  • Vendor contracts: NDA-first; need-to-know data sharing; secure deletion on termination.
C. Trade-Secret Risk Areas
  • Outsourced development to overseas agencies (very common in Bangladesh tech ecosystem)—source-code custody, NDA quality, repository access controls.
  • Recent hires from competitors—"clean-room" hiring documentation; reps that hires brought no third-party trade secrets.
  • Recent departures to competitors—evidence of data exfiltration; lawsuits filed or threatened.
  • Joint-venture disclosures—what was given to the JV partner; survival of confidentiality obligations.
📄 Document Request List (extract): (i) trade-secret register; (ii) standard NDA templates + log of executed NDAs; (iii) employee handbook excerpts on confidentiality; (iv) IT access-control policy; (v) any trade-secret misappropriation litigation; (vi) departing-employee exit-interview templates.
⚠ Common Issue: Target's flagship algorithm was developed jointly with an overseas dev shop in 2019 under a verbal arrangement; no NDA was signed; source code sits in the dev shop's GitLab. The trade-secret claim is fragile—wide disclosure without reasonable steps. Remediation: (a) belt-and-braces confirmatory NDA + assignment from the dev shop; (b) source-code repatriation; (c) carve out from trade-secret rep; (d) specific indemnity for dev-shop misuse claims.
7 Trade Marks, Domains, Trade Dress & Brand Assets

Objective: For consumer / retail / FMCG / hospitality targets, trade-mark portfolio quality often is the deal valuation. The Trademarks Act, 2009 framework imposes specific recordal and use requirements that diligence must verify.

A. Portfolio Architecture
  • Word marks, device marks, composite marks, logos, slogans, product names, service marks.
  • Single-class application audit (Bangladesh does not permit multi-class)—are all goods/services adequately covered? Identify under-protected expansion classes.
  • Defensive registrations and house-marks.
  • Sub-brands and private labels.
  • Trade dress, packaging, get-up, look-and-feel.
  • Geographical indications (GIs) where applicable—Jamdani, Hilsha, Fazli Mango, Bangladesh's growing GI register under the GI Act 2013.
  • Certification marks and collective marks.
B. Use & Enforcement Posture
  • Evidence of bona fide commercial use for each registration—invoices, packaging, advertising, dated photographs (defends against 5-year non-use cancellation under s.42).
  • Trade-mark watch services and policing diligence.
  • Cease-and-desist letters sent and received.
  • Customs IPR recordal with the Directorate of Customs Intelligence and Investigation (DCII)—essential for FMCG / consumer brands exposed to grey imports and counterfeits.
  • UDRP / domain-name complaints for cybersquatting.
  • Marketplace takedown logs (Daraz, Shopee, Amazon, Alibaba).
C. Common Law Rights & Passing Off
  • Bangladesh recognises common-law passing-off for unregistered marks with goodwill—evidence of acquired distinctiveness, length of use, advertising spend.
  • Well-known foreign marks: protected via Paris Convention / TRIPS even without local registration; relevant where the target's mark resembles a global brand.
D. Domain Names & Social Handles
  • .bd ccTLD registrations via BTCL—registrant accuracy.
  • gTLD portfolio (.com, .net, .org, .co, .io, .ai)—registrar account access; transfer locks.
  • Social-media handles owned by the corporate entity (not personal email accounts of founders or marketing staff).
  • Trademark Clearinghouse (TMCH) registrations for new gTLD launches.
📄 Document Request List (extract): (i) full trade-mark schedule; (ii) DPDT register extracts; (iii) renewals calendar; (iv) evidence-of-use packages for the 10 most material marks; (v) DCII customs recordal certificates; (vi) all opposition / cancellation pleadings; (vii) domain-name registrar account access list; (viii) social-media account inventory.
⚖ LegalSeba LLP Expertise: Our IP practice conducts exhaustive clearance searches at the DPDT Trade Marks Registry to verify the target's brand name does not infringe senior holders, files defensive applications in expansion classes pre-closing, and arranges customs IPR recordal at DCII as a value-add to the buyer.
8 Litigation, Oppositions, Disputes & Enforcement

Objective: Quantify known legal liabilities; assess the strength of the target's enforcement posture; identify "skeletons in the closet" that may emerge post-closing.

