Reference text - GACG | Global Anti

advertisement
Reference Text for Trainers
FAKES
Fighting Against Brand Counterfeiting in Three Key
European Member States. Towards a More
Comprehensive Strategy
Reference Text for Trainers
June 2011
With the financial support from the Prevention of and Fight against Crime Programme
of the European Union
European Commission - Directorate-General Home Affairs
1
Reference Text for Trainers
This publication reflects the views of the authors only, and the European Commission cannot be
held responsible for any use which may be made of the information contained therein.
2
Reference Text for Trainers
ABBREVIATIONS
(ACG)
Anti-Counterfeiting Group
(ADB/OECD)
Asian Development Bank/OECD Anti-Corruption Initiative for Asia
and the Pacific
(AEP)
Automated Entry Processing
(AFSSAPS)
Agence Française de Sécurité Sanitaire des Produits de Santé
(French Agency for Sanitary Safety of Health Products)
(APCO)
Association of Public Safety Communications Officials
(ARIPO)
African Regional Industrial Property Organization
(ASEM)
Asia-Europe Meeting
(BASCAP)
Business Action to Stop Counterfeiting and Piracy
(CBP)
Customs & Border Protection
(CCIAA)
Camera di Commercio, Industria, Artigianato ed Agricoltura
(Chamber of Commerce, Industry, Handicraft and Agriculture)
(CD)
Compact Disc
(CEIPI)
Centre d’Études Internationales de la Propriété Intellectuelle
(CEN)
Customs Enforcement Network System
(CIB)
Counterfeiting Intelligence Bureau
(DEA)
Drug Enforcement Administration
(DGLC)
Direzione Generale per la Lotta alla Contraffazione (General
Directorate for Combating Counterfeiting)
(DIIP)
INTERPOL Database on International Intellectual Property
(DNRED)
Direction Nationale du Renseignement et des Enquêtes
Douanières (National Directorate of Customs Intelligence and
Investigation)
(DVD)
Digital Video Disc or Digital Versatile Disc
(EAPO)
Eurasian Patent Office
(EC)
European Commission
(EMEA)
European Medicines Agency
(EPO)
European Patent Office
(ESPACENET)
Europe’s Network of Patent Database
(EU)
European Union
(EUCD)
EU Copyright Directive
(EUROJUST)
European Union’s Judicial Cooperation Unit
(EUROPOL)
European Police Office
(FALSTAFF)
Fully Automated Logistical System Against Forgery and Fraud
(FBI)
U.S. Federal Bureau of Investigation
(FDA)
U.S. Food and Drug Administration
(FPs)
Free Ports
(FTZs)
Free Trade Zones
3
Reference Text for Trainers
(GACG)
Global Anti-Counterfeiting Group
(GATS)
General Agreement on Trade in Services
(GATT)
General Agreement on Tariffs and Trade
(GdF)
Guardia di Finanza
(GIBP)
General Inspectorate of Romanian Border Police
(GICO)
Gruppo
d’Investigazione
sulla
Criminalità
(Investigation Group on Organized Crime)
(GPO)
General Prosecutors Office
(HP)
Hewlett Packard
(ICAR)
International Centre for Asset Recovery
(ICC)
International Chamber of Commerce
(ICE)
U.S. Immigration and Customs Enforcement
(IFPI)
International Federation of the Phonographic Industry
(INDICAM)
Istituto di Centromarca per la lotta alla contraffazione (Institute for
combating counterfeiting)
(INTA)
International Trademark Association
(INTERPOL)
International Criminal Police Organisation
(IP)
Intellectual Property
(Ip)
Internet protocol
(IPC)
Intellectual Property Crime
(IPO)
Intellectual Property Office
(IPRs)
Intellectual Property Rights
(IPT)
Intellectual Property Theft
(ISA)
International Searching Authority
(IT)
Information Technology
(ITU)
International Telecommunications Union
(LDCs)
Less Developed Countries
(LEAs)
Law Enforcement Agencies
(LPs)
Legal Practitioners
(MDTCA)
Ministry of Domestic Trade and Consumer Affairs
(MERCE)
Monitoraggio e Rappresentazione Commercio Estero (Monitoring
and Representation of Foreign Trade)
(MHRA)
Medicines and Healthcare Products Regulatory Agency
(MMECC)
Mainstreaming Methodology for Estimating Costs of Crime Project
(MoJ)
Ministry of Justice
(NAC)
National Authority of Customs
(NCA)
National Copyright Administration
(NIPLECC)
U.S. National Intellectual Property Law Enforcement Coordination
Council
(OAPI)
African Intellectual Property Organization
Organizzata
4
Reference Text for Trainers
(OECD)
Organisation for Economic Cooperation and Development
(OPOs)
Other Public Officials
(OSIM)
Romanian State Office for Inventions and Trademarks
(P2P)
Peer-to-Peer
(PCT)
Patent Cooperation Treaty
(POAHCCJ)
Public Ministry – Prosecutor’s Office attached to the High Court of
Cassation and Justice
(PoCA)
Proceed of Crime Act
(QA)
Quality Assurance
(R&D)
Research and Development
(RCO)
Rapport sur la Contrefaçon et la Criminalité Organisée
(RCO)
Romanian Copyright Office (ORDA)
(SCICO)
Servizio Centrale Investigativo Criminalità Organizzata (Central
Investigation Service on Organized Crime)
(SCT)
Standing Committee on the Law of Trademarks, Industrial Designs
and Geographical Indications
(SDI)
Sistema di Indagine (Investigation System)
(SECI)
Southeast Cooperative Initiative
(SIRENE)
Supplementary Information Request at the National Entries
(SIRO)
Supporto Informativo Ricerche Operative
(SIS)
Schengen Information System
(SISTER)
Sistema Inter Scambio Territtorio (Interchange Territory System)
(StAR)
Stolen Asset Recovery Initiative
(TAXUD)
EU Taxation and Customs Union
(TLT)
Trademark Law Treaty
(TRANSCRIME)
Joint Research Centre on Transnational Crimes
(TRIPS)
Trade-Related Aspects of Intellectual Property Rights Agreement
(TRP)
Tamper Resistant Packaging
(UAE)
United Arab Emirates
(UK)
United Kingdom
(UKBA)
UK Border Agency
(UN)
United Nations
(UNICRI)
United Nations Interregional Crime and Justice Research Institute
(UNIFAB)
Union des Fabricants
(URL)
Uniform Resource Locator
(USA)
United States of America
(USD)
United States Dollar
(VoIP)
Voice over Internet Protocol
(WCO)
World Customs Organization
(WCT)
WIPO Copyright Treaty
5
Reference Text for Trainers
(WHO)
World Health Organisation
(WIPO)
World Intellectual Property Organisation
(WTO)
World Trade Organisation
(ZPAV)
Związek Producentów Audio Video (Polish Society of the Phonographic Industry)
6
Reference Text for Trainers
SECTION 1
Intellectual Property Rights (IPRs): Basic Definitions
A. BASIC IPRS DEFINITIONS
The definitions of Intellectual Property Rights (IPRs) that will be presented in this section will
contribute to the general understanding of the various forms in which human creation can be
protected by law. Two main categories of IPRs may also be identified within the broader notion
of Intellectual Property: Industrial Property and Copyright, the former related to the protection of
innovation and trade (through Patents, Utility Models or Trademarks for example) and the latter
related to the protection of literary and artistic work.
It is important to note that the violation of rights granted by the various forms of IPRs is not
indicated by law with different legal definitions for each of them; the only differentiation that is
made follows usually the above mentioned distinction between Industrial Property and
Copyright. In the former case the violation of the rights granted is referred to as counterfeiting
and in the latter case as piracy.
These are the notions that we will also use for the purpose of this training manual.
1.1 Copyright and related rights
General Information on Copyright Protection
The copyright holder is granted exclusive rights by the Berne Convention for the Protection of
Literary and Artistic Work of 9 September 1886 and by a number of national legislations. The
term “exclusive” suggests that only the copyright holder may exercise these rights, thereby
excluding all unauthorized third parties from exercising them. The copyright holder may also
decide not to use any of the rights that are provided for, or to exercise them over a limited period
of time. This is due to the fact that this is a right which falls under the provisions of the
international and national legislative frameworks on copyright.
It is possible to distinguish between two different rights granted by copyright: economic rights,
which allow the copyright holder to obtain profits if his/her work is used by other parties; and
moral rights, which allow the copyright holder to act in order to maintain a connection with the
results of his/her creative work.
The economic framework of copyright generally allows the author to prohibit or authorize a
series of behaviours/actions in relation to his/her creative work, including: the reproduction of
the work in various forms; the distribution of copies of this work as well as its public
representation; broadcasting of the work by radio/television or through other media; translation
into other languages; and adaptations of the work.
It should be noted that the ability of the copyright holder to prevent the reproduction, distribution,
marketing and importing of copies of his/her work is the central element upon which the
economic protection granted by copyright is based. The economic protection is further
reinforced by the other rights mentioned above.
The strictly commercial element of copyright is supported by an additional element whose
specific goal is to guarantee that the origin of the work is always acknowledged. It must be
considered separately from the commercial component, in accordance with the provisions of
Article 6bis of the Berne Convention. Furthermore, moral rights cannot be transferred (unlike
economic rights) and their recognition is only granted to the individual author.
The rights analyzed thus far are generally attributed to the author of the artistic, scientific or
literary work by the Berne Convention. Although moral rights are always retained by the
commercial rights’ holder, they are subject to certain exceptions.
7
Reference Text for Trainers
Rights deriving from copyright are subject to limitations relative to the individual copies that are
legally produced, marketed and acquired by a third party which becomes the owner of the copy
in question. The owner is not prohibited from reselling the copy. The only exceptions are cases
where the transfer of ownership occurs between parties operating in different countries where
there are importing limits relative to such products.
The limitations mentioned above include a series of exceptions that are specified within most
national legislation and concern particular categories of goods. The Berne Convention
recognizes the free usage of certain categories of works within Article 9 (2) as long as this
usage does not interfere with the legitimate rights of the author and does not lie outside the
normal usage of the work in question. An example of free usage includes citing specific phrases
of a book while mentioning the source of the citation, the author and using a work for illustrative,
educational or informational purposes.
The determination of a copyright’s duration falls under the competence of national legislation.
The minimum guaranteed protection must, in any case and in accordance with Article 7,
correspond to the life of the author plus fifty years after his/her death within countries that are
bound by the Berne Convention. Individual national legislation differs as to when this protection
should begin. In specific cases, the initial date corresponds to the date of creation of the work
while other cases provide for the date in which the work has been officially completed. Current
trends have involved the lengthening of the period of granted protection in order for the author’s
heirs to fully enjoy the fruits of the creative work1.
Legal basis for copyright protection
Copyright and related rights have a strong social purpose which consists of protecting,
encouraging and rewarding creative work2.
The legal basis for the protection of “literally and artistic works” has been provided in the Berne
Convention for the Protection of Literary and Artistic Work. Article 2 (1) defines and outlines the
field of artistic and literary works and states:
“The expression ‘literary and artistic works’ shall include every production in the literary,
scientific and artistic domain, whatever may be the mode or form of its expression, such as
books, pamphlets and other writings; lectures, addresses, sermons and other works of the same
nature; dramatic or dramatico-musical works; choreographic works and entertainments in dumb
show; musical compositions with or without words; cinematographic works to which are
assimilated works expressed by a process analogous to cinematography; works of drawing,
painting, architecture, sculpture, engraving and lithography; photographic works to which are
assimilated works expressed by a process analogous to photography; works of applied art;
illustrations, maps, plans, sketches and three-dimensional works relative to geography,
topography, architecture or science.”
The Berne Convention currently counts 164 contracting State-parties.
The World Intellectual Property Organization (WIPO) Copyright Treaty, adopted on 20
December 20th 1996, is a complementary legal tool in the granting and protection of copyright as
it applies to categories of works not included in the Berne Convention. The aim of the WIPO
Copyright Treaty is stated in the preamble which states:
“[…] Recognizing the need to introduce new international rules and clarify the interpretation of
certain existing rules in order to provide adequate solutions to the questions raised by new
economic, social, cultural and technological developments; Recognizing the profound impact of
the development and convergence of information and communication technologies on the
creation and use of literary and artistic works […]”
1
The part of General Information on Copyright Protection is based on the UNICRI report Counterfeiting: A Global
Spread, A Global Threat, pp. 15-17. Online. Available HTTP: http://counterfeiting.unicri.it/report2008.php
2
World Trade Organization (WTO), Trade-related Aspects of Intellectual Property Rights (TRIPS), What are
Intellectual Property Rights? Online. Available HTTP: http://www.wto.org/english/tratop_e/trips_e/intel1_e.htm
8
Reference Text for Trainers
Articles 4 and 5 stipulate the protection of computer programmes and compilation of data
(databases), respectively. Article 5 is related to databases and foresees that:
“Compilations of data […] constitute intellectual creations, are protected as such. This protection
does not extend to the data or the material itself and is without prejudice to any copyright
subsisting in the data or material contained in the compilation.”
The purposes and scope of the WIPO Copyright Treaty is therefore the extension of copyright
granting and protection to software. This is also included within the concept of artistic or literary
work being the result of creative scientific work and therefore falling under the scope of Article 2
of the Berne Convention. Currently, the WIPO Copyright Treaty counts 88 contracting Stateparties.
Industrial Property
Patents, utility models, industrial designs, layout designs, trade names/firms, marks and
designation of origin and geographical indications are either industrially or commercially
applicable and they fall within the industrial property field. The rules for their grant, regulation,
conditions of application, registration and protection measures against misuse, abuse and
infringement are stipulated in the Paris Convention for the Protection of Industrial Property. It
was adopted on 20 March 1883 and is the basic reference document for industrial property.3
The substantive provisions of the Convention fall into three main categories: national treatment,
right of priority and common rules4. They apply to all of the categories of industrial property
defined by the Convention.
Under the provisions on national treatment, the Convention states that each contracting State
must grant the same protection to nationals of the other contracting States. This is as it grants
the protection of industrial property to its own nationals. Nationals of non-contracting States are
also entitled to national treatment under the Convention if they are domiciled or have a real and
effective industrial or commercial establishment in a contracting State.5
The Convention provides for the right of priority for patents (and utility models, where they exist)
marks and industrial designs. This right implies that on the basis of a regular first application
filed in one of the contracting States, the applicant may, within a specified period of time (12
months for patents and utility models; 6 months for industrial designs and marks) apply for
protection in any of the other contracting States. These later applications will then be regarded
as if they had been filed on the same day as the first application. These later applications will
have priority (hence the expression “right of priority”) over applications which may have been
filed during the given period of time by other individuals for the same invention, utility model,
mark or industrial design. Furthermore, these later applications based on the first application,
will not be affected by any event that may have taken place during this period. Examples include
any publication of the invention or sale of articles bearing the mark or incorporating the industrial
design. One of the practical advantages of this provision is that when an applicant requires
protection in several countries, she/he is not required to present all her/his applications at the
same time but has six or 12 months at his disposal to decide the countries she/he wishes
protection and organize the steps she/he must take to secure protection.6
The Paris Convention foresees common rules which have to be followed by the contracting
parties regarding the categories of patents, utility models, industrial designs, marks, trade
names, indications of source and industrial designs.
The Paris Convention on the Protection of Industrial Property ,
http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P232_38660
4
World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the Protection of
Industrial Property. Online. Available HTTP: http://www.wipo.int/treaties/en/ip/paris/summary_paris.html
5
Ibid.
6 I
bid.
3
9
Reference Text for Trainers
Industrial Property and Competition law
The exclusive rights granted by the State to IPRs holders (especially Patents) must be well
balanced to avoid a situation in which the exclusive rights may lead to the creation of a
monopoly, hampering the functioning of markets based upon the respect of competition law. At
a first view, in fact, these two important pillars of modern trade (IPRs on one side and
competition law on the other side) may seem to be, in principle, naturally opposite. IPRs
protecting the innovation by providing a “non-rivalrous” right to exclusive exploitation of the
content of the innovation and competition law protecting the access to a market that has to be
granted to different competitors. However, the limit of IPRs exclusive exploitation have been
usually identified in the fact that the latter must not pose at risk the social welfare.
The provisions contained in art. 7, Art. 8.2 and Art. 40 of the TRIPs Agreement are a good
example of how this balance may be achieved. The TRIPS suggests that the abuse of IPRs
must be prevented, especially if the latter may hamper the social welfare, and lead to a
restriction of trade and limit the international transfer of technology. While these indications are
generally mentioned in articles 7 and 8, article 40 is dedicated to the prevention of anticompetitive practices that may derive from contractual licensing.
1.2 Patent (industrially applicable)
Definition
A patent is an exclusive right granted for an invention, which is a product or a process that
provides a new way of doing something, or offers a new technical solution to a problem.7 This is
made in exchange of public disclosure of the invention.
A patent provides the owner of the patent with protection for the invention. The protection is
granted for a limited period of time, generally 20 years8.
Patent protection means that the invention cannot be commercially made, used, distributed or
sold without the patent owner's consent. These patent rights are usually enforced in a court,
which in most systems holds the authority to stop patent infringement. A court can also declare
a patent invalid upon a successful challenge by a third party9.
In order to be patentable, the invention must fulfil specific conditions. In general, an invention
must fulfil the following conditions to be protected by a patent: it must be of practical use; it must
show an element of novelty, i.e. a new characteristic unknown to the body of existing knowledge
in its technical field. This body of existing knowledge can be referred to as "prior art". The
invention must show an inventive step which could not be deduced by a person with average
knowledge of the technical field. Finally, its subject matter must be accepted as "patentable"
under law. In many countries, scientific theories, mathematical methods, plant or animal
varieties, discoveries of natural substances, commercial methods or methods for medical
treatment (as opposed to medical products) are generally not patentable10.
The legal basis on patents is principally provided in the Paris Convention11 (Articles. 1§2, 4§A, I,
G, 4bis, ter, quarter, 5§A, D, 5 bis (1) (2), ter, quarter) and in the TRIPS Agreement (Art. 27-34).
In particular, the Paris Convention provides a few common rules which all contracting States
must follow regarding patents. The most significant include:12
7
World
Intellectual
Property
Organization
(WIPO),
Frequently
Asked
Questions/
Patent,
http://www.wipo.int/patentscope/en/patents_faq.html#protection
8
Ibid.
9
Ibid.
10
Ibid.
11
The Paris Convention includes provisions applied on Industrial Property. The articles referred here are either
common to all the categories of Industrial Property, or concern exclusively patents. WIPO, Paris Convention on the
Protection of Industrial Property, http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P232_38660
12 World intellectual property Organization (WIPO), Summary of the Paris Convention for the Protection of Industrial
Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html
10
Reference Text for Trainers

patents granted in different contracting States for the same invention are independent
from one another: the granting of a patent in one contracting State does not oblige the
other contracting States to grant a patent;

a patent cannot be refused, annulled or terminated in any contracting State on the
grounds of it being refused or annulled or terminated in any other contracting State;

the inventor has the right to be named as such in the patent;

the grant of a patent may not be refused, and a patent may not be invalidated, on the
grounds of the sale of the patented product, or of a product obtained by means of the
patented process, is subject to restrictions or limitations resulting from the domestic law;

each contracting State that takes legislative measures providing for the grant of
compulsory licenses to prevent the abuses which might result from the exclusive rights
conferred by a patent may do so with certain limitations. Thus, a compulsory license
(license not granted by the owner of the patent but by a public authority of the State
concerned) based on failure to work the patented invention may only be granted
pursuant to a request filed after three or four years of failure to work or insufficient
working of the patented invention and it must be refused if the patentee gives legitimate
reasons to justify his inaction. Furthermore, forfeiture of a patent may not be provided
for, except in cases where the grant of a compulsory license would not have been
sufficient to prevent the abuse. In such cases, proceedings for forfeiture of a patent may
be instituted, only after the expiration of two years from the grant of the first compulsory
license.
General Information on Patents
Patents grant a series of rights that are exclusive and limited in time regarding the creation of a
product or an innovative productive process.
A patent is requested and implemented by a private citizen or an employee of a governmental
organization. Protection is only granted with the creation of an innovation, whether this
innovation is a product or a productive process.
The underlying rationale for granting protection is based on a particular type of “exchange”
between the inventor and the government. The latter grants protection in the form of a patent on
the condition that the creating party reveals the technology or the procedure underlying the
invention. The exclusive utilization of the latter will be protected for a limited period of time,
typically twenty years. As the knowledge underlying the invention is of public domain, other
parties may create improvements of the technology and request a patent on such
improvements.
The theoretic justification underlying the granting of a patent has been greatly critiqued. It
involves the idea that temporary protection serves as both an incentive for research,
experimentation and innovation as well as a guarantee that the idea will be preserved within
public registries, available to the public at the end of the granted protection period.
Granting of a patent does not automatically imply the possibility of marketing the product over
which protection has been attained. The marketing of the product may only be implemented in
compliance with all laws and authorizations regulating such matters. An example includes
protection concerning the production of a new type of medicine. The patent does not correspond
to an authorization to market the medicine. Marketing the latter will require complying with all
required laws and procedures.
In accordance with the provisions of the Paris Convention (incorporated in the TRIPS
Agreement), the application procedure for a patent within a member state is coupled with a
priority right relative to the presentation of the same patent request in one or more countries
which have ratified the convention. In this case, the application procedure implemented in the
second country is assigned the same date as the date of presentation of the first application.
The priority right has duration of twelve months from the date of presentation of the first patent
application in any of the member states.
11
Reference Text for Trainers
The Paris Convention and the TRIPS Agreement also stipulate limits to the sole rights deriving
from the patent, thereby reflecting the balance between private and collective interest which
characterizes regulations in this sector. Article 5, A, (2) of the Paris Convention considers the
case in which the patent holder decides to abuse his/her rights by not using the invention. In this
case, the granting of a right to a private citizen would not result in a real benefit to the
community. To prevent the occurrence of such situations, the article provides for the possibility
of mandatory licenses relative to the usage of the product or the productive process.
National laws regulating this area may also specify other cases allowing the use of a good
subject to protection without the authorization of the patent holder. These cases generally refer
to situations in which priority is given to the collective interest or to the use of the invention on
the part of the government due to the very nature of the product or productive process. This
thereby results in (rare) mandatory licenses in favour of government entities or structures.
At the end of the period of sole and exclusive rights granted by the legal system, the invention
becomes of public domain and the right to commercially exploit it becomes universal given that
the original inventor no longer retains the exclusive rights.13
1.3 Utility model (industrially applicable)
Definition
A utility model is an exclusive right granted for an invention, which allows the right holder to
prevent others from commercially using the protected invention, without his/her authorization, for
a limited period of time. Its basic definition may vary between countries (where such protection
is available). A utility model is similar to a patent. Utility models are sometimes referred to as
"petty patents" or "innovation patents."14 It shall, therefore, be understood as a new technical
solution, which is beyond the framework of mere technical skill and is industrially applicable. The
utility model is considered as a "low-cost entry point into the intellectual property system."15
Main differences between utility models and patents are the following:

The requirements for acquiring a utility model are less stringent than for patents. While
the requirement of "novelty" is always to be met, that of the "inventive step" or "nonobviousness" may be much lower or completely absent. In practice, protection for utility
models is often sought for innovations of a rather incremental character which may not
meet the patentability criteria.

The term of protection for utility models is shorter than for patents and varies from
country to country (usually between 7 and 10 years without the possibility of extension or
renewal).

In most countries where utility model protection is available, patent offices do not
examine applications as substance prior to registration. This means that the registration
process is often significantly simpler and faster. It takes an average of six months.

Utility models are much cheaper to obtain and to maintain.

In some countries, utility model protection can only be obtained for specific fields of
technology and only for products, not processes.

Utility models are based on registration principle as patents. The difference is that the
granting of a patent is preceded by complete examination of patent application, whereas
utility models are preceded by formal examination only.16
13
The part of General Information on Patents is taken from the 2007 UNICRI report “Counterfeiting: A Global
Spread, A Global Threat”, pp. 17-19
14
WIPO, Protecting Inventions by Utility Models, What is a Utility model?
http://www.wipo.int/sme/en/ip_business/utility_models/utility_models.htm
15
Ibid.
16
Ibid.
12
Reference Text for Trainers
Utility models are considered well suited for Small/Medium-sized Enterprises that make "minor"
improvements and adaptations to existing products. Utility models are primarily used for
mechanical innovations. Only a small number of countries and regions provide the option of
utility model protection. This option is not available in Romania.
Legal provisions on utility models can be found in the Paris Convention. (Articles 1§2, 4§A, 5§D,
5bis, 11). and in the TRIPS Agreement (Articles 25 and 26).17
1.4 Industrial design (industrially applicable)
Definition
An industrial design is the ornamental or aesthetic aspect of an article. The design may consist
of three-dimensional features, such as the shape or surface of an article or of two-dimensional
features, such as patterns, lines or colour.
Industrial designs are applied to a wide variety of products of industry and handicraft: from
technical and medical instruments to watches, jewellery and other luxury items; from house
wares and electrical appliances to vehicles and architectural structures; from textile designs to
leisure goods.
An industrial design must appeal to the eye to be protected under most national laws. This
means that an industrial design is primarily of an aesthetic nature and does not protect any
technical features of the article to which it is applied.18
The owner is defined as the person or entity that has registered the design. When an industrial
design is protected, the owner is assured an exclusive right against unauthorized copying or
imitation of the design by third parties. This assists to ensure a fair return on investment. An
effective system of protection also benefits consumers and the public, by promoting fair
competition and honest trade practices, encouraging creativity and promoting more aesthetically
attractive products.19
In most countries, an industrial design must be registered in order to be protected under
industrial design law. As a general rule, in order to be registered, the design must be "new" or
"original". Different countries have both varying definitions of such terms and variations in the
registration process. Generally, "new" means that no identical or similar design is known to have
existed before. Once a design is registered, a registration certificate is issued. The term of
protection is generally five years. The possibility of further periods of renewal in most cases is
up to 15 years.20
Depending on the particular national law and the type of design, an industrial design may also
be protected as a work of art under copyright law. In some countries, industrial design and
copyright protection can exist concurrently. In other countries, they are mutually exclusive. Once
the owner chooses one form of protection, she/he can no longer invoke the other.21
Under certain circumstances an industrial design may also be protectable under unfair
competition law, although the conditions of protection and the rights and remedies ensured can
be significantly different.22
Legal provisions on industrial design can be found in the Paris Convention (art. 1§2, 4§A,,5§B,D,
5bis, quinquies, 11) and in the TRIPS Agreement (Articles 25 and 26)23
As with patents, marks, trade names and sources of indication, the Paris Convention lays down
a common rule regarding industrial designs which all contracting States must follow. This is that
17
18
19
20
21
22
23
http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P145_20374
http://www.wipo.int/designs/en/
http://www.wipo.int/designs/en/about_id.html#protect
Ibid.
Ibid.
Ibid.
http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P145_20374
13
Reference Text for Trainers
industrial designs must be protected in each contracting State, and protection may not be
forfeited on the ground that the articles incorporating the design are not manufactured in that
State.
General information on Industrial designs
The protection of industrial designs is provided for in the Paris Convention and the TRIPS
Agreement. Article 25.1 of TRIPS agreement states that member states must commit to granting
protection to those industrial designs which present characteristics of novelty or originality. It is
possible, however, to deny protection to products whose design has been exclusively dictated
by their designed function.
The design is considered to be a purely aesthetic or ornamental element that is incorporated
within an object that is mass-produced. Reference is made to products deriving from an
industrial process whose aesthetic element serves as a differentiating function with respect to
other products of the same category which are created for the same purpose. The aesthetic
element is one form of selection criteria used by the consumer. Further examples include:
quality, price and function of the marketed good. The need to protect this distinctive element
derives from this ability to influence consumer choices.
This protection is only granted to a design relative to a good produced on an industrial scale that
possesses certain specific characteristics (novelty or originality). The originality of the design is
not exclusively imposed by the function of the products. Granting protection over the design of
widely distributed products such as a simple screw or a belt, would distort the market by creating
monopolies in which only one producer would have the possibility of manufacturing and selling
screws or belts. In contrast, it is possible to protect a particular design applied to screws or belts
if this design represents a novelty and characterizes the producer, thereby rewarding the latter
for the effort and creativeness involved in the design and stimulating further research in this
area.
The identification of the good which is subject to the protection guaranteed by industrial design
rights allows this protection to be differentiated from copyright protection. Copyright protects an
idea expressed in a particular form while in this case the idea is protected. The idea is defined
as an abstract concept incorporated within the good, however, it is not the latter that is protected
but rather the idea underlying the good.
The duration of protection varies from country to country, ranging from a minimum of ten to a
maximum of twenty five years. The rights are usually granted to the creator of the design; a
procedure for registration must be followed.
The guaranteed rights are also exclusive in this case and serve the final purpose of preventing
unauthorized third parties from commercially exploiting the registered industrial design.24
1.5 Integrated circuits and Layout-designs (topographies)
Integrated circuits and layout-designs are protected by the Treaty on Intellectual property with
respect to Integrated circuits (or “Washington Treaty”) adopted on 26 May 1989. It is not yet in
force as, currently, it has only 10 Contracting Parties.
Article 2 of the Treaty outlines the following definitions of these categories of Industrial property:
(i) “‘integrated circuit’ means a product, in its final form or an intermediate form, in which the
elements, at least one of which is an active element, and some or all of the interconnections
are integrally formed in and/or on a piece of material and which is intended to perform an
electronic function.
(ii) “‘layout-design (topography)’ means the three-dimensional disposition of the elements,
however expressed. At least one of which is an active element, and of some or all of the
24
The part of General Information on Patents is taken from the 2007 UNICRI report “Counterfeiting: A Global
Spread, A Global Threat”, pp. 19-20
14
Reference Text for Trainers
interconnections of an integrated circuit or such a three-dimensional disposition prepared for
an integrated circuit intended for manufacture […]”
1.6 Trademarks (commercially applicable)
Definition
A trademark is a distinctive sign which identifies certain goods or services as those produced or
provided by a specific person or enterprise. Its origin dates back to ancient times, when
craftsmen reproduced their signatures, or "marks" on their artistic or utilitarian products. Over
the years these marks have evolved into today's system of trademark registration and
protection. The system helps consumers identify and purchase a product or service to meet their
needs due to its nature and quality, as indicated by its unique trademark.25
A trademark provides protection to the owner of the mark by ensuring the exclusive right to use
it to identify goods or services or to authorize another to use it in return for payment. The period
of protection varies, but a trademark can be renewed indefinitely beyond the time limit on
payment of additional fees. Trademark protection is enforced by the courts, which in most
systems have the authority to block trademark infringement.26
In a larger sense, trademarks promote initiative and enterprise worldwide by rewarding the
owners of trademarks with recognition and financial profit. Trademark protection also hinders
the efforts of unfair competitors, such as counterfeiters, to use similar distinctive signs to market
inferior or different products or services. The system enables people with skill and enterprise to
produce and market goods and services in the fairest possible conditions, thereby facilitating
international trade.27
The possibilities are almost limitless. Trademarks may be one or a combination of words, letters
and numerals. They may consist of drawings, symbols or three- dimensional signs (e.g. the
shape and packaging of goods), audible signs (e.g. music or vocal sounds), fragrances or
colours used as distinguishing features.28
In addition to trademarks identifying the commercial source of goods or services, several other
categories of marks exist. Collective marks are owned by an association whose members use
them to identify themselves with a level of quality and other requirements set by the association.
Examples would be associations representing accountants, engineers or architects. Certification
marks are given for compliance with defined standards, however, they are not confined to any
membership. They may be granted to anyone who can certify that the products involved meet
certain established standards. The internationally accepted "ISO 9000" quality standards are an
example of such widely-recognized certifications.29
To obtain the protection of the distinguishing sign, name or mark, an application for registration
of a trademark must be filed with the appropriate national or regional trademark office. The
application must contain a clear reproduction of the sign filed for registration, including any
colours, forms or three-dimensional features. The application must also contain a list of goods or
services to which the sign would apply. The sign must fulfil certain conditions in order to be
protected as a trademark or other type of mark. It must be distinctive, so that consumers can
distinguish it and identify a particular product. It must neither mislead nor deceive customers or
violate public order or morality.30
25
World
Intellectual
Property
Organization
(WIPO),
What
is
a
Trademark?
http://www.wipo.int/trademarks/en/trademarks.html
26
World Intellectual Property Organization (WIPO), About Trademarks, What does a Trademark do?
http://www.wipo.int/trademarks/en/about_trademarks.html#function
27
Ibid.
28
World Intellectual Property Organization (WIPO), About Trademarks, What kinds of trademarks can be
registered?
http://www.wipo.int/trademarks/en/about_trademarks.html#function
29
Ibid.
30
World Intellectual Property Organization (WIPO), About Trademarks, How is a trademark registered?
http://www.wipo.int/trademarks/en/about_trademarks.html#function
15
Reference Text for Trainers
Finally, the rights applied for cannot be the same as or similar to rights already granted to
another trademark owner. This may be determined through search and examination by the
national office, or by the opposition of third parties who claim similar or identical rights.31
Almost all countries register and protect trademarks. Each national or regional office maintains a
Register of Trademarks which contains full application information on all registrations and
renewals, facilitating examination, search and potential opposition by third parties. The effects of
such a registration are limited to the country (or in the case of a regional registration, countries)
concerned.32
To avoid the need to register separately with each national or regional office, WIPO administers
a system of international registration of marks. This system is governed by two treaties, the
Madrid Agreement Concerning the International Registration of Marks and the Madrid Protocol.
A person who has a link (through nationality, domicile or establishment) with a country party to
one or both of these treaties may, on the basis of a registration or application with the trademark
office of that country, obtain an international registration having effect in some or all of the other
countries of the Madrid Union.33
The Madrid system for the international registration of marks established in 1891 functions
under the Madrid Agreement (1891) and the Madrid Protocol (1989). It is administered by the
International Bureau of WIPO located in Geneva, Switzerland.34
Thanks to the international procedural mechanism, the Madrid system offers a trademark owner
the possibility to have his/her trademark protected in several countries by simply filing one
application directly with the own national or regional trademark office. A registered international
mark is equivalent to an application or a registration of the same mark effected directly in each
of the countries designated by the applicant. If the trademark office of a designated country does
not refuse protection within a specified period, the protection of the mark is the same as if it had
been registered by that Office. The Madrid system also greatly simplifies the subsequent
management of the mark, since it is possible to record subsequent changes or to renew the
registration through a single procedural step. Further countries may be designated
subsequently.
Article 4 reads in its two paragraphs:35
(1) “From the date of the registration so effected at the International Bureau in accordance
with the provisions of Articles 3 [Contents of Application for International Registration] and
3ter [Request for “Territorial Extension”], the protection of the mark in each of the
contracting countries concerned shall be the same as if the mark had been filed therein
direct. The indication of classes of goods or services provided for in Article 3 shall not bind
the contracting countries with regard to the determination of the scope of the protection of
the mark.”
(2) “Every mark which has been the subject of an international registration shall enjoy the
right of priority provided for by Article 4 of the Paris Convention for the Protection of
Industrial Property [A. to I. Patents, Utility Models, Industrial Designs, Marks, Inventors’
Certificates: Right of Priority], without requiring compliance with the formalities prescribed in
Section D of that Article.”
Legal provisions on trademarks can be found in the Paris Convention (Articles 1§2, 4§A, 5§C
5bis, 6, 6bis, ter, quarter, quinquies, 6, 6bis, ter, quarter, quinquies, sexies, septies, 7, 7bis, 911)36 and in the TRIPS Agreement (Articles 15-21)
31
Ibid.
World Intellectual Property Organization (WIPO), About Trademarks, How extensive is trademark protection?
http://www.wipo.int/trademarks/en/about_trademarks.html#function
33
Ibid.
34
World Intellectual Property Organization (WIPO), Madrid System for the International Registration of Marks,
http://www.wipo.int/madrid/en/
35
World Intellectual Property Organization (WIPO), Madrid Agreement concerning the International registration of
Marks, http://www.wipo.int/madrid/en/legal_texts/trtdocs_wo015.html
32
16
Reference Text for Trainers
The Paris Convention lays out a few common rules which all the contracting States must follow
regarding trademarks. The most important shall be outlined below.37
The Paris Convention does not regulate the conditions for the filing and registration of marks
which are determined in each contracting State by the domestic law. Consequently, no
application for the registration of a mark filed by a national of a contracting State may be
refused, nor may a registration be invalidated, on the ground that filing, registration or renewal
has not been made in the country of origin. Once the registration of a mark is obtained in a
contracting State, it is independent of its possible registration in any other country, including the
country of origin; consequently, the lapse or annulment of the registration of a mark in one
contracting State will not affect the validity of registration in other contracting States.
Where a mark has been duly registered in the country of origin, it must be accepted on request
for filing and protected in its original form in the other contracting States. Registration may still
be refused in well-defined cases, such as: when the mark would infringe acquired rights of third
parties, when it is devoid of distinctive character, when it is contrary to morality or public order or
when it is of such a nature as to be liable to deceive the public.
If in any contracting State, the use of a registered mark is compulsory, the registration cannot be
cancelled until after a reasonable period and only if the owner cannot justify his inaction.
Each contracting State must refuse registration and prohibit the use of marks which constitute a
reproduction, imitation or translation liable to create confusion of an already registered by the
competent national authority and well-known in that State mark.
Each contracting State must likewise refuse registration and prohibit the use of marks which
consist of or contain without authorization, armorial bearings, State emblems and official signs
and hallmarks of contracting states, provided they have been communicated through the
International Bureau of WIPO. The same provisions apply to armorial bearings, flags, other
emblems, abbreviations and names of certain intergovernmental organizations. Collective
marks must be granted protection.
General information on Trademarks
The primary function of a trademark is to differentiate between manufacturers, suppliers of
services and entrepreneurs in general and is linked to the quality of what they offer and market.
The rationale behind the existence of a trademark is based on a collection of interests. It is
important that the consumer can direct his/her purchasing choices towards products whose
origin represents a quality guarantee and that the efforts implemented by the producer in order
to reach these quality standards are protected.
Article 15.1 of the TRIPS Agreement allows the trademark to be defined as any symbol, name or
combination of the latter (given the restrictions described below) which allow the products or
services of one company to be distinguished from those of other companies.
The more a symbol is arbitrary or distinctive or comes close to having such characteristics, the
more it will tend to be considered representative of a particular producer of goods and services,
thereby allowing it to be used as a trademark. In contrast, an excessively generic name or
symbol does not sufficiently guarantee the distinguishing function of the trademark and its usage
for this purpose will not be recognized by the legal system. Consider, for example, the usage of
the Hewlett Packard (HP) trademark for the production of electronic devices for PCs, such as
printers, scanners and even digital cameras. HP is a sufficiently arbitrary or distinctive name and
thereby allows the consumer to differentiate a printer produced for example by HP, from other
printers that are marketed by other producers. The same cannot be said for a manufacturer who
intends to use the word “printer” as a trademark, given that this term is clearly generic and does
36
World Intellectual Property Organization (WIPO), Paris Convention for the Protection of Industrial Property
http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P113_13775
37
World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the Protection of
Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html
17
Reference Text for Trainers
not serve any distinguishing function. This argument may also be extended to cases where the
trademark is not a name but a symbol.
The Paris Convention requires that all member states (even those which grant protection on the
basis of usage) create a registry of trademarks. The registration is implemented by an
application: it allows governments to verify the existence or inexistence of the characteristics
that are required for the symbol or name to be used as a trademark.
The duration of the protection varies from country to country; however, this limitation is
essentially based on the bureaucratic formalism of the administrations which are entrusted with
trademark registration. It is possible to renew the protection term for an equivalent duration on
the expiration date of each term. The TRIPS Agreement states that the minimum duration of a
granted protection term, from both the initial registration as well as subsequent renewal dates,
may not be less than seven years (Art. 18, “Terms of Protection).
The owner of a registered mark may therefore use it in order to distinguish the registered
products or services. The actual marketing of these products will be subject to further regulation
and may require specific authorizations.
The purpose of the protection granted by the legal system is closely linked to the commercial
activity and the ability to distinguish the origin of products or services.. An unjustified failure to
use the registered trademark will primarily allow other parties to take action in order to cancel
the trademark so that it may be newly registered but with a different owner. This does not apply
in cases where the failure to use the trademark is justified, for example, cases of uncontrollable
circumstances. It should be noted that, in the case of legal action initiated for the purposes of
cancelling the trademark, the burden of proof is reversed and falls upon the party owning the
trademark. They must prove the use of the trademark or provide evidence of causes that
prevented its use.
The loss of the trademark’s distinguishing function would serve as an additional case where
cancellation is warranted. Consider, for example, the case in which a producer’s mark or a name
attributed to a product becomes synonymous with the product itself, as with aspirin. In such
cases, the mark is defined as having acquired a generic nature.
Ownership of the trademark, similarly to other intellectual property rights, may be sold. It may
also be subject to specific licensing agreements which authorize third parties to use the
trademark for commercial purposes while simultaneously allowing the owner of the trademark to
control the quality of any marketed products.38
1.7 Trade names (commercially applicable)
A trade name can be defined as, “a name of a business or one of its products which, by use of
the name and public reputation, identifies the product as that of the business. A trade name
belongs to the first business to use it and the identification and reputation give it value and the
right to protect the trade name against its use by others.”39
Furthermore, “trade names are used by profit and non-profit entities, political and religious
organizations, industry and agriculture, manufacturers and producers, wholesalers and retailers,
sole proprietorships and joint ventures, partnerships and corporations, and a host of other
business associations. A trade name may be the actual name of a given business or an
assumed name under which a business operates and holds itself out to the public.”40
Legal provisions on trade names can be found in the Paris Convention (articles 1§2, 5bis, 8-10,
10ter)41
38
The part of General Information on Trademarks is taken from the 2007 UNICRI report “Counterfeiting: A Global
Spread, A Global Threat”, pp. 20-22.
39
http://legal-dictionary.thefreedictionary.com/trade+name
40
Ibid.
41
World Intellectual Property Organization (WIPO), Paris Convention for the Protection of Industrial Property
http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P113_13775
18
Reference Text for Trainers
The Paris Convention lays out a specific common rule regarding trade names, which all the
contracting States must follow: “Protection must be granted to trade names in each contracting
State without the obligation of filing or registration.”42
1.8 Geographical indications (commercially applicable)
Definition
A geographical indication is a sign used on goods that have a specific geographical origin and
possess qualities, reputation or characteristics that are essentially attributable to that place of
origin. Most commonly, a geographical indication includes the name of the place of origin of the
goods. Agricultural products typically have qualities that derive from their place of production
and are influenced by specific local factors, such as climate and soil. Whether a sign is
recognized as a geographical indication is a matter of national law. Geographical indications
may be used for a wide variety of products, whether natural, agricultural or manufactured.43
An appellation of origin is a special kind of geographical indication. It generally consists of a
geographical name or a traditional designation used on products which have specific qualities or
characteristics that are due to the geographical environment in which they are produced. The
concept of a geographical indication encompasses appellations of origin.44 The use of
geographical indications is not limited to agricultural products. They may also highlight qualities
of a product which are due to human factors associated with the place of origin of the products,
such as specific manufacturing skills and traditions. That place of origin may be a village or
town, a region or a country, for example, “Bohemia” is recognized as a geographical indication
in many countries for specific products made in the Czech Republic, in particular crystal ware.45
A geographical indication points to a specific place or region of production, that determines the
characteristic qualities of the product which originates from that location. It is important that the
product derives its qualities and reputation from that location. Since those qualities depend on
the place of production, a specific "link" exists between the products and their original place of
production.46
Geographical indications are understood by consumers to denote the origin and the quality of
products. Many geographical indications have acquired valuable reputations which, if not
adequately protected, may be misrepresented by dishonest commercial operators. False use of
geographical indications by unauthorized parties is detrimental to consumers and legitimate
producers. Consumers are deceived into believing they are buying a genuine product with
specific qualities and characteristics, when they are actually purchasing an imitation. Legitimate
producers are deprived of valuable business and the established reputation of their products is
damaged.47
A trademark is a sign used by an enterprise to distinguish its goods and services from those of
other enterprises. It gives its owner the right to exclude others from using the trademark. A
trademark will often consist of a fanciful or arbitrary name or device. A geographical indication
tells consumers that a product is produced in a certain place and has certain characteristics that
are due to that place of production. It may be used by all producers who make their products in
the place designated by a geographical indication and whose products share specified qualities.
42
World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the Protection of
Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html
43
World Intellectual Property Organization (WIPO), About geographical indications, What is a Geographical
Indication? http://www.wipo.int/geo_indications/en/about.html#agri
44
Ibid.
45
World Intellectual Property Organization (WIPO), About geographical indications, Can geographical indications
only be used for agricultural products? http://www.wipo.int/geo_indications/en/about.html#agri
46
World Intellectual Property Organization (WIPO), About geographical indications, What does a geographical
indication do? http://www.wipo.int/geo_indications/en/about.html#agri
47
World Intellectual Property Organization (WIPO), About geographical indications, Why do geographical
indications need protection? http://www.wipo.int/geo_indications/en/about.html#agri
19
Reference Text for Trainers
Unlike a trademark, the name used as a geographical indication will usually be predetermined
by the name of the place of production. 48
Geographical indications are protected in accordance with international treaties and national
laws under a wide range of concepts, including:

