02.01.2017 Views

ENFORCEMENT

2h1EjNw

2h1EjNw

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Joint Strategic Plan on Intellectual Property Enforcement<br />

ENDNOTES<br />

SECTION 2<br />

1<br />

See, e.g., Organization for Economic Cooperation and<br />

Development, “The Economic Impact of Counterfeiting and<br />

Piracy,” at p. 273 (2008), accessed from http://www.keepeek.<br />

com/Digital-Asset-Management/oecd/trade/the-economic-<br />

impact-of-counterfeiting-and-piracy_9789264045521-<br />

en#.V_0WF_lrjq4#page1. See also Digital Citizens Alliance,<br />

“Good Money Gone Bad: Digital Thieves and the Hijacking of<br />

the Online Ad Business,” at p. 8 (February 2014), accessed from<br />

http://media.digitalcitizensactionalliance.org/ 314A5A5A9ABBB<br />

BC5E3BD824CF47C46EF4B9D3A76/4af7db7f-03e7-49cb-aeb8-<br />

ad0671a4e1c7.pdf.<br />

2<br />

See, e.g., Blackstone, Erwin et al., “The Health and Economic<br />

Effects of Counterfeit Drugs,” American Health & Drug Benefits,<br />

7(4): 216, at p. 220 & n.37 (June 2014), accessed from http://<br />

www.ncbi.nlm.nih.gov/pmc/articles/ PMC4105729/#R37, citing<br />

to Ehrenberg, Rachel, “Counterfeit Crackdown,” Science News,<br />

179: 22-25 (June 18, 2011), available at [subscription required]<br />

https://www.sciencenews.org/article/counterfeit-crackdown.<br />

3<br />

See, e.g., Kan, Paul Rexton et al., “Criminal Sovereignty:<br />

Understanding North Korea’s Illicit International Activities,” at<br />

p. 15 (U.S. Army War College, Strategic Studies Institute; March<br />

2010), accessed from http://www.strategicstudiesinstitute.army.mil/<br />

pdffiles/pub975.pdf.<br />

4<br />

A diverse set of stakeholders has long advocated for the<br />

development and implementation of a “follow the money”<br />

approach as a solution to curb commercial online piracy and<br />

counterfeiting. This approach is embodied in the voluntary private<br />

sector initiatives that have been developed and implemented,<br />

which are discussed elsewhere in this Strategic Plan and in the<br />

2013 Joint Strategic Plan on Intellectual Property Enforcement.<br />

This approach was also discussed, for example, at the 2011<br />

hearing (before the House Judiciary Committee’s Subcommittee<br />

on Intellectual Property, Competition, and the Internet) on<br />

“Promoting Investment And Protecting Commerce Online:<br />

Legitimate Sites v. Parasites” (March 14 and April 6, 2011), House<br />

Doc. 112-153, accessed from https://www.gpo.gov/fdsys/pkg/<br />

CHRG-112hhrg65186/html/CHRG-112hhrg65186.htm. See also<br />

Abrams, Rachel, “Eric Schmidt, Harvey Weinstein Talk Piracy,”<br />

Variety (July 11, 2013), accessed from http://variety.com/2013/<br />

digital/news/sun-valley-eric-schmidt-harvey-weinstein-talkpiracy-1200561819/<br />