A. Active & Threatened Proceedings
  • Civil suits in District Court / High Court Division — pleadings, orders, judgments, settlement docs.
  • Criminal complaints under trade-marks / copyright statutes.
  • Registry proceedings: oppositions, rectifications, cancellations at DPDT.
  • Customs detentions and DCII proceedings.
  • Foreign litigation involving the target or its IP.
  • UDRP and domain-name disputes.
  • Royalty audits initiated by collecting societies (e.g. CCC, BSA, ASCAP-equivalents).
B. Demand Letters & Pre-Litigation
  • Cease-and-desist letters sent and received—especially within the look-back window (typically 3 years).
  • Settlement agreements, covenants not to sue, consents to use, co-existence agreements—these survive closing and may bind the buyer.
  • Communications with non-practising entities ("patent trolls").
C. Risk Triage Framework

For each proceeding or threat, assess:

  • Identity of opponent (competitor, NPE, ex-employee, customer, supplier).
  • Nature of claim (infringement, invalidity, revocation, contract).
  • Materiality of IP at stake.
  • Revenue impact of the affected products/services.
  • Stage of proceedings and procedural posture.
  • Remedies sought (injunction = existential; damages = monetisable).
  • Settlement positions.
  • Worst-case and most-likely outcomes.
  • Design-around feasibility for patent claims.
  • Insurance coverage and indemnity availability.
D. Privilege & Opinions
  • Existence of opinions of counsel (FTO, validity, non-infringement)—balance review value against waiver risk.
  • Common-interest privilege agreements between buyer and target counsel.
  • "Clean team" arrangements for highly sensitive litigation materials.
📄 Document Request List (extract): (i) litigation register; (ii) all pleadings, orders, judgments; (iii) settlement and co-existence agreements; (iv) cease-and-desist correspondence (sent and received) for past 3 years; (v) DPDT opposition / cancellation files; (vi) any opinions of counsel and privilege analyses.
ℹ Note: Routine NPE letters may be a low risk if the buyer indemnity coverage extends. However, an injunction in active litigation against a primary product line requires deep qualitative analysis, often by IP-litigation specialists, and may justify a deal-walk or a major indemnity-and-escrow package.
9 Freedom to Operate (FTO) & Third-Party Rights

Objective: A clean ownership picture is meaningless if the target's products infringe third-party rights. FTO is the deepest, costliest layer of IP DD and is reserved for material strategic deals (Level 4/5).

A. Patent FTO
  • Identify core technical features of the target's products and processes.
  • Patent landscape search in core operating jurisdictions (Bangladesh, India, China, US, EU, Japan, Korea).
  • Claim-mapping against shortlisted competitor patents.
  • Design-around feasibility analysis for any reading patents.
  • FTO opinions of counsel (with privilege protection).
  • Patent expiration and family-tree analysis (a near-expiry blocking patent is a different risk profile).
B. Trade-Mark Clearance
  • Target's brand names, sub-brands, product names searched at DPDT and across foreign registries (especially in expansion markets).
  • Trade-mark watch reports for senior conflicting marks.
  • Common-law / passing-off exposure (well-known unregistered marks).
  • Domain-name and social-media handle conflicts.
C. Copyright & Content Clearance
  • Stock images, fonts, music, video used in marketing—licence trail.
  • User-generated content posted on the target's platforms—DMCA-style notice procedures.
  • Underlying-rights chain for media targets (option agreements, screenplays, sync licences).
D. Trade-Secret Misappropriation Exposure
  • Recent hires from competitors—do they sit in roles that would tempt use of their prior employer's trade secrets?
  • Documentary "clean room" evidence; non-use representations.
  • Any pending or threatened misappropriation claims.
📄 Document Request List (extract): (i) any FTO searches or opinions in the target's possession; (ii) competitor patent watch reports; (iii) trade-mark clearance searches for any new product launches in the past 24 months; (iv) "clean room" hiring documentation for competitor-sourced employees.
⚠ Practice Note: Many sellers refuse to commission affirmative FTO searches because of the willful-infringement / increased-damages risk created by a search that reveals reading patents. In this case, the buyer typically (a) commissions its own FTO outside the disclosure schedule, (b) negotiates a robust non-infringement rep with knowledge qualifier, and (c) seeks a specific indemnity for any post-closing infringement claims.
10 Data Protection, Privacy & Cybersecurity

Objective: Although not strictly IP, the IP team typically owns this workstream. Data is increasingly a value driver, and data-related regulatory exposure can swamp IP findings.