special laws for the protection of geographical indications or appellations

of origin

trademark laws in the form of collective marks or certification marks

laws against unfair competition

consumer protection laws, or

specific laws or decrees that recognize individual geographical indications.
In essence, unauthorized parties may not use a geographical indication in respect of products
that do not originate from the place designated by that indication. Applicable sanctions range
from court injunctions preventing the unauthorized use the payment of damages and fines or, in
serious cases, imprisonment.49
A number of treaties administered by WIPO provide for the protection of geographical
indications, most notably the Paris Convention for the Protection of Industrial Property of 1883,
and the Lisbon Agreement for the Protection of Appellations of Origin and Their International
Registration. Furthermore, Articles 22 to 24 of the Agreement on Trade-Related Aspects of
Intellectual Property Rights (TRIPS) deal with the international protection of geographical
indications within the framework of the World Trade Organization (WTO).50
If a geographical term is used as the common designation of a type of product, rather than an
indication of the place of origin of that product, then the term no longer functions as a
geographical indication. Where this has occurred in a certain country, then that country may
refuse to recognize or protect that term as a geographical indication. For example, the term
“cologne” now denotes a certain kind of perfumed toilet water, regardless of whether or not it
was produced in the region of Cologne.51
WIPO is responsible for the administration of a number of international agreements which deal
partially or entirely with the protection of geographical indications (see, in particular, the Paris
Convention for the Protection of Industrial Property and the Lisbon Agreement for the Protection
of Appellations of Origin and Their International Registration). Furthermore, through the work of
the Standing Committee on the Law of Trademarks, Industrial Designs and Geographical
Indications (SCT), made up of representatives of Member States and interested organizations,
WIPO explores new ways of enhancing the international protection of geographical indications. 52
Two issues are debated under the Doha mandate, both related in different ways to the higher
(Article 23) level of protection: creating a multilateral register for wines and spirits; and extending
the higher (Article 23) level of protection beyond wines and spirits. Both are as contentious as
any other subject on the Doha agenda.
Although the two issues are discussed separately, some delegations see a relation between
them. In July 2008, a group of WTO members called for a “procedural decision” to negotiate
48
World Intellectual Property Organization (WIPO), About geographical indications, What is the difference between
a geographical indication and a trademark? http://www.wipo.int/geo_indications/en/about.html#agri
49
World Intellectual Property Organization (WIPO), About geographical indications, How are geographical
indications protected? http://www.wipo.int/geo_indications/en/about.html#agri
50
World Intellectual Property Organization (WIPO), About geographical indications, How are geographical
indications protected on the international level? http://www.wipo.int/geo_indications/en/about.html#agri
51
World Intellectual Property Organization (WIPO), About geographical indications, What is a "generic"
geographical indication? http://www.wipo.int/geo_indications/en/about.html#agri
52
World Intellectual Property Organization (WIPO), About geographical indications, What is a "generic"
geographical indication? What is WIPO's role in the protection of geographical indications?
http://www.wipo.int/geo_indications/en/about.html#agri
20
Reference Text for Trainers
three intellectual property issues in parallel: these two geographical indications issues and a
proposal to require patent applicants to disclose the origin of genetic resources or traditional
knowledge used in their inventions53. Members remain divided over this idea, opponents arguing
that the only mandate is to negotiate the multilateral register. 54
Legal provisions on Geographical Indications can be found in the following articles of the Paris
Convention (articles 1§2, 5bis, 10, 10bis) 55 and in the TRIPS Agreement (articles 22-24).
The Trade-Related Aspects of Intellectual Property Rights Agreement (TRIPS Agreement)
includes the following provisions for geographical indications in Section 3:56
The Paris Convention lays out the following common rule regarding trade names, which all the
contracting States must follow: measures must be taken by each contracting State against direct
or indirect use of a false indication of the source of the goods or the identity of the producer,
manufacturer or trader.57
General information on Geographical Indications58
All products are covered by Article 22, which defines a standard level of protection. This states
that geographical indications have to be protected in order to avoid misleading the public and to
prevent unfair competition.
Article 23 provides a higher or enhanced level of protection for geographical indications for
wines and spirits: subject to a number of exceptions, they have to be protected even if misuse
would not cause the public to be misled.
Exceptions (Article 24): In some cases, geographical indications do not have to be protected or
the protection can be limited. The exceptions that the agreement allows include: when a name
has become the common (or “generic”) term (for example, “cheddar” now refers to a particular
type of cheese not necessarily made in Cheddar, in the UK), and when a term has already been
registered as a trademark.
Information that members have supplied during a fact-finding exercise shows that countries
employ a wide variety of legal means to protect geographical indications ranging from: specific
geographical indications laws to trademark law, consumer protection law and common law. The
TRIPS Agreement and current TRIPS work in the WTO take account of that diversity.
53
Document TN/C/W/52 of 19 July 2008
World Trade Organization (WTO), TRIPS: Geographical indications, Background and the Current situation,
http://www.wto.org/english/tratop_e/trips_e/gi_background_e.htm
55
World Intellectual Property Organization (WIPO), Paris Convention for the Protection of Industrial Property,
http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P113_13775
56
World Trade Organization (WTO), Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS
Agreement), Part II “Standards Concerning the Availability, Scope and Use of Intellectual Property Rights”, Section 2
“Trademarks” http://www.wto.org/english/tratop_e/trips_e/t_agm3c_e.htm#5
57
World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the Protection of
Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html
58
World Trade Organization (WTO), TRIPS: Geographical indications, Background and the Current situation,
http://www.wto.org/english/tratop_e/trips_e/gi_background_e.htm
54
21
Reference Text for Trainers
SOURCES
United Nations Interregional Crime and Justice Research Institute (UNICRI) (2007)
“Counterfeiting: A Global Spread, A Global Threat”, available at:
http://www.unicri.it/news/0712-3_Counterfeiting_CRT_Foundation.php
United Nations Interregional Crime and Justice Research Institute (UNICRI) (2011)
“Counterfeiting: A Global Spread, A Global Threat”, Advanced Unedited Edition.
World Intellectual Property Organization (WIPO) (2010) About geographical indications,
What is a Geographical Indication? http://www.wipo.int/geo_indications/en/about.html#agri
World Intellectual Property Organization (WIPO) (2010) About Industrial Designs, available
at: http://www.wipo.int/designs/en/about_id.html#protect
World Intellectual Property Organization (WIPO) (2010) About Trademarks, What kinds of
trademarks can be registered? available at:
http://www.wipo.int/trademarks/en/about_trademarks.html#function
World Intellectual Property Organization (WIPO) (2010) Frequently Asked Questions/ Patent,
available at: http://www.wipo.int/patentscope/en/patents_faq.html#protection
World Intellectual Property Organization (WIPO) (2010) Hague System for the International
Registration of Industrial Designs, http://www.wipo.int/ hague/en/
World Intellectual Property Organization (WIPO) (2010) Industrial Designs, available at:
http://www.wipo.int/designs/en/
World Intellectual Property Organization (WIPO) (2010) Madrid Agreement concerning the
International registration of Marks, available at:
http://www.wipo.int/madrid/en/legal_texts/trtdocs_wo015.html
World Intellectual Property Organization (WIPO) (2010) Madrid System for the International
Registration of Marks, available at: http://www.wipo.int/madrid/en/
World Intellectual Property Organization (WIPO) (2010) Patent Cooperation Treaty (PCT)
(1970), available at: http://www.wipo.int/pct/en/treaty/about.html
World Intellectual Property Organization (WIPO) (2010) Protecting Inventions by Utility
Models, What is a Utility model? available at:
http://www.wipo.int/sme/en/ip_business/utility_models/utility_models.htm
World Intellectual Property Organization (WIPO) (2010) Summary of the Paris Convention
for the Protection of Industrial Property, available at:
http://www.wipo.int/treaties/en/ip/paris/summary_paris.html
World Intellectual Property Organization (WIPO) (2010) Summary of the Lisbon Agreement
for the Protection of Appellations of Origin and their International Registration, available at:
http://www.wipo.int/treaties/en/registration/lisbon/summary_lisbon.html
World Intellectual Property Organization (WIPO) (2010) The Hague Agreement Concerning
the International Registration of Industrial Designs: Main Features and Advantages,
available at:
http://www.wipo.int/export/sites/www/freepublications/en/designs/911/wipo_pub_911.pdf
World Intellectual Property Organization (WIPO) (2010) What is a Trademark? available at:
http://www.wipo.int/trademarks/en/trademarks.html
World Trade Organization (WTO) (2010) PART II — Standards concerning the availability,
scope and use of Intellectual Property Rights, available at:
http://www.wto.org/english/tratop_e/trips_e/t_agm3b_e.htm#4
22
Reference Text for Trainers
World Trade Organization (WTO) (2010) TRIPS: Geographical indications, Background and
the Current situation, available at:
http://www.wto.org/english/tratop_e/trips_e/gi_background_e.htm
23
Reference Text for Trainers
SECTION 2
Treaties, Agreements and Conventions at the International Level
2.1 The WTO Agreement on Trade-related Aspects of Intellectual Property Rights (TRIPS)
The Agreement on Trade-related Aspects of Intellectual Property Rights (TRIPS) is an
international agreement administered by the World Trade Organization (WTO)59 and negotiated
and achieved, during the Uruguay Round of the General Agreement on Tariffs and Trade
(GATT)60, in 1986-1994. This Agreement introduced, for the first time, intellectual property rules
into the multilateral trading system while fixing the minimum standards for many forms of
intellectual property (IP) regulation as applied to nationals of other WTO Members. The TRIPS
Agreement is an attempt to narrow the differences in the way IP rights are protected around the
world, and to bring them under common international rules.
The TRIPS Agreement establishes how the legislation of the adhering countries must deal with
the following issues: copyright; trademarks; geographical indications, including appellations of
origin; industrial designs; patents; integrated circuit layout-designs; monopolies for the
developers of new plant varieties and trade dress.
The main issues considered by the Agreement include: i.) how the basic principles of the trading
system and other international intellectual property agreements should be applied; ii.) how to
give adequate protection to intellectual property rights; iii.) how countries should enforce those
rights adequately in their own territories; iv.) how to settle disputes on intellectual property
between members of the WTO and; v.) special transitional arrangements during the period when
the new system is being introduced.
Finally, TRIPS encompasses the two basic principles that also govern the General Agreement
on Tariffs and Trade (GATT) and General Agreement on Trade and Services (GATS): i.) the
national treatment (treating one’s own nationals and foreigners equally); and ii.) the mostfavoured-nation treatment (equal treatment for nationals of all trading partners in the WTO).
TRIPS went one step forward and introduced a third principle according to which intellectual
property protection should contribute to technical innovation and the transfer of technology from
which both producers and users should benefit and economic and social welfare should be
enhanced. Romania is Party to the TRIPS Agreement.
2.2 On Copyright and related rights
2.2.1 The Berne Convention
The Berne Convention for the Protection of Literary and Artistic Works of 9 September 1886 has
offered the legal basis for the protection of “literally and artistic works”. The Convention rests on
three basic principles which are: i) the principle of “national treatment”; ii) the principle of
“automatic” protection and; iii) the principle of the “independence” of protection. It contains a
series of provisions determining the minimum protection to be granted, as well as special
provisions available to developing countries which would like to use them.61
59
The World Trade Organization (WTO) is an international organization, constituted by 153 members whose
objective is to supervise and liberalize international trade. It was established on 1st January 1995, under the
Marrakech Agreement and replaced the General Agreement on Tariffs and Trade (GATT) of 1947. For further details
visit: www.wto.org.
60
The General Agreement on Tariffs and Trade (GATT) was signed in 1947 by 23 countries. The agreement was
designed to provide an international forum to encourage free trade between member states through the regulation
and the reduction of tariffs on traded goods, also providing a common mechanism for resolving trade disputes. For
further details visit: http://www.wto.org/english/tratop_e/gatt_e/gatt_e.htm.
61
For
further
information
on
the
Berne
Convention,
see
http://www.wipo.int/treaties/en/ip/berne/summary_berne.html
24
Reference Text for Trainers
The Convention also provides for “moral rights,” these are, the right to claim authorship of the
work and the right to object to any mutilation or deformation or other modification of, or other
derogatory action in relation to the work which would be prejudicial to the author’s honour or
reputation.
The Berne Union has an Assembly and an Executive Committee. The Berne Convention,
concluded in 1886, was revised at Paris in 1896 and at Berlin in 1908, completed at Berne in
1914, revised at Rome in 1928, at Brussels in 1948, at Stockholm in 1967 and at Paris in 1971,
and was amended in 1979. The Convention is open to all States. Instruments of ratification or
accession must be deposited with the Director General of WIPO. Currently, the Berne
Convention counts 164 contracting State-parties. Romania is Party to the Berne Convention.
2.2.2 The WIPO Copyright Treaty (WCT)
The World Intellectual Property Organization (WIPO) Copyright Treaty, adopted on 20
December 1996, is a complementary legal tool in the granting and protection of copyright as it
applies to categories of works not included in the Berne Convention and therefore constitutes a
special agreement, under the Berne Convention. The Treaty mentions two subject matters to be
protected by copyright: (i) computer programmes, (ii) compilations of data or other material
(“databases”), in any form, which by reason of the selection or arrangement of their contents
constitute intellectual creations.
The Treaty deals with three rights of authors which are: (i) the right of distribution; (ii) the right of
rental and (iii) the right of communication to the public. Each of them is an exclusive right,
subject to certain limitations and exceptions.
The Treaty obliges each Contracting Party to adopt the measures necessary to ensure the
application of the Treaty in accordance with its legal system. In particular, the Contracting Party
must ensure that enforcement procedures are available under its law so as to permit effective
action against any act of infringement of rights covered by the Treaty. This action must include
expeditious remedies to prevent infringement and remedies which constitute a deterrent to
further infringements.
The Treaty establishes an Assembly of the Contracting Parties. Its main task is to deal with
matters concerning the maintenance and development of the Treaty and it entrusts the
administrative tasks concerning the Treaty to the Secretariat of WIPO. The Treaty entered into
force on 6 March 2002. The Director General of WIPO is the depositary of the Treaty which is
open to States members of WIPO and to the European Community. The Assembly is constituted
by the Treaty and currently comprises 88 members. Romania is Party to the WIPO Copyright
Treaty.
2.3 On Industrial Property
2.3.1 The Paris Convention
Patents, utility models, industrial designs, lay-out designs, trade names/firms, marks and
designation of origin and geographical indications are either industrially or commercially
applicable. They fall within the industrial property field. The rules for their grant, regulation,
conditions of application, registration and protection measures against misuse, abuse and
infringement are stipulated in the Paris Convention for the Protection of Industrial Property,
adopted on 20 March 1883, which is the basic reference document for what concerns industrial
property.62
The substantive provisions of the Convention fall into three main categories: i) national
treatment; ii) right of priority and; ii) common rules63 which apply to all the categories of industrial
62
The full text of the Paris Convention can be found at http://www.wipo.int/treaties/en/ip/paris/
World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the Protection of
Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html
63
25
Reference Text for Trainers
property defined by the Convention. The Paris Convention contains provisions for the repression
of unfair competition (Art. 1, §2 and Art. 10bis).
This area of intellectual property is now harmonised at an international level for the first time. On
the basis of Art. 1 of the treaty,64 countries, to which the convention applies, form a Union for
protecting industrial property.
Focusing on Trademarks, Article 6 of the Convention establishes that the conditions for the filing
and the registration of trademarks shall be determined and regulated in each country of the
Union by its domestic legislation. Simultaneously, a trademark registered in a country of the
Union created by the Paris Convention shall be considered as independent of marks registered
in the other countries of the Union, including the country of origin.
As specified by Article 6, “an application for the registration of a mark filed by a national of a
country of the Union in any country of the Union may not be refused, nor may a registration be
invalidated, on the ground that filing, registration or renewal, has not been made in the country
of origin”.
Currently, there are 173 Contracting Parties of the Paris Convention. Romania is Party to the
Paris Convention.
2.3.2 The Patent Cooperation Treaty
Apart from the Paris Convention and the TRIPS provisions on patents, there is also the Patent
Cooperation Treaty (PCT).65 The PCT, was concluded in 1970 and amended in 1979, 1984 and
2001. It is open to State parties to the Paris Convention for the Protection of Industrial Property.
The Treaty makes it possible to seek patent protection for an invention simultaneously in a large
number of countries by filing an "international" patent application. This application may be filed
by anyone who is a national or resident of a Contracting State. Generally, it may be filed with the
national patent office of the Contracting State of which the applicant is a national or resident or
with the International Bureau of WIPO in Geneva (at the applicant's option). If the applicant is a
national or resident of a Contracting State which is party to the European Patent Convention, the
Harare Protocol on Patents and Industrial Designs (Harare Protocol), the revised Bangui
Agreement Relating to the Creation of an African Intellectual Property Organization or the
Eurasian Patent Convention, The international application may also be filed with the European
Patent Office (EPO), the African Regional Industrial Property Organization (ARIPO), the African
Intellectual Property Organization (OAPI) or the Eurasian Patent Office (EAPO).
Once completed, the international application is then subjected to an "international search." This
search is carried out by one of the major patent offices appointed by the PCT Assembly as an
International Searching Authority (ISA). The search results in an "international search report,"
which is, a listing of the citations of such published documents that might affect the patentability
of the invention claimed in the international application. At the same time, the ISA prepares a
written opinion on patentability. The international search report and the written opinion are
communicated by the ISA to the applicant who may decide to withdraw his application, in
particular where the said report or opinion makes the granting of patents unlikely. If the
international application is not withdrawn, it is published by the International Bureau together
with the international search report. The written opinion is not published.
64
Article 1- Establishment of the Union; Scope of Industrial Property:
“1) The countries to which this Convention applies constitute a Union for the protection of industrial property.
2) The protection of industrial property has as its object patents, utility models, industrial designs, trademarks, service
marks, trade names, indications of source or appellations of origin and the repression of unfair competition.
3) Industrial property shall be understood in the broadest sense and shall apply not only to industry and commerce
proper, but likewise to agricultural and extractive industries and to all manufactured or natural products, for example,
wines, grain, tobacco leaf, fruit, cattle, minerals, mineral waters, beer, flowers and flour.
4) Patents shall include the various kinds of industrial patents recognized by the laws of the countries of the Union,
such as patents of importation, patents of improvement, patents and certificates of addition, etc.”
65
The description and information provided here on the Patent Cooperation Treaty can be found on
http://www.wipo.int/pct/en/treaty/about.html
26
Reference Text for Trainers
The procedure under the PCT has the following advantages for the applicant, the patent offices
and the general public: (i) the applicant has up to 18 months more than she/he has in a
procedure outside the PCT to reflect on the desirability of seeking protection in foreign
countries, to appoint local patent agents in each foreign country, to prepare the necessary
translations and to pay the national fees etc.; (ii) the search and examination work of patent
offices can be considerably reduced or virtually eliminated thanks to the international search
report, the written opinion and, where applicable, the international preliminary examination
report that accompany the international application and; (iii) since each international application
is published together with an international search report, third parties are in a more favourable
position to formulate a well-founded opinion about the patentability of the claimed invention.
Instruments of ratification or accession must be deposited with the Director General of WIPO.
The PCT created a Union which has an Assembly. Every State party to the PCT is a member of
the Assembly. Currently there are 142 Contracting Parties of the Patent Cooperation Treaty.
Romania is Party to the PCT.
2.3.3 The Hague Agreement on Industrial Designs66
The Hague Agreement is an international registration system which offers the possibility of
obtaining protection for industrial designs in a number of States and intergovernmental
organizations (both referred to as “Contracting Parties”) by means of a single international
application filed with the International Bureau of the World Intellectual Property Organization
(WIPO). Thus, under the Hague Agreement, a single international application replaces a whole
series of applications which, otherwise, should have been effected with different national (or
regional) Offices.
The Hague Agreement is currently constituted by two international treaties:

The Hague Act of 28 November 1960 (the “1960 Act”); and

The Geneva Act of 2 July 1999 (the “1999 Act”).
The application of the London Act of 2 June 1934 (“the 1934 Act”) was frozen on 1 January
2010, so that no new designation under that Act may be recorded in the International Register.
The freeze of the application of the 1934 Act does not affect the designations made under the
Act which were before 1 January 2010.
The Hague System Concerning the International Registration of Industrial Designs 67
The Hague System for the International Registration of Industrial Designs68 provides a
mechanism for registering a design in countries and/or intergovernmental organizations party to
the Hague Agreement. It is administered by the International Bureau of WIPO. This System
gives the owner of an industrial design the possibility to have his design protected in several
countries by simply filing one application with the International Bureau of WIPO, in one
language, with one set of fees in one currency (Swiss Francs). An international registration
produces the same effects in each of the designated countries, as if the design had been
registered directly with each national office, unless protection is refused by the national office of
that country.
The Hague System simplifies the management of an industrial design registration, since it is
possible to record subsequent changes or to renew the registration through a single procedural
step with the International Bureau of WIPO.69
66
The information on the Hague System presented here are based on the World Intellectual Property Organization
(WIPO) document, “The Hague Agreement Concerning the International Registration of Industrial Designs: Main
Features and Advantages”, http://www.wipo.int/export/sites/www/freepublications/en/designs/911/wipo_pub_911.pdf
67
The information on the Hague System presented here are taken from the World Intellectual Property
Organization (WIPO) document, “The Hague Agreement Concerning the International Registration of Industrial
Designs: Main Features and Advantages”,
http://www.wipo.int/export/sites/www/freepublications/en/designs/911/wipo_pub_911.pdf
68
Ibid
69
Hague System for the International Registration of Industrial Designs,
http://www.wipo.int/ hague/en/
27
Reference Text for Trainers
Advantages of the Hague System

The Hague System of international registration of industrial designs arose from a need
for simplicity and economy. In effect, it enables design owners from a Contracting Parties
to obtain protection for their designs with a minimum of formalities and expense. In
particular, they are relieved of the need to make a separate national application in each
of the Contracting Parties in which they seek protection, thus avoiding any complications
that can arise from procedures and languages which differ between states.

The Hague system also avoids the need for constant monitoring of the deadline for
renewal of a whole series of national registrations, varying from one State to the other.
Furthermore, it avoids the need to pay a series of fees in various currencies.

In effect, under the Hague Agreement, the same result can be obtained by means of a
single international registration, made in one language, on payment of a single set of
fees, in one currency and with one Office (the International Bureau).

Moreover, by having a single international registration with effect in several Contracting
Parties, the subsequent management of the international registration is considerably
enhanced. For instance, a change in the name or address of the holder, or a change in
ownership for only some or all of the designated Contracting Parties, can be recorded in
the International Register and have effect by means of one simple procedural step
carried out by the International Bureau.
The Hague Agreement has 56 Contracting parties. Romania is a Party to the Hague Agreement
which entered into force in Romania on 18 July 1992.
2.3.4 The Washington Treaty on Integrated circuits and Layout-designs (topographies)
Integrated circuits, and layout-designs are protected by the Treaty on intellectual property in
respect of Integrated circuits (or “Washington Treaty”) adopted on 26 May 1989. It is not yet in
force as it has only 10 Contracting Parties. The Czech Republic, Poland and Romania are
currently not contracting parties.
The aim of the treaty is to ensure the protection of Integrated circuits and layout-designs within
the territory of each of its members though the offer of a legal ground for the prevention of
unlawful actions against Integrated circuits and Layout-designs and for appropriate legal
remedies in cases of committed infringements. As far as the implementation of this protection is
concerned, Art. 4 states: “Each Contracting Party shall be free to implement its obligations under
this Treaty through a special law on layout-designs (topographies) or its law on copyright,
patents, utility models, industrial designs, unfair competition or any other law or a combination of
any of those laws”. In Art. 1 the Treaty foresees the establishment of a Union constituted by the
Contacting parties for the purposes of the Treaty.
2.3.5 The Madrid Agreement Concerning the International Registration of Marks
The Madrid Agreement concerning the International Registration of Marks was adopted in 1891
and entered into force in 1892. The agreement was revised in 1900, 1911, 1925, 1934, 1957
and 1967 and amended in 1979. Any State being a party to the Paris Convention may accede to
the Madrid Agreement.
The Protocol relating to the Madrid Agreement (Madrid Protocol) was adopted in 1989 and
entered into force on 1 December 1995. Any country being a party to the Paris Convention may
join the Madrid Protocol. Under the Madrid Protocol the application for international registration
can be based on a trademark application filed in the country of origin. It is administered by
WIPO.
Due to the international procedural mechanism, the Madrid system offers a trademark owner the
possibility to have his trademark protected in several countries by simply filing one application
directly with his own national or regional trademark office. An international mark so registered is
equivalent to an application or a registration of the same mark effected directly in each of the
countries designated by the applicant. If the trademark office of a designated country does not
refuse protection within a specified period, the protection of the mark is the same as if it had
28
Reference Text for Trainers
been registered by that Office. The Madrid system also simplifies the subsequent management
of the mark, since it is possible to record subsequent changes or to renew the registration
through a single procedural step.
In October 2004, the European Community joined the Madrid Protocol System, thus including
the possibility to use Community Trademarks as a basis for international trademark applications
and for Community Trademarks to be applied for via international route.
The Madrid Agreement has 56 members while the Madrid Protocol has 82. Romania is a
member of both.
2.3.6 The Singapore Treaty on the Law of Trademarks
The Singapore Treaty on the Law of Trademarks70 was signed at the Diplomatic Conference for
the Adoption of a Revised Trademark Law Treaty, which took place in Singapore in March 2006.
The Treaty entered into force in March 2009, when it was ratified by the following countries:
Singapore, Switzerland, Bulgaria, Romania, Denmark, Latvia, Kyrgyzstan, USA, Republic of
Moldova and Australia. Spain, Poland and Estonia also ratified the Treaty in 2009.
The Treaty establishes common standards for procedural aspects of trademark registration and
licensing. It maintains the streamlined application formalities of the current TLT (Trademark Law
Treaty of 1994) but eliminates the TLT provision that required national offices to accept paper
applications. This variation in provision consents national trademark offices to progress to an
entirely electronic system, allowing them to take advantage of electronic communication
systems which are presently considered to be efficient alternatives to paper communications.
The Singapore Treaty applies to marks that can be registered under the law of a Contracting
Party. Most importantly it is the first time that non-traditional marks are explicitly recognized in
an international instrument dealing with trademark law. The Treaty is applicable to all types of
marks, including non-traditional visible marks, such as holograms, three-dimensional marks,
movement marks and non-visible marks, such as sound, olfactory or taste and feel marks. The
Regulations provide for the mode of representation of these marks in applications, which may
include non-graphic or photographic reproductions. The Treaty also includes a new provision
addressing relief measures for failure to comply with time limits during the trademark application
process.
The creation of an Assembly of the Contracting Parties introduces a degree of flexibility for the
definition of details concerning administrative procedures to be implemented by national
trademark offices where it is anticipated that future developments in trademark registration
procedures and practice will warrant the amendments of those details. The Assembly is
endowed with powers to modify the Regulations and the Model International Forms, where
necessary. At a preliminary level, the Assembly can also deal with questions relating to the
future development of the Treaty.
The Diplomatic Conference adopted a Resolution Supplementary to the Singapore Treaty on
the Law of Trademarks and the Regulations thereof, stating that: the Treaty does not impose
any obligations on Contracting Parties to (i) register new types of marks, or (ii) implement
electronic filing systems or other automation systems. Special provisions have been drawn up to
provide developing and less developed countries (LDCs) with additional technical assistance
and technological support as to enable them to take full advantage of the provisions of the
Treaty. It was recognized that LDCs shall be the primary and main beneficiaries of technical
assistance by Contracting Parties of the WIPO. The future Assembly is charged with the task to
monitor and evaluate the progress of the assistance granted at every ordinary session. It is
suggested that any dispute arising with respect to the interpretation or application of the Treaty
should be settled amicably through consultation and mediation under the auspices of the
Director General of the WIPO.
70
The full text of the Singapore Treaty could be found on: http://www.wipo.int/treaties/en/ip/singapore/
29
Reference Text for Trainers
2.3.7 The Lisbon Agreement for the Protection of Appellations of Origin and their International
Registration 71
The Lisbon Agreement was concluded in 1958, revised in Stockholm in 1967 and amended in
1979. The Agreement is open to States party to the 1883 Paris Convention for the Protection of
Industrial Property. Instruments of ratification or accession must be deposited with the Director
General of WIPO.
The aim of the Agreement is to provide for the protection of appellations of origin, that is, the
“geographical name of a country, region or locality, which serves to designate a product
originating therein, the quality and characteristics of which are due exclusively or essentially to
the geographic environment, including natural and human factors” (Article 2). Names, as such,
are registered by the International Bureau of WIPO in Geneva upon the request of the
competent authorities of the interested contracting State. The International Bureau
communicates the registration to the other contracting States. A contracting State may declare
that it cannot ensure the protection of a registered appellation within one year. A registered
appellation may not be declared to have become generic in a contracting State as long as it
continues to be protected in the country of origin.
The Lisbon Agreement has 26 Contracting parties. Romania signed it on 31 October 1958.
2.4 Other Important International Tools for Combating Counterfeiting
2.4.1 The United Nations Convention against Transnational Organized Crime (Palermo
Convention)
The United Nations Convention against Transnational Organized Crime72, adopted by General
Assembly resolution 55/25 of 15 November 2000, is the main international instrument in the fight
against transnational organized crime. The Convention entered into force on 29 September
2003. Romania ratified the Palermo Convention on 4 December 2002.
The Convention represents a major step forward in the fight against transnational organized
crime and signifies the recognition by Member States of the seriousness of the problems posed
by it, as well as the need to foster and enhance close international cooperation in order to tackle
those problems. States that ratify this instrument commit themselves to taking a series of
measures against transnational organized crime, including the creation of domestic criminal
offences (participation in an organized criminal group, money laundering, corruption and
obstruction of justice); the adoption of new and sweeping frameworks for extradition, mutual
legal assistance and law enforcement cooperation; and the promotion of training and technical
assistance for building or upgrading the necessary capacity of national authorities.
Counterfeiting is a highly profitable crime and a major source of tax-free income. It is yet another
“seed corn” enabling organized criminal groups to invest the profits of crime into other illegal
activities.
The Palermo Convention represents a significant advancement in the repression of the
phenomenon of counterfeiting as irrefutable links between counterfeiting and organized criminal
groups have been established.
71
World Intellectual Property Organization (WIPO), Summary of the Lisbon Agreement for the Protection of
Appellations of Origin and their International Registration, available at:
http://www.wipo.int/treaties/en/registration/lisbon/summary_lisbon.html
72
To download the text of the United Nations Convention against Transnational Organised Crime, please visit:
http://www.unodc.org/unodc/en/treaties/CTOC/index.html
30
Reference Text for Trainers
SOURCES
United Nations Convention against Transnational
http://www.unodc.org/unodc/en/treaties/CTOC/index.html
Organised
Crime,
available
at:
World Intellectual Property Organization (WIPO), Summary of the Lisbon Agreement for the
Protection of Appellations of Origin and their International Registration, available at:
http://www.wipo.int/treaties/en/registration/lisbon/summary_lisbon.html
World Intellectual Property Organization (WIPO), Full text of the Singapore Treaty available at:
http://www.wipo.int/treaties/en/ip/singapore/
World Intellectual Property Organization (WIPO), Hague System for the International
Registration of Industrial Designs, available at: http://www.wipo.int/hague/en/
World Intellectual Property Organization (WIPO), Patent Cooperation Treaty can be found on
http://www.wipo.int/pct/en/treaty/about.html
World Intellectual Property Organization (WIPO), The Hague Agreement Concerning the
International Registration of Industrial Designs: Main Features and Advantages, available at:
http://www.wipo.int/export/sites/www/freepublications/en/designs/911/wipo_pub_911.pdf
World Intellectual Property Organization
http://www.wipo.int/treaties/en/ip/paris/
(WIPO),
Paris
Convention,
available
at:
World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the
Protection of Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html
World Trade Organization (WTO), General Agreement on Tariffs and Trade, available at:
http://www.wto.org/english/tratop_e/gatt_e/gatt_e.htm.
31
Reference Text for Trainers
SECTION 3
Definitions of Counterfeiting and Piracy
3.1 Definitions of Counterfeiting and Piracy
Counterfeiting and piracy are terms used to describe a range of illicit activities linked to IPR
infringement.73 In its broader sense, the term counterfeiting is often used at the international
level to indicate the infringement of any intellectual property rights, including trademarks,
patents, industrial designs, copyrights and related rights.
A distinction between the two concepts of counterfeiting and piracy can be made, where the first
term refers to the infringement of the norms ruling the use of trademarks and industrial property
in general and the latter refers to the reproduction of copyrighted material without the consent of
the right holder.
The TRIPS Agreement suggests the definitions of counterfeiting and piracy for the purposes of
the agreement. Footnote 14 of art.51 “Suspension of Release by Customs Authorities”, states:
(a) "counterfeit trademark goods" shall mean any goods, including packaging, bearing without
authorization a trademark which is identical to the trademark validly registered in respect of such
goods, or which cannot be distinguished in its essential aspects from such a trademark, and
which thereby infringes the rights of the owner of the trademark in question under the law of the
country of importation;
(b) "pirated copyright goods" shall mean any goods which are copies made without the consent
of the right holder or person duly authorized by the right holder in the country of production and
which are made directly or indirectly from an article where the making of that copy would have
constituted an infringement of a copyright or a related right under the law of the country of
importation.74
The International Trademark Association (INTA) defines counterfeiting as “the practice of
producing goods, often of inferior quality, and selling them under a brand name without the
brand owner’s authorization. Generally, counterfeit goods are sold under a mark that is identical
to or substantially indistinguishable from a mark that is registered for the same goods, without
the approval or oversight of the trademark owner. Many famous brands, such as COCACOLA®, MARLBORO®, and MICROSOFT®, are the subject of counterfeiting, as are brands
associated with products ranging from peanut butter to aircraft parts. Counterfeiting should be
distinguished from trademark infringement or passing off, which involves the use of confusingly
similar indicia. Counterfeiting is most prevalent in developing countries with a strong
manufacturing capability but generally speaking, counterfeit goods are produced and sold
around the globe.”75
The UNESCO World Anti-Piracy Observatory states that piracy “includes the reproduction and
distribution of copies of copyright-protected material, or the communication to the public and
making available of such material on on-line communication networks, without the authorization
of the right owner(s) where such authorization is required by law. Piracy concerns different types
of works, including music, literature, films, software, videogames, broadcasting programmes and
signals.”76 The same source also mentions an interesting debate on the compatibility between
73
Organization for Economic Cooperation and Development (OECD) (2007), “The Economic Impact of
Counterfeiting and Piracy”, Executive Summary, http://www.oecd.org/dataoecd/13/12/38707619.pdf
74
World Trade Organization (WTO), Agreement on Trade-related Aspects of Intellectual Property Rights (TRIPS),
http://www.wto.org/english/docs_e/legal_e/27-trips.pdf
75International
Trademark
Association
website,
“What
is
counterfeiting?”,
http://www.inta.org/index.php?option=com_content&task=view&id=1534&Itemid=&getcontent=4
76
UNESCO, World Anti-Piracy Observatory, “What is Counterfeiting?”, http://portal.unesco.org/culture/en/ev.phpURL_ID=39397&URL_DO=DO_TOPIC&URL_SECTION=201.html
32
Reference Text for Trainers
the term of “piracy” and the absence of the commercial purpose in the activity by stating that
“traditionally, piracy concerned the unauthorized reproduction and distribution of physical copies
of protected works, on a commercial scale or with a commercial purpose. However, the rapid
development of the Internet and the massive unauthorized on-line use of protected content,
where the "commercial" element is often missing, have given rise to a lively debate. The
question whether such use constitutes "piracy" and should be treated in the same way as
traditional piracy is at the heart of the current copyright debate. […]”77
Numerous definitions of counterfeiting exist in literature. Staake and Fleisch (2008) define
counterfeiting as “the unauthorized reproduction of goods, services or documents in relation to
which the state confers upon legal entities a statutory monopoly to prevent their exploitation by
others”.78 If we specifically refer to products, counterfeiting is defined by the same authors as
“the manufacture of articles which are intended to appear to be as similar to the original as to be
passed off as genuine items”.79
Different typologies of counterfeiting – or distinctions within the general definition – could be also
identified. Staake and Fleisch distinguish between deceptive counterfeiting and non-deceptive
counterfeiting: the first refers to cases in which the buyer purchases counterfeit goods in “good
faith”, i.e. without knowing that the intellectual property right inherent to the good has been
infringed; the second to cases in which the buyer fully knows that the article is the result of an
IPR infringement.80
According to Casillo, another distinction could be made between two modalities of
counterfeiting: allusion and expropriation.81 The first concept refers to goods which are very
similar but intentionally not identical to those already commercialized on the market or to goods
which recall other brands or trademarks of famous articles.82 On the contrary, cases of
expropriation could be identified when: (a) the original brand is affixed to goods which belong to
product categories different from the original one83; (b) the original product is imitated in its
format or design or functionality84; (c) goods are produced almost identical to the original
articles, by copying brands, trademarks, design, format and technical characteristics. The last
case of counterfeited goods almost identical to the original ones is alternatively defined by
Casillo as total counterfeiting.85
3.2 Counterfeiting as a financial and IP crime
According to the Interpol, Intellectual Property Crime (IPC) is a generic term used to describe a
wide range of counterfeiting and piracy offences. It primarily affects the industrial and trade
sector, therefore, IPC falls under the classification of financial crimes. Counterfeiting and piracy
are undoubtedly among the most serious and widespread crimes that fall under the IPC
category and by extension under financial crimes. Other types of financial crimes are currency
counterfeiting, money laundering, payment/credit card fraud etc.86
A comprehensive definition of IPC or Intellectual Property Theft (IPT) has been made by the
Northern Ireland Organized Crime Taskforce according to which IPC involves “counterfeited and
77
Ibid.
Staake, T., Fleisch, E. (2008), “Countering Counterfeit Trade”, Springer (ed.), p.17.
79
Ibid.
80
“Deceptive counterfeiting shall refer to cases where a person or an organization purchases counterfeit goods in
the belief they are buying genuine articles; non-deceptive counterfeiting shall refer to cases where a person or an
organization purchase counterfeit goods knowing of their counterfeit nature”. Ibid., p.18.
81
Respectively “allusione” and “espropriazione”. See Casillo, S. (1998), “L’irresistibile ascesa dell’industria del falso
in Italia”, in Il Mulino, n°4, p.709.
82
Some examples could be done: famous cases of allusion are counterfeiting of perfumes such as Chanel No.5
and Versace (respectively counterfeited as “Cannel 5” and “Versage”) or of car-stereo Pioneer (become “Pioniere”)
and even pens (Bic which has been counterfeited as “Bip”).
83
For example the brand of a perfume could be affixed to clothes or other goods which are not perfumes.
84
This is for example the case of reverse engineering or industrial espionage able to lead to the production of
products with the same level of quality or functionality.
85
Casillo, S., op. cit., p.698.
86
Information retrieved form the Interpol website, http://www.interpol.int/public/FinancialCrime/default.asp
78
33
Reference Text for Trainers
pirated goods, manufactured and sold for profit without the consent of the patent or trademark
holder.”87 This implies infringement of the legal rights that are most commonly granted under the
form of copyright, trademarks and patents which guarantee the moral and economic rights of the
creators, recognize their creativity and protects the dissemination of their work.88
IPC represents one aspect of the informal economy (black market) which operates in parallel to
the formal economy.89 A variety of activities within the informal economy involve organized
crime. Examples include: drugs trafficking, human trafficking, smuggling of migrants or
counterfeit credit cards and is structured upon practices such as corruption, extortion, blackmail,
bribery etc. IPC involves a wide range of criminal actors ranging from individuals to organized
criminal groups. IPC includes the manufacturing, transporting, storing and sale of counterfeit or
pirated goods. Generally, the above is organized and controlled by criminals or criminal
organizations.90 Due to its expansion and its significant economic importance the informal
economy favours the perpetration of IPC while IPC in turn continues to nourish informal
economy’s networks.
Interpol states that IPC is a serious financial concern for producers, brand owners and various
companies91 as it contributes towards mass losses in annual turnovers, hampers the Research
and Development (R&D) sector and encourages unfair competition which cannot be sustained
by legitimate companies. In addition, counterfeiting is a serious threat against the health and
safety of consumers in many cases as the compromised quality of counterfeit products put
consumers’ life in danger, especially products of “first range” consumption such as medicines,
food and beverages, spirits and children’s toys.
3.3 Beyond IPR Infringement, the Negative Impact of Counterfeiting
Counterfeiting is generally considered to be a relatively harmless and “victimless” crime.92
Furthermore, from a consumer’s perspective this activity apparently creates some advantages
as counterfeit goods are usually low price replicas of costly, desirable goods. Consequently, this
allows the average consumer to purchase goods which would otherwise have been out of reach.
It may be for this very reason that the repression of counterfeiting has been lower than other
types of crime.93 In reality, however, counterfeiting constitutes a serious problem which causes
grave repercussions throughout the economy, the state and in many cases, among
consumers.94
Adopting the mainstreaming classification of the costs of crime (e.g. example the Mainstreaming
Methodology for Estimating Costs of Crime project -MMECC)95, three categories of costs can be
distinguished: costs in anticipation of crime, costs as a consequence of crime and costs in
response to crime. Costs in anticipation of crime, which follow a preventive approach, are
incurred when measures are implemented with the objective of reducing the vulnerability of
goods to counterfeiting. These costs may include specific expenses (i.e. anti-counterfeiting
technologies) or general costs to improve risk-reducing behaviour (i.e. internalization of the
company’s code of ethics and principles by employees as to ensure a higher level of
confidentiality with regards projects and goods). Costs as a consequence of crime correspond to
any costs or losses incurred by victims as a consequence crime. These may include productivity
87
See the Organized Crime Taskforce of Northern Ireland (2002), “The Threat: Assessment 2002. Serious and
Organized
Crime
in
Northern
Ireland”,
the
Police
Service
of
Northern
Ireland,
p.8,
http://www.nio.gov.uk/organised_crime_threat_assessment_2002.pdf
88
Noble, K.R. (2003), “The links between intellectual property crime and terrorist financing”, Text of public
testimony of the Secretary General of Interpol, p.2, http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/links.pdf
89
Ibid., pp.2-3.
90
Ibid., p.3.
91
Interpol website, op. cit., http://www.interpol.int/public/FinancialCrime/default.asp
92
OECD (2008), op. cit., p.263.
93
Ibid.
94
International Anti-Counterfeiting Coalition (IACC) (2005), “The Negative Consequences of Intellectual Property
Theft: Economic Harm, Threats to the Public Health and Safety and Links to Organized Crime and Terrorism”, white
paper, Washington.
95
See the MMECC website, http://www.costsofcrime.org/CostingPrinciplesandMethodology/
34
Reference Text for Trainers
loss, property loss, long term consequences of victimization, legal expenses, health services
etc. Ultimately, costs in response of crime are equivalent to expenses incurred for the detection
of a crime and the prosecution of offenders (e.g. police, prosecution and legal expenses).96
3.3.1 IPR Holders
The IPR holders are usually those companies which manufacture and sell the goods for which
they hold IPRs. In general, there are two situations which may increase the risk for companies to
become victims of counterfeiting:97