(quoting Eric Schmidt from Google as saying<br />

that: “Our position is that somebody’s making money on this<br />

pirated content and it should be possible to identify those people<br />

and bring them to justice.”).<br />

5<br />

See International Chamber of Commerce (ICC)/Business<br />

Action to Stop Counterfeiting and Piracy (BASCAP), “Roles and<br />

Responsibilities of Intermediaries: Fighting Counterfeiting and<br />

Piracy in the Supply Chain,” at p.89 (March 2015), accessed<br />

from http://www.iccwbo.org/Advocacy-Codes-and-Rules/<br />

BASCAP/International-engagement-and-Advocacy/Roles-and-<br />

Responsibilities-of-Intermediaries/. See also Federal Bureau of<br />

Investigation, “Countering the Growing Intellectual Property<br />

Theft Threat: Enhancing Ties Between Law Enforcement and<br />

Business” (January 22, 2016), accessed from https://www.fbi.<br />

gov/news/stories/countering-the-growing-intellectual-propertytheft-threat<br />

(“Technological advances continue at an even faster<br />

pace, dramatically increasing the threat posed by criminals<br />

who steal trade secrets, produce and/or traffic in counterfeit<br />

products, and infringe on copyrights. One important factor in<br />

this increase is the global expansion of online marketplaces,<br />

which aids international and domestic criminal organizations in<br />

trafficking in counterfeit goods.”).<br />

6<br />

Below are examples of Terms of Service:<br />

Visa Terms<br />

of Service:<br />

MasterCard<br />

Terms of<br />

Services:<br />

American<br />

Express<br />

Terms of<br />

Services:<br />

“Visa is committed to preventing the use of its<br />

payment brand and system for illegal transactions…”<br />

and “upon receiving…credible evidence…that the<br />

merchant (“Merchant”) is engaged in transactions<br />

involving the sale of infringing goods on the<br />

Internet using Visa-branded payment cards, Visa<br />

[may direct] the Merchant to cease selling infringing<br />

goods identified by the IP Owner or terminating the<br />

Merchant account.”<br />

See https://usa.visa.com/legal/intellectual-property-rights.<br />

html<br />

“MasterCard has…adopted a policy that provides<br />

for the immediate removal of any content or the<br />

suspension of any user that is found to have infringed<br />

on the rights of MasterCard or of a third party, or that<br />

has otherwise violated any intellectual property laws<br />

or regulations…”<br />

See https://www.mastercard.us/en-us/about-mastercard/<br />

what-we-do/terms-of-use.html#propertyrights<br />

Establishing that American Express cards may not be<br />

used “…for sales of products over the Internet that<br />

would constitute a violation of copyright or trademark<br />

laws[.]”<br />

See https://www.americanexpress.com/us/content/<br />

legal-disclosures/website-rules-and-regulations.<br />

html?inav=footer_Terms_of_Use<br />

7<br />

International Anti-Counterfeiting Coalition, “IACC Payment<br />

Processor Portal Program: First Year Statistical Review,” at pp.<br />

13-14 (Oct. 2012), accessed from http://docplayer.net/2433238-<br />

International-anticounterfeiting-coalition-iacc-paymentprocessor-portal-program-first-year-statistical-review.html.<br />

8<br />

“A ‘trace message’ is an attempt to make an online purchase<br />

using a valid, yet set-to-decline credit card. It is similar to a<br />

test purchase, but because the payment is declined, no goods<br />

are delivered. The purpose of a trace message is to assist the<br />

Card Network in identifying the merchant account associated<br />

with the website.” International Anti-Counterfeiting Coalition,<br />

“IACC Payment Processor Portal Program: First Year Statistical<br />

Review,” at p. 6 n.5 (October 2012), accessed from http://<br />

docplayer.net/2433238-International-anticounterfeitingcoalition-iacc-payment-processor-portal-program-first-yearstatistical-review.html.<br />

Regarding the detection systems that<br />

thwart “test” transactions, see id., at pp. 15-16 & n. 18.<br />

9<br />

By contrast, in the closed-loop payments model (e.g.,<br />

American Express), the payment services are provided directly<br />

to merchants by the owner of the network without involving<br />

third-party financial institution intermediaries. See, e.g.,<br />

International Anti-Counterfeiting Coalition, “IACC Payment<br />

Processor Portal Program: First Year Statistical Review,” at p. 7<br />

(October 2012), accessed from http://docplayer.net/2433238-<br />

International-anticounterfeiting-coalition-iacc-paymentprocessor-portal-program-first-year-statistical-review.html.<br />

10<br />

See, e.g., Mike Weatherley, MP (Intellectual Property Adviser<br />

to the Prime Minister), on “Follow The Money: Financial<br />

Options To Assist In The Battle Against Online IP Piracy: A<br />

Discussion Paper by Mike Weatherley, MP ” (2014), accessed<br />

from http://www.olswang.com/media/48204227/follow_the_<br />

money_financial_options_to_assist_in_the_battle_against_<br />

82

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!