A. Bangladesh Statutory Framework — Now Comprehensive

The 2025 reforms transformed Bangladesh from a sectoral regime to a comprehensive data-protection and cyber-security framework. Diligence now turns on two new instruments:

  • Personal Data Protection Ordinance, 2025 (Ordinance 61 of 2025, enacted 6 November 2025) — Bangladesh's first comprehensive data-protection statute. Establishes data-fiduciary / data-subject / processor framework; lawful bases for processing (s.5); rights of access, portability, correction and erasure (Ch. III); 5-year record-keeping (s.19); breach notification to the National Data Management Authority (s.20); independent data audits (s.21); Chief Data Officer mandatory for "Significant Data Fiduciaries" (s.23); data classification regime — Public, Internal, Confidential, Restricted (s.29); cross-border transfer rules (s.29(3)–(7)). Chapter III and ss.31–46 (rights enforcement and offences) phase in over 18 months from enactment.
  • Cyber Security Ordinance, 2025 (Ordinance 25 of 2025, 21 July 2025) — repealing the Cyber Security Act, 2023. Establishes the National Cyber Security Agency, NCERT, and National Security Operation Centre (NSOC); Critical Information Infrastructure (CII) designation regime (s.15); offences include unauthorised CII access (s.17), unauthorised system access / hacking (s.18), system damage (s.19), cyber fraud (s.22), cyber-terrorism (s.23), unlawful e-transactions (s.24), online sexual harassment / blackmail / revenge porn / CSAM (s.25), religious or communal hate content (s.26); content takedown procedure with Tribunal oversight (s.8); 24-hour data-preservation orders (s.36).
  • National Data Management Authority: the supervisory regulator for personal data, established under the parallel National Data Management Ordinance, 2025. Empowered to impose administrative fines, issue corrective directions, and approve cross-border transfers.
  • Sectoral overlay (still operative): Bangladesh Bank cybersecurity and ICT-risk guidelines for financial services; BTRC for telcos and ISPs; DGHS for health data; ICT Act 2006 s.66 for residual offences not picked up by the CSO 2025.
  • Foreign regulatory reach (where target serves overseas users): EU GDPR; UK GDPR; CCPA / CPRA; India DPDP Act 2023; Singapore PDPA; APPI (Japan); Thailand PDPA — diligence by reference where the target has cross-border data flows.
B. Significant Data Fiduciary ("SDF") Status — A New Diligence Trigger
  • Under PDPO 2025, s.2(5), the National Data Management Authority may designate a target as a "Significant Data Fiduciary" based on: (i) potential impact on state sovereignty; (ii) volume / financial sensitivity of data processed; (iii) risk to data-subject rights; (iv) potential threat to national security, public order, public safety, economic order, or public health.
  • SDF status carries enhanced obligations: appointment of a Chief Data Officer at a location designated by the Authority (s.23); higher administrative-fine ceilings (up to 5% of Bangladesh turnover under s.32(2), versus 2% for ordinary fiduciaries under s.32(1)); enhanced audit and reporting obligations.
  • Diligence: confirm SDF designation status; review CDO appointment, qualifications, reporting line; review CDO-issued incident reports and policy framework; assess whether the target should reasonably expect SDF designation post-closing under the new entity.
C. Privacy Programme Audit — Mapped to PDPO 2025
  • Lawful basis register: under PDPO s.5, processing requires either consent (informed, specific, freely given, withdrawable — s.5(2)) or one of seven non-consent bases (contract, legal claim, vital interests, employment law, voluntarily-public data, etc.). Verify the target's basis-mapping for each processing activity.
  • Sensitive-PD inventory: per s.7, the additional consent / qualifying-condition layer applies to genetic, biometric, ethnic, religious / political-belief, trade-union, health, sexual-orientation, criminal-record, and real-time-location data. Identify all such processing.
  • Consent infrastructure: granular, withdrawable consent flows; demonstrable consent records (s.5(4) places the burden of proof on the data-fiduciary); cookie banners; mobile-app permission prompts.
  • Privacy notice / transparency framework: s.15 mandates disclosure of categories of data, purposes, complaint routes to the Authority, transfer information, and contact details — review current and historical versions.
  • Data-subject-rights operations: documented procedures for s.11 (access & portability — including federated interoperable ecosystems), s.12 (rectification), s.13 (consent withdrawal & erasure), s.14 (system-wide propagation of corrections / deletions through mirrors, caches, backups, DR, test environments). Logs of requests received, response times, refusals.
  • Children's data: s.9 bars tracking, monitoring, profiling, and targeted advertising at minors and requires verifiable parental consent for under-18 processing. Diligence is sharper for ad-tech, edtech, gaming, and social-platform targets.
  • Records of Processing Activities (RoPA) and Data Processing Agreements (DPAs) with vendors, sub-processors, customers — note that s.8 deems the data-fiduciary liable for the processor's acts.
