12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Joint Strategic Plan on Intellectual Property Enforcement<br />

ENDNOTES<br />

SECTION 1<br />

1<br />

U.S. Department of Commerce, “Intellectual Property and the<br />

U.S. Economy: Industries in Focus” (March 2012), accessed from<br />

https://www.uspto.gov/sites/default/files/news/publications/<br />

IP_Report_March_2012.pdf.<br />

2<br />

See U.S. Department of Commerce, “Intellectual Property and<br />

the U.S. Economy: 2016 Update,” (September 2016), accessed<br />

from https://www.uspto.gov/sites/default/files/documents/IPandtheUSEconomySept2016.pdf.<br />

3<br />

Message by President Obama on World Intellectual Property<br />

Day (April 26, 2016), accessed from https://www.whitehouse.<br />

gov/sites/whitehouse.gov/files/images/Documents/EMessage%20World%20Intellectual%20Property%20Day.pdf.<br />

4<br />

Copyrights and trademarks are the most commonly violated<br />

intellectual property rights for both hard goods and online<br />

content. As a result, this Section emphasizes these intellectual<br />

property interests. Of course, there are certain activities or<br />

products that may constitute an infringement of patent rights independent<br />

from, or in combination with, one or more other intellectual<br />

property right(s). For example, a counterfeit electronic<br />

device such as a smartphone may implicate the infringement<br />

of a trademark, a copyright, and a patent right. Patent interests<br />

that are independent of counterfeiting and piracy are addressed<br />

more extensively in Section IV of this Plan.<br />

5<br />

See Prioritizing Resources and Organization for Intellectual<br />

Property Act of 2008 (“PRO-IP Act”), Pub. L. No. 110-403, 122<br />

Stat. 4256 (2008).<br />

6<br />

Prioritizing Resources and Organization for Intellectual Property<br />

Act of 2008 (“PRO-IP Act”), Pub. L. No. 110-403, 122 Stat.<br />

4256 (2008) (emphasis added).<br />

7<br />

An example that illustrates the importance of the Federal Government<br />

being aware of and seeking to keep up with technological<br />

innovations and new business models is the case of cell<br />

phone unlocking. When cell phone unlocking lost exemption<br />

status under the Digital Millennium Copyright Act, consumers<br />

lost the ability to shop for a mobile phone provider using the<br />

device they had purchased because “unlocking” a device<br />

would circumvent technical access mechanisms that are often<br />

used to protect copyright. After over 100 thousand Americans<br />

petitioned the Federal Government to restore the exemption,<br />

the U.S. Congress and the Executive Branch acted and the<br />

Unlocking Consumer Choice and Wireless Competition Act,<br />

Pub. L. No. 113-144, 128 Stat. 1751 (2014), was passed, so that<br />

the strong protections that prevent illicit actors from stealing<br />

copyrighted works would not create unintended consequences<br />

that lessened the ability for a consumer to take their business<br />

where they choose.<br />

8<br />

General Keith Alexander (ret.), while Director of the National<br />

Security Agency and Commander of U.S. Cyber Command,<br />

estimated that U.S. companies lose approximately $250<br />

billion per year due to the theft of their intellectual property.<br />

See Rogin, Josh, “NSA Chief: Cybercrime constitutes<br />

the “greatest transfer of wealth in history,” The Cable (July<br />

9, 2012), accessed from http://thecable.foreignpolicy.com/<br />

posts/2012/07/09/nsa_chief_cybercrime_constitutes_the_<br />

greatest_transfer_of_wealth_in_history.<br />

9<br />

See Section I.<br />

10<br />

See Section III.<br />

11<br />

See U.S. Government Accountability Office (“GAO”), “Intellectual<br />

Property: Observations on Efforts to Quantify the Economic<br />

Effects of Counterfeit and Pirated Goods” (April 2010), at p.16,<br />

accessed from http://www.gao.gov/assets/310/303057.pdf.<br />

12<br />

See Congressional Research Service, “Protection of Trade<br />

Secrets: Overview of Current Law and Legislation” (April 22,<br />

2016) at pp.13-14, accessed from http://www.fas.org/sgp/crs/<br />

secrecy/R43714.pdf (listing a number of factors impeding more<br />

precise calculation of the economic impact of trade secret theft,<br />

including: (1) the fact that companies may not realize that their<br />

sensitive information has been stolen until years after the theft;<br />

(2) the belief that reporting security breaches to law enforcement<br />

could harm the company’s reputation and stock prices,<br />

or damage its corporate relationships; (3) fear of offending<br />

potential customers or business partners by publicly accusing<br />

a foreign government or business competitor of trade secret<br />

theft; and (4) difficulty in measuring the monetary value of some<br />

forms of sensitive information). See also Department of Justice,<br />

American Journal Of Trial Advocacy, “Your Secrets Are Safe<br />

With Us: How Prosecutors Protect Trade Secrets During Investigation<br />

and Prosecution,” Vol. 38:461 (2016) at p.463, accessed<br />

from http://www.justice.gov/criminal-ccips/file/640271/download<br />

(observing, “Despite the potential advantages of federal<br />

prosecution, some victims of trade secret theft have been<br />

reluctant to involve the Justice Department when investigating<br />

suspected thefts. Among other reasons, victims have expressed<br />

concern that inviting a criminal investigation and prosecution<br />

will increase the likelihood of the trade secret becoming publicly<br />

revealed during investigation or at trial.”).<br />

13<br />

See Organization for Economic Cooperation and Development<br />

(OECD), “The Economic Impact of Counterfeiting and<br />

Piracy” (2008) (hereinafter “2008 OECD Report”), accessed<br />

from http://www.oecd.org/sti/ind/theeconomicimpactofcounterfeitingandpiracy.htm,<br />

as updated by OECD, “Magnitude of<br />

Counterfeiting and Piracy of Tangible Products: An Update”<br />

(November 2009) (hereinafter “2009 OECD Report Update”),<br />

accessed from http://www.oecd.org/sti/ind/44088872.pdf.<br />

The quotations, regarding the estimates in the 2008 Report and<br />

the 2009 Update, are in the 2009 Update at pp. 1 and 3. In the<br />

2008 Report, the estimate is at p.13 (“Analysis carried out in this<br />

report indicates that international trade in counterfeit and pirated<br />

products could have been up to USD 200 billion in 2005.”).<br />

14<br />

See OECD/European Union Intellectual Property Office,<br />

“Trade in Counterfeit and Pirated Goods: Mapping the<br />

Economic Impact” (2016) (hereinafter “2016 OECD Report”)<br />

at p.68 (emphasis in the original), accessed from https://euipo.<br />

europa.eu/tunnel-web/secure/webdav/guest/document_library/<br />

observatory/documents/Mapping_the_Economic_Impact_study/<br />

Mapping_the_Economic_Impact_en.pdf. In addition, the 2016<br />

OECD Report estimated that “as much as 5.1% of EU imports<br />

in 2013 was in counterfeit and pirated products.” Id. at p.76<br />

(emphasis in original) (“this number represents an upper limit of<br />

counterfeit imports to the EU . . . the maximum possible amount<br />

of imports of counterfeit goods”). The 2016 OECD Report also<br />

indicated that, for at least one product category, the percentage<br />

of counterfeit goods could be significantly higher (“for some EU<br />

members, the incoming flows of counterfeit footwear from China<br />

tends to reach 27% of the total incoming trade in that product<br />

category . . . [this] represents the upper level of potential trade in<br />

46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!