when they fail to protect themselves adequately as a result of lack of knowledge
regarding the norms related to IPRs and/or they do not apply these norms because they
believe them to be a waste of money or they simply chose not to invest to protect the
brand;

when they contract out or set up company branches in countries where the protection of
IPRs is inadequate and/or where countermeasures against such criminal activities are
not implemented.
To reduce this risk, numerous companies now invest in preventive measures and actions to
prevent the crime, such as R& D for the proposal of new products, the hiring of private
investigators and/or the introduction of anti-counterfeiting technologies.98 Despite these
interventions, companies are still at risk of counterfeiting.
The existence of a “counterfeiting industry”, which produces and sells products at a lower price
than the originals, has grave repercussions on the legal industry. This is as it reduces the
demand for original goods. It should also be noted that the counterfeiting industry also benefits
from the fact that it does not incur some costs which are instead applied to a legal industry and
the legal market. Examples of such costs include:

costs to guarantee high quality standards;

costs resulting from the compliance with regulations concerning safety in the workplace
and/or quality controls;

costs for the purchasing of high quality materials;

costs for marketing and R&D (these are incurred by the industry which legally produces
the original goods).
The counterfeiting industry produces goods which already include R&D value and which do not
require any type of marketing, as advertising carried out for the original good is usual enough
publicity. Taxes are generally avoided by counterfeiters as their products are usually sold on the
black market.99 Lower expenses incurred mean that the counterfeiting industry can produce and
sell counterfeit goods at a lower price.100 This can be considered as the first direct loss for the
legal companies, as lower prices of the replicas may reduce the demand for original goods
increasing the demand for fake ones.101 Consequently, the following can be expected with
respect to the legal company:

a loss in terms of market share for the company;

a reduction in revenues;

a loss in terms of job positions.
96
Ibid.
Calovi, F., Vettori, B., Yu J. (2008), op. cit., pp.132-134.
98
Ghidini G. (1998), “Ricerca e Sviluppo come motore del ‘vantaggio competitivo’: il ruolo della proprietà
intellettuale” in Micro&Macro Marketing, n°2, pp.229-244.
99
UNICRI (2007), op. cit., p. 41.
100 Centre d’Etudes Internationales de la Propriété Industrielle (CEIPI) (2004), “Impacts de la contrefaçon et de la
piraterie en Europe. Rapport Final”, Université Robert Schuman, Strasbourg, pp.16-17, downloadable at
http://counterfeiting.unicri.it/resources.php
101 Ibid., pp. 40-49.
97
35
Reference Text for Trainers
Other than the previously mentioned costs, there are further costs linked to the crime of
counterfeiting. According to a classification system formulated by Bronca, two categories of
costs can be distinguished:102

Direct costs: reduction in demand as consumers opt for the cheaper version of the
product, financial damages occur due to required changes in productions, as well as
investment in R&D.

Long term indirect costs: expenses incurred for the registration of a trademark,
advertising, investigation costs and legal expenses.
According to the Association of Public Safety Communications Officials (APCO), the incidence
of counterfeited sporting goods is equivalent to 10-12% of the total value of the sector globally.
In the EU alone this incidence is equivalent to 11% and the estimated losses are more than 7.5
billion Euros.103 The World Health Organisation (WHO) estimates that the problem of counterfeit
medicines is limited in developed countries in which their presence is less than 1% due to
efficient regulatory and control mechanisms. The problem is significant in developing countries
(Africa, areas of Asia and areas of Latin America) in which the incidence of counterfeit
medicines ranges from 10-30%. It is worth noting that some former Soviet republics have a
proportion of counterfeit medicines which is above 20% of market value. Finally, according to
WHO estimates that more than 50% of medicines sold online through sites that conceal their
actual postal address are counterfeit.104
According to the Centre for Economics and Business Research, counterfeiting within the
pharmaceutical sector has led to a loss of 292 million Euros 105. According to The Motor and
Equipment Manufacturers Association, sale of counterfeited spare motor vehicle parts has
caused a total loss of 12 billion dollars and a loss of 750,000 jobs.106 According to WIPO, total
losses in the perfume and cosmetics sector are estimated to be 3,017 million Euros. 107
Furthermore, according to the Council of Europe, every year counterfeiting causes a total loss of
100,000 jobs within the European Union.108
3.3.2 Consumers’ Health and Safety
There are two types of consumers who purchase counterfeit goods: aware consumers and
unaware consumers. Consumers of counterfeit clothes and accessories are usually aware of
what is being purchased. In this case, the item is purchased as people aspire to move up the
social ladder through imitating members of higher social classes through buying a “status
symbol” product. Advertising and brands’ reputation amplify this desire. The average consumer,
however, does not have enough financial resources to buy such costly goods and may tend to
opt for the counterfeit version.109
Accidental consumers are people who buy counterfeit products without being aware of their
illegal nature. Deceived consumers sincerely believe to have purchased an authentic product at
a convenient price. In such case, it often results in the goods bought not meeting the
consumer’s expectations.
It is to be noted that low quality of some counterfeit products can be extremely hazardous to the
consumers’ health and safety.110 Examples include: pharmaceuticals, electronic components,
102
Bronca, E. (1998), “La contraffazione del marchio” in Micro&Macro Marketing, n°2, August, pp.195-196.
APCO (2003), “Global Counterfeiting”, Background Document, p.18.
104 WHO (2006), “Counterfeit medicines: an Update on Estimates”, International Medical Products AntiCounterfeiting
Taskforce,
IMPACT,
15
November
available
online
http://www.who.int/medicines/services/counterfeit/impact/TheNewEstimatesCounterfeit.pdf
105 Centre for Economics and Business Research (CEBR ) (2000), “The Economic Impact of Counterfeiting in
Europe”, pp. 2-3.
106 Majid, Y. (2005), “A Deadly Faith in Fakes”, quoted in CEBR (2000), ibid., p.8.
107 World Intellectual Property Organization (WIPO) (2004), “WIPO National Seminar” ibid., p.4.
108 Council of Europe (2004), “Counterfeiting: Problems and Solutions”, Report of the Committee on Economic
Affairs and Development.
109 Curcio, A.M (1998), “Desiderio di falso, falso desiderio?” in Micro&Macro Marketing, n°2, pp.215-216.
110 UNICRI (2007), op. cit., pp. 49-50.
103
36
Reference Text for Trainers
alimentary products, spare parts for motor vehicles and toys. Such counterfeit goods are usually
made from sub-standard materials which have not undergone any sort of safety control, which in
some cases may contain harmful substances. For this reason consumers of counterfeit goods
tend to be more cautious when purchasing such items and consequently counterfeiters are
obliged to produce goods even more similar to the original, making them less distinguishable
from one another. Examples of serious consequences caused by counterfeited goods include:
numerous deaths in various countries (China, Turkey, Thailand)111 caused by the consumption
of counterfeit food and/or beverages; food and/or alcohol poisoning; plane and/or car crashes as
a result of counterfeit spare parts used in aircrafts and/or motor vehicles; serious health
problems caused by the consumption of counterfeit medicines (often made without or with
insufficient active ingredients) or smoking of counterfeit cigarettes (produced by mixing plastic,
soil, sand and rodent droppings with tobacco leaf or which contain extremely high nicotine
levels); eye, ear, kidney and immune system problems caused by counterfeit batteries (often
made with high levels of mercury); inflammation caused by use of fragrant and cosmetic
products containing bacteria or toxic substances; safety problems for children who play with
counterfeit toys.112 Examples of counterfeit goods considered to be hazardous which have been
seized include: counterfeit shampoos which contained bacteria or even acid in North America
and in Zambia; packages of counterfeit toothpaste which contained toxic substances in Spain;
children toys produced with flammable materials in Canada.113 Health and safety costs are not
the only costs incurred by consumers. Other costs may include emotional and physical harm
(value of reductions in wellbeing experienced by an individual or household as a result of the
physical and emotional impact of victimization) and legal expenses (only if the users decide to
take legal action).114
3.3.3 National Economy and Society
The State is also a victim of the counterfeiting industry, since it has to bear the costs in response
to crime. In particular, the State must cover police costs, justice costs, costs deriving from
criminal sanctions, costs linked to the drawing-up of a legislative structure which disciplines the
crime, as well as the penalties and costs necessary to have effective controls at customs. All
these costs are necessary to repress counterfeiting and to ensure effective implementation of
the law.115
Police costs are related to the costs incurred for the work carried out by the police forces; justice
costs refer to expenses deriving from court cases; costs deriving from criminal sanctions include
costs such as those incurred for the management and running of fine collections, the criminal
justice system, including the remuneration of those who work in the penitentiaries and who work
in the courts; costs linked to the drawing-up of laws include fees due to parliamentarians, as well
as the remuneration of customs / police and the purchase of technological items considered to
be essential for the detection of counterfeited goods at borders.
Further costs incurred by the State include those which derive from crime. These costs can be
divided into two categories:
111
112
113
114
115

Direct losses: national governments may bear losses due to a reduction in tax revenues.
A reduction in tax revenues can be caused by different factors. Primarily, it may reflect a
reduction of revenues originating from legal companies as a result of less profit earned
and thus lower taxes to be paid. A second factor is linked to the fact the counterfeit
industry often sells its products on the black market thus avoiding paying taxes.

Indirect losses: counterfeiting can lead to general loss of trust in the government’s
capacity of ensuring compliance with IPRs. Consequently, there is an ever higher
reluctance to establish company branches in countries where counterfeiting is
"Global Counterfeiting” (2003), background document, pp.11-15.
Ibid.
Ibid., pp.49-51 and UNICRI (2007), op. cit., pp. 49-50.
For further information see http://www.costsofcrime.org/CostingPrinciplesandMethodology/
Ibid.
37
Reference Text for Trainers
widespread, thus, a reduction in the amount of foreign investments made within these
countries.
Furthermore, authentic products which are manufactured in countries where the counterfeit
industry is notably active tend to be perceived, even though authentic, as low quality goods. This
obviously has a negative effect on exports. As a result, the authentic product’s reputation is
defamed and the levels of exports are decreased.116
3.4 Types of Counterfeiters
Counterfeiters are individuals in various ways involved in activities linked to the unauthorized
production of copies of original products with the purpose of generating profits. The decision to
invest in the production of counterfeit goods is often based on a cost-benefit analysis.
Counterfeiters base their costs assessment on a calculation of the efforts required to produce a
particular counterfeit good. Social perceptions, legislation and the level of its enforcement117 are
also taken into account. Furthermore, the evaluation of benefits weighs up the opportunities of
earning large profit margins at low costs.118 It is to be noted that counterfeiting has until recently
been regarded as a “victimless crime” and has not been deemed socially dangerous, therefore
its repression has been limited.119
Counterfeiters are often involved in other criminal activities, such as drug and arms trafficking,
illegal workforce employment, human trafficking, illegal immigration and money laundering.
Furthermore, these individuals may resort to violence as a tool to coerce others to work and/or
cooperate with them. These coercive methods may include psychological pressure, blackmail
and intimidation.120 Characteristics which, together with the use of coercion, have led to the
worldwide involvement of numerous individuals operating alone or more often organized in
groups.
3.4.1 Single Counterfeiter
Even though counterfeiting activities are often carried out at an international level and require a
complex set of skills, which individual companies do not usually possess, smaller scale
counterfeiting activities do exist. These small scale activities are carried out by small
entrepreneurial organizations constituted mainly by single counterfeiters who may cooperate
together and which produce and distribute counterfeited goods. These small scale activities can
evolve into larger scale activities if there is a significant amount of capital and the entrepreneur
has tight connections with third parties operating in and across different locations. 121 In such
cases, crimes considered to be typical of those linked to organized crime are committed. This
may include the employment of an illegal workforce, corruption of customs officers and police
forces, coercive methods such as blackmail and intimidations used to oblige legal companies to
produce counterfeit goods. Furthermore, these illegal activities may be facilitated by weak
border controls, differences across jurisdictions and a lack of severe and adequate penalties.122
Five types of counterfeiters have been detected by Staake and Fleisch:123
116
“Global counterfeiting” (2003), ibid., p.16, and UNICRI, (2007), op. cit., p. 49.
Williams F.P., Mc Shane M.D. (2002), “Devianza e criminalità”, Il Mulino, Bologna, p.196.
118
OECD
(2008),
“The
Economic
Impact
of
Counterfeiting”,
Paris,
pp.
47-49,
http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/OECD-FullReport.pdf
119 Ibid., p.87.
120 Union des Fabricants (UNIFAB) (2004), “Counterfeiting & Organized Crime Report”, 2nd edition, Paris, p.
11,http://counterfeiting.unicri.it/docs/Union%20des%20Fabricants.Counterfeiting%20and%20Organised%20Crime%2
0Report.2nd%20edition2004.pdf
121
UNICRI, op. cit., p.110.
122 Savona E.U. (1999), “Trends and Causes of Cross-border (organized) Crime in Europe”, text of the report used
during the “Conference on Area of freedom, security and justice in the EU: policy development and practical
implementation of criminal law co-operation”, ERA Congress Centre, 18-19 October, Trier (Germany).
123 Staake, T., Fleisch, E. (2008), “Countering Counterfeit Trade. Illicit market insights, Best-Practice Strategies and
Management Toolbox”,Springer-Verlag (editions), Berlin Heidelberg, pp.22-54.
117
38
Reference Text for Trainers

Disaggregators: usually produce replicas of fashion company brands. Goods produced
are easily made and are often of poor quality (the machines used during manufacturing
may be of poor quality). In order to minimize transport costs these goods are usually sent
in large quantities. Disaggregators reduce the risks of detection by choosing countries
considered to have weak border controls as places of destination for the goods in
question.

Imitators: produce replicas of medium quality, thus imitators are required to have specific
knowledge regarding the production of the chosen goods. Furthermore, a large amount
of initial capital is invested in machinery used for manufacturing the goods. Imitators
counterfeit both brands and designs. Their market is mainly national.

Fraudsters: produce low quality counterfeit goods. The goods produced are similar in
appearance to the original. It is for this reason that their retail price is just slightly lower
than the original good.

Desperados: produce easily imitable goods, such as medicines and spare parts for
motor vehicles. In order to reduce the risk of being detected, desperados produce small
quantities of goods to then sell them at high retail prices.

Counterfeit smugglers: profit by avoiding tax and violating custom laws. One particular
form of ‘counterfeiting’ consists of suppliers selling factory overruns on the black market.
Factory overruns are those goods produced in excess with respect to the quantity
contractually ordered from the supplier by the retailer. This phenomenon cannot be
formally considered as counterfeiting, since neither copyright nor trademark rights are
violated (after all, the good being sold is an authentic product). The license agreement
stipulated between the two parties (supplier and retailer) is violated. It is to be noted,
however, that these products are often included in statistics concerning counterfeit
products and their dissemination through business associations.
3.4.2 The Implication of Organized Crime
According to the United Nations Convention against Transnational Organized Crime, an
organized criminal group is a “structured group of three or more persons, existing for a period of
time and acting in concert with the aim of committing one or more serious crimes or offences
established in accordance with this convention, in order to obtain, directly and indirectly, an
economic or other material benefit”.124 These criminal groups are characterized by a durable
structure which commits criminal offences in order to generate profits. The globalization of
markets, together with the widespread distribution of information technologies has led an ever
greater demand for illegal goods and services. Consequently, this increase in demand has led to
new profit opportunities and the formation of alliances among various organizations.125 These
elements provide a better understanding of why a significant portion of counterfeit trafficking is
managed by organized criminal groups. There is a demand for illegal products which is satisfied
by them. Counterfeit goods may be sought by consumers if there is a lack of products along
legal distribution chains or if the prices offered are more advantageous than those of the original
products.
These counterfeit goods are often transported along the same trade routes used for drug and
arms trafficking. Consequently, such goods may be transported in collaboration with the various
groups managing other types of illegal trade.126 These relations have, with time, facilitated the
evolution of counterfeiting and transformed it into an extremely well organized transitional
criminal activity. Organized criminal groups have various economic resources and thus can
invest in all types of sectors, including the technological ones, therefore, they can be considered
as real illegal mass producers. Direct involvement of the criminal groups in the counterfeiting
industry occurs if the counterfeit activity is owned by one of these organized criminal groups.
124
125
126
United Nations (2000), “United Nations Convention against Transnational Organized Crime”, Art. 2(a).
UNIFAB (2004), op. cit., p.7.
UNICRI (2007), op. cit., pp.104-109.
39
Reference Text for Trainers
Indirect involvement in counterfeiting occurs when one of these groups decides to endorse a
pre-existing legal company.127 Organized criminal groups are able to evade border controls by
resorting to corruption and/or intimidation which may further result in their products being put on
the legal distribution chain.128 Counterfeiting activities ensure a low level of detection and a high
level of profitability. Organized criminal groups consider counterfeiting as a way to generate
funds which can be then laundered by investing them in other activities, both illicit and licit.129
The Organisation for Economic Co-operation and Development (OECD) states that organized
criminal groups are actively involved in producing, smuggling and selling untaxed alcoholic
beverages and cigarettes; electronic components; clothes and accessories. This speculation is
based on the fact that the previously mentioned sectors are the most profitable and involve less
risk.130 According to the Union des Fabricants, the Italian Camorra, Albanian gangs, Asian
gangs (especially the Japanese Yakuza) and Turkish clans (in particular the Bucak clan) are the
main criminal networks operating in the counterfeiting industry.131 According to police and
investigations132, it is thought that the Camorra is specialized in counterfeiting clothes, especially
items associated with famous brands. In the Port of Naples alone, according to the Italian
Customs Agency, 60% of the goods unloaded are not checked. 1,600,000 tonnes of goods with
Chinese origin are unloaded and registered, however, another 1,000,000 tonnes of Chinese
goods remain unchecked. It has been estimated that two hundred million Euros of taxes were
evaded. Cheap counterfeit products were bought in Eastern countries, where illegal workforces
are often employed in the production process of such goods, then shipped over to Italy and
unloaded at Port of Naples, to be then loaded onto vans and distributed throughout Italian and
other European cities.133 The Camorra is also involved in the production of counterfeit CDs.
These CDs are often imported from countries such as Bulgaria and Ukraine.134 The Camorra
manages all stages of production, distribution and sales of counterfeit products by financing and
controlling the companies which produce the goods.
Albanian gangs are particularly active in the port of Antwerp in Belgium and they deal with all
types of counterfeit products. Asian gangs are more skilled in the manufacturing and distribution
of counterfeit credit cards, software and electronic entertainment devices. Asian gangs are
known to collaborate with organized criminal groups in Eastern Europe, Eastern India and
Nigeria. The Bucak clan monopolizes the sales of counterfeit clothes in Kusadasi in Turkey.135
The Link between Counterfeiting and other serious Organised Crime
As any serious organised crime, counterfeiting poses a significant threat to the legitimate
economy, consumer safety, national values and social stability.136
Nevertheless, IP crime is still considered very attractive to global criminal groups as it is highprofit and low-risk, with inadequate penalties - often just a fine and/or a short suspended
sentence.
Organized crime’s involvement in counterfeiting may be better understood by considering three
motivations: consolidating, expanding vertically and expanding horizontally. In the first, as the
entry barrier to counterfeiting is lowered, organized crime entrenches itself in the activity in order
to fend off amateur competitors. In the second, a criminal group expands into counterfeiting to
127
Calovi, F., Vettori, B., Yu, J. (2008), “I falsi di moda. Le vulnerabilità del mercato italiano della moda alla
contraffazione”, Franco Angeli (editions), Milano, p. 130.
128 UNICRI (2007), op. cit., pp.104-109.
129 “Global counterfeiting” (2003), Background document, p.20.
130 OECD (2008), op. cit., pp.87-88.
131 Union des Fabricants, (2004), op. cit., pp.16-17.
132 See, Saviano R. (2006), “Gomorra. Viaggio nell’impero economico e nel sogno di dominio della camorra”,
Mondadori (editions), Milano, pp.11-47.
133 Ibid.
134 UNIFAB (2004), op. cit., pp.16-17.
135 Ibid.
136 The Anti-Counterfeiting Group, Links between counterfeiting and other serious organised crime, available at:
http://counterfeiting.unicri.it/docs/AntiCounterfeiting%20Group.Links%20between%20Counterfeiting%20and%20Other%20Serious%20Crimes.February20
08.UK.pdf
40
Reference Text for Trainers
derive profit from experience in related criminal activity. For instance, the methods used in
human smuggling—forging documents, laundering money, smuggling objects or people across
borders and the like—can be leveraged when turning to counterfeiting and vice-versa. The third,
and most prevalent, motivation is expanding into counterfeiting to diversify a criminal group’s
illicit revenue streams.
The profits made by counterfeiting are often used to fund other serious organized crime such as
drugs and arms smuggling, people trafficking, identity theft, money-laundering and child
pornography.137
By investigating drugs or other trafficking/corruption-related crimes, it is frequently found that
warehouses containing counterfeit products are also discovered. The opposite situation hardly
occurs. This is mainly due to the fact that investigations on counterfeiting cases usually are not
deep enough to allow discovering possible links with other crimes.
For this very reason, in order to make advancements in countering counterfeiting-related crimes
and discovering the criminal networks behind them, all the available investigation tools need to
be used.
Some case studies and news showing the connection between counterfeiting and other
organised crimes are reported in the boxes below.
Box 1
Operation Lund and human smuggling in Britain
On 5th February 2004, 21 Chinese illegal immigrant cockle-pickers drowned as their unlicensed gang
master forced them to work in dangerous conditions. Police found evidence that the head of the
syndicate ran an extensive human-smuggling operation at his numerous residences. In gathering
evidence, police also found more than 4,000 counterfeit DVDs, as well as computers containing
counterfeit materials. This case highlighted the “range of possible entry methods exploited by Chinese
organized immigration crime groups”.
Highlight. This case demonstrates an IPR-infringement crime connection to one of the most infamous
incidents of Chinese illegal immigration and labour abuse in England’s history.
Piracy revenue was a secondary but important part of this operation: the commercial scale of operation
showed a significant investment in equipment and blank media. There was no surveillance or
intelligence about how he entered into piracy.
Motivation for entry into piracy. This is a case of vertical expansion, as the gang master’s piracy
operation was a direct extension of the gang’s primary activity of human smuggling. By expanding into
piracy, the gang master was able to capture additional profits from the labour he had at his disposal.
Role of law enforcement. Police identified the piracy operation they uncovered; prosecutors successfully
convicted the gang master and his accomplice of 11 counts of copyright infringement.
Evidence base. The evidence base comprises the court proceedings and press accounts, which provide
vivid details of the drowning tragedy and the national response that followed.
Police discovered tens of thousands of counterfeit DVDs, disc copiers, and high-end printers in a search
of the gang master’s cousin’s residence. Counterfeit DVDs like those found at the residence were being
sold by Chinese illegal immigrants in the area. These circumstances suggest that the immigrant cocklepickers were recruited to also assist in the manufacture and sale of the counterfeit DVDs. The gang
master’s cousin was charged with both immigration and trademark offences.
Source: Rand Corporation, Safety and Justice Programme
137
RAND Corporation (2009), Film Piracy, Organised Crime and
http://www.rand.org/pubs/monographs/2009/RAND_MG742.appendix.pdf
Terrorism,
RAND,
available
at:
41
Reference Text for Trainers
Box 2
Counterfeiting revenues to fund drug trafficking in the U.K.
In July 2009 fake goods worth around £3m were seized in one of the biggest-ever counterfeit raids in
Manchester. Customs and trading standards officers swooped on a Piccadilly warehouse after a tip-off
and found thousands of boxes of bogus gear.
Officials believe the warehouse supplied hundreds of shops and market stalls across the country. They
are treating it as a body blow to counterfeit gangsters who have plagued Manchester.
In 2007, the Manchester Evening News revealed the city was regarded as the country's fake goods
capital and officers have continued to target the illegal industry. They are now hunting for the factory's
owner; nobody was inside when the doors were smashed down at the Chapeltown Street site.
The huge stash included fake Gucci purses, Prada handbags and thousands of boxes of trainers
bearing brand names such as Nike and Lacoste. There were also polo shirts, fleeces, t-shirts and coats
from bogus top labels such as Armani and Dolce & Gabbana. One pile of boxes contained the popular
Australian UGG® boots.
Officers also found hundreds of ghdTM hair straighteners. The company warned that the fakes could be
`lethal'. A spokesman for the Anti-Counterfeiting Group said: "There is no doubt that some of the vast
sums raised from counterfeiting go to fund drug trafficking".
Graham Forbes, from Her Majesty's Revenue and Customs, added: "The gangs behind this form of
criminality reap huge profits from their sales which are ploughed straight back into the criminal
underworld, feeding activities like drug dealing and fraud."
Source: Manchester Evening News
Box 3
Counterfeiting and firearms smuggling: the involvement of Camorra
U.S. authorities alleged that a band of criminals sent from Italy by the Camorra ran a counterfeiting
ring in the tri-state area (New York, New Jersey and Connecticut) that sold knock-off clothing and
electronics on street corners, at flea markets and on the Internet.
It is claimed the proceeds from the sales were funnelled back to the organized crime leadership in
Italy.
The alleged leader of the ring imported items such as video cameras, MP3 players and clothing
through his company and then placed counterfeit labels on them. Authorities alleged the group working
under the leader consisted of dozens of people sent by a Naples-based organized crime family, part of
the Camorra organized crime syndicate.
After a seven-month investigation, police raided the ring leader’s house, his company warehouse,
together with another house where authorities said many Italian nationals allegedly involved in the scam
were living. Hundreds of items of counterfeit merchandise, including Apple iPod labels, were recovered
from the warehouse, and police also found a number of firearms.
Source: CIB Counterfeiting Confidential
42
Reference Text for Trainers
Box 4
The case of Ang Bin Hoey Triad in Malaysia
Malaysia became a major centre for the production and distribution of pirated films since law
enforcement in China and Hong Kong began to crack down aggressively on burning labs and began
arresting organized-crime bosses as well as low-level front men in the 1990’s. Many of the counterfeiting
operations in Malaysia are said to have ties to organized crime in Taiwan.
Ang Bin Hoey Triad comprises a network of more than a hundred street gangs with an estimated 11,000
members. It’s leader is alleged to have controlled more than 1,000 companies, many of them illicit,
including several piracy factories.
Highlight. This case demonstrates how counterfeiting and piracy operations fit easily into a traditional,
hierarchical organized-crime structure.
Piracy revenue. The triad profited from counterfeiting and piracy primarily through the extortion of
vendors in Kuala Lumpur.
Motivation for entry into piracy. This is a case of both consolidation and horizontal expansion. At the
street level, the triad’s gangs consolidated its power over territory, in part including profitable
counterfeiting and piracy markets among its rackets. The horizontal expansion was made thorough the
1,000 companies the leader is alleged to have controlled across both licit and illicit markets.
Role of law enforcement. The Ministry of Domestic Trade and Consumer Affairs handles the
enforcement of anti-piracy laws. Over the years enforcement has been met with violence and
intimidation from pirates, cumulated with death threats against the MDTCA .
Evidence base. Information on ‘Operation Copperhead’ was compiled from numerous press reports and
verified by interviews with law enforcement.
Source: Rand Corporation, Safety and Justice Programme
43
Reference Text for Trainers
SOURCES
APCO (2003), “Global Counterfeiting”, Background Document, p.18.
Bronca, E. (1998), “La contraffazione del marchio” in Micro&Macro Marketing, n°2, August,
pp.195-196.
Calovi, F., Vettori, B., Yu, J. (2008), “I falsi di moda. Le vulnerabilità del mercato italiano della
moda alla contraffazione”, Franco Angeli (editions), Milano, p. 130.
Casillo, S. (1998), “L’irresistibile ascesa dell’industria del falso in Italia”, in Il Mulino, n°4, p.709.
Centre d’Etudes Internationales de la Propriété Industrielle (CEIPI) (2004), “Impacts de la
contrefaçon et de la piraterie en Europe. Rapport Final”, Université Robert Schuman,
Strasbourg, pp.16-17, downloaded at http://counterfeiting.unicri.it/resources.php
Centre for Economics and Business Research (CEBR) (2000), “The Economic Impact of
Counterfeiting in Europe”, pp.2-3.
CIB
Counterfeiting
Confidential,
(August
2008)
available
ccs.org/index.php?option=com_content&view=article&id=29&Itemid=3
at:
http://www.icc-
Council of Europe (2004), “Counterfeiting: Problems and Solutions”, Report of the Committee on
Economic
Affairs
and
Development
available
at
http://assembly.coe.int/Documents/AdoptedText/ta04/EREC1673.htm
Curcio, A.M. (1998), “Desiderio di falso, falso desiderio?”, in Micro&Macro Marketing, n°2,
pp.215-216.
International Anti-Counterfeiting Coalition (IACC) (2005), “The Negative Consequences of
Intellectual Property Theft: Economic Harm, Threats to the Public Health and Safety, and Links
to Organized Crime and Terrorism”, white paper, Washington.
International Anti-Counterfeiting Coalition (IACC) (2005), “The Negative Consequences of
Intellectual Property Theft: Economic Harm, Threats to the Public Health and Safety, and Links
to Organized Crime and Terrorism”, white paper, Washington.
International
Trademark
Association,
“What
is
counterfeiting?”,
available
at:
http://www.inta.org/index.php?option=com_content&task=view&id=1534&Itemid=&getcontent=4
Interpol, http://www.interpol.int/Public/FinancialCrime/IntellectualProperty/Default.asp [
Manchester
Evening
News,
£
3m
in
fake
goods
seized,
available
at:
http://menmedia.co.uk/manchestereveningnews/news/s/1127317_3m_in_fake_goods_seized
Noble, K.R. (2003), “The links between intellectual property crime and terrorist financing”, Text
of public testimony of the Secretary General of Interpol, p.2, available at:
http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/links.pdf
Organization for Economic Cooperation and Development (OECD) (2007), “The Economic
Impact
of
Counterfeiting
and
Piracy”,
Executive
Summary,
available
at:
http://www.oecd.org/dataoecd/13/12/38707619.pdf
Organized Crime Taskforce of Northern Ireland (2002), “The Threat: Assessment 2002. Serious
and Organized Crime in Northern Ireland”, the Police Service of Northern Ireland, p.8, available
at: http://www.nio.gov.uk/organised_crime_threat_assessment_2002.pdf
RAND Corporation (2009), “Film Piracy, Organised Crime and Terrorism”
Saviano, R. (2006), “Gomorra. Viaggio nell’impero economico e nel sogno di dominio della
camorra”, Mondadori (editions), Milano, pp.11-47.
Staake, T., Fleisch, E. (2008), “Countering Counterfeit Trade”, Springer (ed.), p.17.
44
Reference Text for Trainers
UNESCO, World Anti-Piracy Observatory, “What is Counterfeiting?”,
http://portal.unesco.org/culture/en/ev.phpURL_ID=39397&URL_DO=DO_TOPIC&URL_SECTION=201.html
available
at:
World Trade Organization (WTO), Agreement on Trade-related Aspects of Intellectual Property
Rights (TRIPS), available at: http://www.wto.org/english/docs_e/legal_e/27-trips.pdf
45
Reference Text for Trainers
SECTION 4
Counterfeiting at the European Union Level
4.1 The Normative Framework
The Green Paper of 15th October 1998 stated the European Commission’s efforts to define the
objectives of the Community strategy against counterfeiting and piracy and identified the areas
where improvement was required. The main objectives of the Green Paper were: (a) to assess
the economic impact of counterfeiting and piracy in the Single Market; (b) to review the existing
legislation in this field, while identifying the problems and the improvements required on the
legal front; (c) to examine the need for Community action in this area with reference to the
objectives of the Single Market.
Furthermore, the document identified four key areas in which improvements could be made in
the measures to combat counterfeiting within the EU Single Market:

monitoring by the private sector;

the use of technical devices;