  • Cross-border-transfer mechanisms: see Section D below.
  • Retention & destruction: s.18 caps retention at the period prescribed by regulation for the original purpose; s.19 requires record-keeping for at least 5 years.
D. Data Localisation & Cross-Border Transfers (Critical New Diligence Item)
  • PDPO classifies data into four tiers under s.29(1): Public, Internal, Confidential, and Restricted. Cross-border transfer is permitted on consent / contract / data-subject-interest grounds (s.29(3)) and only to jurisdictions or facilities prescribed as having adequate technical infrastructure (s.29(4)).
  • Mandatory in-country mirroring: s.29(7)(b) requires that Restricted personal data and data of Critical Information Infrastructure (as defined in CSO 2025 s.2(1)(j)) held in cloud have at least one synchronised real-time copy maintained inside Bangladesh. This is one of the most operationally significant features of the new regime.
  • "Sensitive personal identifiable data" notification: s.29(6) requires mandatory notification to the Authority of bulk cross-border transfers of national-ID, passport, TIN, biometric, genetic, and criminal-record data.
  • Authority's relocation power: s.29(7)(c) empowers the Authority to order re-architecture, relocation, or shutdown of cloud usage within 60 days where it identifies a national-security or public-safety risk or evidence of breach.
  • Diligence focus: cloud-region maps for AWS / GCP / Azure / Snowflake / Salesforce; presence of in-country mirror for Restricted PD and CII data; data-flow diagrams across jurisdictions; SCC-equivalent contractual mechanisms; intra-group data-sharing agreements; vendor-side data-residency commitments.
E. Cybersecurity Posture — Now Mapped to CSO 2025
  • CII designation review: CSO 2025 s.15 empowers the Government to designate computer systems / networks / data infrastructures as Critical Information Infrastructure. Confirm whether the target's systems are or could be designated; if so, the target must maintain its own CIRT and SOC reporting to the National SOC (s.9(2)) and undergo annual external infrastructure audit (s.16(2)).
  • NCERT / CIRT incident reporting: per s.9(4) proviso, every public, private, or autonomous body must report cyber incidents to the National CERT without delay. Review the target's incident register against this obligation.
  • Information-security programme: ISMS scope and ISO 27001 / SOC 2 Type II certification; penetration-test and vulnerability-scan logs (last 12–24 months); incident-response plan and tabletop-exercise records.
  • Breach register & notification: cross-check against PDPO s.20 (notification to the Authority where data-subject harm is likely) and CSO 2025 s.9 (notification to NCERT).
  • Content-takedown exposure: CSO 2025 s.8 empowers the DG of the Cyber Security Agency or law enforcement (with Tribunal confirmation within 3 days) to order takedown / blocking of content threatening cyber-safety or public order. Review any takedown orders received.
  • Cyber-insurance: coverage scope (PDPO regulatory fines, CSO offences, third-party claims), deductibles, prior claims, exclusions for known issues.
F. Data Asset Diligence (Where Data Is the Value)
  • Origin of the dataset — was it lawfully collected for the purpose for which it is now being monetised under the PDPO lawful-basis test?
  • Consent architecture for marketing, profiling, AI training, and onward sale — particular attention to PDPO s.9 (children) and s.7 (sensitive PD).
  • Database rights / sui generis protection (where available under the Copyright Act, 2023).
  • Data-broker agreements — chain-of-title in the data, including provenance back to the original data subject.
📄 Document Request List (extract): (i) PDPO compliance assessment / readiness report; (ii) data-classification register (Public / Internal / Confidential / Restricted); (iii) cloud-region map and in-country-mirror evidence for Restricted PD and CII data; (iv) current and last 5 years of privacy policies; (v) RoPA; (vi) DPAs with material vendors; (vii) breach register with NDM Authority and NCERT notifications; (viii) penetration-test reports; (ix) DPIA register; (x) Chief Data Officer appointment and reports (if SDF); (xi) cyber-insurance policy; (xii) any takedown or data-preservation orders received under CSO 2025.
⚠ Red Flag — Deal-Killer: Target's valuation rests on a 50M-record consumer dataset; on inspection, the data was scraped from public sources without consent, the privacy policy did not disclose the scraping or onward sale, and the data is held entirely on overseas cloud infrastructure with no Bangladesh mirror. Under the PDPO 2025, the dataset fails s.5 (lawful basis), s.15 (transparency), and s.29(7)(b) (in-country mirror for Restricted PD). Combined exposure: NDM Authority administrative fines (up to 5% of Bangladesh turnover for SDFs); criminal exposure under PDPO ss.36–37; foreign regulatory layer (GDPR / UK ICO); class-action risk. Remediation: (a) data deletion + valuation reset; (b) re-architecture to in-country mirror; (c) specific super-cap indemnity; (d) walk away.
11 Employment IP, Restrictive Covenants & Key-Person Risk

