ENFORCEMENT
2h1EjNw
2h1EjNw
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Joint Strategic Plan on Intellectual Property Enforcement<br />
ENDNOTES<br />
SECTION 2<br />
1<br />
See, e.g., Organization for Economic Cooperation and<br />
Development, “The Economic Impact of Counterfeiting and<br />
Piracy,” at p. 273 (2008), accessed from http://www.keepeek.<br />
com/Digital-Asset-Management/oecd/trade/the-economic-<br />
impact-of-counterfeiting-and-piracy_9789264045521-<br />
en#.V_0WF_lrjq4#page1. See also Digital Citizens Alliance,<br />
“Good Money Gone Bad: Digital Thieves and the Hijacking of<br />
the Online Ad Business,” at p. 8 (February 2014), accessed from<br />
http://media.digitalcitizensactionalliance.org/ 314A5A5A9ABBB<br />
BC5E3BD824CF47C46EF4B9D3A76/4af7db7f-03e7-49cb-aeb8-<br />
ad0671a4e1c7.pdf.<br />
2<br />
See, e.g., Blackstone, Erwin et al., “The Health and Economic<br />
Effects of Counterfeit Drugs,” American Health & Drug Benefits,<br />
7(4): 216, at p. 220 & n.37 (June 2014), accessed from http://<br />
www.ncbi.nlm.nih.gov/pmc/articles/ PMC4105729/#R37, citing<br />
to Ehrenberg, Rachel, “Counterfeit Crackdown,” Science News,<br />
179: 22-25 (June 18, 2011), available at [subscription required]<br />
https://www.sciencenews.org/article/counterfeit-crackdown.<br />
3<br />
See, e.g., Kan, Paul Rexton et al., “Criminal Sovereignty:<br />
Understanding North Korea’s Illicit International Activities,” at<br />
p. 15 (U.S. Army War College, Strategic Studies Institute; March<br />
2010), accessed from http://www.strategicstudiesinstitute.army.mil/<br />
pdffiles/pub975.pdf.<br />
4<br />
A diverse set of stakeholders has long advocated for the<br />
development and implementation of a “follow the money”<br />
approach as a solution to curb commercial online piracy and<br />
counterfeiting. This approach is embodied in the voluntary private<br />
sector initiatives that have been developed and implemented,<br />
which are discussed elsewhere in this Strategic Plan and in the<br />
2013 Joint Strategic Plan on Intellectual Property Enforcement.<br />
This approach was also discussed, for example, at the 2011<br />
hearing (before the House Judiciary Committee’s Subcommittee<br />
on Intellectual Property, Competition, and the Internet) on<br />
“Promoting Investment And Protecting Commerce Online:<br />
Legitimate Sites v. Parasites” (March 14 and April 6, 2011), House<br />
Doc. 112-153, accessed from https://www.gpo.gov/fdsys/pkg/<br />
CHRG-112hhrg65186/html/CHRG-112hhrg65186.htm. See also<br />
Abrams, Rachel, “Eric Schmidt, Harvey Weinstein Talk Piracy,”<br />
Variety (July 11, 2013), accessed from http://variety.com/2013/<br />
digital/news/sun-valley-eric-schmidt-harvey-weinstein-talkpiracy-1200561819/<br />
(quoting Eric Schmidt from Google as saying<br />
that: “Our position is that somebody’s making money on this<br />
pirated content and it should be possible to identify those people<br />
and bring them to justice.”).<br />
5<br />
See International Chamber of Commerce (ICC)/Business<br />
Action to Stop Counterfeiting and Piracy (BASCAP), “Roles and<br />
Responsibilities of Intermediaries: Fighting Counterfeiting and<br />
Piracy in the Supply Chain,” at p.89 (March 2015), accessed<br />
from http://www.iccwbo.org/Advocacy-Codes-and-Rules/<br />
BASCAP/International-engagement-and-Advocacy/Roles-and-<br />
Responsibilities-of-Intermediaries/. See also Federal Bureau of<br />
Investigation, “Countering the Growing Intellectual Property<br />
Theft Threat: Enhancing Ties Between Law Enforcement and<br />
Business” (January 22, 2016), accessed from https://www.fbi.<br />
gov/news/stories/countering-the-growing-intellectual-propertytheft-threat<br />
(“Technological advances continue at an even faster<br />
pace, dramatically increasing the threat posed by criminals<br />