sanctions and other means of enforcing IPRs

administrative cooperation between the competent authorities.
Intellectual property is protected within the European Union by a series of international
normative instruments of which the Member States of the European Union (EU) are also a
Party. The EU Legislator is strongly committed to improving and harmonizing the EU legislation
on intellectual property and related rights. In 2001 the European Union adopted Directive
2001/29 /EC on the harmonization of specific aspects of copyright and related rights in the
information society (a.k.a. EU Copyright Directive, EUCD), whose aim was to keep the legal
framework of the EU Member States in line with the international conventions on the subject.
The Copyright Directive falls within the scope of articles 47 (2), 55 and 95 of the Treaty of Rome
and is also aimed at implementing the WIPO Copyright Treaty and the WIPO Performances and
Phonograms Treaty, of which the European Union is a Party. The philosophy at the basis of the
EUCD is the need to prevent and punish all forms of unauthorized use of the works resulting
from the activity of human intellect. The EUCD aims to maintain a high level of protection for
copyright and related rights, considering also the needs arising from the diffusion of digital
technology and providing a harmonized protection at the community level. This harmonized
protection should grant all rights holders, as identified in the Directive, the exclusive right to
make their works protected by copyright accessible to the public as well as the materials that are
protected by other rights.
The EU Legislator intervenes to identify the content of specific exclusive rights of economic use
as well as the extent of the related exceptions. Furthermore, it provides new forms of protection
regarding technological measures designed and used by right holders to prevent any
unauthorized act involving their work. Similar protection is also accorded to rights management
information. This term can be defined as information provided by the right holder that identifies
the work, the author or any other right holder, information regarding the terms and conditions of
use of the work, or numbers and codes that represent such information. As previously outlined
in the WIPO Copyright Treaty, the Copyright Directive specifies the content of the rights of
reproduction, communication to the public and of distribution.
Art. 2 confers to authors, performers, phonogram producers, producers and broadcasting
organizations regarding the right of reproduction. It outlines the “exclusive right to authorize or
prohibit direct or indirect, temporary or permanent reproduction by any means and in any form
of”, their works, fixations of their performances, their phonograms, the first fixations of films in
respect to the original and copies of their films and fixation of their broadcast.
46
Reference Text for Trainers
The EUCD confers right holders the exclusive right to authorize or prohibit any communication
or transmission to the public, by wire or wireless, of their work, copy of their work and of
performances of performers regarding the right of communication to the public (art. 3) and the
right of distribution (Art. 4). Moreover, the authors enjoy the exclusive right to authorize or
prohibit the distribution of the original of their works or of copies in any form. The exceptions to
the previously mentioned rights are stated in Art. 5. The main principle is to avoid any prejudice
to the technological development and to adapt the concepts of use and reproduction to the
specificities of digital communication.
The Directive excludes the prohibition of temporary acts of reproduction which are transient or
incidental and that constitute an essential and integral part of a technological process. These
reproduction acts should, for instance, be performed with the sole purpose of enabling a lawful
use of a work or other protected material and should not have independent economic
significance.
Member States retain the right to provide for further exceptions or limitations to the right of
reproduction, the right of communication to the public, and the right of distribution Articles 6 and
7 are directly related to the implementation of the WIPO Copyright Treaty. They are aimed at
ensuring adequate legal protection against the circumvention of the technological measures that
are implemented by the right holders to prevent unauthorized acts on their works protected by
copyright, and to provide for adequate legal protection for rights management information. The
term “technological measures” (art. 6.3) indicates, as in the WIPO Copyright Treaty, any
technology, component or device that, in the normal course of its operation, is designed to
prevent acts, with reference to a work, not authorized by the right holder of any copyright or
related right. The protection accorded by the EUCD relates to the necessity for the ratifying
countries of providing adequate legal measures against the manufacture, import, distribution or
sale of devices, products or components which: a) are promoted, advertised or marketed for the
purpose of circumvention of the specific technological measures; b) have only a limited
commercially significant purpose or are used other than to circumvent the technological
measures; c) are primarily designed, produced adapted or performed for the purpose of
enabling or facilitating the circumvention of the technological measures (Art. 6.2). The concept
of rights management information is defined by Art. 7 as any information provided by the right
holders which identifies the work or other protected materials under the Directive, the author or
any other right holder, or information about the terms and conditions of use of the work or of
other protected materials, or any number or codes representing such information.
The EUCD calls Member States for the provision of adequate legal protection against anyone
who a) removes or modifies, without the authorization of the right holder, any rights
management information; b) distributes, imports for distribution, broadcasts, communicates or
makes available to the public, protected works from which the rights management information
has been removed or altered without authorization with the aim of ensuring an effective
implementation of the WIPO Copyright Treaty. The individual must, however, know or have
reasonable ground to know that by so doing she/he is inducing, enabling, facilitating or
concealing any infringement of any copyright or any related right. Examples of the
implementation of the EU Copyright Directive (foresaw not later than the 22nd December 2002)
include: the United Kingdom adopted in 2003 the Copyright and Related Rights Regulation;
France adopted in 2006 the Loi sur le Droit d'Auteur et les Droits Voisins dans la Société de
l'Information (DADVSI); while Finland modified in 2005 the Finnish Copyright Act and the Penal
Code. For Italy, art. 30 of law 39 /2002 the Italian Parliament delegated to the Government the
issuance of a legislative decree aimed at implementing the Directive. The decree in question is
the D. Lgs. 68 of 9th April 2003, entitled “Implementation of Directive 2001/29/CE on the
harmonization of certain aspects of copyright and related rights in the information society”.
The EU legislative framework on customs cooperation relies on Council Regulation 1383/2003.
Its aim is to improve customs cooperation for the identification of goods infringing an IPR. Art. 2
of the Regulation proposes a distinction between “counterfeit” and “pirated” products. The term
“counterfeit goods” is used by the Regulation to identify those goods unlawfully bearing a
trademark identical or very similar to the registered one, while the term “pirated goods” indicates
goods which are or contain unauthorized copies of a work protected by copyright. The
47
Reference Text for Trainers
provisions of the regulation, and especially those articles regarding customs actions, are also
applicable to those products infringing: a) a patent registered in one of the EU Member States,
and b) an indication of origin. Customs actions may be performed upon goods intended for
export, import and transit (art. 1).
Customs actions may be initiated by the national customs officers when there is the suspicion
that the goods may infringe an IPR and may also be initiated after the presentation of an
application for action by the right holder. In the latter case, the request should be sufficiently
detailed describing, in particular, the goods in question and indicating the type of alleged
infringement. Other information, if available, should concern: the final destination of the
identified goods, the scheduled time for their arrival or departure, the means of transport used,
the interested countries, and the differences between the original and the infringing products.
Furthermore, the applicant has to present a declaration of assumption of responsibility for the
damages eventually suffered by the party against whom the customs action is requested. This
declaration represents an assurance for the alleged infringer when the measures taken by the
customs are revoked in consequence of an act or an omission on the part of the requesting
party or in the case in which it is later found that no infringement occurred (Art. 5 and Art. 6). Art.
13 affirms that the competent customs office must receive communication on the initiation of
judicial proceedings for the decision on the merits of the case. This must occur within 10 working
days from the day in which the notification was received regarding the suspension of the goods
from the channels of commerce or of the seizure of the goods. In the case of inaction on the part
of the requesting party the alleged infringing goods are released. The suspension from
commerce and the seizure are provided for by Art. 9. In such cases where suspicion arises after
a customs control. Art. 11 states that, with the consent of the right holder, the alleged infringing
goods suspended or seized may be destroyed. In this case, a decision on the merits of the case
has yet to be taken as there is only suspicion that the goods are infringing an IPR. For this
reason the provision of Art. 11 could only be applied if the customs authorities receive a written
declaration, on the part of the owner or of the proprietor of the alleged infringing goods,
indicating her/his favourable opinion for the destruction of the said goods. This declaration is
presumed if the owner or proprietor does not oppose the request of the destruction of the goods
within the established time limits. Art. 16 indicates the measures to which these goods are
subjected that have been recognized to infringe an IPR following the end of judicial proceedings.
In this situation, the identified goods cannot enter the EU channels of commerce, cannot be
exported and must be suspended in case in which they were already traded.
Commission Regulation (EC) No 1891/2004 of 21 October 2004 set provisions for the
implementation of Council Regulation (EC) No 1383/2003. This regulation defines the natural
and legal persons who may represent the right holder or any other person authorized to use the
right. This Regulation also specifies the nature of the proof of ownership of intellectual property,
while providing a model form and the language requirements for filing a request for action,
specifying the type of information necessary in order to facilitate the work of the customs
administrations in recognizing the goods that may infringe an intellectual property right. Both the
national and customs applications and the procedures for the detention of counterfeit goods by
customs have been harmonized in all the EU member states. There is no unified EU customs
entity, however, the national customs administrations of the 27 member states:

work together;

are subject to common regulations;

exchange information through a centralized information system.
It is to be noted that EU customs practices still have different characteristics in each member
state. In addition, even if the means used to enforce IP rights have been harmonized, civil and
criminal procedures are different in each Member State.
On March 2004, the European Union Institutions adopted the Directive 2004/48/EC, also known
as the “IPR enforcement directive”, focused primarily on the protection of IPRs. The preamble to
the Directive explicitly recalls the obligations binding the EU Member States in consequence of
their participation to the TRIPs Agreement, being the European Community itself a Contracting
48
Reference Text for Trainers
Party of the Agreement and not only the EU Member States individually. The intervention of the
Community Institutions is necessary to harmonize the relevant legislation and practice of the EU
Member States, which varies from one member to the other. This is the case for example for
what concerns the procedure to be followed by the competent authorities to indicate provisional
measures aimed at preserving evidence. The preamble of the Directive foresees a normative
framework which presents certain points in common with the TRIPs Agreement, but the act
owns, in this case, all the strength that Community legislation has towards the EU Member
States. Art. 1 defines the object and scope of the IPR Enforcement Directive: the protection of
IPRs, including also industrial property rights. The extent of its application is specified by the
following article which states that the Directive has to be applied in any case of infringement of
an IPR in a Member State or in the Community, without any prejudice to the application of a
more stringent protection in the case in which protection should be provided by other national or
Community means.
Art. 3 (1) calls Member States for the adoption of remedies and procedures applicable to
enforce IPRs. The remedies and procedures should be effective, proportionate and dissuasive,
they should not be applied in a manner to create barriers to commerce, and they should not be
unnecessary complicated or costly, or entail unreasonable time-limits or unwarranted delays.
The Directive adopts the presumption of paternity of the work to the advantage of the person
who placed her/his name on the said work. Norms concerning the acquisition and protection of
proofs are very similar to the ones contained in the TRIPs. Thus, Articles 6 and 7 provide for: the
power, held by the judicial authorities, to order the resistant to present the element of proof at
her/his disposal; the possibility to order provisional measures to protect the elements of proof
inaudita altera parte, when there is the possibility that the proofs could be compromised or
destroyed; the possibility to subordinate the order of such measures to the lodging, on behalf of
the requesting party, of a sum of money as an assurance towards the party against which the
measures should be ordered; the payment on behalf of the requesting parties to the alleged
infringer of compensation for the damages suffered, in the case in which the ordered measures
are revoked for any act or omission of the requesting party or in cases where it is subsequently
found that there has been no infringement.
The Directive, similarly to the TRIPs Agreement, indicates the possibility for the judicial
authorities, (upon request of the claimant) to order the release of information to: a) the infringer
or to any person b) found in possession of goods infringing an IPR, or c) commercially
distributing such goods, or d) providing services used in infringing activities or e) to any other
person indicated by the before mentioned subjects. The Directive presents a more detailed
description of the subjects, who bear the obligation to provide information. The same obligation
is better defined with regard to its object and it must contain the names and addresses of the
producers and of distributors of infringing goods as well as of all the subjects which participated
towards the illicit activity. It must also contain an indication regarding the units produced and
distributed and the average sale price (art.8).
Article 9 provides the power, held by the judicial authorities, to order provisional measures also
to prevent an alleged infringement of an IPR or to forbid the continuation of an alleged infringing
activity. To achieve this aim the competent authorities may order the subjects to maintain a
certain behaviour or may seize the alleged infringing goods. In the case where the alleged
infringing activity is an activity conducted on a large scale, the competent authorities may also
order the precautional seizure of movable and immovable property of the alleged infringer,
including the blocking of her/his bank accounts and other assets. Ordering of such measures is
subordinated to the demonstration on the part of the injured party of circumstances likely to
endanger the possible recovery of damages. The measure could be ordered inaudita altera
parte and could be revoked. The latter could be the consequence of inaction on the part of the
requesting party with regard to the initiation of proceedings to decide on the merit of the case, or
could also be subsequent to the finding by the competent authorities that no infringement has
occurred. In this case, the requesting party could be ordered to pay the damages eventually
suffered by the alleged infringer. In the case where the judicial authorities find that an
infringement occurred, the Directive, similarly to the TRIPS Agreement, foresees the possibility
to suspend, retire from the channels of commerce, or destroy the infringing goods at the
expenses of the infringer (Art. 10). For what concerns the compensation for damages, Art. 13
49
Reference Text for Trainers
provides for two calculation standards. The first (Art. 13, 1, (a)) assesses the economic
consequences suffered by the damaged party while the second (Art. 13, 1 (b)) assesses the
economic value of the IPR and of the licenses. The last articles of the Directive call Member
States to improve their cooperation and exchange of information also by publishing the relevant
Court sentences and informing the Community Institutions about any problem encountered in
the implementation of the Directive.
Declaration 2005/295/CE of the Commission specifies article 2 of the Directive 2004/48/CE of
the European Parliament and of the Council on the observance of intellectual property rights.
This declaration of the Commission regards the following intellectual property rights falling within
the enforcement of the mentioned directive: royalties; rights in connection with the royalties;
rights of makers of topographies; rights of trademarks; rights on designs and models; registered
trademarks; rights coming from complementary, protective certifications; geographical
indications; rights of public utility; sole right for vegetal inventions; commercial names if
protected by sole right of the domestic legislation.
The IP Criminal Enforcement Directive (CED) is still at the stage of discussion within the
European Institutions. The absolute novelty for the legislative framework put in place by the
European Institutions will be that the CED will, for the first time, specifically address criminal law
provisions to which Member States will have to conform to enhance the fight against
counterfeiting and piracy. Apart from the criticism138 that surrounded the CED since its first
appearance as a draft, it is nonetheless very interesting that the EC recognizes that
counterfeiting and piracy are supporting the activities of organized crime (and also of terrorist
groups) and that specific typologies of counterfeit products – in particular medicines – are a real
threat for consumers’ health and safety. This is the starting point that leads the Directive to
propose criminal measure to reduce counterfeiting and piracy. The CED, thus, contains
provisions on the penalties that have to be inflicted for committing the crime and also on the
confiscation of goods of the offender. Patents and Plants Varieties Rights are excluded from the
sphere of application of the CED139 that is also applicable only to those activities that are: 1)
committed on a commercial scale and 2) intentional. Interesting provisions also relate to the
creation of joint investigation teams between Member States that could improve cooperation in
these matters. Time will tell the real effectiveness of the CED and which form and scope will
have the provisions contained in its final version.
4.2 The Dimensions of Counterfeiting:
Three estimates, formulated by different institutions and using various data, have been taken
into consideration, namely the estimates provided by: 1) TAXUD; 2) WCO; and 3) OECD. Some
other measures which have been calculated by other organizations will also be presented.
Estimations by the EU Taxation and Customs Union (TAXUD)
Statistics provided by the EU Taxation and Customs Union (TAXUD) refer to the number of
seizures which take place at the EU border in relation to goods suspected of infringing an IPR.
According to Commission Regulation No 1891/2004, national customs across the EU are
obliged to provide the EU TAXUD with statistics related to the number of cases involving the
seizure of goods suspected of infringing IPRs that, once elaborated, will then be published by
TAXUD in an annual report. It must be noted that the statistics provided by TAXUD only take
account of: goods which are imported into the EU, goods which are exported out of the EU, reexports, trans-shipments and goods in transits. Consequently, all potentially counterfeited goods
which may have been produced and consumed within the same country, or the EU, are
excluded from the data provided. The result is that any assessment on the extent of
138
Criticism related to several aspects of the CED. The fact itself that the European Institutions owned the
competence to propose measure falling within the criminal sphere was not clear to many commentators. Other
criticized elements related to the contents of the CED, as for example the criminalization of abetting or inciting to
commit the crime (which could lead to the criminalization of the advice provided by a lawyer that an IPR was not
infringed by acting in a certain way).
139 Mainly because of the complexity of these rights for which it is not always clear if the infringement has been
committed.
50
Reference Text for Trainers
counterfeiting which has been carried out using these statistics may underestimate the real
magnitude of the phenomenon. In addition, the general accuracy of statistics based on seizures
needs to be properly weighed, as many factors (i.e. new legislation, customs performance,
effectiveness of customs risk assessment methods) may influence the interception of counterfeit
products. Thus an increase or decrease of seizures may not exactly represent the actual trend
of the traffic of counterfeit goods and should generally not lead to generalizations.
Considering the number of cases involving the seizure of goods suspected of infringing an IPR,
in 2009, 43,572 cases were registered on EU borders (a decrease from the 49,381 cases
registered in 2008). This phenomenon has been on the increase since 1999, a year in which
only one tenth of the amount of these cases were registered (see Image 1) The actual amount of
items confiscated in 2009, is approximately 118 millions items (Image 2). It must be noted that
these statistics do not refer only to cases of brand counterfeiting, as they include cases of
piracy.
Image 1
Source: TAXUD
Image 2
Source: TAXUD
51
Reference Text for Trainers
Although the 2009 statistics show a decrease in both the total amount of cases registered and
the total amount of products seized, it should be noted that the data indicates an increase in the
seizure of counterfeit products that are potentially dangerous to consumers’ health and safety.
Medicines represent 10% of the entire amount of detained goods. The TAXUD Report
recognizes that counterfeiting does not just affect luxury goods but everyday products (i.e.
shampoos, toothpaste, toys and electrical appliances). Counterfeit products intended for daily
use and products potentially dangerous for consumers’ health and safety constitute 17 million
items intercepted, or 18% of the total amount.
More detailed trends for the latter products can be obtained by examining the data of the
TAXUD Reports of recent years, both with reference to the number of articles detained (see
Images 3, 4 and 5) and to the number of cases registered (see Images 6, 7 and 8). These trends
are particularly alarming as they show an increase in the trade of counterfeit goods potentially
dangerous for consumers’ health and safety.
Image 3
Counterfeit foodstuffs detained
Num ber of articles detained
3500000
3000000
2500000
2000000
1500000
1000000
500000
0
2006
2007
2008
2009
Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports
52
Reference Text for Trainers
Image 4
Counterfeit toys detained
Number of articles detained
8000000
7000000
6000000
5000000
4000000
3000000
2000000
1000000
0
2006
2007
2008
2009
Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports
Image 5
Counterfeit m edical products detained
Number of articles detained
14000000
12000000
10000000
8000000
6000000
4000000
2000000
0
2006
2007
2008
2009
Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports
53
Reference Text for Trainers
Image 6
Counterfeit foodstuffs
Number of cases
90
80
70
60
50
40
30
20
10
0
2006
2007
2008
2009
Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports
Image 7
Counterfeit toys
Number of cases
2000
1800
1600
1400
1200
1000
800
600
400
200
0
2006
2007
2008
2009
Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports
54
Reference Text for Trainers
Image 8
Counterfeit m edical products
Number of cases
4000
3500
3000
2500
2000
1500
1000
500
0
2006
2007
2008
2009
Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports
Image 9 presents the outcome of the detention of suspected infringing goods, showing that a
significant percentage (47.44 %) were destroyed using the simplified procedure.
Image 9
Source: TAXUD
The provenance140 of counterfeit goods seized at EU borders in 2009 is illustrated by the
TAXUD report which provides a breakdown of the origin of goods, per number of products
140
The report states that the provenance of the goods is considered (from where they were sent to the EU) and not
their real origin (where they were actually produced) since this is often difficult to ascertain due to infringers practices
aimed at hiding the country of production/real origin of the goods. Refer to: Report on EU Customs Enforcement of
Intellectual Property Rights, Results at the EU Borders – 2009, TAXUD, 2010, page. 13
55
Reference Text for Trainers
detained. Overall, China is still the most prevalent country of provenance (more than 64% of the
total amount of products detained – see Image 10), confirming a trend that is valid since 2003.
Image 10
Source: TAXUD
Other countries were also identified as main countries of provenance for specific
products/sectors. This is the case for Turkey for the category “Foodstuffs”, for Egypt for the
category “Toys” and for the United Arab Emirates for the category “Medicines”. Finally, the
analysis of the means of transport used in 2009 (see Image 11) confirms the trends already
shown by the 2008 TAXUD Report, showing an increase in the use of shipments through the
postal service.
Image 11
Source: TAXUD
56
Reference Text for Trainers
Estimations by the WCO
The World Customs Organization (WCO) provides statistics related to the number of seizures
made by customs authorities within countries which are members of the organization. These
statistics are usually collected by WCO through the Customs Enforcement Network system
(CEN).
In 2009, a total number of 13,280 cases (Image 12) involving the seizure of counterfeit goods
were reported by the national customs administrations of the WCO Member States, while the
total number of products seized totalled 291 million (Image 13)
57
Reference Text for Trainers
Image 12
Image 13
Source: WCO
Source: WCO
The WCO data – similarly to the TAXUD stats – also show an alarming increase in the trade of
counterfeit products potentially dangerous for consumers’ health and safety. This is the case of
counterfeit pharmaceutical products and of counterfeit spare parts. The great majority of the
seizures were performed by customs administrations and only 178 cases were the result of
cooperation between customs and police forces. These few cases totalled approximately 15% of
the entire amount of products seized, suggesting that improved inter-agency cooperation can
greatly benefit the detection activities. As shown by Images 14 and 15, countries such as China,
Italy and Mexico are in the top 10 category for what concerns both the number of cases
registered and the number of items seized in 2009. This data not only reveals the extent of the
problem and but underlines the commitment of the national authorities in the fight against IPR
infringements.
Image 14
Image 15
Source: WCO
Source: WCO
58
Reference Text for Trainers
The WCO data also identify both the country of origin – in the same way as TAXUD data – and
the actual country of departure. In both cases the top 10 list is very similar and it is interesting to
note that 99 different countries were identified in the reports as country of origin (see Image 16)
and 122 as country of departure (see Image 17).
Image 16
Image 17
Source: WCO
Source: WCO
Finally, six EU Member States are in the top 10 destination countries (see Image 18) while
seven are in the top 10 transit countries (see Image 19).
Image 18
Image 19
Source: WCO
Source: WCO
59
Reference Text for Trainers
4.3 Recent Cases
2010: A Joint Customs Operation (code-named Matthew II) has led to the seizure of more than
16 million cigarettes, 241 kilograms of tobacco products, 6,400 litres of alcohol, 20 tonnes of
counterfeit perfumes, 53.418 other counterfeit items such as bags, coats, scarves, wallets, and
1,515.75 kilograms of cannabis. During the operational phase, additional seizures of more than
25 million cigarettes also took place in some EU ports. The operation was organized by the
Czech Republic, in close cooperation with Poland and the European Commission (OLAF).
(Source: EUROPA Press Release IP/10/418)
2010: In Romania, over 78,000 glass containers inscribed with various brand names including
Dolce Gabbana, Clinique and Gucci were seized, on suspicion of being counterfeit goods.
(Source: Business Action to Stop Counterfeiting And Piracy (BASCAP) Digest 15-28 February
2010)
2010: Large quantities of counterfeit cigarettes were seized in a number of countries including
Ireland, the Netherlands and the UK
(Source: BASCAP Digest 15-28 February 2010)
2010: In the UK £180,000 worth of fake medicines were seized in a joint operation between
police and the UK Medicine and Healthcare products Regulatory Agency (MHRA).
(Source: BASCAP Digest 1-14 March 2010)
2009: The UK Border Agency (UKBA) seized £1,646,173 of counterfeit goods entering into the
country in just four months from 1 April. The fakes seized by UKBA officers include England
football shirts, GHD branded hair straighteners, designer watches, handbags, shoes and
cigarettes. A spokesman said the popular hair straightener and cigarettes were made with
potentially dangerous materials.
(Source: The independent (Press association))
2009: Fake goods worth around £3m were seized in one of the biggest-ever counterfeit raids in
Manchester. Customs and trading standards officers swooped on a Piccadilly warehouse after a
tip-off - and found thousands of boxes of bogus gear. Officials believe the warehouse supplied
hundreds of shops and market stalls across the country. Officers also found hundreds of hair
straighteners. The company warned that the fakes could be `lethal'.
(Source: Manchester Evening News)
2009: Hundreds of Chinese workers were kept in virtual slavery for years as part of a
multimillion-pound pirate DVD industry uncovered in the UK. The men and women, many of
whom lived 11 to a room, were the labour behind an organised crime syndicate that began on a
market stall in Hackney, east London, and grew into a £5m illegal industry. Detective Constable
Evelyn Steeples said the case revealed the large profits that could be made from organised
crime.
(Source: The Guardian)
2009: Italian police have seized counterfeit merchandise from China worth more than Euro 20
million ($28 million) during raids on 17 warehouses in Rome. Italy's financial police say 18
Chinese citizens are being investigated for allegedly importing counterfeit goods including
clothes, electronics and some 150,000 children's toys.
(Source: Associated Press)
2008: Drinkers in Buckinghamshire have been told to be wary of buying cheap bottles of
“Glen’s” vodka after counterfeit 70cl bottles were found on sale in Chesham, Aylesbury and
Downley. Counterfeit vodka has caused blindness and even death in past instances. Genuine
“Glen’s” vodka has an AGC (Allied Glass Containers) logo on the base of the bottle as well as a
distinctive glue pattern comprising lines of glue 2mm apart which bind the label to the bottle.
60
Reference Text for Trainers
(Source: www.thisisbucks.co.uk, 22 January 2008)
2008: Health authorities in Sierra Leone seized a container filled with banned toothpaste from
China, which contained high levels of a toxic substance that could cause kidney and liver failure.
In 2007, health authorities in several countries including the United States and Hong Kong
warned against brands of Chinese low-cost toothpaste that were found to contain the poisonous
chemical diethylene glycol.
(Source: Counterfeiting Intelligence Bureau (CIB) Counterfeiting Confidential November)
2008: IBM sued a company that it alleged was selling unsafe counterfeit laptop batteries. The
company was alleged to be “offering counterfeit IBM products which posed a substantial threat
to the safety of the consuming public.” The discovery of the alleged counterfeits happened after
a consumer in Ohio bought a battery for a laptop. The battery caught fire and damaged the
laptop. After conducting an examination of the faulty battery, IBM learned that it was not
genuine. It then bought 12 Thinkpad batteries from the suspect company for further analysis. All
the batteries were found to be counterfeits.
(Source: CIB Counterfeiting Confidential January)
2008: MarkMonitor’s “Spring 2008 BrandJacking Index” found airline parts on sale at popular
online consumer auction sites. They included valves, gears, flanges, gauges and radar parts.
(Source: CIB Counterfeiting Confidential July)
2008: Police in Italy arrested 12 members of an organized criminal gang involved in the
distribution of pirate CDs and DVDs. A meticulous investigation had preceded the arrests, which
took place in Naples and Milan. A series of raids uncovered six illegal pirate factories, five in
Naples and one in Milan, which contained 350 burners. More than 70,000 CDs and DVDs were
seized during the raids, alongside more than 100,000 counterfeit inlay cards. The gang
members were charged with conspiracy and copyright infringement and might face jail
sentences of up to six years.
(Source: CIB Counterfeiting Confidential July)
2008: Polish authorities, working in conjunction with ZPAV (Polish Society of the Phonographic
Industry) and International Federation of the Phonographic Industry (IFPI) representatives,
arrested 8 people and seized over 65,000 DVDs and CDs in a raid in the Klodzko region.
Among the seized items were also firearms, counterfeit cigarettes and a large amount of cash,
highlighting again the link between digital piracy and organized crime. The pirate discs were
believed to be produced in Russia and the Ukraine and were destined for the German market.
The haul included both German and international DVDs many of which had not been legally
released yet.
(Source: IFPI)
2008: Scottish smokers have been advised to resist the temptation to buy cheaper cigarettes
amid fears of what they may actually contain. “Cheap cigarettes” usually meant those that had
been smuggled into the U.K. from outside the E.U. However the “bargain cigarette” market is
more and more dominated by counterfeit cigarettes, which are packaged to look like the real
brands. The fake cigarettes may contain up to 160% more tar, 80% more nicotine, 5.8 times
more lead and three times more arsenic, in some cases they had also been found to contain
sawdust, beetles and rat droppings. Proceeds from this illicit trade were used to fund other
crimes, such as people trafficking and prostitution.
(Source: BBC News, March 8th 2008)
2007: Counterfeit Colgate toothpaste, containing diethylene glycol, was found on sale in
different Countries: i.e. Spain, the United States of America, Panama, the Dominican Republic
and Australia. Spanish authorities seized 100,000 toothpaste tubes and, according to the
Spanish newspaper El País, 10,000 packages were distributed in the hospitals in Valencia.
(Source: http://webintel.wordpress.com and www.elpais.com)
61
Reference Text for Trainers
2007: Counterfeit cigarettes from Eastern Europe and the Far East were reportedly being sold
for as little as £1 a packet by shopkeepers in Leicester. The counterfeit cigarettes contained
higher levels of tar, arsenic, nicotine and other carcinogens and were smuggled into Leicester
and sold to shopkeepers in bulk at heavily discounted prices. Customs officials issued a warning
to consumers as the packaging on the fake cigarettes was indistinguishable from the genuine
variety. Organized criminal gangs were thought to be behind the scheme for huge profits to be
made from selling counterfeit cigarettes. Officials who seized also a shipment worth millions of
pounds analysed the ingredients with alarming results. The fake cigarettes contained extremely
high levels of arsenic, cadmium, benzene and formaldehyde, a lethal mix of carcinogens.
(Source: Leicester Mercury, 31 August 31 2007)
2007: Couples in East London have been warned after fake Durex condoms were discovered
during raids on shops and newsagents. The investigation began when a member of the public
noticed something “not quite right” and contacted the local authorities. Durex warned consumers
that despite the packaging looking genuine, the fakes were not effective contraceptives and
were unlikely to provide effective protection against sexual diseases.
(Source: East London Advertiser, 22 October 2007)
2007: More than a year-long operation into an organized crime ring pirating DVD’s, culminated
in a massive anti-piracy operation in which 20 raids across Hong Kong were conducted. The
raids took place at a number of locations, including three storage units and three retail outlets,
and yielded 14 arrests and 120,000 fake DVD’s. According to the head of the task force
conducting the raids the syndicate was one of Hong Kong’s notorious triad gangs. The gang
was believed to be selling more than $6,000 worth of DVD’s a day. The fake DVD’s originated in
mainland China and then smuggled into Hong Kong using a cross-boundary container lorry,
which was also seized.
(Source: DPA news)
2007: Russian police intercepted and arrested a criminal group alleged to illegally produce
aircraft parts and sell them in Russia, as well as to other nations. The organized group was
arrested after allegedly stealing components from the Saturn plant in central Russia and
producing and selling civil aircraft parts.
(Source: CIB Counterfeiting Confidential September)
2007: The Agence Française de Sécurité Sanitaire des Produits de Santé (AFSSAPS) was
informed by the European Medicines Agency (EMEA) about a case of a counterfeit medicine
identified in Great Britain. The elements on the products’ distribution network led to the recall of
the medicine from the French territory. This was the first case of recall of counterfeit “Plavix” in
France.
(Source: Emballage Digest, 14 February 2007)
2007: The Italian customs and Guardia di Finanza in Naples seized different shipments of
counterfeit products (including fake toys) whose value was estimated at 11,000,000 of Euro.
(Source: Italian Customs Agency)
2007: The Medicines and Healthcare Products Regulatory Agency (MHRA) began a criminal
investigation after a counterfeit batch of “Casodex” was discovered. The drug, which is used in
the treatment of prostate cancer, was found to contain only 75% of the active ingredient
bicalutamide.
(Source: BBC News, June 2nd 2007)
2007: The customs office at the port of Le Havre seized almost 410,000 counterfeit medicines
(145kg) and 11 million of medicines with a high pseudo-ephedrine content (two tonnes) for a
total estimated value of €5,8 million. The operation was conducted by customs officers who had
been previously informed about a container originating from Syria and destined for Honduras.
(Source: Emballage Digest, 17 December 2008)
62
Reference Text for Trainers
2007: The link between counterfeiting and organized crime has once again been demonstrated
after Italian police uncovered an illegal distributing network operating in Sicily. 2,000 counterfeit
CD’s and DVD’s were seized along with guns, ammunition and bomb making equipment. Police
then started investigating possible links between those arrested and organized crime, in
particular Sicily’s notorious mafia families.
(Source: IFPI)
2006: 140,000 counterfeit razor blades were seized in Italy after investigations by the Guardia di
Finanza. The products were ready to be inserted into the licit supply chain and sold to
unsuspecting buyers. The fake blades may have caused skin irritations and infections.
(Source: Confesercenti, Counterfeiting and cybercrime: damages to the economy and to
enterprises)
2006: 35,000 counterfeit electrical products were seized by the Italian Guardia di Finanza. The
products posed risks of fire and electric or thermal shock.
(Source: Confesercenti, Counterfeiting and cybercrime: damages to the economy and to
enterprises)
2006: A laboratory used for the production of fake cosmetics and perfumes was discovered in
Rome by the Guardia di Finanza who seized more than 600,000 packages.
(Source: Confesercenti, Counterfeiting and cybercrime: damages to the economy and to
enterprises)
2006: British authorities identified 18 websites selling counterfeit “Tamiflu”, the websites were
based in the UK, Canada, Switzerland, Bahrain, Cyprus, Singapore and Malta, highlighting the
worldwide nature of this illicit trade.
(Source: CIB, 3 March 2007)
2006: Officials seized in the UK, 5,000 packets of counterfeit “Tamiflu”, estimated to be worth
£500,000. US customs also seized over four dozen shipments of fake “Tamiflu” in South San
Francisco. The shipment was labelled “Generic Tamiflu”.
(Source: CIB, 3 March 2007)
2006: The Italian Guardia di Finanza seized 138 tonnes of counterfeit olive oil. The bottles and
cans filled with the counterfeit oil looked almost identical to those used by famous producers.
(Source: Confesercenti, Contraffazione e criminalità informatica: I danni all’economia e alle
imprese)
2006: The Italian customs and the Guardia di Finanza seized a container with 15 tonnes of
counterfeit toys originating from China.
(Source: Italian Customs Agency)
63
Reference Text for Trainers
SOURCES
Business Action to Stop Counterfeiting And Piracy (BASCAP), available at:
http://www.iccwbo.org/bascap/id1127/index.html
Emballage Digest website, available at: http://www.emballagedigest.fr/
EUROPA Press Release IP/10/418, available at:
http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/418
International Federation of the Phonographic Industry (IFPI) website, available at:
http://www.ifpi.org/
Italian Customs Agency website, available at:
http://www.agenziadogane.it/wps/wcm/connect/ee/
Leicester Mercury website, available at: http://www.thisisleicestershire.co.uk/
TAXUD website, available at: http://ec.europa.eu/taxation_customs/index_en.htm
64
Reference Text for Trainers
SECTION 5
Counterfeiting at the National Level in Romania
1 Legislation on Intellectual Property Enforcement:
1.1 Implementation of the European standards and International Treaties
In order to comply with the EU standards for the protection of the IPR provided by Council
Regulation 1383/2003 of 22nd July 2003 (concerning customs action against goods suspected of
infringing certain IPRs and the measures to be taken against goods found to have infringed such
rights) at the European level, Romania has imposed the Emergency Government Ordinance No.
100/14.07.2005 concerning all IPRs.
The amended law 84/1998 published on 27 May 2010 on Trademarks and Geographical
Indications and the Emergency Government Ordinance No. 100/14.07.2005 on the enforcement
of the Industrial Property Rights have implemented the principles of Directive 2004/48/EC.
The principal copyright legislation is the Law No. 8/1996 on Copyright and Related Rights. It
entered into force on the 27 June 1996.

For being in full compliance with the acquis communautaire in the copyright field (a
precondition for the EU integration), this law has undergone the following subsequent
modifications and completions:

Law No. 285/2004 (Of.M.no.587/30.06.2004, operational on 30.07.2004)

Emergency Ordinance of the Government No. 123/2005 (Of.M.no.843/19.09.2005)

Law no. 329/2006 for the approval with modifications of E.O.G. No.123/2005
(Of.M.no.657/31.07.2006, operational on 03.08.2006)

At present, Romania’s copyright and related rights legislation is fully harmonized with
that of the EU, being in compliance with the provisions of all 8 directives of the European
Council and Parliament, in force up to now.
1.2 National legislation
Copyright and neighbouring rights

Law on Copyright (Consolidation), 14/03/1996 (2006), No. 8 (No. 329)

Law on Copyright, 14/03/1996, No. 8

Copyright (Organization, Functioning Copyright Office), Decision, 29/03/2006, No. 401
(implementing rules and regulations)
Patents

Patent Law No. 64/1991

Patent Law No. 64/1991, as republished on 8th August 2007 + implementing regulations
published on 2008

Law on Utility Models No. 350/12, December 2007

Government Ordinance No. 41/1998 on the fees in the industrial property protection field
and the conditions for using the same + amendments published on 4th January 2006

Law on transitional protection of patents for inventions (No. 93/13 May 1998)

Law on the Repression of Unfair Competition, published on 30 January 1991
65
Reference Text for Trainers
Utility Models

Utility Model Law No. 350/2007 + implementing regulations
Trademarks and Geographical Indications

Law No. 84/1998 on Marks and Geographical Indications + implementing regulations

Law No. 84/1998 on Trademarks and Geographical Indications as published in 2010

Government Ordinance No. 41/1998 on the fees in the industrial property protection field
and the conditions for using the same + amendments published on 4th January 2006
Industrial Designs

Design Law No. 129/1992 as republished in December 2007

Government Ordinance No. 41/1998 on the fees in the industrial property protection field
and the conditions for using the same + amendments published on 4th January 2006
Topographies of Semiconductor Products

Law No. 16 of 6th March 1995 on the protection of topographies of semiconductor
products, as republished on 5th December 2005

Law No. 16 of 6th March 1995 on the protection of topographies of semiconductor
products, as republished on 6th October 2006

Government Ordinance No. 41/1998 on the fees in the industrial property protection field
and the conditions for using the same + amendments published on 4th January 2006
New Plant Varieties

Law No. 255/1998 on the protection of new plant varieties + implementing regulations

Law no. 255/1998 on the protection of new plant varieties, republished on 26th January
2007

Government Ordinance No. 41/1998 on the fees in the industrial property protection field
and the conditions for using the same + amendments published on 4th January 2006
Unfair competition

Law No. 11/1991 on fighting against unfair competition
Other laws related to IPRs

The Criminal Code of Romania, republished in the Official Journal of Romania no. 65 of
16 April 1997, with subsequent amendments

The Criminal Procedure Code of Romania, republished in the Official Journal of
Romania no. 78 of 30 April 1997, with subsequent amendments.
1.3 Relevant Legislation on Organized Crime
Romania signed the United Nations Convention against Transnational Organized Crime (the
“Palermo Convention”) on 14 December 2000 and ratified it on 4 December 2002 together with
the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and
Children as well as the Protocol against the Smuggling of Migrants by Land, Sea and Air. It
joined the Protocol against the Illicit Manufacturing of and Trafficking in Firearms, their Parts and
Components and Ammunition by accession on 16th April 2004. These international legal
instruments (except for the 3rd Protocol) were signed and ratified by Romania with the Law no
565/2002.
In 2005, Romania adopted the Convention of Council of Europe for fighting against trafficking in
human beings and in accordance with this Convention, Romania adopted G.D. No. 79/2005
66
Reference Text for Trainers
which modified and complete the Law No. 678/2001 on preventing and combating trafficking in
human beings.
The adoption of the national legislation involved a whole package of legislation coming into force
in 2001-2003. It enables the law enforcement agencies to take action for diminishing this
phenomenon of illegal migration, trafficking in human beings. It also harmonizes the Romanian
legislation and strategies with the European standards and proceedings in the field:

Law No. 678/2001 regarding prevention and combating trafficking in human beings;

Governmental Decision (G. D.) No. 1216/2001 for the approval of National Action Plan
for prevention and combating trafficking in human beings;

Law No.682/2002 regarding witness protection;

Law No. 565/2002 on ratifying UN Convention against Transnational Organized Crime
and Additional Protocols;

Law No. 39/2003 regarding prevention and combating organized crime;

G.D. No. 299/2003 on approval of the Regulation for implementation of the Law
678/2001.
Human trafficking, alongside drugs and weapons trafficking, were carefully scrutinised as they
were seen as a threat against humanity. The Law No. 678/2001 on prevention and combating
the trafficking in human beings was issued in 2001.
The domestic legislation has many provisions related to the Palermo Convention in various
national Laws including:

Law No. 21/1999 regarding the prevention and penalization of money laundering,
amended by Law 78/2000 on prevention, detection and penalization of the crimes of
corruption;

Law No. 143/2000 on fighting against drugs trafficking and use, establishes the
undercover investigator and regulates controlled deliveries and the Penal Procedure
Code that legalizes the interception of telephone calls and images;

Government Emergency Ordinance No. 105/2001 regarding the state border of
Romania; - Government Emergency Ordinance No. 112/2001 which penalizes certain
acts committed abroad by Romanian citizens or by any persons without citizenship
residing in Romania.
The General Directorate for Fighting against Organized Crime and Anti-Drugs is part of the
General Inspectorate of Police, Ministry of Interior. The General Directorate has structures both
at central and territorial level. There are Directorates for Fighting against trans-border criminality
within the General Inspectorate of the Border Police.
A section within the Public Ministry has been established to fight against corruption and
organized crime. The Prosecutor’s Office to the Supreme Court of Justice and services for
combating corruption and organized crime, function at the level of Public Prosecutor’s Office of
the Appeal Courts.
Since 2000, laws have been adopted regarding the organization and functioning of the police,
the fight against organized crime, witness protection, the fight against cybercrime and the fight
against trafficking in human beings. Furthermore, these laws were adopted to implement the
acquis communautaire. The legal interception of telecommunications is a very important
investigation technique in fighting against organized crime and corruption. In order to transpose
Council Resolution of 17th January 1995 on the legal interception of telecommunications,
legislation has been adopted regulating the technical rights, restrictions and obligations of all the
authorized offices, network operators and service providers in case of legal interceptions of
telecommunications.
Law No. 161/2003 on Certain Measures to Ensure Transparency in the Exercise of Public
Dignity, of Public Office and in the Business Environment, and to Prevent and Punish Corruption
67
Reference Text for Trainers
Law No. 161/2003 states in Article 57 that "access to a computer system, as well as interception
and recording of communications taking place through computer systems may be done when
they are useful for finding the truth, and when establishing the factual situation or if identifying
the perpetrators would be impossible based on any other evidence."
In justified cases, to prevent, detect or eliminate threats to national security, the State agencies
with competences in the field of national security may intercept and record communications,
according to Law No. 535/2004 to Prevent and Suppress Terrorism, based on an authorization
(warrant) issued by a judge.
According to the national legislation in this field, the word "communications", includes "signals
sent through wire, radio, optical fibre or any other electromagnetic means, including satellite
communications, fixed networks (with circuit or packet switching, including the Internet) and land
mobile networks, systems for the conveyance of electricity, to the extent that they are used in
order to send signals, networks used for transmitting audiovisual communication and TV cable
networks, regardless of the type of information that they convey" (G.O. No. 34/2002, Article 2
(a)).
Focus on Trademarks: Definitions and Conduct
The recently amended Law no. 84/1998 provides a more specific definition of a trademark. In
particular, according to the revised Article 2 of mentioned law, any sign capable of being
graphically represented and has a distinctive character may be considered a trademark. The list
of signs which can be considered as trademarks has been extended and now includes nontraditional trademarks and combinations of them. In fact, the list explicitly mentions that the
following can be considered as trademarks: words, including names of persons, drawings,
letters, figures, figurative elements, three dimensional shapes, especially the shapes of the
goods or their packaging, colours, combination of colours, holograms, sound signals as well any
combination of herein.
Article 3 of the same law also defines:

Renowned trademark: a sign which is widely recognised throughout Romania, especially
by the segment of the population specifically targeted by the goods and services bearing
the sign in question, even if the sign in question has not yet been registered as
trademark;

Collective trademark: when the trademark distinguishes goods and/or services which
belong to the members of an association from those of another;

Certificated trademark: certifies the quality of the materials used, the means of
manufacturing, precision and/or other characteristics of goods or services;
In Romania, the state authority in charge of processing the registration of trademarks is called
State Office for Inventions and Trademarks (OSIM).
The first natural or legal person to file an application for the registration of a trademark, under
the provision of the Trademark law, will be given the exclusive right over the trademark in
question.
Chapter III of “Application for trademark registration”, states that a request for the registration of
a trademark may be filed if sent by post and/or electronically, via e-mail, individually or jointly by
any person.
Under the new provisions, the opposing procedure in trademark registration has assumed a
relevant role for the protection of previously registered trademarks. The public is entitled to
submit observations and/or even object to the registration of the trademark on the “relative
grounds for refusal” within the three months following publication of an application for the
registration of a trademark. Every petition opposing registration of a trademark must be written,
motivated and presented along with proof of payment of the corresponding fee due by law. The
OSIM notifies the applicant on all related opposing petitions. During the three months following
such notification, the applicant has the right to present a report in defence of his/her request for
the trademark to be registered.
68
Reference Text for Trainers
The OSIM examines the application by appraising its merits and, within six months from the date
of publication, decides whether the trademark should be accepted for registration or rejected. If
the application for registration complies with the necessary requirements, the trademark will be
published in the Official Bulletin for Industrial Property within two months from the date of its
registration. The applicant receives certification of the registered trademark only after the fee
has been paid.
Once a trademark has been registered, the applicant is given the exclusive right over the
trademark.
The exclusive right to the trademark holder and the applicant (only after the publication of the
trademark) to file a request for action to prevent the unauthorised use of their trademark in
commercial activities by third parties are given by Article 35 and Article 36 of the Trademark Law
respectively. Infringement of the right of protection for a trademark consists of the unlawful use,
in the trading phase, of:

a sign identical to the registered trademark on goods and/or services for which the
trademark is registered;

a sign identical or similar to a registered trademark and placed on identical and/or similar
goods, if a likelihood of misleading the public and the risk that the public may associate
the sign with a registered trademark, exists;

a sign, identical or similar to a trademark, placed on goods or services other than those
for which the trademark is registered.