Objective: Verify that all IP created by employees is owned by the target, restrictive covenants are enforceable, and key-person flight risk is mitigated.

A. Employment IP Architecture
  • Standard-form employment contract — IP assignment clause: present-tense, irrevocable, comprehensive scope.
  • Specific carve-out for pre-existing inventions disclosed in a schedule.
  • Specific assignment of moral rights / waiver where permissible.
  • Confidentiality undertaking surviving termination.
  • Garden-leave provisions for senior staff.
B. Restrictive Covenants — Enforceability under Bangladesh Law
  • Bangladesh courts construe restraints of trade narrowly; non-compete clauses post-termination are difficult to enforce except where reasonable and ancillary to a sale.
  • Non-solicit (customers, employees) more readily enforceable.
  • Confidentiality clauses unaffected and broadly enforceable.
  • Consider acquihire dynamics: are key employees subject to retention agreements / new-hire packages with the buyer?
C. Key-Person Risk
  • Identification of individuals whose departure would materially impair the IP — solo inventors, sole architects, brand-creator.
  • Retention bonus structures payable post-closing.
  • Knowledge documentation and bus-factor mitigation.
  • Founder lock-up / earn-out architecture in the SPA.
📄 Document Request List (extract): (i) employee handbook; (ii) standard-form employment contract + executed copies for top 20 employees; (iii) PIIA / IP-assignment register; (iv) retention bonus pool architecture; (v) any garden-leave or non-compete agreements with departing key staff.
12 Group Structure, Inter-Company Licensing & IP-Tax Interface

Objective: IP often sits in an entity different from the operating company; understanding the group's IP-holding architecture is essential for valuation, transfer-pricing, and integration planning.

A. Holding Architecture
  • Identify which entity owns each material IP asset—often an offshore IP holdco (Singapore, Cayman, Mauritius) for groups with international structure; for purely domestic groups, IP may sit in the operating Bangladeshi entity or in a parent.
  • Inter-company IP licence agreements between the holdco and operating entities — royalty rates, territories, fields, term.
  • Are the licences transfer-pricing-compliant under NBR rules and the relevant treaties?
  • Bangladesh Bank approvals for cross-border royalty remittances—both quantum and frequency.
B. IP & Tax Considerations in M&A
  • Step-up / step-down basis on acquired IP (relevant for intangibles amortisation in the buyer's books).
  • Withholding tax on royalty streams—Bangladesh Bank-approved withholding rates and treaty rates.
  • VAT / VDS implications on royalty payments under the VAT and Supplementary Duty Act, 2012.
  • Exit-tax exposure on cross-border IP migrations.
  • Coordination with tax DD: see LegalSeba LLP Tax Due Diligence playbook.
C. Carve-Out Specific Issues
  • Shared "platform" IP retained by seller—buyer needs a perpetual, royalty-free, sublicensable licence-back for seller-retained IP used in the divested business.
  • Transitional IP licences—term-limited rights to use seller marks during the rebrand period.
  • Reverse transitional IP licences—limited rights for the seller to wind down use of divested IP.
  • Allocation of jointly-developed IP.
📄 Document Request List (extract): (i) group structure chart with IP-ownership annotation; (ii) all inter-company IP licences; (iii) transfer-pricing documentation; (iv) Bangladesh Bank royalty-remittance approvals; (v) any tax rulings on IP arrangements.

Reps, Warranties & Indemnities — From DD Findings to Deal Document

The output of IP DD is not just a report. It is the IP architecture of the SPA: the IP schedule, the IP-specific representations and warranties, the disclosure letter that flanks them, the specific indemnities for known issues, and the closing covenants. This is where Magic Circle and top-tier US firms allocate risk between buyer and seller.