who steal trade secrets, produce and/or traffic in counterfeit<br />
products, and infringe on copyrights. One important factor in<br />
this increase is the global expansion of online marketplaces,<br />
which aids international and domestic criminal organizations in<br />
trafficking in counterfeit goods.”).<br />
6<br />
Below are examples of Terms of Service:<br />
Visa Terms<br />
of Service:<br />
MasterCard<br />
Terms of<br />
Services:<br />
American<br />
Express<br />
Terms of<br />
Services:<br />
“Visa is committed to preventing the use of its<br />
payment brand and system for illegal transactions…”<br />
and “upon receiving…credible evidence…that the<br />
merchant (“Merchant”) is engaged in transactions<br />
involving the sale of infringing goods on the<br />
Internet using Visa-branded payment cards, Visa<br />
[may direct] the Merchant to cease selling infringing<br />
goods identified by the IP Owner or terminating the<br />
Merchant account.”<br />
See https://usa.visa.com/legal/intellectual-property-rights.<br />
html<br />
“MasterCard has…adopted a policy that provides<br />
for the immediate removal of any content or the<br />
suspension of any user that is found to have infringed<br />
on the rights of MasterCard or of a third party, or that<br />
has otherwise violated any intellectual property laws<br />
or regulations…”<br />
See https://www.mastercard.us/en-us/about-mastercard/<br />
what-we-do/terms-of-use.html#propertyrights<br />
Establishing that American Express cards may not be<br />
used “…for sales of products over the Internet that<br />
would constitute a violation of copyright or trademark<br />
laws[.]”<br />
See https://www.americanexpress.com/us/content/<br />
legal-disclosures/website-rules-and-regulations.<br />
html?inav=footer_Terms_of_Use<br />
7<br />
International Anti-Counterfeiting Coalition, “IACC Payment<br />
Processor Portal Program: First Year Statistical Review,” at pp.<br />
13-14 (Oct. 2012), accessed from http://docplayer.net/2433238-<br />
International-anticounterfeiting-coalition-iacc-paymentprocessor-portal-program-first-year-statistical-review.html.<br />
8<br />
“A ‘trace message’ is an attempt to make an online purchase<br />
using a valid, yet set-to-decline credit card. It is similar to a<br />
test purchase, but because the payment is declined, no goods<br />
are delivered. The purpose of a trace message is to assist the<br />
Card Network in identifying the merchant account associated<br />
with the website.” International Anti-Counterfeiting Coalition,<br />
“IACC Payment Processor Portal Program: First Year Statistical<br />
Review,” at p. 6 n.5 (October 2012), accessed from http://<br />
docplayer.net/2433238-International-anticounterfeitingcoalition-iacc-payment-processor-portal-program-first-yearstatistical-review.html.<br />
Regarding the detection systems that<br />
thwart “test” transactions, see id., at pp. 15-16 & n. 18.<br />
9<br />
By contrast, in the closed-loop payments model (e.g.,<br />
American Express), the payment services are provided directly<br />
to merchants by the owner of the network without involving<br />
third-party financial institution intermediaries. See, e.g.,<br />
International Anti-Counterfeiting Coalition, “IACC Payment<br />
Processor Portal Program: First Year Statistical Review,” at p. 7<br />
(October 2012), accessed from http://docplayer.net/2433238-<br />
International-anticounterfeiting-coalition-iacc-paymentprocessor-portal-program-first-year-statistical-review.html.<br />
10<br />
See, e.g., Mike Weatherley, MP (Intellectual Property Adviser<br />
to the Prime Minister), on “Follow The Money: Financial<br />
Options To Assist In The Battle Against Online IP Piracy: A<br />
Discussion Paper by Mike Weatherley, MP ” (2014), accessed<br />
from http://www.olswang.com/media/48204227/follow_the_<br />
money_financial_options_to_assist_in_the_battle_against_<br />
82