In particular, under Article 35, par. 3, it is considered infringement of the trademark law:

affixing a registered trademark to goods or the packaging without the consent of the
rightful holder of the trademark;

to offer and/or sell products bearing a registered trademark without the consent of the
rightful holder of the trademark; or possess products bearing a registered trademark with
the intent to offer or perform services under the trademark in question without the
consent of the rightful holder of the trademark.
The revised Article 83 of the Trademarks and Geographical Indications Law considers
infringement, the following:

the unlawful performance of any act provided for in Article 35, which is considered civil
infringements;

acts infringing provisions of Articles 9-11 of the Community Trademark Regulation.
It is to be noted that Article 86 has been repealed. Hence, the use of trademarks and/or of
geographical indications considered to be against fair practice implemented in industrial or
commercial activities and intended to mislead consumers is no longer punishable by a term of
imprisonment from 1 month to 2 years.
2.1 Romania and the other EU Member States
69
Reference Text for Trainers
Recent statistics by TAXUD provide an overview of the number of suspect counterfeit articles
intercepted in the period 2006-2009.
Source: European Commission, Taxation and Customs Union, “Report on EU Customs Enforcement of
IPRs. Results at the EU Border-2009”, p.19
70
Reference Text for Trainers
Source: European Commission, Taxation and Customs Union, “Report on EU Customs Enforcement of
IPRs. Results at the EU Border-2009”, p.12i
2.2 Cases in Romania
 24 August 2010, “Romanian Customs Seize Chanel, Prada, Puma, Gucci, Hugo Boss,
Adidas Counterfeits”
During regular controls in the period between 8 July and 17 August 2010, the Romanian
customs officials at the port of Constanta seized a considerable quantity of goods believed to be
counterfeit, bearing the labels of well-known brands and worth over EUR 600,000 (USD
761,000).The items were shoes, backpacks, pants and baby clothes, originating in China and
were intended for companies in Hungary, Bulgaria and Moldova.
On 26 July, the customs officials seized a considerable quantity of counterfeit goods at a
shopping centre in Bucharest. They seized more than 2,000 clothing articles, 551 pairs of
sneakers and 931 perfume bottles.
(Source: Romanian Customs)
 21 July 2010, “Romanian Customs Seize Puma, Adidas, Nike, Disney Counterfeits”
During regular controls in the period between 9 June and 2 July, 2010, the Romanian customs
officials seized a considerable quantity of goods believed to be counterfeit, bearing the labels of
well-known brands, worth approximately EUR 1,250,000 (USD 1,600,000). The seizures took
place in various locations, namely in Giurgiu on 9 June, in Bechet on 14th June, at the port of
Constanta between 21 June and 1 July 2010 and in Calafat on 2 July.
(Source: Romanian Customs)
 23 June 2010, “Romanian Customs Seize Adidas, Nike, Armani Counterfeits”
During regular controls in the period between 21 May and 3 June 2010, the Romanian customs
officials seized a considerable quantity of goods believed to be counterfeit, bearing well-known
brand labels, worth approximately EUR 1,000,000 (USD 1,225,797). On 21 May the customs
officials in collaboration with members of the police ran a regular control at a commercial centre
in Bucharest, the outcome of which was the seizure of 15,885 items believed to be counterfeit,
including 13,347 clothing articles, 1,068 pairs of sneakers, 1,466 perfumes and cosmetic
71
Reference Text for Trainers
products and four wristwatches. On the same day, the customs inspectors at the port of
Constanta, on the western coast of the Black Sea, seized 20,728 items believed to be
counterfeit, including games and toys such as electric motorcycles, dolls, ponies, puzzles,
stickers, drums, playing cards, plastic laptops, minicomputers and plastic football game sets.
On 26 May the officials at the port of Constanta seized 3,258 pairs of shoes and 2,160
cardboard toys. On 28 May the officials seized 9,120 pairs of clogs, cardboard and plastic toys
on 1 June and 8,160 clothing items on 3 June. The goods were discovered in containers
originating in China and intended for companies in Romania.
(Source: Romanian Customs)
 26 April 2010, “Romania Customs Seize EUR 3,434,733 Worth of Counterfeit Goods”
During regular controls between 1 March and 31 March 2010, the customs officials at Romania’s
port of Constanta, on the western coast of the Black Sea, seized items bearing top brand
names, believed to be counterfeit, worth approximately EUR 3,434,733 (USD 4,671,952). The
seized goods include 9,500 pairs of shoes, 16,188 clothing items (jackets, caps, T-shirts),
17,050 sportswear items (shorts and T-shirts), 7,488 pairs of leggings, 8,000 leather articles
(bags, wallets, key chains), 13,790 balls, 214 printer cartridges, 416 furniture parts and 10,000
zippers.
(Source: Romanian Customs)
 30 March 2010, “Number of Seized Counterfeit Goods in Romania Triples in 2009 Compared
to 2008”
The Romanian Customs have reported that the number and the value of seized counterfeit
goods greatly increased in 2009 compared to 2008 – 70,076,524 items worth EUR 91,230,000
(USD 125,743,216) were confiscated in 2009 compared to 21,411,728 items worth EUR
41,686,277 (USD 57,471,797) the year before.
The majority of confiscated items originated in China, Turkey, Ukraine and the Republic of
Moldova. Cigarettes were the most prevalent fake goods seized in 2009 (67,564,860 pieces),
followed by clothing (1,792,589 items) and cigarette lighters (298,000 items).It has been noted,
however, that certain counterfeit items were less frequently seized in 2009 than in 2008. For
instance, in 2008, 433,903 cosmetic products were seized whereas in 2009 242,284 were
seized. The same applies to footwear (296,116 pairs in 2008; 99,783 in 2009), leather products,
pharmaceutical products and car parts.
In 2009, new forms of counterfeit items were also discovered during inspections, most notably
printer cartridges, jewellery, water filters and even nail files, which were not on the list in 2008.
(Source: Romanian Customs)
 30 March 2010, “Romanian Customs Seize Burberry, Disney, Armani, Nike, Boss
Counterfeits”
During regular controls at the borders from 19 February to 2 March 2010, the customs officials
confiscated various products carrying big brand names, believed to be counterfeit, worth
approximately EUR 2.7 million (USD 3.7 million). Between February 19 and 22, the officials at
the port of Constanta, on the western coast of the Black Sea, seized balls, sneakers and socks,
all discovered in containers originating in China.
On 1 March 2010, officials in the town of Siret, North-eastern Romania, seized various textile
products. The products originated in Turkey and were intended for a company in Ukraine. On 2
March 2010, the customs inspectors in the town of Varsand, in North-western Romania, seized
various textile products, discovered in a truck driven by a Turkish citizen.
(Source: Romanian Customs)
 23 February 2010, “Ten Percent of Car Parts in Romania Counterfeit”
At a press conference on 15 February 2010 Jean Francois Martin the quality and services
manager of Dacia, the Romanian subsidiary of Renault, stated that 10% of car parts on the
72
Reference Text for Trainers
Romanian market are counterfeit and that this had caused EUR 5 million (USD 7 million)
damage to Renault in 2009. During the previous year and a half, the Romanian customs and
border police seized almost 25,000 counterfeit Dacia car parts.
The Romanian Customs reported that there was an increase in counterfeit auto parts by 2005
within a year. Out of the 70 million products seized in 2009, the auto parts accounted for less
than 1%. Most of the seized car parts originated in China, Bulgaria and Turkey.
(Source: Financiarul.ro)
 23 February 2010, “Romanian Customs Seize EUR 160,000 Worth of Counterfeit Goods”
The Romanian Customs officials at the port of Constanta, on the western coast of the Black
Sea, seized goods suspected of being counterfeit worth approximately EUR 158,969 (USD
219,096). The confiscated goods included 78,082 glass containers bearing various marks. The
containers, used for storing fake cosmetics, originated in China and were intended for a
company located in Poland.
In an activity report published on its website, the Romanian Customs announced that in 2009
the customs officials confiscated 60,959,923 counterfeit items, worth approximately EUR
80,500,000 (USD 112,000,000).
(Source: Romanian Customs)
 20 January 2010, “Romanian Customs Seize Counterfeit Adidas and Juventus Sweatshirts”
On 14 December 2009, the Romanian Customs officials at the port of Constanta, seized
suspected counterfeit goods worth approximately EUR 204,500 (USD 296,435), which were
intended for a company in Romania. The seized goods included 2,500 sweatshirts and
tracksuits bearing Adidas and Juventus (Italian soccer club) marks.
(Source: Romanian Customs)
 22 December 2009, “Romanian Customs Seize 20 Tonnes of Fake Perfume”
On 29th November 2009, the Romanian Customs at the border crossing with Hungary in the
town of Varsand in western Romania seized, a truck containing 20 tonnes of counterfeit perfume
bottles, being driven by a Bulgarian citizen. According to the documents presented by the driver,
the goods originated from Turkey and were intended for a company in Poland.
(Source: Romanian Customs)
 21 October 2009, “Romanian Customs Seize 7,000 Counterfeit FIFA Soccer Balls”
On 30 September 2009, the Romanian Customs seized EUR 290,000 (USD 425,000) worth of
goods believed to be counterfeit. The seized items included 7,269 soccer balls bearing the
International Federation of Football Association (FIFA) sign. The customs officials at the port of
Constanta on the Black Sea discovered the counterfeit balls, in a container originating from
Pakistan and intended for a company located in Ukraine.
(Source: Romanian Customs)
 21 July 2009, “Romanian Customs Seize Counterfeit Adidas, Dior, Lacoste and Nike Items”
In the period between 29 June and 4 July 2009, Romanian customs officials seized two loads of
various counterfeit goods. On 29 June 29 2009, the customs officials found 3,613 pairs of
counterfeit Adidas sports shoes, and 6,418 items of counterfeit Nike sportswear. The goods,
worth EUR 350,000 (USD 487,113), were discovered in Bechet in southern Romania, in a truck
driven by a Bulgarian citizen. According to the documents presented to the customs officials, the
goods originated in Singapore and were intended for a company in the Netherlands.
On 4 July 2009, the customs officials seized approximately 37,900 litres of counterfeit Chanel,
Dior, Dolce & Gabbana, and Lacoste perfume. The seized goods were discovered in Varsand in
North-western Romania, in two trucks coming from Turkey. They were intended for a company
in Germany.
(Source: Romanian Customs)
73
Reference Text for Trainers
 25 June 2009, “Romanian Customs Seize Counterfeit Adidas, Armani, Chanel, Lacoste and
Nike Goods”
The Romanian Customs recently seized two loads of counterfeit goods. The first load was
confiscated on 15 June 2009, when customs officials discovered 6,000 pairs of counterfeit
Adidas sports shoes worth EUR 290,000 (USD 401,471). The customs found the counterfeit
goods at the town of Bechet in southern Romania. The goods were discovered in a truck driven
by a Bulgarian citizen. The second load was discovered on 2 June 2009 in the town of Varsand,
in North-western Romania, in a truck driven by a Greek citizen. This load contained various
counterfeit goods worth approximately EUR 86,400 (USD 119,928). The load included 519
bottles of perfume and 1,534 pairs of sport shoes, bearing various trademarks.
(Source: Romanian Customs)
 12 May 2009, “Romania Destroys 150,000 Pirated CDs, DVDs and VHS Tapes”
To mark the Intellectual Property Day on 26 April 2009, the Romanian Copyright Office (ORDA)
organized a public destruction of approximately 150,000 pirated CDs, DVDs and VHS cassettes
with music, films and computer programmes in downtown Bucharest. Officials also destroyed
approximately 200 hardware items. The value of destroyed goods was estimated at about EUR
238,000 (USD 319,044). The goods were seized from more than 1,000 persons who had either
produced or marketed them.
(Source: Romanian Customs)
 14 April 2009, “Romanian Customs Seize Counterfeit Toys and Cosmetics Worth EUR
142,700”
The first seizure took place on 27 March 2009 at the port of Constanta, when customs officers
discovered 2,045 plastic toy cars and motorcycles, bearing various trademarks. Their value was
estimated at approximately EUR 25,700 (USD 34,000). On the second occasion, on 1 April
2009, the customs officers seized 12,090 counterfeit cosmetic products of various famous
trademarks, worth approximately EUR 117,000 (USD 155,000). In both instances, the
counterfeit goods were found in containers shipped from China.
(Source: Romanian Customs)
3 Remedies and Actions Against Counterfeiting:
3.1 Border Measures
Under Article 91 of the law concerning Trademarks and Geographical Indications, the General
Department of Customs has been nominated as the State authority in charge of guaranteeing
the protection of registered trademarks and geographical indications.
The Law on Measures to Enforce IP rights Within Customs Proceedings, Law No. 344/2005, in
accordance with the Regulation 1383/2003 allows:

Ex officio measures: when the customs office has sufficient grounds for suspecting

Preventive application for action: according to Article 5 of the Regulation, the registered
owner of a trademark, the person authorized to use the trademark or their
representatives may file a request for action, valid for one year. This request allows
customs authority to seize any goods suspected of infringing the recorded rights when
imported in, or exported from, Romania. When customs suspend the release of
suspected goods, they inform the right-holder who has to decide whether to initiate civil
or criminal proceedings.

Simplified procedure: when the right holder confirms that the seized goods are
counterfeited and the importer, the holder or the designee of the goods does not
goods that infringe rights, they may suspend the release of the goods or detain them.
Subsequently, Customs will inform the owner of the allegedly infringed IP right, the
importer, holder or designee of the goods.
74
Reference Text for Trainers
expressly object to destruction of the seized goods, the customs authorities may destroy
the alleged infringing goods. The operation is carried out only by companies approved by
authorities, at the expense of the rightful owner of the trademark. As such actions are
often costly, the rightful owners of trademarks tend to choose this procedure only if the
quantity of seized goods to be destroyed is significant.
3.2 Civil Sanctions
In order to enhance the quality of the judicial decision, Bucharest Tribunals have the exclusive
jurisdiction over trademark cancellation and revocation cases. Furthermore, special panels have
also been created at the Bucharest Court of Appeal and the High Court of Justice and
Cassation.
Due to its entrance into the EU, Romanian anti-counterfeiting legislation has become more rigid
in recent years. Government Ordinance on Enforcing IP Rights, No. 100/2005, which
implements the Directive 2004/48 allows the owner to request the following responses:
 Preliminary measures: under Article 9, in order to prevent any other violation, when there is a
suspicion of infringement of an IPR, the complainant may request an interim injunction against
the infringer or against an intermediary whose services are used by the infringer. The competent
authority may also order the imposition of a guarantee intended to ensure the compensation of
the owner. When the injured party proves the existence of circumstances that could make the
recovery of damages impossible, the competent court could order the blocking of bank accounts
and other goods in possession of the alleged infringer. The release of the banking, fiscal or
commercial documents could also be ordered. When any delay is liable to cause irreparable
prejudice to the trademark’s owner, the president of the court can dispose provisional measures
inaudita altera parte, with an immediate communication to the parties involved.
 Proceedings on merits: When an infringement is established, the registered owners can
obtain the following corrective measures:

A cease and desist order by a presidential order. The violation of the forbidding measure
will be considered a new violation of the protected trademark.

Article 11 allows for a court ruling to order the removal of counterfeited goods from
commercial district networks and/or from commercial circuits. This article also allows for
the destruction of counterfeited goods, as well as of the materials used in the
manufacturing of such goods. All expenses are to be paid by the offender/infringer.
The court ruling should take into account the proportionality between the severity of the act and
the corrective measures applied. Article 13 of the same law states that if the offender/infringer
acted unintentionally then he/she may ask for the right to compensate the injured party for the
damage caused by his/her actions, as by acting unintentionally the execution of the measures
cause a disproportional prejudice and the payment of the compensation is reasonably
satisfactory;

Damages: the injured party may claim damages-interests corresponding to the prejudice
the party suffered as a result of the violation of its rights. Beside damages, when the
infringer acts intentionally, the court may rule income coverage.

Broadcast information regarding the court ruling as a partial or integral part of the
ordinance, on request of the injured party and expenses covered by the
offender/infringer. The party who loses the case is obliged to bear all legal expenses,
including those for the court hearing and those accumulated by the winning party.
It is important to note that Government Ordinance No. 731 of 4th July 2007 provides a procedure
for the destruction of goods which infringe an IPR. Under Article 34, the rightful owner of the
trademark whose rights have been violated may appoint a commission consisting of one
representative from the General Directorate for Public Finance in the county.
75
Reference Text for Trainers
In Bucharest the commission consists of: one representative of the holder of the goods; one
representative of the General Police Inspectorate of the county or the General Police Directorate
from Bucharest; one representative from the Consumer Protection Office of the county or of
Bucharest and; one representative from the Environmental Protection Agency in the county.
Once formed, the commission will decide on a location where the destruction of the
counterfeited goods is to take place. If necessary, specialised services for the destruction of the
goods will be used. Once the counterfeited goods have been destroyed, the commission must
complete a destruction report, 3 copies of which must then be signed by each commission
member.
Civil measures have been adopted regarding copyright to protect the copyright holder. Article
139 of the Law 8/1996 provides that the owners of copyright may:

claim damages for the redressing of the prejudice caused (Article 139 (1));

demand immediate measures to be taken for preventing the imminent occurrence of
damage through the violation of a right, for ensuring the remedy of the damage or for
maintaining evidence (article 139 (3));

ask for the seizure of objects and documents that may constitute evidence of the
infringing of copyright or neighbouring rights (article 139 (10));

apply for the ordering of the remittance of the proceeds from unlawful deed (article 139
(14);

apply for the destruction or removal of the illegally made copies or equipment and means
intended for the perpetration of the unlawful deed (article 139 (14)).
In establishing the damages, the court considers criteria such as the negative economic
consequences or whether they represent triple the amounts that would have been lawfully owed
for the type of use that made the object of the illicit deed (article 139(2)).
3.3 Criminal sanctions
After negotiations concerning Romania’s entry into the EU, Romania sought to improve state
activities carried out by the police and the Prosecutor’s Office. As a result, a specialized
department was created to prevent counterfeiting and the infringement of IPRs.
Whoever commits an offence under Article 83 shall be sentenced to a term of imprisonment
from 6 months to 5 years.
If the crime committed jeopardises the health and/or safety of the consumers, the
offender/infringer shall be sentenced to a term of imprisonment from 2 to 10 years and the
disentitlement of specific rights.
When an offender is found guilty of having carried out activities which involve the counterfeiting
of goods, the rightful owner of the associated trademark may present a claim to the court asking
that the offender/infringer pay the damages sustained due to losses borne by the rightful owner
of the trademark, along with payment for all expenses incurred by the Romanian State during
the criminal proceedings.
The revised paragraph 1 of Article 84 of Trademarks Law permits criminal investigation offices
to request the implementation of ex officio measures during the preliminary procedure in order
to deter the trade in products bearing counterfeited trademarks and safeguard evidence. During
the investigative stage of criminal proceedings, the Prosecutor assigned to the case may order
the seizure of counterfeits, assets and bank accounts of alleged infringers.
Since it is thought that the State suffers most damages as a result of counterfeiting activities,
proceedings are conducted by State institutions. Consequently these criminal proceedings tend
to be slower than civil proceedings and the time required to complete investigation takes an
average of three to six months.
76
Reference Text for Trainers
The rightful owners of trademarks which have been counterfeited, therefore, tend to opt for
criminal proceedings, particularly when they lack information on the infringer and/or when there
is a major case of infringement. In cases where there is insufficient information, article 90 allows
the trademark owners, as well the Ministry of Agriculture and Rural Development, to file a
request in court asking that the individual(s) accused of violating the IPR be compelled to
provide information regarding the origin and the commercial network of the unauthorised
distribution of the alleged counterfeits; the name of manufacturers and/or traders and the
quantity of the product manufactured, delivered or ordered.
Criminal remedies also exist in the case of copyright infringement. The Court may make the
following sentences:

imprisonment;

criminal fine;