A. Standard IP Representations & Warranties

A typical institutional SPA will include the following IP reps. The buyer pushes for breadth; the seller resists with knowledge, materiality, and disclosure-letter qualifiers.

RepWhat It CoversCommon Qualifiers
Ownership / TitleThe target owns or has the valid right to use all material IP, free of liens (other than disclosed encumbrances)."To the Knowledge of the Seller"; reference to the IP Schedule.
SufficiencyThe IP owned and licensed is sufficient to operate the business as currently conducted (and sometimes "as proposed to be conducted").Materiality; "as currently conducted" only (not aspirational).
Validity / EnforceabilityThe registered IP is valid, subsisting, and enforceable; no challenges pending.Knowledge; carve-out for office actions / pending oppositions disclosed in schedule.
Non-InfringementThe conduct of the business does not infringe any third-party IP, and no claims have been made.Knowledge; look-back period (e.g. 3 years); materiality.
No Infringement by Third PartiesTo Seller's Knowledge, no third party is infringing the target's IP.Knowledge.
Employee / Contractor AssignmentsAll material IP created by employees / contractors has been validly assigned to the target.Materiality; knowledge for distant past.
Confidentiality / Trade SecretsThe target has taken reasonable steps to protect its trade secrets; no material misappropriation."Reasonable steps"; materiality.
Open SourceThe target's products do not include OSS that requires the disclosure or licensing of proprietary source code.Knowledge; reference to disclosed OSS schedule.
Data Protection & CybersecurityThe target complies with the PDPO 2025, CSO 2025, ICT Act 2006, and applicable foreign data-protection laws; consents and lawful bases in place; no material breach unreported; in-country mirror maintained for Restricted PD and CII data per s.29(7)(b); no NDM Authority enforcement actions or CSO content-takedown orders.Materiality; knowledge for cross-border laws; reference to disclosed breach register.
IT SystemsIT systems are adequate for current operations; no recent material outages or breaches.Materiality; specific carve-out for disclosed incidents.
Royalties & LicensingAll licence fees and royalties payable have been paid; no audits pending; no notices of breach received.Materiality.
No CoC / Anti-Assignment TriggersThe transaction will not result in termination, modification, or new payment obligation under any material IP contract (often subject to disclosed list of consents required).Disclosed list of CoC consents required; reference to schedule.

B. Indemnity Architecture — How DD Findings Drive Deal Economics

General Indemnity for R&W Breaches

Covers any losses from breach of the IP reps and warranties. Subject to:

  • Survival period: typically 18–36 months for IP reps; "fundamental" reps (title) often 6 years or indefinite.
  • Cap: typically 10–20% of EV (without R&W insurance); often higher caps or super-caps for fundamental and IP reps.
  • Basket: tipping or true deductible, ~0.5% of purchase price; "mini-basket" excludes claims under a per-claim threshold.
  • De minimis: typically calibrated to DD materiality threshold.

Specific Indemnities for Known Risks

For DD findings the buyer is unwilling to accept under general reps. Key features:

  • Independent of seller's knowledge.
  • Not subject to the disclosure letter.
  • Often uncapped or with a super-cap above the general cap.
  • Specific to the identified issue (e.g. "all losses arising from the [BRAND] cancellation proceedings filed by X on [date]").
  • May be backed by escrow or a holdback against the consideration.

C. The Disclosure Letter — Where DD Findings Land

Under English-style M&A practice (and increasingly in Bangladesh), the seller delivers a Disclosure Letter against the warranties. Anything fully and fairly disclosed cannot ground a warranty claim. The IP DD report drives the IP-specific schedules of the Disclosure Letter, including:

  • Schedule of registered IP (with health flags).
  • Schedule of material in-licences.
  • Schedule of material out-licences.
  • Schedule of consents required for the transaction.
  • Schedule of pending IP litigation, oppositions, and disputes.
  • Schedule of OSS used in commercial products.
  • Schedule of data breaches and regulatory notifications.
  • Schedule of trade-mark non-use / vulnerable registrations.

