08.08.2015 Views

Economic Report of the President

Economic Report of the President - 2005 - The American Presidency ...

Economic Report of the President - 2005 - The American Presidency ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

it difficult for law enforcement agencies to track down sources <strong>of</strong> fraudulentspam and spyware (which collects information from <strong>the</strong> victim’s computer).Such activity is growing quickly and posing significant costs to victims andcompanies. The <strong>President</strong> signed into law <strong>the</strong> Controlling <strong>the</strong> Assault <strong>of</strong> Non-Solicited Pornography and Marketing Act <strong>of</strong> 2003 (CAN-SPAM Act), whichestablishes a framework <strong>of</strong> administrative, civil, and criminal tools to helpAmerica’s consumers, businesses, and families combat unsolicited commercial e-mail. The problems associated with spam cannot be solved by Federal legislationalone, but will require market responses in <strong>the</strong> development and adoption <strong>of</strong>new technologies. The Federal government has also stepped up <strong>the</strong> pursuit <strong>of</strong>purveyors <strong>of</strong> fraudulent spam and spyware. For example, in a joint law enforcementinitiative, <strong>the</strong> FTC and <strong>the</strong> Department <strong>of</strong> Justice (DOJ) have broughtactions to shut down operations that hijacked logos from online businesses tocon hundreds <strong>of</strong> consumers into providing credit card and bank accountnumbers. December 2004 saw <strong>the</strong> formation <strong>of</strong> a new public-private consortiumthat includes financial services firms, Internet service providers, ITvendors, and law enforcement to fight Internet-based fraud.Copyright InfringementCopyrights encourage <strong>the</strong> development <strong>of</strong> goods such as books, songs, andvideos that are much costlier to produce initially than to replicate. Digitaltechnologies and <strong>the</strong> Internet have made possible high-quality reproduction<strong>of</strong> music and video at nearly zero cost, and facilitated extensive unauthorizeduse through mechanisms such as file-sharing networks. Industry is exploringtechnological remedies to combat <strong>the</strong>ft, but <strong>the</strong> Federal government is alsoplaying a role. The Attorney General has made enforcement <strong>of</strong> intellectualproperty laws a high priority <strong>of</strong> <strong>the</strong> DOJ. The DOJ has expanded itsComputer Crime and Intellectual Property Section and created <strong>the</strong> CyberDivision <strong>of</strong> <strong>the</strong> Federal Bureau <strong>of</strong> Investigation. In 2004, <strong>the</strong> DOJ launchedOperation Digital Gridlock, <strong>the</strong> first Federal enforcement action ever takenagainst criminal copyright <strong>the</strong>ft on peer-to-peer networks (that allow groups <strong>of</strong>computer users with <strong>the</strong> same networking program to interconnect anddirectly access files from one ano<strong>the</strong>r’s hard drives).Competition Versus <strong>Economic</strong> RegulationAn overly high price or low quality by a supplier opens <strong>the</strong> door to pr<strong>of</strong>itopportunities for <strong>the</strong> supplier’s rivals. Rivals can expand <strong>the</strong>ir sales by undercuttingprice or <strong>of</strong>fering superior quality or service. In this way, competitiondrives suppliers to provide customers <strong>the</strong> greatest possible value consistentwith covering costs. Pursuit <strong>of</strong> pr<strong>of</strong>it opportunities also draws firms to enter142 | <strong>Economic</strong> <strong>Report</strong> <strong>of</strong> <strong>the</strong> <strong>President</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!