seizure or destruction of the goods or remedies for the injured party.
Pirated goods are pieces of evidence which prove a criminal offence. The pieces of evidence
are governed by articles 94-95 of Criminal Procedure Code of Romania.
During the criminal proceedings (but not in the preliminary procedure), the prosecutor may order
security measures for the pirated goods in order to assure a remedy for the injured party.
If the criminal proceeding is completed, the prosecutor will refer the case to the court. The court
may impose an imprisonment or a criminal fine. The court may also order for the seizure and
destruction of the goods and award remedies for the injured party.
In the Romanian judicial system, the penal regulations are also applied for the legal individuals if
the criminal offence was carried out on behalf of, or for the benefit of that legal person. The
criminal liability of the legal person does not exclude the criminal liability of the natural person
who committed the same criminal offence.
77
Reference Text for Trainers
LEVEL OF CRIMINAL PENALTIES IN CASES OF INFRINGEMENT OF IPR
Copyright
Legal
Basis
Constituent Elements Of The
Offence
Nature And Level Of The Penalty
Aggravating Circumstances
Nature And Level Of Penalties
Assistance To Investigations By The Rights
Owners
Complaint
Needed For
Public Action
Art.139
-Making of pirated goods for
distribution without aiming
directly or indirectly material
benefits;
-Imprisonment from 2 to 5 years;
-commercial purpose141 is
sanctioned with imprisonment
from 3 to 12 years;
-Measures to prevent the imminent
occurrence of damage through the violation
of a right;
no complaint
needed
-involvement of an organized
criminal group is sanctioned
with imprisonment from 5 to 15
years;
-Measures to ensure the remedy of the
damage (on movable and immovable
assets);
§§
1,3, 6,7;
Law No.
8/1996
-Placing of the pirated goods
under a final import or expert
regime, a suspensive customs
regime or in free zones;
-Introduction of pirated goods
in the domestic market
whatsoever.
-fine 100 to 50,000 RON for natural persons;
2,500 to 2,000,000 RON for legal persons.
Other complementary penalties against legal
persons:
-dissolution;
-suspension from 3 months to 1 year of the whole
activity or suspension from 3 months to 3 years
of one of the activities related to the committed
offence;
-shutting down certain local offices from 3
months to 3 years;
-cause of very serious
consequences142 is
sanctioned with imprisonment
from 5 to 15 years.
-Devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-Owners of the presumably infringed rights
or their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts.143
-interdiction of participating to public procurement
procedures for a period from 1 to 3 years;
-publication or dissemination of the conviction
judgment.
141
For the purposes of the Law on Copyright and Related Rights, commercial purpose means aiming at obtaining, directly or indirectly, an economic or material benefit. The
commercial purpose shall be presumed if the pirated good is identified at the headquarters, working locations, in the annexes thereof or in the means of transport used by the legal
persons that have in their object of activity the reproduction, distribution, rental, storing or transport of products involving copyright or related rights (Art. 139, §§ 9 and 10 of Law No.
8/1996).
142
“Very serious consequences” means a material damage bigger than 200,000 RON or a very serious disorder in the activity performed by a public authority or by any other
entities mentioned in article 145 of the Criminal Code or by another legal or natural person (Art. 146 of the Criminal Code). In order to evaluate the seriousness of the consequences, the
calculation of the material damage is made by taking into account the identified pirated good and the price per unit of the original products, cumulated with the amounts illegally earned
by the offender (Art. 139, §6 of Law No. 8/1996).
78
Reference Text for Trainers
Art.139,
§§
2,3,6,7
-Offer, distribution, possession,
storage and transportation for
the purpose of distribution;
Law No.
8/1996
- Possession of pirated goods
for the purpose of using them
by public communication at the
working locations of the legal
persons.
-Imprisonment from 1 to 5 years;
-Fine 100 to 50,000 RON for natural persons;
2,500 to 2,000,000 RON for legal persons (+
other complementary penalties for legal persons
mentioned above)
-commercial purpose is
sanctioned with imprisonment
for 3 to 12 years;
-Measures to prevent the imminent
occurrence of damage through the violation
of a right;
-involvement of an organized
criminal group is sanctioned
with imprisonment for 5 to 15
years;
-Measures to ensure the remedy of the
damage (on movable and immovable
assets);
-cause of very serious
consequences is sanctioned
with imprisonment for 5 to 15
years.
no complaint
needed
-Devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-Owners of the presumably infringed rights
or their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts (+ the general provisions
mentioned in fn.5).
143
In addition, the Criminal Procedure Code contains the following general provisions, applicable to all offences: (1) the possibility for all parties to assist to the following
investigation acts: Field investigation - according to the Art. 129, § 2 of Criminal Procedure Code “…The investigation is performed in the presence of the parties, when necessary.”; Field
reconstruction of the way and conditions in which the deed has been committed (Art. 130, § 2 of Criminal Procedure Code); Expertise (Art. 120, § 4 of Criminal Procedure Code); (2) the
rights of parties’ defenders to assist all investigation acts which imply the hearing or the presence of the parties that are defended and to draw up claims and memories (Art. 173 of
Criminal Procedure Code). These provisions are applicable in case of all infringements of copyright, rights related to copyright and sui generis rights of a database maker.
79
Reference Text for Trainers
Art.139,
§§4,6,7
-Rental or offer for rental of
pirated goods.
Law No.
8/1996
Imprisonment from 3 to 12 years (+ other
complementary penalties for legal persons
mentioned above)
-involvement of an organized
criminal group is sanctioned
with imprisonment for 5 to 15
years;
-cause of very serious
consequences is sanctioned
with imprisonment for 5 to 15
years.
-Measures to prevent the imminent
occurrence of damage through the violation
of a right;
no complaint
needed
-Measures to ensure the remedy of the
damage (on movable and immovable
assets);
-Devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-owners of the presumably infringed rights or
their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts (+ the general provisions
mentioned in fn.5).
Art.139,
§§5,7,
Law No.
8/1996
-Promotion of pirated goods by
any means and any modalities,
including the use of public
announcements or electronic
means of communication or by
public exhibition or
presentation of lists or
catalogues of such products.
- Imprisonment from 6 months to 3 years;
-Fine 100 to 50,000 RON for natural persons;
2,500 to 2,000,000 RON for legal persons (+
other complementary penalties for legal persons
mentioned above)
-Involvement of an organized
criminal group is sanctioned
with imprisonment for 5 to 15
years.
-Measures to prevent the imminent
occurrence of damage through the violation
of a right;
no complaint
needed
-Measures to ensure the remedy of the
damage (on movable and immovable
assets);
-Devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-Owners of the presumably infringed rights
or their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts (+ the general provisions
mentioned in fn.5).
80
Reference Text for Trainers
Art.139,
Law No.
8/1996
-Refusal to declare the source
of the pirated goods or of the
pirated access control devices
used for conditioned access
programme services
- Imprisonment from 3 months to 2 years;
/
-Fine 100 to 50,000 RON for natural persons;
2,500 to 2,000,000 RON for legal persons (+
other complementary penalties for legal persons
mentioned above)
-measures to prevent the imminent
occurrence of damage through the violation
of a right;
no complaint
needed
-measures to ensure the remedy of the
damage (on movable and immovable
assets);
-devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-owners of the presumably infringed rights or
their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts (+ the general provisions
mentioned in fn.5).
Art.139,
Law No.
8/1996
-making available to the public,
including through the Internet
or other computer networks,
without the consent of the right
owners, products involving
copyrights (…) or copies thereof
regardless the physical
storage medium, so that the
public may access them from
any place and at any time,
individually chosen by them.
- Imprisonment from 1 to 4 years;
-Fine 100 to 50,000 RON for natural persons;
2,500 to 2,000,000 RON for legal persons (+
other complementary penalties for legal persons
mentioned above)
/
-measures to prevent the imminent
occurrence of damage through the violation
of a right;
no complaint
needed
-measures to ensure the remedy of the
damage (on movable and immovable
assets);
-devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-owners of the presumably infringed rights or
their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts (+ the general provisions
mentioned in fn.5).
81
Reference Text for Trainers
Art.139,
Law No.
8/1996
-unauthorized reproduction of
computer programmes on
computer systems in any
through installation, storing,
running or execution,
displaying or transmission
within the internal network
-Imprisonment from 1 to 4 years;
/
-Fine 100 to 50,000 RON for natural persons;
2,500 to 2,000,000 RON for legal persons (+
other complementary penalties for legal persons
mentioned above)
-measures to prevent the imminent
occurrence of damage through the violation
of a right;
no complaint
needed
-measures to ensure the remedy of the
damage (on movable and immovable
assets);
-devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-owners of the presumably infringed rights or
their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts (+ the general provisions
mentioned in fn.5).
Art.141,
Law No.
8/1996
-unlawfully claim of the
authorship of a work or the
disclosure of a work to the
public under another name
than the one decided by the
author.
-Imprisonment from 3 months to 5 years;
-Fine of 2,500 to 50,000 RON (+ other
complementary penalties for legal persons
mentioned above)
/
-measures to prevent the imminent
occurrence of damage through the violation
of a right;
no complaint
needed
-measures to ensure the remedy of the
damage (on movable and immovable
assets);
-devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-owners of the presumably infringed rights or
their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts (+ the general provisions
mentioned in fn.5).
82
Reference Text for Trainers
Art.143,
§§ 1 and
2, Law
No.
8/1996
- the unlawful production,
import, distribution, rental, offer
for sale or rent, or possession
for commercial purposes of
devices or components that
allow the neutralization of the
technological protection
measures or perform services
which lead to the neutralization
of some technological
protection measures, including
in the digital environment;
- the removal or modification of
any electronic information
regarding the applicable
copyright (…) regime from the
works or other protected
products for commercial
purposes without the
permission of the rights
owner;.the distribution, import
for distribution, radio broadcast
or public of works or other
protected products from which
any electronic information
regarding the applicable
copyright or related rights
regime has been removed or
modified without authorization,
so that anybody can access by
means of digital technology
-Imprisonment from 6 months to 3 years;
- Fine 100 to 50,000 RON for natural persons;
2,500 to 2,000,000 RON for legal persons (+
other complementary penalties for legal persons
mentioned above)
/
-measures to prevent the imminent
occurrence of damage through the violation
of a right;
no complaint
needed
-measures to ensure the remedy of the
damage (on movable and immovable
assets);
-devolve upon competent authorities the
goods suspected for violation of a right
granted by Law 8/1996 to prevent their
introduction in the commercial circuit;
-owners of the presumably infringed rights or
their representatives are entitled to
participate in the enforcement of the
measures taken to ensure the evidence or
establish the facts (+ the general provisions
mentioned in fn.5)
83
Reference Text for Trainers
Rights related to Copyright
legal
basis
constituent elements of
the offence
nature and
penalty
level
of
the
aggravating
circumstances
nature
and
level
assistance to investigations
by the rights owners
complaint
needed
for public action
of penalties
Art.
<0}139
Law No.
8/1996
Making available to the public,
including through the Internet or
other computer networks, without
the consent of the right owners, of
products involving (…) related rights
(…) or copies thereof, regardless the
physical storage medium, so that the
public may access these products
from any place and at any time,
individually chosen by them.
-Imprisonment from 1 to 5
years;
-Fine 100 to 50,000 RON for
natural persons; 2,500 to
2,000,000 RON for legal
persons.
Other
penalties
persons:
complementary
against
legal
- dissolution;
- suspension from 3 months
to 1 year of the whole
activity or suspension from 3
months to 3 years of one of
the activities related to the
committed offence;
/
- measures to prevent the imminent occurrence of
damage through the violation of a right;
no
complaint
needed
- measures to ensure the remedy of the damage
(on movable and immovable assets);
-devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the
commercial circuit;
- owners of the presumably infringed rights or their
representatives are entitled to participate in the
enforcement of the measures taken to ensure the
evidence or establish the facts (+ the general
provisions mentioned in fn.5).
- shutting down certain local
offices from 3 months to 3
years;
- interdiction of participating
to
public
procurement
procedures for a period from
1 to 3 years;
-publication or dissemination
of the conviction judgment.
84
Reference Text for Trainers
Art
<0}140
Law No.
8/1996
Acts committed without the
authorization of the rights owner:
-Imprisonment from 1 month
to 2 years;
a) reproduction of works or products
involving related rights;
-Fine 100 to 50,000 RON for
natural persons; 2,500 to
2,000,000 RON for legal
persons (+ other
complementary penalties for
legal persons mentioned
above)
b) distribution, rental or import, on
domestic market, of copies of works
or products involving related rights,
other than those of the pirated
goods;
/
- measures to prevent the imminent occurrence of
damage through the violation of a right;
no
complaint
needed
- measures to ensure the remedy of the damage
(on movable and immovable assets);
- devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the
commercial circuit;
- owners of the presumably infringed rights or their
representatives are entitled to participate in the
enforcement of the measures taken to ensure the
evidence or establish the facts (+ the general
provisions mentioned in fn.5).
c) communication to the public of
the works or products involving
related rights;
d) broadcasting of works or products
involving related rights
e) cable retransmission of the works
or products involving related rights;
f) making of derivative works;
g) recording of performances or
radio or television broadcasts for
commercial purpose;
- infringement of Art. 134
- the unlawful production, import,
distribution or rental, offer for sale or
rent, or possession for commercial
purposes of devices or components
that allow the neutralization of the
technological protection measures or
performs services which lead to the
neutralization of some technological
protection measures, including in the
digital environment;
imprisonment from 6 months
to 3 years; fine 100 to 50,000
RON for natural persons;
2,500 to 2,000,000 RON for
legal persons
(+
other
complementary
penalties for legal persons
mentioned above)
/
- measures to prevent the imminent occurrence of
damage through the violation of a right;
no complaint
needed
- measures to ensure the remedy of the damage
(on movable and immovable assets);
- devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the
commercial circuit;
- owners of the presumably infringed rights or
their representatives are entitled to participate in
the enforcement of the measures taken to ensure
the evidence or establish the facts
85
Reference Text for Trainers
(+ the general provisions mentioned in fn.5).
- the deed of a person who, without
having the consent of the right
owner and knowing or having to
know that in this way he/she
permits, facilitates, causes or hides
an infringement of a right provided
for by the present law:
/
a) removes or modifies, for
commercial purposes, from the
works or other protected products
any electronic information regarding
the applicable (…) related rights
regime;
b) distributes, imports for
distribution, radio broadcasts or
publicly communicates or available
to the public works or other
protected products from which any
electronic information regarding the
applicable (…) related rights regime
has been removed or modified
without authorization, so that
anybody can access them in any
place and at any time individually
chosen by them, without having the
right to do so, by means of digital
technology.
86
Reference Text for Trainers
Sui generis right of database maker
legal basis
constituent elements of the
offence
nature and level of the penalty
Art.139, Law No.
8/1996
making available to the public
products involving (…) sui generis
rights of the makers of databases
or copies thereof regardless the
physical medium and including
through the Internet or other
computer networks, without the
consent of the owners of rights,
so that the public may access
them from any place and at any
time
imprisonment from 1 to 4 years; fine
100 to 50,000 RON for natural
persons; 2,500 to 2,000,000 RON for
legal persons (+ the provisions for
legal persons mentioned in fn. 2).
illicit production, import,
distribution, possession,
installation, maintenance or
replacement of the access control
devices, either original or pirated
ones, used for the conditioned
access programme services
- imprisonment from 2 to 5 years; fine 100 to 50,000 RON for natural
persons; 2,500 to 2,000,000 RON for
legal persons (+ the provisions for
legal persons mentioned in fn. 2).
Art.141, §§ 1 and
5, Law No.
8/1996
aggravating
circumstances
nature and level
of penalties
assistance to investigations by the rights owners
complaint
needed
for
public action
/
- measures to prevent the imminent occurrence of
damage through the violation of a right;
no complaint
needed
- measures to ensure the remedy of the damage (on
movable and immovable assets);
- devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the commercial
circuit;
- owners of the presumably infringed rights or their
representatives are entitled to participate in the
enforcement of the measures taken to ensure the
evidence or establish the facts (+ the general
provisions mentioned in fn.5).
commercial
purpose
is
sanctioned
with
imprisonment from
3 to 10 years.
- measures to prevent the imminent occurrence of
damage through the violation of a right;
no complaint
needed
- measures to ensure the remedy of the damage (on
movable and immovable assets);
- devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the commercial
circuit;
- owners of the presumably infringed rights or their
representatives are entitled to participate in the
enforcement of the measures taken to ensure the
evidence or establish the facts
(+ the general provisions mentioned in fn.5).
Art.141, §§ 2 and
5, Law No.
8/1996
unlawful connection to the
conditioned access programmes
- imprisonment from 6 months to 3
years;
- fine 100 to 50,000 RON for natural
commercial
purpose
is
sanctioned
with
imprisonment from
- measures to prevent the imminent occurrence of
damage through the violation of a right;
no complaint
needed
- measures to ensure the remedy of the damage (on
87
Reference Text for Trainers
persons; 2,500 to 2,000,000 RON for
legal persons (+ the provisions for
legal persons mentioned in fn. 2).
3 to 10 years.
movable and immovable assets);
- devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the commercial
circuit;
- owners of the presumably infringed rights or their
representatives are entitled to participate in the
enforcement of the measures taken to ensure the
evidence or establish the facts (+ the general
provisions mentioned in fn.5).
Art.141, §3, Law
No. 8/1996
- use of public announcements or
electronic communication means
for promotion of pirated control
devices for access to conditioned
access programme services;
Imprisonment from 1 month to 3
years (+ the provisions for legal
persons mentioned in fn. 2).
/
sale or rental of pirated access
control devices
no complaint
needed
- measures to ensure the remedy of the damage (on
movable and immovable assets);
-devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the commercial
circuit;
- unlawful exhibition or
presentation to the public of the
information needed to make
devices able to ensure the
unauthorized access to
conditioned access programme
services or intended for the
unauthorized access in any mode
to such services
Art.141, §4, Law
No. 8/1996
- measures to prevent the imminent occurrence of
damage through the violation of a right;
- owners of the presumably infringed rights or their
representatives are entitled to participate in the
enforcement of the measures taken to ensure the
evidence or establish the facts (+ the general
provisions mentioned in fn.5).
Imprisonment from 3 to 10 years (+
the provisions for legal persons
mentioned in fn. 2).
/
- measures to prevent the imminent occurrence of
damage through the violation of a right;
no complaint
needed
- measures to ensure the remedy of the damage (on
movable and immovable assets);
- devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the commercial
circuit;
- owners of the presumably infringed rights or their
representatives are entitled to participate in the
enforcement of the measures taken to ensure the
evidence or establish the facts (+ the general
88
Reference Text for Trainers
provisions mentioned in fn.5).
Art.143, §1, Law
No. 8/1996
- unlawful production, import,
distribution or rental, offer for sale
or rent and possession for
commercial purposes of devices
or components that allow the
neutralization of the technological
protection measures;
- performance of services which
lead to the neutralization of some
technological protection
measures, including in the digital
environment
imprisonment from 6 months to 3
years; fine 100 to 50,000 RON for
natural persons; 2,500 to 2,000,000
RON for legal persons (+ the
provisions
for
legal
persons
mentioned in fn. 2).
/
- measures to prevent the imminent occurrence of
damage through the violation of a right;
no complaint
needed
- measures to ensure the remedy of the damage (on
movable and immovable assets);
- devolve upon competent authorities the goods
suspected for violation of a right granted by Law
8/1996 to prevent their introduction in the commercial
circuit;
- owners of the presumably infringed rights or their
representatives are entitled to participate in the
enforcement of the measures taken to ensure the
evidence or establish the facts (+ the general
provisions mentioned in fn.5).
89
Reference Text for Trainers
Rights of the creator of the topographies of a semiconductor product
legal
basis
constituent elements of the offence
Art.
38,
Law No.
16/1995144
Unauthorized commercial exploitation or
production of a protected topography or
semiconductor product embedding a
protected topography or a circuit
element
embedding
such
a
semiconductor product, as far as the
said element still contains a topography.
This act is considered as offence if
committed after the date of publication
of the topography registration in the
National Register of Topographies.
nature and level of the
penalty
- Imprisonment from 3 months
to 2 years;
aggravating
assistance to investigations by the rights owners
circumstance
s nature and
level
of
penalties
/
complaint needed
for public action
- possibility for the rights holder to assist the following no complaint needed
acts:
Field investigation: “…The investigation is performed in
the presence of the parties, when necessary.” Art.129,
§2, Criminal Procedure Code
- Fine from 10,000 to 30,000
RON (and upon the right
holder’s request: confiscation
or destruction of the counterfeit
products and confiscation or
destruction of the equipment
used directly for committing
the offence)145
Field reconstruction of the way and conditions under
which the act has been committed; Art.130, §2,
Criminal Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all
investigation acts which imply the hearing or the
presence of the parties that are defended and to draw
up claims and memories; Art.173, Criminal Procedure
Code.
Art. 5,
§1 (a) (g),
Law
No.
11/1991146
- making use of an (…) integrated circuit
topography (…),able to cause confusion
with the one legitimately employed by
another trader;
imprisonment from 6 months to
2 years; fine from 2,000 to
5,000 RON
- manufacture, import, export, storage,
sale or offer for sale of goods/services
bearing deceptive indications regarding
[… ] integrated circuit topographies […],to
misleading other traders and consumers
/
- possibility for the rights holder to assist the following
acts:
Field investigation: “…The investigation is performed in
the presence of the parties, when necessary.” Art.129,
§2, Criminal Procedure Code
Field reconstruction of the way and conditions under
which the act has been committed; Art.130, §2,
Criminal Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all
144
145
146
public action upon the
injured party’s
preliminary complaint,
upon notification by the
local Chamber of
Commerce and
Industry or by another
professional
organization or upon
notification of agents
authorised by the
Competition Office
Law on the protection of topographies of semiconductor products.
Additional sanctions applicable according to art. 38, §4 of Law 16/1995.
Law on the Fight against Unfair Competition.
90
Reference Text for Trainers
investigation acts which imply the hearing or the
presence of the parties that are defended and to draw
up claims and memories; Art.173, Criminal Procedure
Code
91
Reference Text for Trainers
Trademark rights
legal basis
constituent elements of the offence
nature and level of the penalty
aggravating
circumstances
nature
and
level
of
penalties
Art.83,
§1
(a),
(b);
Art.35, Law
No.
84/1998147
counterfeiting/infringement148,
imitation or unlawful use of a
trademark with the intent of
misleading the public as to the
quality of the goods or services to
which the trademark applies;
imprisonment from 3 months to 3
years or fine of 1,500 RON (also
applicable:
confiscation
or
destruction of the counterfeit
products and confiscation or
destruction of materials and
equipment used directly to
commit the infringement)149
/
- the unlawful marketing of a
product under a trademark that is
identical or similar to a trademark
registered for identical or similar
products, causing prejudice to the
owner of the registered trademark
Art.86, Law
No.84/1998
Unfair competition: “any use of imprisonment from 1 month to 2
trademarks (…) contrary to honest years; fine of 1,500 RON
practices in industrial or commercial
activities, with an attempt to mislead
consumers”
assistance to investigations by the rights owners
complaint needed
public action
- possibility for the rights holder to assist the following acts:
no complaint needed
for
Field investigation: “…The investigation is performed in the
presence of the parties, when necessary.” Art.129, §2,
Criminal Procedure Code
Field reconstruction of the way and conditions under which
the act has been committed; Art.130,
§2, Criminal
Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all investigation
acts which imply the hearing or the presence of the parties
that are defended and to draw up claims and memories;
Art.173, Criminal Procedure Code
/
- possibility for the rights holder to assist the following acts:
Field investigation: “…The investigation is performed in the
presence of the parties, when necessary.” Art.129, §2,
Criminal Procedure Code
preliminary complaint of
the injured party needed
Field reconstruction of the way and conditions under which
the act has been committed; Art.130,
§2, Criminal
147
Law on Trademarks and Geographical Indications.
The performance of any act referred to in the second paragraph of Article 35 by a person not having the consent of the owner of the registered trademark shall constitute such an
infringement, meaning the use in the course of trade of:
(a) any sign which is identical with the trademark in relation to goods or services which are identical with those for which the trademark is registered;
(b) any sign where, because of its identity with or similarity to the trademark or the identity or similarity of the goods or services on which the sign is affixed with the goods or services for
which the trademark is registered, there exists a likelihood of confusion on the part of the public, including the likelihood of association between the sign and the trademark;
(c) any sign which is identical with or similar to the trademark in relation to goods or services which are not similar to those for which the trademark is registered, where the latter has a
reputation in Romania and where the use of that sign without due cause could take unfair advantage of the distinctive character or the repute of the trademark or where such use would cause
prejudice to the trademark owner.
149 Additional sanctions applicable according to art. 84 of Law 84/1998.
148
92
Reference Text for Trainers
Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all investigation
acts which imply the hearing or the presence of the parties
that are defended and to draw up claims and memories;
Art.173, Criminal Procedure Code
Legal
Basis
Constituent Elements Of The
Offence
Nature And Level Of The Penalty
Art. 50,
Law No.
129/1992
The unlawful claiming of the
status of author of an industrial
design
- Imprisonment from 6 months to 2
years;
150
Aggravating
Circumstances
/
Assistance To Investigations By The Rights Owners
Complaint Needed For
Public Action
- possibility for the rights holder to assist the following
acts:
no complaint needed
Field investigation: “…The investigation is performed in
the presence of the parties, when necessary.” Art.129,
§2, Criminal Procedure Code
- Fine of 1,500 to 3,000 RON
Field reconstruction of the way and conditions under
which the act has been committed; Art.130, §2, Criminal
Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all
investigation acts which imply the hearing or the
presence of the parties that are defended and to draw up
claims and memories; Art.173, Criminal Procedure Code
Art. 50,
Law No.
129/1992
150
counterfeiting of the industrial
design:
the
unlawful
reproduction of an industrial
design for the purpose of
manufacturing products with an
identical
appearance,
manufacturing, offering for
sale, selling, importing, using or
storing such products for the
- Imprisonment from 6 months to 2
years;
- Fine of 1,500 to 3,000 RON (also
applicable:
confiscation
or
destruction of the counterfeit
products and confiscation or
destruction of materials and
equipment used directly to commit
/
- possibility for the rights holder to assist the following
acts:
no complaint needed
Field investigation: “…The investigation is performed in
the presence of the parties, when necessary.” Art.129,
§2, Criminal Procedure Code
Field reconstruction of the way and conditions under
which the act has been committed; Art.130, §2, Criminal
Procedure Code
Industrial Design Law.
93
Reference Text for Trainers
purpose
of
putting
into
circulation or using them,
without having the consent of
the owner of the certificate of
registration of the industrial
design, during the period of
validity thereof.
151
the infringement)151
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all
investigation acts which imply the hearing or the
presence of the parties that are defended and to draw up
claims and memories; Art.173, Criminal Procedure Code
Additional sanctions applicable according to Art. 52 of Law 129/1992.
94
Reference Text for Trainers
Design rights
Patent rights, including rights derived from supplementary protection certificates 152
Legal Basis Constituent Elements Of The Nature And Level Of The Penalty
Offence
Art.
58,
Law
No.
64/1991153
unlawful claim of the
status of inventor
- imprisonment from 6 months to 2
years;
Aggravating Circumstances
/
Assistance To Investigations By The Rights Owners
- possibility for the rights holder to assist the following acts:
Field investigation: “…The investigation is performed in the
presence of the parties, when necessary.” Art.129, §2,
Criminal Procedure Code
- fine of 5,000 to 10,000 RON
Complaint
Needed For
Public Action
no complaint
needed
Field reconstruction of the way and conditions under which
the act has been committed; Art.130,
§2, Criminal
Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all investigation
acts which imply the hearing or the presence of the parties
that are defended and to draw up claims and memories;
Art.173, Criminal Procedure Code
Art. 59, Art.
32,
§2,
Law
No.
64/1991
counterfeiting consisting
of the following acts:
- Imprisonment from 3 months to 2
years;
- manufacture, use, offer
for sale, sale or import for
the purposes of use, offer
for sale or sale, where the
subject matter of the
patent is a product;
- Fine of 10,000 to 30,000 RON (also
applicable: confiscation or destruction
of the counterfeit products and
confiscation
or
destruction
of
materials and equipment used directly
to commit the infringement)154
- use of the patented
process and use, offer for
sale, sale or import for
these purposes of the
/
- possibility for the rights holder to assist the following acts:
Field investigation: “…The investigation is performed in the
presence of the parties, when necessary.” Art.129, §2,
Criminal Procedure Code
no complaint
needed
Field reconstruction of the way and conditions under which
the act has been committed; Art.130,
§2, Criminal
Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all investigation
acts which imply the hearing or the presence of the parties
that are defended and to draw up claims and memories;
152
Law 350/2007 on utility models (Art. 28) makes reference to the provisions regarding patent rights protection stipulated within the Patent Law No. 64/1991, which shall be applied
accordingly.
153
Patent Law.
154
Additional sanctions applicable according to Art. 59, §3, Law 64/1991.
95
Reference Text for Trainers
product directly obtained
by the patented process,
where the subject matter
of the patent is a process
Art.
62,
Law
No.
64/1991
disclosure by the staff of
the OSIM and also by
other persons whose
activities
deal
with
inventions
of
the
information contained in
patent applications prior
to the publication thereof
Art.173, Criminal Procedure Code
imprisonment from 3 months to 2
years
/
- possibility for the rights holder to assist the following acts:
Field investigation: “…The investigation is performed in the
presence of the parties, when necessary.” Art.129, §2,
Criminal Procedure Code
no complaint
needed
Field reconstruction of the way and conditions under which
the act has been committed; Art.130,
§2, Criminal
Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all investigation
acts which imply the hearing or the presence of the parties
that are defended and to draw up claims and memories;
Art.173, Criminal Procedure Code
96
Reference Text for Trainers
Geographical indications
Legal Basis
Constituent
Elements
Of The Offence
Nature And Level Of The Penalty
Art. 83, §1 (c),
Law
No.
84/1998155
- marketing of a product
under a geographical
indication
suggesting
that
the
concerned
product originates from
a geographical region
other than its true region
of origin, with the intent
of misleading the public
as to the geographical
origin of the product
- imprisonment from 3 months to 3 years;
Aggravating
Circumstances
/
- fine of 1,500 RON (also applicable:
confiscation or destruction of the
counterfeit products and confiscation or
destruction of materials and equipment
used directly to commit the infringement)156
Assistance To Investigations By The Rights
Owners
Complaint Needed For
Public Action
- possibility for the rights holder to assist the
following acts:
no complaint needed
investigation: “…The investigation is
performed in the presence of the parties, when
necessary.” Art.129, §2, Criminal Procedure
Field
Code
Field reconstruction of the way and conditions
under which the act has been committed;
Art.130, §2, Criminal Procedure Code
Expertise; Art.120, §4, Criminal Procedure
Code;
- the right of the parties’ defenders to assist all
investigation acts which imply the hearing or the
presence of the parties that are defended and to
draw up claims and memories; Art.173, Criminal
Procedure Code
Art. 86, Law
No. 84/1998
Unfair competition: any
use of (…) geographical
indications contrary to
honest
practice
in
industrial or commercial
activities
with
an
attempt
to
mislead
consumers.
- imprisonment from 1 month to 2 years;
- fine of 1,500 RON
/
- possibility for the rights holder to assist the
following acts:
preliminary complaint of
the injured party needed
investigation: “The investigation is
performed in the presence of the parties, when
necessary.” Art.129, §2, Criminal Procedure
Field
Code
Field reconstruction of the way and conditions
under which the act has been committed;
Art.130, §2, Criminal Procedure Code
Expertise; Art.120, §4, Criminal Procedure
Code;
155
156
Law on Trademarks and Geographical Indications.
Additional sanctions applicable according to Art.84, Law 84/1998.
97
Reference Text for Trainers
- the right of the parties’ defenders to assist all
investigation acts which imply the hearing or the
presence of the parties that are defended and to
draw up claims and memories; Art.173, Criminal
Procedure Code
98
Reference Text for Trainers
Plant variety rights
Legal Basis
Art. 44,
§§ 1,2,3,5,6; Art.
31, §1,
Law
255/1998157
No.
Constituent Elements Of The Offence
Nature
And
Level Of The
Penalty
Aggravating
Circumstances
Assistance To Investigations By The Rights Owners
Complaint
Needed
For Public Action
Intentional counterfeiting without the variety patent
holder’s authorization:
Imprisonment
from 3 months
to 2 years;
perpetration of
one of the
hereby
mentioned
actions by a
civil
servant/official
in the course of
his/her duties is
sanctioned with
imprisonment
for 6 months to
5 years
- possibility for the rights holder to assist the
following acts:
preliminary complaint
by the injured party
needed, only if the
offender is a civil
servant/official in the
course of his/her
duties
- production or reproduction;
- process for the purpose of propagation;
- offer for sale;
- sale or other marketing;
- import/export;
- stockpile for one of the purposes mentioned in
subparagraphs above; And/or:
- use of a denomination, other than the registered
one for the new variety, for the produced and sold
propagation material;
Fine
of
10,000
to
30,000 RON
(also
applicable:
confiscation
or destruction
of
the
counterfeit
products)158
Field investigation: “…The investigation is performed
in the presence of the parties, when necessary.”
Art.129, §2, Criminal Procedure Code
Field reconstruction of the way and conditions under
which the act has been committed; Art.130, §2,
Criminal Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all
investigation acts which imply the hearing or the
presence of the parties that are defended and to
draw up claims and memories; Art.173, Criminal
Procedure Code
- use of the registered denomination of a new
variety for the produced and sold propagation
material that does not belong to that variety;
- grant of a denomination to the produced and sold
propagation material that is so similar to the
denomination of the protected variety, that it may
cause confusion;
- sale of propagation material with false indications
which belongs to a variety for which a variety
patent has been granted, thereby misleading
purchasers;
- falsehood in the registration of a variety in the
National Register of Protected Varieties;
157
158
Law on the protection of the new plant varieties.
Additional sanction applicable according to Art. 44, §6, Law 255/1998.
99
Reference Text for Trainers
- false reports and falsification of documentation
required by this Law;
- submission of documents containing false
information
Art. 44, §§ 4,5,6,
Law
No.
255/1998
Disclosure of data and information constituting a
trade secret on a new variety for which a variety
patent has been applied or granted
Imprisonment
from 6 months
to 2 years;
Fine
of
10,000
to
30,000 RON
perpetration of
one of the
hereby
mentioned
actions by a
civil
servant/official
in the course of
his/her duties is
sanctioned with
imprisonment
for 6 months to
5 years
- possibility for the rights holder to assist the
following acts:
Field investigation: “…The investigation is performed
in the presence of the parties, when necessary.”
Art.129, §2, Criminal Procedure Code
Field reconstruction of the way and conditions under
which the act has been committed; Art.130, §2,
Criminal Procedure Code
preliminary complaint
by the injured party
needed, only if the
offender is a civil
servant/official in the
course of his/her
duties
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all
investigation acts which imply the hearing or the
presence of the parties that are defended and to
draw up claims and memories; Art.173, Criminal
Procedure Code
100
Reference Text for Trainers
Trade names
legal basis
constituent
offence
the
nature and level of
the penalty
Art. 5, §1 (a)
(g),
- use of a trade name (…) which is
likely to cause confusion with the
one legitimately employed by
another trader;
-Imprisonment
from 6 months to 2
years;
Law No.
11/1991159
elements
of
- manufacture in any manner,
import, export, storage, sale or
offer for sale of goods/services
bearing deceptive indications
regarding (…) trade names (…), for
the purpose of misleading other
traders and consumers
aggravating
circumstances
/
assistance to investigations by the rights owners
complaint needed for public action
- possibility for the rights holder to assist the following
acts:
public action upon the injured party’s
preliminary
complaint,
after
notification by the local Chamber of
Commerce and Industry or by
another professional organization/
after notification of agents authorized
by the Competition Office
Field investigation: “…The investigation is performed
in the presence of the parties, when necessary.”
- Fine of 2,500 to
5,000 RON
Art.129, §2, Criminal Procedure Code
Field reconstruction of the way and conditions under
which the act has been committed; Art.130, §2,
Criminal Procedure Code
Expertise; Art.120, §4, Criminal Procedure Code;
- the right of the parties’ defenders to assist all
investigation acts which imply the hearing or the
presence of the parties that are defended and to draw
up claims and memories; Art.173, Criminal Procedure
Code
Know-how
legal basis
constituent elements of the offence
nature and level
of the penalty
Art. 5, §1 (e)
and (f), Law
No.
11/1991160
as by the representatives of the
legitimate owners of these secrets
assigned to represent them in front
of public authorities
- Imprisonment
from 6 months to
2 years;
159
160
- Fine of 2,500 to
5,000 RON
aggravating
circumstances
/
assistance to investigations by the rights
owners
assist all investigation acts which imply the
hearing or the presence of the parties that
are defended and to draw up claims and
memories; Art.173, Criminal Procedure Code
complaint needed for public action
public action upon the injured party’s
preliminary complaint, after notification by the
local Chamber of Commerce and Industry or
by another professional organization or after
notification of agents authorized by the
Competition Office
Law against Unfair Competition.
Law against Unfair Competition.
101
Reference Text for Trainers
3.4 Role, Competences and Coordination of Decisions and Actions of the National Working
Group on IPRs
Based on the principles of cooperation and coordination in the matter of efficient enforcement
of IPRs among the various concerned stakeholders, the Grupul de Lucru pe Probleme de
Proprietate Intelectuală (Working Group on Intellectual Property Issues) is a public-private
partnership between State institutions and major private organizations which all share the
common objective of combating piracy and counterfeiting.
The public-private partnership that was founded in the field of IP in Romania developed into a
viable project and was appreciated by foreign observers. It is the first fruit of the National
Intellectual Property Strategy (2003 - 2007) which was approved by Government Decision No.
1424/2003 which was later amended and supplemented. In this context, the partnership led to
the formalization, on June 26, 2006 of a formal structure: the Working Group on Intellectual
Property Issues.
According to the “Action Plan regarding urgent common measures with a view to improving
enforcement in the area of Intellectual Property Rights (2005-2007)” adopted by the
Government Decision No. 1174/2005 and following the initiatives of the central structure of the
Public Ministry and the Ministry of Justice, together with the other stakeholders, a central
working group was established to coordinate the national IP enforcement policy comprising
representatives of all the institutions involved.
To establish the Working Group, 32 members representing State institutions and the private
sector alike, signed the Protocol establishing the structure on 26th June 2006, in Bucharest, at
the Prosecutor of the High Court of Cassation and Justice of Romania. Subsequently, on 12th
March 2007, the National Audiovisual Council joined the group by signing the accession
agreement after the invitation by the Group management thus raising the number of members
to 33. The Group was formed to ensure a suitable environment, to develop and foster
creativity, innovation, fair competition and IPRs. The Group operates in accordance with the
provisions of the Protocol of Incorporation.
It is a high-level decision–making group with regular meetings where information on the risk and
action zones is shared. Consultative reunions for drafting the proposals for amending the legal
framework are also organized.
Furthermore, the representatives of public and private sectors decided to create three subworking groups on: counterfeiting, piracy and collecting agencies to increase efficiency. The
members of the working groups decided to have monthly meetings. The first meeting took
place on 10th March 2006.
The core aims of the Working Group on IPRs can be summarized in its achievements such as:

Strong communication between enforcement agencies and industry representatives

Action to combat counterfeiting and piracy

Identification of gaps, analysis and suggested solutions to improve the enforcement of
IPRs

Support of the implementation and respect of National Strategy in IPR field

Great contribution towards legislation improvement (for instance the adoption of the
new trademark law)

Contribution towards the new IPRs Strategy

Training for law enforcement agencies and the manuals destined for police officers and
prosecutors
102
Reference Text for Trainers

Coordination of investigators and information used in successful criminal procedure

Awareness-raising actions in both the public and private sector.
103
Reference Text for Trainers
SOURCES
Industrial Design Law
Law on the Fight against Unfair Competition
Law on the protection of the new plant varieties
Law on Trademarks and Geographical Indications
Law on the protection of topographies of semiconductor products
Law 350/2007 on utility models
Patent Law No. 64/1991
Romanian Customs, http://www.customs.ro/en.aspx
Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in
the EU: Report on International and National Existing Standards (unpublished version)
104
Reference Text for Trainers
SECTION 6
Main Concepts and Suggested Best Practices for Investigations
6.1.1 Detection of Counterfeit Goods and Initiation of the Investigation161
One of the main aims of this training manual is to provide law enforcers, and all those involved in
the detection and identification of counterfeit goods, with the operational tools to improve their
counterfeit investigations.
For this reason, the investigators should not just stop with identifying the “counterfeit sellers” as
they can be considered “the tip of the iceberg” and occasionally also victims of crime. The
investigations should aim to achieve the following two specific objectives:
1. Identification of the whole counterfeiting chain, up to and including the production sites;
2. Identification of the possible involvement of criminal organisations.162
The seized goods can also provide a variety of information. Examples include information on the
routing of counterfeit goods and evidence against the manufacturers. Furthermore, investigations
may lead to the finding of existing links between counterfeiting and organized crime.
One important weapon in the fight against counterfeiting is the clear presumption of IPR ownership,
putting the onus on the suspect to prove that goods in his/her possession are not counterfeit.
A law enforcement officer encountering a product for the first time has to consider the following
questions:

What is the product and is it illicit or licit?

Where can I obtain assistance to confirm my suspicions?

Where do I obtain evidence of rights ownership?

What evidence is available to support or disprove allegations of IPR infringement?

What evidence do I require to support prosecution?163
Investigators and law enforcers should adopt a common strategy aimed at identifying all relevant
persons involved in the manufacturing, distribution and sale of counterfeit products. The discovery
of the following information could be essential:

Companies and persons (partially or totally) involved in the production and distribution
network. This information is essential for recognising the possible involvement of an
organised crime group and the relevant internal structure164;

Money transfers that might constitute important evidence for tracking the illicit trading flows
and for obtaining the seizure and confiscation orders;

Real estate and property, especially production sites, warehousing or selling points that are
not only crucial for seizure and confiscation proceedings, but also key points of the criminal
chain.
161
The main source for the whole paragraph is UNICRI (2010), Strategies for technical-juridical training and awareness
raising on counterfeiting, (unpublished Italian version).
162 UNICRI (2010), Strategies for technical-juridical training and awareness raising on counterfeiting, (unpublished Italian
version), p. 101.
163 See, INTERPOL (2007), Guide To Intellectual Property Crime And Investigations, Lyon.
164 One of the main weak points of all criminal organizations, including those with a “satellite structure”, is represented by
the need to acquire enormous quantities of raw materials. The set up of complicated company structures is needed to
cover the significant number of purchase orders. Such companies avail themselves usually of just one or two suppliers,
easily identifiable as few are the factories producing the necessary raw materials.
105
Reference Text for Trainers

Details and registrations of vehicles or other means of transport used in production
(movement of raw materials, parts or e.g. packaging) and distribution;

Details of mobile communications and IT hardware used in infringements.
The complex distribution chain of counterfeit products can complicate any exercise aimed at
tracing items back to the various parts of the illicit supply chain. This traffic is managed by veritable
transnational criminal networks, capable of progressively refining the methods to conceal and trade
products, following well established routes also used for the trafficking of other illicit goods,
especially drugs. The methods used to avoid customs controls have evolved rapidly. A common
method employed by criminal networks involves transiting the products through several countries
in order to conceal their actual origin. This technique is most used when the country of origin is
particularly “sensitive”. 165
It is particularly important to highlight that prevention and repression of counterfeiting must be
accompanied by thorough information and evidence gathering on the complex system underlying
the illegal reproduction of goods. Counterfeiting is a very complex phenomenon that cannot be
stopped just by limiting the presence of small traders both licensed and unlicensed or through
isolated actions. We need to develop proper strategies to combat counterfeiting in all its
complexity.166
It may be useful to specify the main factors that should be taken into account in the investigative
framework:

The possible origin of the investigation;

The analysis of events;

The choice of investigative methodology;

The data collection plan;

The investigative developments.
The above steps are not intended to cover all of the countless possibilities arising from different
scenarios. They suggest effective investigative activities aimed at identifying and dismantling the
criminal organizations that are responsible for managing significant levels of trafficked counterfeit
goods, and which are also responsible for causing the most harm to right holders, the State and
society as a whole. Investigations should be targeted at understanding the complete criminal
scenario, identifying the counterfeiting production-distribution chain (capital, factories, facilities,
distribution network, warehouses and equipment in general), in order to identify criminal
organizations involved. If these organizations are operating in several countries, the possible
application of those norms regarding transnational organized crime should also be verified before
adopting them.
There are a variety of methods in which investigations on counterfeiting can be initiated, for
example:

During criminal investigations for a different crime;

Receiving a complaint from the right holder, or communications from other institutions;

Instances of Customs’ protection;

During normal controls of the territory;

Other police activities;

International cooperation and mutual administrative assistance.
The scenario to be investigated will be more or less complex depending on whether investigations
will consider:
165
166
UNICRI (2010), “Strategies for technical-juridical training and awareness-raising on counterfeiting”, p. 31.
UNICRI (2010), “Strategies for technical-juridical training and awareness-raising on counterfeiting”, p. 34.
106
Reference Text for Trainers

Small traders, both licensed and unlicensed, who constitute the last links of the
counterfeiting market;

Counterfeiting entrepreneurs (the producers and intermediaries trading counterfeit goods).
The following information sources can be used to acquire elements in support of the investigation:

Information available in existing national databases;

Analysis of other open sources;

Analysis of databases on trademarks, patents, designs and models, such as:
 European trademarks (http://oami.europa.eu/)
 International trademarks (http://wipo.int/portal/index.html.en)
 European
Patents
Office
(Espacenet,
http://www.espacenet.com/index.en.htm)
http://www.epo.org/
&
 Other databases on designs and model.

National and regional IP enforcement associations;

Related industry associations (such as Union des Fabricants, the pharmaceutical industry
associations, etc.)
After having collected and analyzed the information of the suspected counterfeit product, the
products’ safety and potential risks for consumers should be ascertained. The following distribution
and trade channels should be detected:

Regular distribution (mix-sale);

Mail-order and via the Internet;

Out of the regular distribution channels.
At the end of this first phase of analysis, investigative hypotheses can be carried out on the
following:

Subjects involved;

Type of infringement and/or crimes committed;

Identification of operational modalities;

Geographical locations;

Driving motives;

Time-span.
Once these pieces of information are collected, it will be possible to evaluate which of the following
investigative methods are considered most appropriate:

Inspections at borders;

Collection of photographic evidences;

Identify people and means;

Technical investigations;

Identify the production/distribution chain, financial assets etc;

Inspections (documents inspections, verification of the information);

Surveillance;

Ambushes;
107
Reference Text for Trainers

Use of informants;

Raids;

Retrieve declarations and information;

Other investigation techniques;

Undercover operations.
6.1.2 Border Controls Aiming to Detect Counterfeit Products and Anti-Counterfeiting Technologies
Those involved in counterfeiting use a variety of means to introduce their products into the market.
The main distribution chains to consumers include market stalls, itinerant small traders, both
licensed and unlicensed, and sales over the internet.167
We will now start by analyzing how border controls work and how the infringers sometimes avoid
them. We shall outline some useful means already used to detect counterfeit goods before they
reach the market.
Investigations are rather complex as capital, production units, distribution and market circuits are
parcelled out. It may happen, for instance, that counterfeit products sold in Europe are destined for
another market and are thus in transit. In order to deceive customs’ authorities, counterfeiters
resort to indirect transportation systems, involving hiding the origin of the products by passing
through different countries before sending them to their final destination. There are many examples
illustrating this manoeuvre:
-
In September 2003, approximately 15,000 counterfeit glasses (whose estimated value on
the French market was 1,262,650 euros) were discovered at Roissy airport, in France. The
cargo, coming from Dubai, the most notorious seaport for world counterfeiting, was
addressed to Abidjan, Ivory Coast.
-
In December 2003, customs officials of the cargo control unit of Roissy airport seized
approximately 245,000 counterfeit labels of the following trademarks: Lacoste, Timberland,
Nike and Ecko. The labels had been shipped from Hong Kong with Morocco as the final
destination.168
Counterfeiters try to hide the origin of the products to avoid raising suspicion. For this reason,
every counterfeit product has its own circulation and distribution network. There is not a standard
pattern, a number of transit countries are chosen due to the mass trafficking of goods (making
customs work difficult) or perceived weak controls within these territories and customs units. Some
areas are nothing other than turntables: within the EU this is the case with some ports like Antwerp
or Rotterdam, or some airports as Schipol or Roissy. Outside Europe, Dubai, and Hong Kong or
some ports in the U.S. are considered privileged transit places. Furthermore, counterfeiters make
use of every kind of transportation means (by air, land and sea) and recur to the faster transport
routes available. The European Commissioner responsible for TAXUD (Taxation and Customs
Union), László Kovács declared: "All these techniques and the indirect routes taken by many
cargos are similar to the ones used by drugs traffickers, which clearly shows which kind of
organisations we are dealing with”169.
The origin of the products can also be masked by taking advantage of the so-called Free Trade
Zones (FTZs). Goods passing through FTZs or Free Ports (FP) create opportunities for
counterfeiters to disguise the true country of origin of goods. They can also take advantage of
countries where customs control on shipped or in-transit goods is known to be weak. Over the
years quite a number of FTZs and FPs in different countries have been cited in reports as hotspots
for counterfeit goods. These include Latvia, Lithuania, Paraguay (Ciudad del Este), UAE (Abu
167
168
169
IP Crime Group (2010), Annual Report 2009-2010, p. 9.
Unions des Fabricants (2005), “Rapport sur la contrefaçon et la criminalité organisée”, p. 13.
Unions des Fabricants (2005), “Rapport sur la contrefaçon et la criminalité organisée”, p. 14.
108
Reference Text for Trainers
Dhabi and Fujairah), China (Hong Kong, Shanghai and Guangdong), Panama, Taiwan and
Mexico.170
BOX 5
Counterfeiting and Free Trade Zones (FTZs)
A recent New York Times exposé on the trade in counterfeit pharmaceuticals shows how FTZs can play
an important role in facilitating their sale. One particular case revealed a complex supply chain of fake
drugs originating in China and ran through Hong Kong, Dubai, the UK, the Bahamas and the US. It was
exposed when British customs officials intercepted a large consignment of counterfeit pharmaceuticals at
Heathrow Airport. What surprised them was that the shipment had come from the UAE and was bound for
the Bahamas - not a route normally used by legitimate pharmaceutical companies. This seizure triggered
investigations and raids all over the world.
In Dubai, customs officers raided the warehouse of a trading house called Euro Gulf, impounded a
significant cache of counterfeit drugs, and charged several people. In the Bahamas, the authorities
entered the offices of the Personal Touch Pharmacy and seized drugs worth 4 million USD. As the
investigation progressed, it became clear that the counterfeits were manufactured in China, transported by
truck to Hong Kong, and then air freighted to the UAE. From there they were shipped via London to the
Bahamas. Customers for the Bahamas Company were generated from a Canadian internet pharmacy
website.
To maintain the illusion the drugs came from a legitimate manufacturer, orders were routed to the
Bahamas where the drugs were packaged and addressed, and then sent back to London by air. From
here, they were mailed to recipients in the US and other parts of the world. As well as exposing the
complex supply chains counterfeiters’ use, the case revealed the role of FTZ’s in masking the origin of
products. According to Ilisa Bernstein, director of pharmacy affairs at the US Food and Drug
Administration, “Free Trade Zones allow counterfeiters to evade the laws of the country because often the
regulations are lax in these zones.”
Source: ICC Counterfeiting Intelligence Bureau (2009), International Anti-Counterfeiting Directory, p.
27.
Since an understanding of the counterfeit goods’ flows can help licit manufacturers, brand owners,
and law enforcement agencies to protect the licit supply or to disrupt counterfeit activities a
diagrammatic representation of the potential trade routes used by counterfeiters has been created
by Europol. This diagram also illustrates connections between criminal groups operating in various
countries.
170
ICC Counterfeiting Intelligence Bureau (2009), “International Anti-Counterfeiting Directory”, p. 27, available at
http://counterfeiting.unicri.it/docs/IACD.A%20key%20information%20resource%20to%20combat%20the%20global%20pl
ague%20of%20counterfeiting.2009.pdf
109
Reference Text for Trainers
Source: Europolk, in UNICRI (2007)
International best practices
An interesting example of a new tool that allows countries to improve how they track the source of
counterfeit goods and also monitor the ports of transit for these fake products is the database
elaborated by the United States National Intellectual Property Law Enforcement Coordination
Council (NIPLECC), in collaboration with the U.S. Chamber of Commerce, to support Interpol in the
establishment of “Interpol Intellectual Property Crime Database”.
This new database will allow countries around the world to share information on counterfeiting and
piracy to track IP crime and prevent future criminal acts. The database will act as an important new
tool for information exchange between countries. It allows countries to share information they hold
on counterfeiting and piracy, while also allowing for information to be entered into the database
from the individual companies who own the goods that have been stolen.171
Another good practice, presented in box 2 below, is the Customs & Border Protection’s (CBP)
online registration system for trademarks and copyright
United States National Intellectual Property Law Enforcement Coordination Council (2008), Report to the
President and Congress on Coordination of Intellectual Property Enforcement and Protection , p.35. For a more in-depth
171
analysis of this database look also p. xx, chapter 5, part C (a good practice: DIIP).
110
Reference Text for Trainers
BOX 6
U.S. Customs & Border Protection IPR registration process: a good practice
The U.S. Customs and Border Protection (CBP) is the unified border agency within the Department of
Homeland Security responsible of the management, control and protection of national borders at and
between the official ports of entry.
“CBP’s online registration system for trademarks and copyrights allows rights owners to electronically
record their trademarks and copyrights with CBP.
CBP personnel use the system daily to make IP infringement determinations.
The IPR registration system makes IP information relating to imported merchandise (such as images of
trademarks and copyrights, contact information, countries of production, and licensees) readily available to
CBP personnel as they are inspecting shipments at the ports of entry in real time.
As of the end of 2007, over 21,000 trademarks and copyrights were recorded with CBP.
For more information on this tool or to register your trademark or copyright, visit CBP’s e-recordation
website”.
Source: U.S. Customs and Border Protection, http://www.cbp.gov/xp/cgov/trade/priority_trade/ipr/
For information on border measures as effective means of blocking counterfeit products, see the
implementation of the EU Customs Regulation in Romania (Part 4 of this manual).
In the following, boxes two good practices on customs action (in Ireland and in France respectively)
are presented as suggestions for both Romania and the rest of the EU.
111
BOX 7
Customs action against goods suspected of infringing IPRs in Ireland
“1. Suspect goods identified in the course of checks carried out at the request of a right-holder
The entry of the goods should be monitored in accordance with the terms of the application in
question. To facilitate the identification of the goods, suitable arrangements should be made
including the insertion of appropriate profiles on the AEP (Automated Entry Processing) system, for
the period of the application under consideration.
Where imported goods appear to infringe an IPR covered by an application they are to be detained
and the right-holder and the person who imported the goods are to be informed. In addition, the
detention should be reported immediately to the IPR Co-ordinator. The right-holder is to be provided
with a sample of (or asked to view) the goods. Furthermore, he/she is requested to confirm in writing
whether or not the goods are counterfeit or pirated, giving reasons by reference to the
characteristics of the goods or their packaging or otherwise. The person who imported the goods
should also be given the opportunity to inspect them. This person’s name should not be divulged to
the right-holder.
2. Suspect goods identified in the course of normal checks
During normal checks, if goods are discovered which appear to infringe an IPR, but are not the
subject of an application, they are to be detained. The right-holder whose IPR is suspected of being
infringed and the person who imported the goods are to be informed. In addition, the detention
should be reported immediately to the IPR Co-ordinator. The detention, which can only be for a
period of 3 working days, is to allow the right-holder an opportunity to lodge an application with
International and Trade Security Branch, Customs Division.
If an application is granted, the procedure should be applied.
If an application is not lodged within the 3 working days the goods are to be released provided that
all customs formalities have been complied with.
3. Follow Up and Reporting
Where goods have been detained, a right-holder has 10 working days to confirm that the suspect
goods infringe an IPR under National law. In the absence of this confirmation the goods will be
released provided that all customs formalities have been complied with.
The 10-day working period may be extended by a maximum of 10 further working days if considered
necessary. In cases involving perishable goods suspected of infringing an IPR, this period is 3
working days and may not be extended. If the goods are subsequently seized, a written report
setting out all the facts shall be forwarded immediately to Anti-Fraud Unit, in accordance with
standing instructions on the reporting of seizures. A copy of this report should also be sent to the
IPR Coordinator, at the address above. To facilitate the requirement of quarterly reporting to the
Commission of goods seized under these provisions, the report in each case must include the
following information: the name of the right-holder, a description of the goods and the brand name of
the IPR infringed. For each item, the quantity of goods detained or seized, their customs status, the
type of IPR infringed, the means of transport used; and whether commercial or passenger traffic was
involved and whether the procedure was initiated in the course of normal checks, or specific checks
covered by an application for action”.
Source: International & Trade Security Branch, Customs Division (2008), Intellectual Property Rights
(IPR), Manual Customs action against goods suspected of infringing certain intellectual property
rights and the measures to be taken against goods found to have infringed such rights, Ireland.
BOX 8
Customs action in France
“According to law 94-102 of 5th February 1994, counterfeiting is a customs-related crime (articles
38, 215 bis of Code de Douanes). The following customs penalties regarding trademarks
counterfeiting include: the seizure of counterfeit goods, means of transport and facilities used to
hide the crime; a fine whose value can be once or twice the counterfeit merchandises’ cost (art.
414 Code de Douanes) and with a minimum of 300 Euros (art. 437 Code de Douanes). A 3 yearsmaximum imprisonment is also incurred. The proceedings are then transmitted to the prosecutor
according to art. 40 of the Criminal Procedure Code.
The customs action can become customs seizure due to the intervention request sent by a rights’
owner to the Direction Nationale du Renseignement et des Enquêtes Douanières (DNRED). The
rights’ owner, within 10 days, has to justify to customs services both the measures decided by the
TGI (Tribunal de Grande Instance) president and whether a civil proceeding was started (art.
L.335-10, art. L.521-7 and art. L.716-8 of CPI).
The law of 9th March 2004, adapting measures to the new crime evolutions, extended the customs
authorities’ prerogatives concerning intellectual property. So, regarding the trademarks
counterfeiting, the new article 67 of the Code de Douanes allows customs agents to proceed with
undercover operations, with the authorization and under the control of the Public Prosecutor.
The European Regulation n° 1383/2003 (22nd July 2003) strengthened the Customs possibilities
for action within the European Union. Since 1st July 2004 the Customs are able to act whenever a
sufficient suspicion exists, even before the call for action by the IPRs’ owner. This system is
applied to all IP rights, including the geographical indications, appellations of origin and the
vegetable patents. Moreover, free and harmonized intervention requests are foreseen by this
Regulation.
The Customs administration have the right of self-directed prosecution in front of the repressive
jurisdiction for the implementation of fiscal sanctions, but only if the public action of the common
right has been engaged either by the Prosecutor or by the right’s owner. If the public action has
not been activated, the Customs will have to close a transaction. Transaction power – regarding
Customs – is exerted mainly for low levels of counterfeit products. Customs transactions have no
effects over the public action in prosecuting the infringements of common law. For this purpose,
the proceeding has to be transmitted to the Public Prosecutor according to art. 40 of the Criminal
Procedure Code.
Source: Unifab (2004), La lutte anti-contrefaçon. Manuel destiné aux officiers de police judiciaire ,
2ème édition, p. 14.
6.1.3 Anti-counterfeiting Technologies
The great volume of international commercial trade is not the only involuntary ally of
organized crime in the trafficking of counterfeit goods. Modern logistic management of
international trade is facilitated thanks to intermodal shipping. Intermediary destinations are
often chosen from those hubs which law enforcement authorities do not consider to be “high
risk” thereby making the origin of the goods appear less questionable. This creates
additional practical difficulties when attempting to detect counterfeit goods.172
The problem becomes more complex when the imported object is not a finished counterfeit
product. To avoid border controls, counterfeiters resort to a variety of techniques to disguise
the goods; examples include: mixing original and counterfeit products or using double
bottomed transportation means. In 2000, a Bulgarian ship transporting goods from Ukraine
and ex-Yugoslavia was inspected. A double bottom was discovered containing more than
220,000 pirated CDs whose value was about USD 500,000.173
The practice of parcelling out the components of a product across several shipments is also
very common. Clothes and counterfeit trademarks can be sewn on to clothes that have been
shipped separately. Sometimes a product is delivered first, followed later by its packaging.
In this case the manufacturing of the product is completed only after its transport, thus
subdividing the risks involved in shipping.
Since there are many techniques to conceal counterfeit products and to make them
increasingly hard to distinguish from the original ones, a variety of detecting measures have
been elaborated in the recent years. Some of the most used are outlined below.
The report entitled “A key information resource to combat the plague of counterfeiting”
published in 2009, provides a series of new anti-counterfeiting technologies available to the
market in 2008:174
12
13
14

Two Australian chemists developed a new rapid forensic test for authenticating
antique porcelain after discovering that all porcelain has its own unique ‘fingerprint’.
This ‘fingerprint’ allows its history to be traced back to the precise quarry from where
the clay was mined, the furnace in which it was fired, and the period in which it was
manufactured. The technology involves a laser sampling technique to determine the
unique signature of the clay from any porcelain object to be authenticated.