D. Pre-Closing & Post-Closing Covenants

DD findings translate into covenants that the seller must perform between signing and closing (or shortly thereafter). Bangladesh-specific covenants frequently include:

  • Recordal of historic assignments at DPDT for any chains of title with gaps.
  • Recordal of Registered User Agreements at DPDT for any unrecorded trade-mark licences (s.44 Trademarks Act 2009).
  • Filing of confirmatory deeds of assignment from founders, contractors, or prior owners with title gaps.
  • Renewal of trade marks coming due within the closing window.
  • Payment of patent annuities due within the closing window.
  • Obtaining licensor consents to change of control / assignment for material in-licences.
  • Release of IP-secured liens recorded at DPDT or RJSC.
  • OSS remediation: factor-out or commercial re-licensing of contaminating components.
  • Customs IPR recordal at DCII for unrecorded marks.
  • Settlement of pending oppositions on agreed terms.
  • Bangladesh Bank approvals for any post-closing royalty / IP-payment arrangements.

E. Representations & Warranties Insurance (RWI)

For mid-market and larger transactions, R&W insurance is increasingly standard. Underwriters review the IP DD report directly. Key parameters:

  • Retention: 0.5–1% of EV (deductible). May "drop down" after a period.
  • Policy limit: typically 10–20% of EV.
  • Premium: typically 2.5–4% of policy limit.
  • IP-specific exclusions: any DD-identified known issue is excluded; FTO and patent-validity sometimes carved out unless specifically diligenced.
  • Underwriter call: counsel walks the underwriter through the DD report; gaps in DD = exclusions or reduced cover.
⚖ LegalSeba LLP Practice: We routinely structure IP DD reports specifically to support RWI underwriting—comprehensive scope, clear materiality threshold, fully indexed exhibits, and a dedicated Q&A session with the underwriter.

Risk Materiality Matrix

Not every DD finding is a deal-breaker. Magic Circle practice triages findings on two axes—likelihood of materialisation and impact on valuation—and translates the position on the matrix into a specific deal-document response. LegalSeba LLP supports acquirers, sellers, and investors in moving findings from technical observations to actionable price chips, escrows, indemnities, and walk-away calculations, alongside our integrated Tax DD, Legal DD, and Financial DD services.

Materiality Assessment of Common Findings

0 0 2 2 4 4 6 6 8 8 10 10 Likelihood of Issue Materialising (1-10) Potential Impact on Valuation / Deal (1-10) Missing Founder Assignment (likelihood 8, impact 9) Unrecorded DPDT Assignment (likelihood 9, impact 8) AGPL/GPLv3 in Core Product (likelihood 8, impact 9) Active Patent Litigation (likelihood 3, impact 9) Toxic Training Data (likelihood 7, impact 7) No In-Country PD Mirror (likelihood 8, impact 6) CoC Termination on Material Licence (likelihood 7, impact 6) Weak Trade-Secret Posture (likelihood 6, impact 5) AI-Generated Code in Product (likelihood 5, impact 6) 5-Year Non-Use Risk on Mark (likelihood 6, impact 4) Single-Class Coverage Gap (likelihood 4, impact 5) Lapsed Peripheral Trade Mark (likelihood 8, impact 2) Missing Recent PIIAs (likelihood 2, impact 3) OSS Notice Attribution Gaps (likelihood 4, impact 2) Missing Founder Assignment Unrecorded DPDT Assignment AGPL/GPLv3 in Core Product Active Patent Litigation Toxic Training Data No In-Country PD Mirror CoC Termination on Material Licence Weak Trade-Secret Posture AI-Generated Code in Product 5-Year Non-Use Risk on Mark Single-Class Coverage Gap Lapsed Peripheral Trade Mark Missing Recent PIIAs OSS Notice Attribution Gaps
Deal Breaker / Major Adjustment Pre-Close Covenants / Specific Indemnity Post-Close Housekeeping

