The Fear Series: Predatory Teaming and the IP Theft No One Calls Theft


Small contractors know the playbook. A prime needs your past performance, your small business certs, and your technical credibility to win the bid. Post-award, the work-share quietly shrinks. What gets less attention is the parallel raid on your intellectual property: your proprietary methods, your technical data, your trade secrets, all extracted under the cover of a teaming relationship that was never going to last. Here is how predatory primes get your IP, and how to stop them:

The Proposal Phase Disclosure. To win the work, the prime asks for your "technical approach" in detail: methods, software, prototypes, performance data. You hand it over because that is what teaming looks like. There is no NDA, or the NDA is one-sided and toothless. After award, the prime executes your approach with someone else, or in-house. You have no recourse because you cannot prove what was yours before the relationship started.

The Background IP Trap. Teaming agreements routinely include broad grants of "background IP" needed for performance. Read carelessly, these clauses license your pre-existing technology to the prime, sometimes irrevocably, sometimes sublicensable to the Government with unlimited rights. The clause looks like boilerplate but it is not.

How to Protect Your Business Right Now:

1️⃣ NDA First, Teaming Agreement Second. No proposal disclosure happens before a mutual, narrowly scoped NDA is signed. Identify what is yours, in writing, before it leaves your shop.

2️⃣ Background IP Schedule. Attach a schedule to every teaming agreement listing your pre-existing IP and the limited license you grant for proposal and performance purposes only. No background IP grant should be open-ended, perpetual, or sublicensable without written consent.

3️⃣ Assert Your Rights at the Source. Mark your technical data and software per DFARS 252.227-7013(f) and -7014(f) before any disclosure. Unmarked data is presumed to carry unlimited rights. The marking is your shield.

4️⃣ Pre-Award Assertions. Use the DFARS 252.227-7017 assertions table to identify your limited and restricted rights data before contract award. Post-award assertions are harder to defend and easier to challenge.

5️⃣ Audit the Pass-Through Clauses. Subcontract terms should mirror, not weaken, the prime contract's IP and data rights provisions. If the prime's flow-down language is silent on your rights, that silence will be read against you.

You may recover the work on the next contract. But the IP you lost is gone. Predatory teaming is not just a business development problem, it is an IP protection problem, and the time to solve it is before the teaming agreement is signed.

Previous
Previous

So you think you have an AI invention. Do you really?

Next
Next

The Fear Series: Rushing to Failure