Bayer CropScience also launched its Qualidate fingerprint authentication technique,
a new patented technology based on approved food additives developed to protect
crop protection products. The system provides a quick and easy test to determine
whether or not a product is authentic and of original Bayer CropScience quality.

In 2008 a new tool in the fight against counterfeit wine was also launched. French
scientists developed a particle accelerator that can authenticate a wine bottle’s age
and detect counterfeits. As testing wine to determine its age is problematic, as such
tests are often questionable (especially for wines older than 50 years) this technique
analyzes the composition of the bottles. Glass production centres are unique, and
production methods have changed over time, leaving on each bottle specific marks.
The analysis focuses on the bottle’s glass and not its contents, thus the bottle can
remain sealed, during the test. The particle accelerator projects an ion beam at a
UNICRI (2010), “Strategies for technical-juridical training and awareness-raising on counterfeiting”
UNICRI, 2007, op. cit.
CEIPI (2004), p.27
bottle and then studies the X-rays that are emitted from the glass using a
semiconductor detector. The process does not harm the bottle in any way. The test
results are then compared with information in a database, which contains an
analysis of bottles sent directly from wineries to ensure their provenance.

Another interesting anti-counterfeiting system was launched in Ghana aiming to give
consumers first hand information on the authenticity of pharmaceutical products
being sold in the country. The system, known as mPedigree, links producers and
distributors with consumers and regulators and has been designed to eliminate the
information blockage on which counterfeiters thrive. A strategist of the mPedigree
platform stated that once the system is operational, it will be the world’s first
consumer protection system of its kind. Under the system, drug buyers and/or
consumers have the opportunity to check for free whether their purchases are
genuine or not, by using their mobile phones to send special, non-duplicable codes
embossed on drugs and to receive in a few seconds a response confirming or
denying the authenticity of the product concerned.

Sanofi-aventis also inaugurated its Central Anti-Counterfeit Laboratory at the
company’s pharmaceutical plant in Tours, France. The laboratory, with its experts
and state-of-the-art equipment, has a three-fold remit in respect of reducing the
threat of counterfeit drugs. This involves: conducting direct examinations of
packaging items and leaflets as well as definitive chemical tests on suspect samples
of commonly counterfeited products; developing test methods and distributing them
globally. This would allow any industrial plant in the world to inspect and test, the
suspect products corresponding to those manufactured by Sanofi-aventis with the
same criteria; and to centralise “Identity Cards” for the counterfeit drugs found, in a
single, central database, making it possible to compare different types of counterfeit
goods.
It should be emphasized that anti-counterfeiting technologies can be taken as examples and
possibly replicated in similar contexts. Also this underlines the importance of sharing
information, both between public and private sector and between the institutions involved in
the fight against counterfeiting.
Authentication technologies are used to authenticate products. Consequently, these
technologies form a source of evidence for the courts and thus aid law enforcement
agencies during procedures related to the seizure of infringing goods. Markings are divided
in four categories: overt (visible to human eye), hidden (elements incorporated into overt
features or packaging which are visible to human eye by means of tools such as reactive
pens, laser pointed tools, optical filters or UV lights), covert (elements which can only be
detected with specific detection devices), forensic (elements which can only be detected by
means of an infield kit or through a laboratory analysis which allows for a more
comprehensive analysis).
Track and trace technologies are used to follow and analyse the movement of products
through supply chains and hence can help enforcement agencies during investigations.
Such technologies can provide barcodes or radio frequency identification (i.e. an automatic
identification method which is incorporated into a product and is transmitted through radio
signals). A good practice is represented by GS1 Standards: they use RFID technology
within barcodes in order to manage shipments, inventories & assets and to reduce
counterfeiting. The barcodes system enable companies to manage the supply chain more
efficiently, thus may help in finding counterfeiting actors operating at that level.175
International Best Practices
175
Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in the
EU: report on best practices (unpublished version)
The Italian Customs Agency own one of the international best practices on computerized
customs risk management, entitled FALSTAFF. (Fully Automated Logistical System against
Forgery and Fraud)
Box 9
A best practice of computerized customs’ risk management
Fully Automated Logistical System against Forgery and Fraud (F.A.L.S.T.A.F.F.)
The project of fight against counterfeiting – the Fully Automated Logistical System against Forgery
and Fraud (FALSTAFF) – developed by the Italian Customs Agency is based on a multimedia
database of original products. It is included in the information system of the Agency.
Each producer, manufacturer or right holder applying for customs protection generates a record in
the database, which contains several data related to the products for which protection is requested –
information on routes and quantities traded, technical information for the identification of the
product, photos of the trademark and of the product itself as well as packaging information.
Customs officers can query the database obtaining real time information and in case of an
application for action, they can also refer to the support of experts of trade associations and/or
quality certification bodies for the products concerned.
The database is also integrated with the customs control circuit, thus allowing for the definition of
further risk profiles which result in corresponding actions aimed at protecting trademark rights.
The customs control circuit performs a real time analysis of all import and export declarations
submitted to custom s and automatically redirects them to the relevant control channels matching
those risk profiles. The risk profiles are elaborated also on the basis of parameters indicated in the
forms submitted by right holders to the Agency.
The implementation of the system is a positive step undertaken by the Italian Customs Agency to
meet some of the most urgent needs resulting from the First World Congress on the Fight against
Counterfeiting. These include: identifying the highest possible number of counterfeit products and
counterfeiting strategies; and taking the fastest possible actions in these respects. These tasks are
achievable only through the adoption of electronic technologies.
In 2005, FALSTAFF was awarded the Honour Mention in the eEurope Awards, European Oscar for
the better initiatives related to eGovernment, held in Manchester. This was as FALSTAFF was an
innovative and ambitious project aimed at combating the counterfeiting phenomenon within the
European Union single market. It is an excellent example to be followed by the other European
customs agencies and can improve the efficacy of cooperation among the EU member states.
Source: www.agenziadogane.it/wps/wcm/connect/ed/Servizi/F.A.L.S.T.A.F.F.
6.1.4 Raids at Production/Stockpiling Points or Local Markets
In the previous paragraph, we analyzed how border controls work, within the EU framework,
in cases of IPRs infringement. We also explored some technologies implemented to discover
and detect counterfeit products.
On the basis of preliminary information acquired by law enforcement and border officials,
another instrument to counter these criminal practices is the one of Raids, which literally
means ‘searching without warning, making a sudden surprise attack’.
It is crucial to mention that raids and the related activities are usually carried out with joint
teams from different law enforcement agencies including: immigration controls, vehicle
standards, trading standards, social welfare fraud investigators and other ‘organized crime’
investigators such as vice squad, drugs, arms etc.
The so-called “surprise effect” is carried out in production/stockpiling points and local
markets: it is a key tool for acquiring every useful element to identify all the events related to
the crimes. For this reason, a prior inspection should be completed to understand the
external features of the premises. This would make it easier to safeguard the exits when
entering into the buildings or into the warehouses.
“In particular, when a search is performed, a series of activities shall be carried out,
involving:

Examining tax records;

Examining the Customs documentation in the case of international transactions;

Examining commercial correspondence;

Looking for any documentation that may be relevant to the investigation (such as
diaries, notes, receipts, correspondence, addresses) on the premises and facilities
used for the activity, including motor vehicles used in relation to the business;

Looking for any technical documentation (such as declarations of conformity,
technical documentation, reports, etc.) or documentation relating to the production
processes (in the case of a manufacturer);

Verification of permits, notices and licenses to conduct the business (also in the case
of e-commerce);

Examination of documentation proving ownership of trademarks,
concessions, supply contracts, royalties, etc;

Analysis of the quantity and composition of computer equipments (e.g. personal
computers, local networks etc.);

Acquisition of magnetic media to assist later examination for the identification of any
transactions that can be of interest. Special attention should be given to data
contained in the hard disks of personal computers used by the owner, or by others
with management responsibilities. This can be achieved through backing-up the
identified hard disks;

Identification of all the personnel effectively working in the enterprise, specifying
personal identification data, the tasks performed, the date of commencement of the
activities, the type of employment responsibilities;
licenses,

Performing an analytical inventory (quantity, value and provider) of the existing
products (even extending the search to any premises that may be available to the
suspect)”.176
The identification of counterfeit products can be performed using two criteria:
Simple criterion:

Very low price;

Characteristics of the seller;

Lack of distinctive signs, information and labels;

Quality of packaging;
Complex criterion:

Technical advice;

Sending samples (including photos) of the product to the right holder;

Chemical or physical examination;

Analysis and laboratory tests.177
6.1.5 Evidence Gathering and Types of Evidence Presented to the Court in Counterfeiting
Cases178
An investigation is an activity aimed at gathering information and evidence and is conducted
for many different reasons. The purpose of any investigation is to determine and document
facts concerning a particular issue to ensure the law enforcement agency can make informed
and sound decisions. Investigation is a general term and can apply to a very general activity
or a specific type of information gathering process. Some specific types of investigations
include: a complaint investigation, a disaster investigation, a health fraud investigation and a
product counterfeiting/tampering investigation.179
An operative list of actions to be carried out during the investigation process is presented
below. It can be applied to different forms of fake products posing risks for consumers’
health.
Counterfeiting/Tampering Investigations
The purpose of these investigations is to determine if counterfeiting/tampering has occurred;
the seriousness of the problem; the quantity of affected products on the market; the source of
the counterfeiting/tampering; and quick removal from consumers or commerce of any
contaminated product. The office specifically assigned to criminal investigations will seek to
identify and initiate criminal prosecution of those persons responsible for criminal activity
associated with counterfeiting/tampering/threat incidents.
176
UNICRI (2010), “Strategies for technical-juridical training and awareness-raising on counterfeiting”
These guidelines are the one outlined by the Italian Guardia di Finanza in the UNICRI (2010)
publication, but could prove as a useful example for other European countries.
178
The main source for the whole paragraph is:
U.S. Food and Drug Administration (last update march 2010), Investigations Operation Manual, ch. 8, available at
http://www.fda.gov/downloads/ICECI/Inspections/IOM/UCM123515.pdf
177
Counterfeiting/tampering incidents historically have occurred in unpredictable forms and
products. Some ‘standard operating procedures’, in most cases, will suffice for these
investigations. As events take place, specific instructions for some investigations may be
provided by the assigned offices. Prompt resolution is important, especially when a health
hazard is involved.
The law enforcement official(s) shall attempt to answer the following questions as rapidly as
possible:
1. Has counterfeiting/tampering occurred, or can the condition of the product be
explained by other means?
2. Is death, injury, or illness associated with the report and, if so, does it appear to be
caused by the product counterfeiting/tampering?
3. Does the incident appear to be isolated or widespread?
4. Is it likely that other similarly affected products remain in distribution, and if so, what
is the extent and magnitude of distribution?
5. If not isolated, could the product counterfeiting/tampering have occurred at the
production facility or in the distribution chain?
6. Can specific persons or points in the distribution chain be identified as possibly
causing the problem?
Contacting rights owners is an essential step in every investigation process. They can
contribute to evidence and information gathering due to their past experiences and
knowledge on the original products.
Interviews with informants and/or suspects:
1. Conduct interviews in a location which reduces unnecessary interruptions or
distractions.
2. Establish rapport with the person or persons being interviewed to put them at ease.
3. Listen to the person. Let them first tell the story in their own way. Listen carefully to
each side.
4. Be genuine and at ease.
5. After hearing the entire story, ask them for more information to fill in details.
6. Ask for clarification of key points. Obtaining details and requesting clarification of key
points allows you to obtain an idea of the validity of the person's story through
comparison of the accuracy of the details with previous information supplied.
7. Note-taking may put the person being interviewed on edge. If this appears to be the
case, do not take notes until you request clarification of key points. Video / audio
recording should also be considered.
8. For cases of counterfeiting/tampering, ask who was with the person, what happened
in the store, any problems noted with the product at the store, and other questions
which will provide you with more information on when, where, or why events took
place, who was present, etc. If two investigators are involved in the interview, one
should take notes while the other asks the questions.
9. During interviews, watch for changes in attitudes, body language, hesitation in
speech, etc., as you observe and listen to the person being interviewed. Describe
your observations of body language and personal characteristics in your report.
Sampling:
1. Whenever a sample is collected for suspected tampering/counterfeiting, you must
collect an authentic sample of the same product. It should be from the same lot and
code, if at all possible.
2. Collect any containers a suspect may have handled as they placed the tampered
product on the shelf.
3. When handling product containers or other evidence associated with
tampering/counterfeiting, take care to avoid adding or smearing fingerprints by
wearing cotton gloves, using tongs, forceps, or by picking the container up by
opposing corners.
4. Identify product containers carefully and in as small an area as possible.
5. Do not open outer containers to identify inner containers or inserts.
The sampling is often related to tampering cases, however, in most counterfeiting cases,
investigators do not usually collect an authentic sample of the same product.
Retail stores:
1. Before starting any activity at the scene, protect the area to preserve any evidence on
the store shelves, floor or adjacent areas and products.
2. Discuss with the firm's management, and/or the personnel in charge of the stocking
of the shelves, how material is received and handled prior to being placed on
shelves.
3. Document the area using photographs of the product shelves, surrounding area, and
any shots which would provide information on the product, its location and store
layout.
4. Samples of materials in the area that may be applicable to the investigation are to be
collected.
5. Be observant of persons present in the store, as guilty parties are thought often to
return to such location, especially when the agency or news media are present. Be
alert to statements of store personnel about activities they have observed. Obtain
descriptions of the actions, dress and physical characteristics of individuals the
employees have noted exhibiting unusual/notable behaviour in the store.
6. Determine if the firm has a closed circuit TV monitoring system and if they maintain
tapes. If so, these may be a source of leads.
7. Obtain information about employees terminated in the past year, employee problems,
or shoplifters who may wish to cause problems in the store.
The key to a successful investigation or inspection is to clearly define the objectives of the
operation and to examine each facet of the establishment in light of the objectives.
Manufacturing sites:
Aspects of the production/distribution system to inspect for leads may include:
1. Age of facility and date when production of the first batch of the product under
investigation was initiated.
2. List of other facilities which produce the product under investigation.
3. For drugs, list by strength, size of container, name, dosage form, and number of
packages per shipping case, all products manufactured or processed at the facility.
4. Obtain the names, titles, addresses, office and residence telephone numbers of
representatives of the company.
5. Contract packagers, if any, should be described by name, location and products
handled.
6. For the suspect lot, give its lot number, the size of the lot, size and type of containers
in which it was packaged, its history of production and distribution beginning with the
date of weighing of the raw material, and the dates and description of steps in
processing.
7. Describe any locations within the facility where an employee could have access to
the product/contaminant being investigated.
8. Describe the characteristics of the suspected product/contaminant within the facility,
its container type, its brand and generic name, its lot number, size of container,
whether the container is full or partially full and the approximate amount remaining.
9. Describe security for the suspected product/contaminant including limitations of
access, where it is stored, and responsibility for controlling access to the material.
10. Describe what legitimate use, if any, the facility has for the suspected
product/contaminant in each of the locations found.
11. Determine how often the material is used and whether or not a log of its use is
maintained.
12. If a log is maintained, obtain a copy showing its use and discuss with plant
management the legitimacy of each such use.
13. Determine whether the firm verifies use and use rates and has a method of
determining explanations for any discrepancies noted.
14. Have samples of the suspect product/contaminant been obtained by, for instance the
FDA in the case of medicines, or other competent agencies, and if so, what are the
results of analysis?
15. Does the firm test for the product/contaminant under investigation?
16. What method is utilized for such testing, and at what frequency?
17. List the facility's sources of raw materials for the suspect lot/product.
18. Evaluate the raw material storage conditions to determine the potential for
manipulation of materials.
19. Describe the lot numbering system, any plant identification numbers, and expiration
dates placed on retail products and cases.
20. If any product for export is processed at this plant, describe any differences from
domestic products.
21. If the product under investigation has tamper resistant packaging (TRP), determine
the type of system utilized, and if the system utilized has been evaluated to determine
if breaching is possible. If breaching is possible, describe. Describe lot numbers or
code numbers placed on TRP and security measures taken for TRP materials on
hand and those sent to contract packagers. Determine whether TRP materials are
accountable.
22. If the plant process includes collection of samples for examination on the production
line or by laboratory facilities, discuss where the samples are maintained, who has
access to them, and their disposition.
23. Report dates and description of each step in processing, including identification of
storage locations between steps. Obtain estimates of flow rates and volume of
materials in hoppers and drums at key stages. Determine distances between
production areas or between processing equipment at critical points. This information
can be useful for statistical evaluation of the likelihood of contamination at various
points in the process.
24. Include a description of the in-process lot numbering systems for each phase of
manufacturing, security for each process and/or product while in storage and during
processing.
25. In some types of processes, there are provisions for an individual to ensure sufficient
products are placed in each container before being filled. If this is the case in the
plant under inspection, describe the circumstances and security for this process.
26. Determine whether the facility hires part-time employees, or transfers employees
from one location to another on a temporary basis. Were any present during
production of the suspect lot?
27. Describe provisions for determining reliability of employees.
28. Determine if employees can move from area to area within the facility. Describe any
restrictions on their movements and if enforced.
29. Describe laboratory control tests and in-process tests performed on the finished
packaged product and in-process materials. Determine if reserve samples are
retained of all lots.
30. Determine how rejects and reworked materials are handled.
31. Describe any unusual event which may have taken place during the period when the
suspect material was within the facility.
32. Determine if the firm has a plan to safeguard against counterfeiting/tampering as part
of its quality assurance (Q.A.) programme. If so, determine the implementation date
of this plan and review any periodic assessment reports for potential problem areas.
Distribution facilities:
It may be necessary to obtain the following information at each level in the distribution chain:
1. Amount of suspect lot on hand at time of inspection.
2. Obtain the turnover rate for the product under investigation.
3. Amount of suspect lot received, and any variations from amount consigned to the
facility.
4. Date received.
5. How received.
6. Name and type of carrier which delivered the product. Determine security of the
vehicle or container while in-transit.
7. Obtain distribution history of the suspect lots.
8. Describe the distribution area covered by the facility being inspected and the number
of accounts served, whether they are retail or wholesale.
9. Determine if the facility handles any cash and carry orders.
10. Determine if the facility will accept returns and how are they handled.
11. Describe stock rotation practices and how they can be assured.
12. Determine if lot numbers of products distributed can be traced.
13. Describe the method of packing of shipments; for instance, plastic tote bins sealed
with nylon tape, intact cartons only, cases are split, etc.
14. Describe the methods of shipment utilized by the warehouse.
15. Describe personnel practices, problems and other information on visitors,
contractors, etc.
It is often advantageous to produce a pictograph or a timeline chart of the distribution
system. This would show basic information on each level in the distribution chain and
distances between each link in the chain. It is also often worthwhile to prepare a timeline
chart showing the progression of the suspect lot through the manufacturing process to the
source of the complaint, including the significant steps in the manufacture and distribution of
the suspect product.
Security:
Methods used to report this information should be discussed with the supervisor, since an
inadvertent release could compromise the facilities security system.
1. General security arrangements including: the number of guards, their shifts,
locations, and whether or not they patrol the facility.
2. Describe any closed circuit TV systems, their locations, and any physical barriers to
prevent access to the plant grounds and its facility.
3. Describe who is logged in and out of the facility and whether or not employees must
display identification badges upon entry. If plant employees are issued uniforms by
colour or design, which designate their work station locations, also describe.
4. Determine whether visitors, contractor representatives, cleaning crews, etc., are
subject to movement tracking or control, and if any were present during production of
the suspect product.
5. If the suspect product was particularly vulnerable to in-plant tampering during certain
stages of handling, identify particular employees who had access to product during
these stages and interview them individually. There may be occasions when line
employees may be able to remember suspicious activities on the part of co-workers
or others working in the area when suspect lots were being produced.
6. Describe the security measures taken for the processing area after hours, during
work breaks, and at meal times. Be alert to those periods when in-process containers
are left unattended on a packing/production line.
7. Describe any employee relations problems such as layoffs, firings, probations,
adverse actions, etc.
Reporting:
Reporting an investigation is frequently completed using a memorandum. The format is not
as defined in sections as an inspection report. A good rule of thumb to follow is to first
summarize what has been done, why or give the reason for the investigation and briefly state
the findings. After this, one can go into detail about the investigation was conducted and
what was found.
Reporting the course of the investigation and relevant findings chronologically works in many
situations. For long narratives, using headings will make it easier for the reader to follow the
report. Some types of investigations have forms that need to be completed in addition to the
narrative.
Box 10
In summary: How to operate?
The police officer getting knowledge or checking up on a counterfeiting-related fact should act
gradually by:
-
-
-
-
-
Gathering whatever information concerning the fact (that will inform the Public
Prosecutor), as charges, written documents or complaints, even interviewing, if possible,
informed people and other customers of the counterfeiters;
Paying close attention in acquiring the notitia criminis, by researching all information
sources considered suitable;
Aiming at detecting the counterfeiting chain (capital, factories, structures, distribution
network, warehouses and generic tools), by activating each informative and investigation
source whenever a criminal organization is involved, according to the Palermo
Convention’s definition;
Contacting another law enforcement agency or a specialized organisation (tax police,
customs, port authorities, associations or privates involved in countering counterfeiting
etc.) when his/her expertise is not adequate, in order to delve into fiscal aspects or other
issues concerning immigration or job conditions;
Taking care, as carefully and promptly as possible when gathering data to send to
administrative centres in order to improve the implementation of the prevention and
repression of those crimes;
Finally, the rights’ owner should be informed in order to initiate civil or criminal
proceedings, and ask for compensation with prejudicial consequences for the
counterfeiter.
Other countering instruments
The experience in the carrying out of investigations showed that the producer is different from the
small traders both licensed and unlicensed: the unlicensed, often clandestine, can be punished
through expulsion; while the licensed trader is usually an underground entrepreneur, can be
efficiently punished by civil or criminal measures.
Sanctioning the associative bond can act as a powerful deterrent with both direct and indirect
consequences.
The main deterrent for the counterfeiter is being damaged in his/her own entrepreneurial activity. If
the seizures of the destruction of thousands of counterfeit goods may be an economic loss, the
confiscation of an apartment, a bank account or a licence, or the forfeiture of driving licence or
documents for leaving one’s country is the real deterrence.
Usually, the criminal sanctions’ effects are more preventative than repressive. The sanction
creates a deterrent effect due to its existence, by creating insecurity among the criminals.
Deterrence can be carried out by making counterfeiting less interesting and attractive. If
counterfeiting is also a way of laundering ‘dirty money’, we can assume that by increasing
sanctions, using counterfeiting for this aim would no longer appear attractive.
Source: Italian Ministry of the Interior
6.1.6 Internet Investigation
The use of the Internet for the advertisement/sale of counterfeit products has created an
independent distribution process. It directly targets final users, contributing to ordinary
distribution and sometimes overlapping it. The Internet is an important supply channel for the
counterfeiters as it allows them to simultaneously supply products at the retail and wholesale
level.
The data provided by the U.S. Food and Drug Administration (FDA), indicates that 10 million
parcels enter the USA every year. This demonstrates that the use of the Internet as a
distribution channel is rapidly growing. The OECD predicts that the volume of sales over the
internet will rise by 20%-30% per year, thus, potentially increasing the distribution of
infringing products.
The Internet guarantees anonymity due to the impersonal nature of online commercial
exchanges.

Auction sites and online marketplaces. The auction sites are well used routes to
market, sell and distribute counterfeit products, including digital files, CDs and DVDs.
Recent years have seen a growth in more established market places, such as
Amazon and eBay. Currently, there are over 90 UK based auction websites. The past
year has seen action being taken to try and tackle this issue, in particular through
joint work with the auction sites. The Internet Auction Working Group is led and
chaired by trading standards. It is developing ways to harmonise the approach to
removing sites that sell infringing products, with the aim of reducing the burden on
enforcement and agencies brand holders. The group is also looking to introduce a
code of practice for auction sites.

Another key area is where dedicated websites have been set up to sell specific fake
or pirated content. In some instances, items are clearly advertised as fake or their
price might indicate that they are not legitimate products. In other instances the
products are represented as genuine articles.

Criminal activity through P2P file sharing sites, for example by running or hosting a
site, continues to be an area of serious risk. Much of the discussion and debate
regarding P2P in 2009/10 has centred on the civil infringement issues resulting from
the large volumes of consumers who are making use of P2P technology to download
unlawfully copied content. These activities do not typically fall into the category of IP
crime although civil law breaches may be occurring (also involves criminality).

Streaming sites are a concern to the audio-visual sector as a whole. They raise
particular concerns for those involved in audiovisual rights around sporting events. It
is the “live” nature of the sporting event which provides the greatest appeal to a
prospective audience. It is at risk of piracy by means of live streaming on the Internet.
Online purchases seriously jeopardize the identifying function given to trademarks, as it is
practically impossible for the consumer to know who or what is behind an Internet site.
Furthermore, the consumer may not have physical contact with the goods she/he intends to
acquire, but must trust the images that are presented on the online store. The combination of
these factors, which could be defined as conditions of non-verifiability – creates a fertile
ground for the development of illegal activities which aim to sell replicated products. Due to
this level of anonymity, the investigations implemented by the law enforcement officials have
been considerably more difficult”.180
It is necessary to take into consideration the dynamism of the Internet when regarding
investigations within the digital environment. The Internet can easily and rapidly modify itself.
It may happen that those responsible for the websites can alter the webpage contents and
format while the investigations are in progress after having realized that they are being
180
IPO Crime Group, IP crime Report 2009/2010, United Kingdom, p.10 and following.
investigated. For this reason, while carrying out the inquiries, some information and
documents need to be noted down, so as to identify and retain evidence about websites and
contents investigated. Examples are listed below:

Precise webpage address, through the URL (Uniform Resource Locator)

Download of the webpage in a digital support. It is possible to verify its content and
the existence of any business advertisement related to the products or services
offered through the webpage (banners)

Day and time periods during which the non-authorized activities are carried on

Ip (Internet protocol) addresses from which the acts have been realized

Download of products or services offered in the web

Certification made by the rights’ owner, in which is proved that the investigated
portals is not authorized for carrying out these activities

Nicknames of forum users, the ones who make non-authorized exploitations”.181
International Best Practices
In 2004, an investigation related to various Internet sites and the pharmaceutical distribution
chain was implemented by the US Immigration and Customs Enforcement (see box below).
The Immigration and Customs Enforcement (ICE) believes that the Internet is the preferred
tool for criminals involved in the trafficking of counterfeit medicines. Nevertheless, the
Internet is also a preferred supply channel for other products posing a risk to consumers’
health and safety, such as spare parts for aircraft.182
181
Ministerio de Cultura de España (2008), Manual de buenas practicas para la prosecución de los delitos
contra la propiedad intelectual.
182
L'Espresso, available HTTP: http://espresso.repubblica.it/dettaglio-archivio/1077207.
BOX 11
Internet investigations by the US
Immigration and Customs Enforcement (ICE)
Operation Ocean Crossing – February 2005
The ICE discovered a trade network of counterfeit medicines originating from China and directed
towards the US, the UK and other European nations. This trade was managed by a Chinese criminal
organization that was linked to an American citizen. Three Chinese citizens operating in the province
of Tianjin were arrested and the following was seized: more than 55,000 packages of counterfeit
Viagra and Cialis, 75,000 loose pills, a device used to seal pharmaceutical packages and a
significant amount of counterfeit trademarks bearing the Viagra inscription. In September 2005, a
police operation was implemented in three facilities with in the region of Henanth were involved in
the production of counterfeit drugs. This operation led to the arrest of eight Chinese citizens and the
seizure of more than 222,000 pills of counterfeit Viagra, 70,000 loose pills, 260 kilograms of raw
materials and 580,000 counterfeit Viagra trademarks. At the same time, U.S. authorities arrested a
US citizen who subsequently pleaded guilty to the charge of importing counterfeit drugs.
Onelinepillbox.com
Investigations conducted by the ICE, the FDA and the Drug Enforcement Administration (DEA) led
to the discovery of an Internet site, onlinepillbox.com, which offers regulated drugs and substances
with out requiring a valid medical prescription. These substances were sent to US consumers
through regular mail. It was later discovered that the delivered substances were unauthorized drugs
from Thailand, the Philippines and Mexico.
Source: US Immigration and Customs Enforcement (ICE), www.ice.gov
BOX 12
Case study on auction sites
March 2010 saw the eventual conviction of three men who defrauded buyers out of hundreds of
thousands of pounds through the sale of counterfeit goods through eBay following investigations and
raids in 2007 and 2008 by Sandwell Trading Standards. One of the men was jailed for 12 months
and the other two were given suspended sentences and unpaid work in the community. The men
were convicted under the Trade Marks Act 1994 for offences relating to the possession and sale of a
range of counterfeit goods through the auction website. The goods included trainers, clothing,
perfume, handbags and sunglasses and were being sold to consumers as genuine products. The
men now face a Proceeds of Crime Act hearing.
Source: www.sandwell.gov.uk
6.1.7. Financial Investigations
A financial investigation is a combination of the more traditional investigative techniques and
those used by auditors for 3,000 years. What makes financial investigation any different from
other techniques used by law enforcement? The reason for creating a paper trail is to enable
someone to reconstruct what happened, to whom, and for the use of criminal investigators.
Although much of an auditor’s time is spent reviewing financial documents, a substantial
amount is devoted to interviewing people, asking questions about the records and about
specific transactions.
The links that exist between counterfeiting and organized crime today are proven and
recognized at the international level. The potential and financial profits are becoming more
and more attractive.183 As a case in point, we may refer to the creation of companies
operating with the sole purpose of laundering or reinvesting proceeds of crimes originating
from the same criminal group or transferred to it from other criminal organizations for this
purpose. In this context, counterfeiting represents a new investment opportunity.
The counterfeiting enterprise also benefited from the already existing financial profits that
were at the disposal of criminal groups rendering it a surprisingly flexible activity, capable of
reacting quickly to variations in product demand and to enforcement controls. Channels and
methods used for the introduction, trade and sale of other illicit products were also ready to
be used for fake products. In Italy, for instance, in the territories where the Mafia-type
organizations are stronger, they have been able to force legitimate shops to sell their
counterfeit products as a substitute to extorting protection money from them.
Counterfeiting and its huge economic potential are in the process of being fully exploited by
organized crime. Following this assumption, there is no reason to replicate only luxury
products since every product in the market can be replicated due to the modern technologies
available. From medicines to toys, from spare parts to food and beverages, everything can
be and is counterfeited. The rule of profit maximization is also at the basis of the search for
the cheapest raw materials, which often involves using substandard, toxic or poisonous
substances for a variety of products, turning them into real dangers for consumers’ health
and safety.184
Two short examples are presented below showing how financial investigations can be
successful.

In July 2002, during the breaking up of an important network of luxury counterfeited
trademarks in Southern Italy (specifically in Naples and Teramo), the Italian Guarda
di Finanza discovered some significant money transfers between London and
Naples, concerning revenues generated by the counterfeiting business.