Remediation Playbook — From Finding to Deal-Document Response

FindingRisk ProfileDeal-Document Response
Missing founder IP assignmentHIGH × HIGH — title defectClosing condition: confirmatory deed of assignment from founder. If founder unavailable, walk.
Unrecorded historic DPDT assignmentHIGH × HIGH — unenforceable rightsClosing condition: file recordal pre-closing (3–6 months at DPDT); confirmatory deed if original assignor available.
AGPL / GPLv3 contamination in core SaaSHIGH × HIGH — disclosure / re-licensing riskClosing condition: factor-out or dual-licence. Specific uncapped indemnity for residual exposure. Price chip.
Active patent litigation by competitorMED × HIGH — quantum riskSpecific indemnity, capped at exposure estimate; escrow funded; control-of-defense provision.
Change-of-control consent needed for material licenceHIGH × MED — operational riskClosing condition: licensor consent; or deal-structure change to share purchase; or specific indemnity for non-renewal.
5-year non-use exposure on key trade markMED × MED — cancellation riskPre-close covenant: re-launch use; specific indemnity for any cancellation in 24 months post-closing.
Missing PIIAs for 5 employeesLOW × LOW — clericalPre-close covenant: secure executed PIIAs as a closing deliverable. General rep with knowledge qualifier.
Lapsed peripheral trade-mark registrationHIGH × LOW — re-file or accept lapseDisclosure-letter entry. No other action.
OSS notice-attribution gaps (permissive licences)HIGH × LOW — technical breachPost-close housekeeping covenant.
Data set scraped without consent forming basis of valuationHIGH × HIGH — regulatory / class-actionWalk, or deep restructuring: data deletion, valuation reset, super-cap indemnity, escrow.
Restricted PD or CII data held only on overseas cloud (no Bangladesh mirror)HIGH × MED — PDPO 2025 s.29(7)(b) breachPre-close covenant: stand-up in-country synchronised real-time mirror within 60 days; specific indemnity for any NDM Authority enforcement action; CDO appointment if SDF.

IP Diligence Workstream & Indicative Timeline

A typical mid-market M&A IP diligence engagement runs 3–8 weeks depending on data-room readiness, target complexity, and DD level (1 to 5). The phasing below reflects standard institutional practice.

Phased Workstream

W1

Week 1 — Scoping & Document Request

Engagement letter; conflict checks; scoping call with deal team and (where possible) target counsel; issue tailored Document Request List; data-room access; preliminary public-register searches at DPDT, USPTO, EUIPO, WIPO; corporate-structure mapping.

W2-3

Weeks 2–3 — Core Review & Management Q&A

Detailed review of registered-IP schedules, agreements, employment-IP architecture, OSS scans, dispute history; first round of follow-up questions to target; management interviews (general counsel, CTO, head of brand, head of HR); flag preliminary red flags to deal lead.

W3-4

Weeks 3–4 — Specialist Workstreams

FTO searches (where Level 4 / 5); patent-claim mapping with technical specialists; trade-mark clearance in expansion markets; AI / data-asset deep-dive; privacy / cybersecurity assessment with IT counsel; tax / transfer-pricing interface review.

W4-5

Weeks 4–5 — Draft Report & Issues List

Draft DD report circulated to deal team; issues list of red / amber findings with proposed remediation; preliminary heads-of-issues for SPA negotiation; engagement with R&W underwriter (if applicable).

W5-7

Weeks 5–7 — SPA Negotiation Support & Disclosure Letter

Drafting / reviewing IP reps and warranties; specific indemnities for identified findings; disclosure-letter schedules; closing conditions and pre-closing covenants; integration of DD findings into transaction documents.

W7-8

Weeks 7–8 — Closing & Post-Closing

Final disclosure letter; bring-down reps at closing; closing-deliverables checklist (recordals filed, consents obtained, releases recorded); post-closing integration plan including DPDT recordal of the deal-related assignment to the buyer entity (where applicable).

Deliverables of an Institutional IP DD Engagement

1. Executive Summary Memo

5–10 pages: deal-team facing, red/amber/green findings, materiality calls, recommended deal-document responses.

2. Full DD Report

Module-by-module institutional report (often 60–200 pages); used for R&W underwriting, audit committee, and investment committee.

3. Issues List & Remediation Tracker

Live document tracking each finding through remediation, deal-document response, and closing-deliverables checklist.

4. IP Schedule for SPA

Verified, deal-ready schedules for the SPA / APA — registered IP, material agreements, consents required, encumbrances.

5. Disclosure Letter Drafting (Sell-side)

For the sell-side instruction, drafting and negotiation of IP-related disclosures against the warranties.

6. Closing Deliverables Pack

DPDT recordals, BCO confirmations, licensor consents, lien releases, executed assignments, customs IPR updates.

Execute Your Transaction with LegalSeba LLP

Whether you are conducting IP due diligence in Bangladesh for a strategic acquisition, preparing for an IP portfolio audit ahead of fundraising or IPO, structuring R&W insurance, or negotiating IP reps and indemnities in a cross-border deal, LegalSeba LLP brings Magic Circle-grade methodology and deep local expertise. Our Deal Advisory Group secures the IP architecture of your transaction—from the Document Request List through to the final closing deliverables and DPDT recordals.

Email Us

support@legalseba.com

WhatsApp

+880 1753 718 223

Schedule a Consultation

LegalSeba.com/book-now