In December 2004, a counterfeiter’s network was broken up in Tours, France.
Thirteen individuals were investigated; counterfeit trousers and shirts, equivalent to
25 cubic metres of fabric were seized. In addition, many bank accounts were frozen,
some properties bought with ‘dirty money’ have been embargoed prior to forfeiture
and huge sums of cash have been confiscated. 185
Counterfeiting is considered an easy and profitable investment yielding massive sums of
‘dirty money’ from the different types of trafficking involved. It is frequently just part of a much
wider criminal portfolio and its participants cooperate with the other criminal organizations.
According to ICE, partnerships between the public and private sectors may represent one of
the strongest means to detect, deter, disrupt and deny criminal organizations illicit profits and
material support required to fuel their evil acts. In the case study (Box 6) we provide an
example of good practice on financial investigations and the possible vulnerabilities and red
flag indicators of criminal activity are presented.
The role of the private sector in countering counterfeiting is later analyzed in this manual.
183
184
185
UNICRI (2010), op.cit., p.33.
UNICRI (2010), op.cit., p.34.
Unions des Fabricants (2005), Rapport sur la contrefaçon et la criminalité organisée.
Box 13
Case Study: Counterfeit of alcoholic drinks in Romania
(use of shell companies, offshore centres – real estate investment)





A and B are two companies working in the domain of alcoholic drinks (production and sale),
whose associates and administrators are Romanian citizens. Company B designated a nonresident citizen from a Middle East country as administrator for 39 days. Police indicated that he
was acting in Romania under 3 false identities and was member of a criminal network.
The Romanian Financial Intelligence Unit (FIU) received information from the Border Police that
company A exported to a Free Zone an important quantity of alcoholic drinks to be packed and
labelled. The control noticed that the export documents mentioned that the merchandise was
“alcohol”, but the product was packed and labelled in bottles specific to “Ballantyne’s Scotch
Whisky”. According to company A’s representatives it was meant to be sold on the Romanian
market.
The tax police when controlling the headquarters of company B found that the invoices issued to
company A were registered as being stolen and that the means of transport registered were not
proper for transporting alcohol.
It appeared that similar “commercial operations” had been made by the two companies many
times before. The loss to the state budget made by A company evading taxes was calculated at
more than 8,300,000 lei (2.5 million US$).
A few months after these transactions, company C (a Romanian company) became the
beneficiary of an external loan for 12 million US$, the transfer being made by a bank situated in
another offshore jurisdiction. The majority associates of that company is a foreign company
registered in the second offshore jurisdiction (from where the money came), and the
administrators of the company are the same Romanian citizens involved in A and B companies
mentioned above.
In this case, in order for company C to give its external transfer a legal aspect, company C and its nonresident associate made an external loan agreement registered at the Romanian National Bank, on the
private debt. This facto would allow them to get a legal form for their further transfers with explanation
“credit reimbursement”. The administrator of company C used these to buy more tourist resorts (hotels,
boarding houses) in Romania.
Source: Moneyval, Money laundering and counterfeiting, Typologies Report 2007-2008
6.1.8 Use of Informants and other Special Investigative Techniques
The use of informants is fundamental to investigative work. It is accompanied with the
opportunity to receive clear intelligence about the activities of an individual or groups of
people acting illegally. On occasion, it can also give rise to serious problems and abuses.
Informants must be given clear and unambiguous instructions about what they can and
cannot do. For this reason it is important to carry out a risk analysis before deploying an
informant, not only for the safety of the individual concerned but for the organisation as a
whole. This risk analysis should include an assessment of the motives of the informant.
In some countries the regulations controlling the use of informants are stringently enforced
and any deviation from them can lead to defendants subsequently being released and
embarrassment being caused to law enforcement and industry.186
The generic term “informant” is often used by police and prosecutors to describe a wide
variety of individuals who confidentially provide them with information concerning criminal
activities187. The Black’s Law Dictionary, a legal resource for lawyers, defines an informant
as “A person who informs or prefers an accusation against another, whom she/he suspects
of the violation of some penal statute”.
The testimony of witnesses must be considered with more caution than the testimony of
others: for instance, a paid informer or a witness who has been promised that he/she will not
be charged or prosecuted may have reason to make a false statement.
Terms used to identify informants and methods of utilizing informants can differ drastically
from region to region and within different agencies.
The list provided below is reported by the American FBI Manual of Investigative Operations
and Guidelines and concerns the factors considered in determining an individual’s suitability
to be an informant188:
1. whether the person appears to be in a position to provide information concerning
violations of law that are within the scope of authorized […] investigative activity
2. whether the individual is willing to voluntarily provide information
3. whether the individual appears to be directed by others to obtain information
4. whether there is anything in the individual’s background that would make him/her
unfit for use as an informant
5. whether the nature of the matter under investigation and the importance of the
information being furnished outweigh the seriousness of any past or
contemporaneous criminal activity of which the informant may be suspected
6. whether the motives of the informant in volunteering to assist the police appear to be
reasonable and proper
7. whether the information that the informant can provide could be obtained in a more
timely and effective manner through other sources or by a less intrusive means
8. whether the informant is sufficiently reliable and trustworthy, and whether there is an
adequate means by which to verify his/her truthfulness
186
Interpol, Guide to IP crime and investigations, 2007, p.29.
Fitzgerald D.G. (2007), Informants and undercover investigations: a practical guide to Law, Policy and
Procedure, Taylor & Francis Group, New York, p.1.
188
Fitzgerald D.G. (2007), Informants and undercover investigations: a practical guide to Law, Policy and
Procedure, Taylor & Francis Group, New York, pp. 4-5.
187
9. whether the individual appears to be willing to conform to the agency’s rules
regarding his/her operation
10. whether the police will be able to adequately monitor and control the activities of the
informant
11. whether the use of the informant could compromise an investigation or subsequent
prosecution that may require the government to move for a dismissal of the case.
With organized crime, the informants can be particularly difficult to control, though they are
essential for the investigators’ job.
One of the responsibilities of the analysts (investigator) is to corroborate an informant’s
information (by checking on whether it is substantiated by other intelligence) and to
determine the informant’s reliability.
The following terminology states a scale of reliability for the informants:189

Reliable - no doubt of the person's authenticity; past information reliable in all
instances

Usually Reliable - some doubt, but past information has been reliable in most
instances

Fairly Reliable -- some doubt, but past information has been reliable on average

Not usually Reliable - there is doubt, and past information has only been reliable on
occasions

Unreliable - there is great doubt; past experience has proven it to be unreliable but
that doesn't mean that this piece of information now is not reliable.
Wiretapping represents a more adequate response to the complexity and transnational
nature of criminal activities and criminal trafficking, often supporting the possibility to achieve
a "mapping" of criminals behind this illegal phenomenon. It is also important to highlight the
importance of controlling data communication, since in several operations conducted it has
been shown that the heads of criminal organizations made extensive use of the VoIP (Voice
over Internet Protocol), and in particular of Skype, for their communications.
A variety of measures can also be used in the fight against counterfeiting in terms of assets’
control. These measures are aimed at identifying the criminal turnover and profits, analyzing
the suspects’ movable and immovable properties, money, and values for which a preventive
seizure can be proposed to the Competent Authority, in view of the possible adoption of
further measures190. Furthermore, where the illegal proceeds were not subject to the
previously mentioned penal measures, it is always possible, and appropriate, to proceed with
controls on tax evasion. In particular, this activity must be primarily aimed at detecting and
targeting the evasive behaviour put in place by natural/legal persons involved in different
phases of the production of illicit products, often identified by the omission of tax records or
the issue of documents for nonexistent transactions.
For a more in-depth analysis of assets recovery see also paragraph 6.2.5.
189
APS
University,
professor
Tom
O’Connor
website,
available
HTTP:
www1.apsu.edu/oconnort/3220/3220lect07a.htm
190
For instance, confiscation, also in case of disproportion of the assets if compared to the declared income
(in some countries).
6.1.9 The Role of National Common Databases
A pre-investigative analysis should always be carried out whatever the origin of investigation
activity is, through a series of preliminary checks in order to acquire useful elements.
Primarily, the importance of information sharing tools should be considered. These include
the national databases developed in some countries, both in Europe and outside the EU. An
outline of the Romanian national common database is detailed below, together with a
comparison with other existing databases, which can be considered as good practices.
The Romanian national Common Database consists of several modules:
1. Penal Case module, which is the main functionality where information regarding
infringements and deeds can be entered into the system. The Penal Case must
contain information about Origin institution and assignment of Prosecutor and
investigators. A case number has to be created manually by the user due to the
structure and nomination of the case numbers. It also provides the opportunity to
search for existing Penal Cases and view/edit them. Each Penal Case must be
attached to an Infringer. The system provides the opportunity to attach the Penal
Case to either a Natural Person or to a Legal Person.
2. Persons module, contains information on infringers, both Natural and Legal persons.
The module holds detailed information, such as address, ID and connection to Penal
Cases etc.
3. Right Holder Registration module, provides a searchable overview of selected IPRrelated information from SOIT and RCO. The user will be able to perform searches in
respective registers.
4. Detainments module, intends to show a listing of searchable details regarding
different seized goods etc. from NCA.
5. Reports and Statistics, module allows obtaining of reports and statistics regarding
criminal files in the IPR-field, depending on various parameters.
The beneficiaries/end users of the IT database are:

Public Ministry – Prosecutor’s Office attached to the High Court of Cassation and
Justice, (POAHCCJ)

General Inspectorate of the Romanian Police (Fraud Investigation Division)

General Inspectorate of Romanian Border Police (GIBP)

National Authority of Customs (NAC)

Romanian Copyright Office (RCO)

State Office for Inventions and Trademarks (SOIT).
“All the beneficiary institutions, according to their competences, have access to the database
and they can introduce or use the data introduced by the others. For example, a prosecutor
can easily check if someone has had previously any kind of sanctions on IPR, even if those
sanctions were not of a criminal matter, but administrative sanctions. Consequently, they can
proceed with in-depth information on the person that they are dealing with. As a result, all of
the institutions involved in the fight against counterfeiting are always aware of their partners`
activities; they also have access to the database of the Register of Commerce, the Police
database and the Customs’ database, etc”.191
6.1.10 Confiscation and Management of Confiscated Counterfeit Products
The principle behind forfeiture is ancient and is commonly regarded as a logical and fair
response to its detractors: the criminal. The criminal cannot keep the fruits of his/ her crime,
nor can the instruments or tools used to commit the crime be allowed to stay in criminal
hands. Forfeiture is the legal process by which the government may confiscate those
items.192
For what concerns the involvement of organized crime in counterfeiting crimes, the
Convention against Transnational Organized Crime (a.k.a. Palermo Convention)193 defines
the guidelines both for seizures of goods and for the management of confiscated
goods/crime seized proceeds.
Art. 12 – Confiscation and seizure
“1. States Parties shall adopt, to the greatest extent possible within their domestic legal
systems, such measures as may be necessary to enable confiscation of:
(a) Proceeds of crime derived from offences covered by this Convention or property the
value of which corresponds to that of such proceeds;
(b) Property, equipment or other instrumentalities used in or destined for use in offences
covered by this Convention.
2. States Parties shall adopt such measures as may be necessary to enable the
identification, tracing, freezing or seizure of any item referred to in paragraph 1 of this article
for the purpose of eventual confiscation.
3. If proceeds of crime have been transformed or converted, in part or in full, into other
property, such property shall be liable to the measures referred to in this article instead of the
proceeds.
4. If proceeds of crime have been intermingled with property acquired from legitimate
sources, such property shall, without prejudice to any powers relating to freezing or seizure,
be liable to confiscation up to the assessed value of the intermingled proceeds.
5. Income or other benefits derived from proceeds of crime, from property into which
proceeds of crime have been transformed or converted or from property with which proceeds
of crime have been intermingled shall also be liable to the measures referred to in this
article, in the same manner and to the same extent as proceeds of crime.
6. For the purposes of this article and article 13 of this Convention, each State Party shall
empower its courts or other competent authorities to order that bank, financial or commercial
records be made available or be seized. States Parties shall not decline to act under the
provisions of this paragraph on the ground of bank secrecy.
7. States Parties may consider the possibility of requiring that an offender demonstrate the
lawful origin of alleged proceeds of crime or other property liable to confiscation, to the
191
All the information on the database has been reported by the Romanian Public Ministry.
Schott P.A. (2006), Reference Guide to Anti-Money Laundering and Combating the Financing of
Terrorism, World Bank, Washington D.C.
193
To
download
the
full
text
of
the
Palermo
Convention
please
visit:
http://www.unodc.org/unodc/en/treaties/CTOC/index.html#Fulltext
192
extent that such a requirement is consistent with the principles of their domestic law and with
the nature of the judicial and other proceedings.
8. The provisions of this article shall not be construed to prejudice the rights of bona fide third
parties.
9. Nothing contained in this article shall affect the principle that the measures to which it
refers shall be defined and implemented in accordance with and subject to the provisions of
the domestic law of a State Party.”
Art. 14 - Disposal of confiscated proceeds of crime or property
1. Proceeds of crime or property confiscated by a State Party pursuant to articles 12 or 13,
paragraph 1, of this Convention shall be disposed of by that State Party in accordance with
its domestic law and administrative procedures.
2. When acting on the request made by another State Party in accordance with article 13 of
this Convention, States Parties shall, to the extent permitted by domestic law and if so
requested, give priority consideration to returning the confiscated proceeds of crime or
property to the requesting State Party so that it can give compensation to the victims of the
crime or return such proceeds of crime or property to their legitimate owners.
3. When acting on the request made by another State Party in accordance with articles 12
and 13 of this Convention, a State Party may give special consideration to concluding
agreements or arrangements on:
(a) Contributing the value of such proceeds of crime or property or funds derived from the
sale of such proceeds of crime or property or a part thereof to the account designated in
accordance with article 30, paragraph 2 (c), of this Convention and to intergovernmental
bodies specializing in the fight against organized crime;
(b) Sharing with other States Parties, on a regular or case-by-case basis, such proceeds of
crime or property, or funds derived from the sale of such proceeds of crime or property, in
accordance with its domestic law or administrative procedures.
Corrective measures involving counterfeit goods194
Recall from the market, definitive removal and/or destruction of counterfeit goods are the
corrective measures contemplated by the EU Directive on the Civil Enforcement of
Intellectual Property Rights (IPRED) as remedies in the cases of IPR infringement.
However, as highlighted by the EU Counterfeiting and Piracy Observatory, even if all EU
Member States have adopted these remedies, “it is unclear in certain member states from
whom the infringing products may be recalled/removed”.195 This is due to “the scarcity of
precedents/relevant court cases”. For instance, in many countries it is not specified if the
costs for removing and destroying the infringing goods must be borne by the infringer, the
IPR holder or the state.
The general principles of these corrective measures are explained below.
1. Destruction of counterfeit goods:
According to IPRED, destruction of goods infringing IPR should be the general principle.
Goods have to be destroyed in order to avoid to the infringer advantages for his/her activity:
194
Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in the EU:
report on best practices (unpublished version)
195
See EU Counterfeiting and Piracy Observatory, Corrective Measures in IPR infringements, p. 1. It can
be downloaded here: http://ec.europa.eu/internal_market/iprenforcement/observatory/index_en.htm.
they should not be able to distribute counterfeit products on the market after removing the
infringing items (e.g. trademarks or brands or logos).
As mentioned before, it is not clear by whom the destruction costs must be borne: in
principle, in civil proceedings, costs must be paid by the infringer: they are borne by the right
owner, who must be reimbursed by the infringer. In criminal proceedings, destruction is
usually performed by state officials, mainly by the police, and the destruction costs are borne
by the State. However, practices vary country by country: in Greece the costs of destruction
are borne by the State, whereas storage costs are paid by right holders. In Belgium,
Luxembourg and the Netherlands the destruction of goods is deemed to be a penalty and
can only be imposed on a defendant who has been convicted.
2. Secondary use of counterfeit goods:
Even if destruction of counterfeit goods should be the general rule, sometimes a secondary
use of fakes is also allowed. After removing the infringing items (e.g. brands, trademarks,
logos, etc), goods could be donated to charities, recycled or reused. Some precedents exist:
counterfeit goods can be reused in Estonia, Denmark, Germany, Hungary, Italy, Portugal,
Romania, Sweden and UK. In Denmark, Germany, Hungary and UK the secondary use is
not allowed in customs proceedings. In Finland the secondary use appears to be the general
rule, when destruction is ordered only recycling can be implemented. In some countries, on
the contrary, the secondary use is prohibited: France, Greece, Latvia, Belgium, Netherlands
and Slovenia. In Poland “secondary use of goods is not explicitly mentioned as a remedy
available to the plaintiff in civil proceedings”.
3. Definitive removal of counterfeit goods from commercial channels
In order to be destroyed and/or reused, counterfeit goods and other products infringing IPR
must be firstly removed from commercial channels. Compared to market recall, which is a
temporary measure, the removal of counterfeit goods from the market is definitive and aimed
at the destruction of the goods.
As noted by the EU Counterfeiting and Piracy Observatory, the removal of products from the
commerce is necessary, “otherwise only the infringing products already seized or still
present at the infringer’s premises […] would in the end, be destroyed”.
As we have seen earlier, this practice is implemented differently according to differences in
national legislations. For instance, it is unclear if goods must be removed only if they are still
in the hands of the infringer, if the measure can also be put in place when products are
already in commerce, when distributed by wholesalers and retailers or even possessed by
customers/consumers/end-users.
In many countries, when goods are already in commerce or in the hands of consumers, it is
no more than an obligation for the infringer to inform all his/her customers notifying them of
the infringement, and offering them the possibility to sell back the fakes (e.g. in the
Netherlands) and/or to give back goods to the infringer at their own expense (e.g. Germany).
In other countries, such as in UK, if the court orders the destruction of goods (and their
removal from the market), this order applies irrespectively, no matter who holds the product.
4. Recall of counterfeit goods from commercial channels
Different from the definitive removal, recalls of counterfeit goods from the market must be
considered temporary or precautionary measures: this implies that the recall can be reversed
or the goods can be marketed again after the IPR attached to the goods expires. However,
as noted by the EU Counterfeiting and Piracy Observatory, “this interpretation seems to be
inconsistent with the deterrence purpose of these measures, since it would give the
infringers the possibility of retaining at least a part of the economic benefit coming from their
infringing activity”, enabling them to wait for the expiration of the IPR with no consequences
for its counterfeiting activity.
6.1.11 Inter-sectorial Cooperation between Customs and Police Services and International
Collaborators
Inter-sectorial cooperation
In order to optimize the available police resources within the territory and offering consumers
a better security service related to the IP crimes, it should be necessary that specific
coordination protocols exist between Law Enforcers, Customs authorities etc. include
specific agreements concerning the following issues:196

Information exchange, in order to obtain an accurate analysis of the situation
concerning these kinds of crime, aimed at promoting the corresponding policies and
police operation.

Development and integration of databases. With respect to the existing laws related
to data protection, the development and implementation of specific databases of
persons, companies, and all the information linked to these crime activities, both for
statistical aims and for understanding, for a better knowledge of piracy/counterfeiting
organized networks’ modus operandi within a country. This could really represent a
step forward in countering counterfeiting and piracy. (see also par. B.2.1)

Participation by the Local Police to the juridical police offices.
Most certainly, there can be no efficient enforcement of IPR without appropriate cooperation
among the various institutions having competencies on IP matters.
For Romania - as previously stated in chapter 4.B.3.4 - according to the Action Plan, and
following the initiatives of the central structure of the Public Ministry and the Ministry of
Justice, together with the other stakeholders, a central working group was established to
coordinate the national IP enforcement policy comprising representatives of all the
institutions involved. This proved essential for improving the IP enforcement in Romania, or
as the last peer review reflected, “the creation of a high level decision making group has
been critical”.197
At the European level, a significant progress in this direction was achieved by the Council
Act of 28 November 2002, with a Protocol amending the Europol Convention. The Protocol
stipulates that Europol can ask the competent authorities of Member States to initiate
conduct or coordinate criminal investigations in specific cases. If the competent authorities
decide not to positively respond to this request, they shall inform Europol of their decision
unless it has to be kept confidential for reasons related to national security or for the success
of other ongoing investigations. The Protocol also provides for the inclusion in the Europol
Convention of an article regarding the participation of Europol officials in joint investigation
teams if they are investigating crimes falling within the Europol competence.
The cooperation possibilities contemplated by the creation of joint investigative teams are
potentially highly innovative. Joint and common investigations carried out by different
countries imply in fact that they should be valid and enforceable by the courts of all countries
196
Ministerio de Cultura de España (2008), Manual de buenas practicas para la prosecución de los delitos
contra la propiedad intelectual
197
Source: WIPO, Advisory Committee on Enforcement, Romanian efforts to improve awareness of
decision makers and public on issues related to the enforcement of intellectual property rights (2006), p.12.
taking part in the investigation. The creation of joint investigative teams can be performed
under specific conditions:

They must arise from complex investigations conducted by a Member State but
having repercussions in other countries of the European Union;

They must investigate crimes that require coordinated action with the participation of
more than one Member State.
Investigation teams will be headed by a representative of the competent Member State in
which the team operates and will operate in accordance with the law of the Member State in
which the team is intended to conduct its operations. Furthermore they will be created only
with the mutual agreement of the Member States concerned, for a specific purpose and for a
limited period extendable only with the agreement of all the parties.
Another instrument at the European level is the Supplementary Information Request at the
National Entries (SI.RE.NE) and is a link service ensuring a continuous assistance, 24h per
day, for the police forces of EU Member countries. This is one of the so called
"compensation mechanisms” adopted by the EU to balance the effects of the free movement
of persons and vehicles, since in the Schengen no internal border controls are usually
foreseen.
The SI.RE.NE offices are a unique point of contact, where representatives of all the National
authorities related to the Schengen Information System operate. Their main task is the
analysis of "reports" included in the Schengen Information System (SIS) and the
implementation of specific monitoring measures. They also play a key role in cross-border
police cooperation.
In particular, these offices provide additional information for the alerts, coordinate the
measures related to alerts in the SIS, and ensure that appropriate measures are taken in
different cases, for instance: if a wanted person is arrested, if a person who had already
been refused entry attempts to enter the Schengen area, if a missing person is found or a
stolen car or ID document are seized.
EUROJUST is an agency of the European Union dealing with judicial co-operation. It is
composed of national prosecutors, magistrates or police officers of equivalent competence
from each of the EU states. Its task is to enhance the effectiveness of the national authorities
when they are dealing with the investigation and prosecution of cross-border and organised
crime.
The Southeast Cooperative Initiative, SECI Center, is an operational regional organization
bringing together police and customs authorities from 13 member countries in Southeast
Europe. The Center supports the national customs and law enforcement agencies by
offering a trusty environment for information sharing, knowledge development, joint planning
and common action in the field of trans-border crime. Member States of SECI Center are:
Albania, Bosnia and Herzegovina, Bulgaria, Croatia, Greece, Hungary, F.Y.R. of Macedonia,
Moldova, Montenegro, Romania, Serbia, Slovenia and Turkey. The SECI Center's network is
composed of the Liaison Officers of Police and Customs Authorities from the member
countries, supported by 13 National Focal Points established in each member state. The
NFP representatives stay in permanent contact with the liaison officers in the headquarters
and keep close relationships with the police and customs authority in the host country. The
National Focal Points assure the rapid information flow, by collecting and distributing the
information requests and answers from and to the law enforcement agencies and the
headquarters liaison officers.
The SECI Center will transform into SELEC - Southeast European Law Enforcement Center
- once two thirds of the Member States have deposited their instruments of ratification of the
Convention of SELEC signed on the 9th December 2009, during a ceremony organized in
Bucharest, Romania, together with celebrating 10 years of the SECI Center198.
International Collaborations199
Counterfeiting is a transnational crime, since counterfeit goods are often produced in
countries other than the ones where they are purchased and consumed. Counterfeit goods
are often transported across borders, thus involving different customs and border authorities.
For these reasons, international collaborations musts to be properly set up and promoted in
order to combat counterfeiting.
We itemise in the following paragraphs some of the most important International agreements
signed during recent years and some police/customs operations carried out at the
international level.
International Agreements
1. The EU-US Action Strategy for the Enforcement of IPR was adopted at the EU-USA
Summit held in Vienna on 21st June 2006. This Action Strategy has three main goals:
1) promote enforcement of related laws by customs and border control officials, 2)
strengthen cooperation among the parties, 3) promote public-private partnerships.
In order to achieve the first goal, the Action Strategy introduces measures such as
the exchange of IPR border enforcement practices and experiences, as well as the
exchange of information on IPR seizures and the introduction of a joint IPR border
enforcement action. As far as the second goal is concerned, bilateral networks with
third countries have been created, in primis with China and Russia. Such networks
facilitate the exchange of information, technical assistance and joint industrial
practices related to the enforcement of relevant laws. With regard to the third goal,
joint public-private discussions have been organised and representatives from
various business sectors have been invited to exchange information and intelligence
with law enforcement agencies.
2. The EU-China Project on the protection of the IPR, launched in 2007, defines which
technical assistance shall be provided by EU to China with regards to the
enforcement of China’s IPR regulation. Such technical assistance includes: 1) the
training of custom officers ; 2) the exchange of expertise, best practices and knowhow; 3) cooperation between a network of authorities, including Chinese and
European right holders and other stakeholders; and 4) techniques for a more
effective enforcement of IPR regulations.
3. This agreement should increase the level of trust in future EU-China trade
relationships.
4. According to the Agreement on Trade, Development and Co-operation between the
European Community and its Member States and the Republic of South Africa, which
entered in force on 1st January 2000, the Community may provide technical
assistance to South Africa in the preparation of laws and regulations for protection of
IPR; the establishment and reinforcement of domestic offices and other agencies
involved in enforcement and protection, including the training of personnel.
198
For a more in-depth analysis of SECI Center’s activities: http://www.secicenter.org/m105/Home
Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in the EU:
report on best practices (unpublished version)
199
5. According to the Framework Trade and Co-operation Agreement between the
European Community, its Member States and Korea, which entered in force on 1st
April 2001, parties should respect the obligations contained in multilateral IPR
conventions, integrate the TRIPS within their national legislation and facilitate
cooperation between customs authorities.
International Operations
1. The Joint Customs Operation “Infrastructure”, carried out in November/December
2007, was the first IPR enforcement operation undertaken by Customs and Border
Protection (CBP) and the European Union. It created a close relationship between
European Union and United States customs reinforcing the EU-US Action Strategy
for the Enforcement of Intellectual Property Rights. The operation consisted of
cooperation and the exchange of information, concerning counterfeit goods, between
EU and US customs. This action strategy was implemented especially for the seizure
of counterfeit integrated circuits and computer networking equipment. In all, over
360,000 counterfeited integrated circuits bearing over 40 different trademarks were
seized. These kinds of goods were chosen for the strategy because they have an IPR
infringement risk and also a high safety risk.
2. Joint Customs Operation “Diabolo II”.
The Asia-Europe Meeting (ASEM) is a form of informal cooperation between Asia
and Europe which started in 1996. Many initiatives have been suggested to
strengthen relationship between these two continents in the fight against counterfeit
goods. One of the objectives of ASEM partners is to increase customs cooperation.
During the 7th meeting, held in Yokohama in November 2007, it was decided to
implement operation “DIABOLO II”. This operation was signed by all 27 EU Member
States and 13 Asian countries (Burma/Myanmar, Cambodia, Indonesia, Japan, Laos,
Malaysia Mongolia, Pakistan, the Philippines, Singapore, Republic of Korea,
Thailand, and Vietnam). DIABOLO II was organised and coordinated by the
European Commission.
The operation focused on containers shipped from Asian ports of loading to EU ports
of discharge. Each country appointed a national contact point which was responsible
for the gathering of national data and its transmission to other countries, ensuring its
confidentiality. This operation, focused mainly on counterfeited cigarettes but also on
other products, leading to the seizure of more than 65 million counterfeited cigarettes
and 369,000 other counterfeited items, bearing over 20 different trademarks.
3. Operation “Mamba”
Operation “MAMBA” is the first combined INTERPOL and WHO (World Health
Organization) operation targeting counterfeit pharmaceutical products. The operation
was carried out by the WHO’s International Medical Products Anti-Counterfeiting
Taskforce (IMPACT). The aim of IMPACT is to raise awareness of the dangers of
counterfeit medical products and to curb their manufacture and distribution. In many
countries, especially in Africa, counterfeit medical products (such as fake antimalarial drugs) represent a big problem. Operation Mamba is deployed in Uganda
and Tanzania. In this Operation multiple law enforcement agencies (police, drugs and
financial crime authorities) joined forces to confiscate counterfeit medicines.
INTERPOL and IMPACT organized a two-day training course in each country on
methods and procedures of anti-counterfeiting, to support cross-agency efforts to
combat transnational organized criminals who manufacture and distribute counterfeit
medical products throughout Africa. An investigative guide produced by the
Permanent Forum on International Pharmaceutical Crime was also distributed.
4. Operation Matthew II
The Joint Customs Operation, code-named Matthew II, was aimed at detecting the
smuggling of cigarettes in commercial consignments entering the EU by road. The
operational phase took place from 24 November to 3 December 2009 and large
seizures of cigarettes carried in personal cars and buses were reported. Controls
were focused on methods of transport entering the EU customs territory from third
countries via the eastern EU border.
The operation was organised by the Czech Republic, in close cooperation with
Poland and the European Commission (OLAF) which provided organizational and
technical support. All Member States were invited to participate in the JCO Matthew
II, as were Europol and the WCO/RILO WE (World Customs Organization / Regional
Intelligence Liaison Office for Western Europe). The WCO/RILO WE supported the
joint operation by means of analytical activity. Selected non-EU Member States
(Croatia, Russia, Serbia, Norway and Switzerland) were also invited to participate in
this operation.
The Operation has led to the seizure of more than 16 million cigarettes, 241
kilograms of tobacco products, 6 400 litres of alcohol, 20 tonnes of counterfeit
perfumes, 53.418 other counterfeit items such as bags, coats, scarves, wallets, and
1.515,75 kilograms of cannabis. During the operational phase, additional seizures of
more than 25 million cigarettes also took place in some EU ports.
6.2. Prosecution. Legal Proceedings200
200
The present paragraph is based on the following sources: Romania country profile, by Transcrime &
Vilau D.M., 2010, Anti-counterfeiting measures, country chapter: Romania.
6.2.1 Jurisdiction in Cases of Counterfeiting: Criminal or Civil cases
Box 14
Criminal cases
-
According to art. 27 para. 1 (e1) of the Criminal Procedure Code Tribunals have
jurisdiction for IPR cases in first instance
Tribunals’ decisions may be appealed in front of the Courts of Appeal and a second
appeal may be lodged in front of the High Court of Cassation and Justice
Criminal investigations are conducted by prosecutors from the Prosecutors’ Office
attached to the court having jurisdiction for the case
Civil cases
-
According to art. 2 para 1 (e) of the Civil Procedure Code Tribunals have jurisdiction for
IPR cases in first instance
Tribunals’ decisions may be appealed in front of the Courts of Appeal and a second
appeal may be lodged to the High Court of Cassation and Justice.
6.2.2 Main Proceedings
Precedents in Romania concerning copyright infringements
“The Romanian rock band Vama recently lost a legal battle against another rock band Trupa
Veche over copyright infringement involving songs composed during the existence of their
common former band Vama Veche. This is the first time a Romanian court has ruled on an
issue involving a copyright infringement between two rock bands. It is expected that this
case will form an important precedent in Romania’s copyright practice.
The lawsuit began in December 2006, when three members of Trupa Veche sued Vama for
performing their former band’s songs on tour without their approval.
On 11th March 2010, the Romanian Supreme Court ruled against Vama for breaching the
copyright law, ordered them to pay EUR 15,000 (USD 20,674) in damages and legal costs,
and forbid them to perform the Vama Veche songs without the authors’ consent”.201
Internationally, the law has prescribed very effective remedies to fight disease of
counterfeiting in most jurisdictions. The U.S. Trademark Act in various jurisdictions
dispenses a deterrent punishment for counterfeiters which may include a jail sentence and
stringent fines (asides from the confiscation and destruction of the counterfeiting articles). In
Thailand, counterfeiting is even punishable by death. In addition to criminal remedies, the
law of most countries also provides the brand owner remedies under the civil law by which
suits for damages can be filed and damages obtained swiftly and efficiently.
“In most jurisdictions, counterfeiting is being attacked in a random, haphazard and
unsatisfactory manner. Anti-counterfeit actions are handled either by law firms or agencies
headed by retired police or government officials. These actions take the form of minimalistic
investigation by 'informants' followed by 'raids' on 'unearthed retailer of counterfeit goods'.
The raids are conducted with the help of police officials either directly or under the orders of
a local judicial officer such as a magistrate.
Counterfeit goods seized in the course of these raids are confiscated and destroyed. The
person who is raided generally ends up paying 'compensation'. A portion of which goes
towards financing the raid and a fraction goes towards the brand owner. If a case is
201
Source: Libertatea.ro in http://www.petosevic.com/resources/news/romania
registered, this is necessarily required to be compounded or quashed in legal systems where
criminal cases relating to IPR cannot be compounded. The brand owner is proudly presented
periodically with a report on the number of raids successfully conducted, the amount of
counterfeit goods seized, and the compensatory amounts collected along with undertakings
from individuals not to repeat the activity. There is almost no initiative to pursue complaints
to conviction. A trial is needed is for a conviction. Criminal trials need to be meticulously
conducted by lawyers proficient in the criminal process. These trials can be time consuming
and relatively more expensive than the process of obtaining the initial orders and conducting
'raids'. This failure to oversee the proceedings to its conclusion, however, is the root cause of
the escalation of the problem. Truncating the anti-counterfeit proceedings by settlement is
equivalent to prematurely ending antibiotic treatment on the second day of a five day course,
when the patient apparently feels dramatically better and healthy. This can lead to the
danger of relapse and also the possibility that the microbe becomes resistant to the
treatment”. 202
6.2.3 Bringing Evidence into Court
Existing practices in the U.K. 203
The general principle with criminal proceedings within the United Kingdom is that a witness
should give evidence orally in a court of law or, as an alternative, a written statement.
In advance of any trial, a prosecutor must disclose the existence of the statement identifying
the counterfeit goods to the defence. The defence can request for a copy of the statement
and of any test results based on experts’ findings on the counterfeit goods. A clear and
concise expert’s statement can contribute greatly towards encouraging a ‘guilty’ plea; while
any contradictions in such statements will encourage the evidence to be contested and/or
enter for a ‘not guilty’ plea.
A witness bringing evidence into court must primarily give details regarding her/his
qualifications and her/his appropriate experience. Furthermore, her/his statement should
give details on the literature or other information used by or provided in reaching a particular
opinion. For instance, she/he can declare if the trademark owner has a manual for identifying
counterfeit goods.
All information given must be proven to have substance. The expert witness should provide
the information received that led to the preparation of the report/witness statement. The
witness must prove that the trademark is officially registered. The integrity of the counterfeits’
sample plays a pivotal role in the trial. It is also necessary to identify when the sample was
received. It is preferred not to identify any individual involved.
Anyone who makes a statement, whether within the UK or abroad may be called to give
evidence in person at court. It is the witness’ responsibility to attend court, even if the
arranged time is inconvenient. The witness should describe the sample, by stating the points
of difference between the genuine and the counterfeit item. It may be relevant in some cases
to exhibit a genuine product to compare against the counterfeit version.
6.2.4 The Prosecutor’s Role in the Criminal Case
The basic role and function of prosecutors vary considerably among legal systems,
particularly with the civil law system and the common law system. The role that prosecutors
202
Mohan Dewan at http://EzineArticles.com/?expert=Mohan_Dewan
The source of this paragraph is The Anti-Counterfeiting Group (seventh revision, April 2010), ACG
guidance note. Guidelines for Witnesses in Counterfeiting, based upon the Criminal Procedure Rules 2010,
effective from 5 April 2010.
203
have can vary significantly in the pre-trial phase – during the actual investigation of a
crime.204 In inquisitorial systems, as in Italy, ‘the prosecutor is duty bound to begin
investigations immediately on receipt of a notitia criminis, that is, as soon as she/he is aware
of the possible commission of a criminal offence. If, after investigation, the Prosecutor
considers that there is sufficient evidence to prosecute, she/he is legally bound to prosecute.
Yet she/he does not enjoy any discretionary power. Though, discretionary power exists in
other civil law countries such as in France and Belgium, it is tightly controlled within the UK.
As emphasised in the preamble of the United Nations Guidelines on the Role of the
Prosecutors, it is essential for States ‘to ensure that prosecutors possess the professional
qualifications required for the accomplished of their functions, through improved methods of
recruitment and legal professional training, and through the provision of all necessary means
for the proper performance of their role in combating criminality, particularly in its new forms
and dimensions’205.
The UN guidelines include several paragraphs, which stress the importance of the role of the
prosecutor in maintaining the rule of law and criminal justice. Prosecutors shall perform an
active role in criminal proceedings. Responsibilities include: institution of prosecution; when
authorized by law or consistent with local practice, in the investigation of crime, supervision
over the legality of these investigations; supervision of the execution of court decision and
the exercise of other functions as representatives of the public interest.
The Public Ministry (prosecutors’ offices)
For Romania, a central role in ensuring the proper enforcement of IPR and coordination of
the various institutions in this field was recently entrusted to the General Prosecutors Office
(GPO)206, a department of the Public Ministry207.
According to the Romanian Constitution the Public Ministry functions under the Minister of
Justice’s (MoJ) authority. It should be clearly stated that the MoJ retains no authority over
cases but only has a coordinating role. According to the legal provisions, upon proposal of
the general prosecutor the MoJ, set up, by Order 412/2006 a specialized IPR unit, within the
GPO. The unit is composed of 10 prosecutors specializing in IP crime and organized in two
tiers:

Operative sub-unit: prosecutors effectively working on IPR cases

Studies sub-unit: prosecutors centralizing data countrywide, studying the process of
investigation of IPR cases, drafting analyses and disseminating them in the country,
for the appropriate, unified and efficient enforcement of IPR.
This structure acts as a central hub for coordinating the other institutions. Its responsibilities
include: centralizing the relevant data needed for the enforcement of IPR from the other
institutions and private entities; coordinating the development of activities of the Prosecutor’s
Office and all prosecutors within Romania (including resources and training); monitoring the
implementation of the National Strategy - Action Plan; organizing meetings to optimize the
204
UNICRI & UNODC, Investigation, prosecution and adjudication of drug – related cases (200?), pp.102-
104
205
United Nations, Guidelines on the Role of the Prosecutors, Adopted by the Eight United Nations
Congress on the Prevention of Crime and Treatment of Offenders, Havana, Cuba, 27 August to September 1990
206
The General Prosecutors Office is officially named the Prosecutors Office attached to the High Court of
Cassation and Justice and is the central prosecutorial structure that coordinates the other prosecutors’ offices
countrywide. The GPO and the rest of prosecutors offices, which function attached to the courts, form the Public
Ministry
207
WIPO, Advisory Committee on Enforcement, Romanian efforts to improve awareness of decision
makers and public on issues related to the enforcement of intellectual property rights (2006), p.6
working methods and establishing best solutions to streamline the legislation and its
implementation; and ensuring communication and cooperation between Government
institutions and anti piracy/counterfeiting groups.
Another important measure includes the appointment in each prosecutor’s office attached to
tribunals of at least one prosecutor to deal with IP cases. Special training programmes are
designed and organised for these prosecutors. This measure is taken according to the
Action Plan. It should be regarded as bringing the penal IP cases up to the level of tribunals
and prosecutors offices. Furthermore, it reflects the growing importance now placed upon IP
crime.
Government Emergency Ordinance n. 190/2005 includes provisions to increase efficiency in
prosecuting offences against IPR:
1. IPR offences are prosecuted ex officio and the possibility of amiable settlement of
criminal litigation has been eliminated
2. IPR offences are under the jurisdiction of tribunals
3. IPR offences are investigated by more experienced prosecutors at the level of county
offices (minimum 4 years length of service)
4. IPR offences related to organized crime are investigated by the specialized
department within the Prosecutors’ Office attached to the High Court of Cassation
and Justice208
6.2.5 Asset Recovery
Asset recovery is a very recent field of international activity in countering a variety of crimes.
It involves an efficient and effective criminal justice system, sound preventive policies, and
transparent financial regulations.
The high priority accorded to asset recovery initiated numerous international initiatives.
Examples include, the StAR (the Stolen Asset Recovery Initiative), the ADB/OECD AntiCorruption Initiative for Asia and Pacific, the International Centre for Asset Recovery (ICAR)
at the Basel Institute on Governance, U4 Anti-Corruption Resource Centre and other entities.
Article 6 and article 12 of the UN Convention on Transnational Organized Crime (the
Palermo Convention) deal with such areas, particularly on the criminalization of the
laundering of proceed of crime and the confiscation and seizure of those proceeds of crime.
Asset recovery is relevant in cases of seizure or forfeiture of counterfeit goods. Recovered
assets and proceeds of illegal counterfeiting activities may be used in order to compensate
the material (and moral) damages of the victims.
Existing good practices in EU
Some EU countries’ internal laws already possess such measures.
208

In Austria, for the civil remedies and in particular the proceedings on merits, “(b) in
case of negligence, the payment of damages – including lost of profits and moral
damages – or the handing over of any asset made by the infringement” is foreseen.

In Belgium, the civil measures adopted only deal with the seizure of counterfeit goods
during the preliminary proceedings. Proceeds generated by illegal activity, personal
or real goods of the suspected infringer and the freezing of the infringers’ bank
account. As far as the damages within the proceedings on merits concern: “(c) the
Ibid, p.16
confiscation of all profits made by the unauthorized use of registered trademark” is
stated.

In Estonia, civil law holders may claim compensation for damages, whether material
or moral. Material damages may include damage to assets and loss of profits.

In the Czech Republic, within proceedings on merit, the removal action and
destruction of infringing goods can occur. The court can consider the profits obtained
through the violation of the law in order to calculate damages.
Assets recovery measures are taken into consideration by the national laws mainly within the
civil remedies, as mentioned previously. The shortage of juridical measures concerning this
challenging matter can be regarded as a gap in the national and European legislative
framework. An important step forward should involve both single States and the EU as a
whole. Furthermore, applied research in this field may play a significant role.
6.3. The Role of the Private Sector
6.3.1 Experience, Exchange and Knowledge Sharing and Cooperation with the Private
Sector in Terms of Information-Exchange
Prosecutions of IP crime depend on the cooperation between IP owners and law
enforcement. Without the sharing of information, prosecutors can neither determine the most
effective overall enforcement strategies, nor meet the burden of proof in a given case.
The Canadian IP council is a Canadian business coalition designed to provide a central
voice to press for stronger IP protection both in Canada and worldwide. They suggest the
following steps for private sector collaboration with law enforcement209:
209

Conduct a thorough investigation: investigations encompass a variety of investigative
steps including interviewing witnesses, acquiring counterfeit goods, conducting
surveillance of suspects as well as an examination of computers and other services

Document all investigative steps: maintain a record of investigative steps employed
(to be presented to law enforcement and entered into evidence)

Preservation of evidence

Contact law enforcement agencies without delay: early referral is the best way to
ensure that all investigative avenues are fully explored

Assist in the identification of stolen IP: law enforcement may call upon an owner’s
representative or expert to examine items obtained during an investigation to
determine their origin or authenticity […] in certain investigations LEAs may wish to
have an intellectual property owner present during the execution of a search warrant
to help agents identify specific items to be seized.

Share the results of internal investigations or civil lawsuits with law enforcement

Participate in law enforcement task forces

Help train law enforcement authorities

Registering IP by ‘private sector’: the resources of law enforcement and customs are
limited; the private sector should provide them as much information as possible. They
The Canadian IP Council, Intellectual Property: Enforcement Manual. A Practical and Legal Guide for
Protecting Your Intellectual Property Rights, p.19
also have to designate a central point of contact (an individual or a group) which
Customs can work with, to deal with the counterfeiting problem.

Help Customs to be helped by them: providing customs with tools, like a dedicated
email address for them to send in info or request; a secure webpage; a reference
manual etc.

Help train customs officials: there is no substitute for one-on-one training; training
seminars [by enterprises] should be complemented by the distribution of product
identification manuals, security feature identifiers etc.

Responding to inquiries regarding suspect goods

Following up on seizures.
Existing best practices in the EU
INTERPOL works as a catalyst to encourage police, customs, international organizations,
the public health sector, cross-industry representative bodies, IP crime affected industries
and other stakeholders to work together to combat transnational organized counterfeiting
and piracy.
The database that INTERPOL is developing within the IPR programme to further improve the
exchange of information and intelligence on this subject is presented below:
Box 15
Database on International Intellectual Property Interpol
The INTERPOL Database on International Intellectual Property (DIIP) Crime is an autonomous
iBase database containing information on transnational and organized IP crimes.
It has been specifically developed to be a depository for private sector industry information on
transnational and organized IP crime. The DIIP Crime neither competes with established public
sector IP crime databases nor duplicates existing IP crime data collection mechanisms.
Data contained in the database will be subjected to criminal analysis to identify links between
transnational and organized cross-industry sector IP criminal activity; facilitate criminal
investigations; and develop regional and global strategic IP crime reports.
INTERPOL does not disclose information contained in DIIP. Participating industries receive
feedback in the form of referrals indicating that two or more industries are being targeted by the
same transnational organized criminals.
Arising benefits:
 It is used to inform and facilitate law enforcement interventions in transnational organized
IP crime
 It is used to produce regional and global strategic IP crime reports
 Improves the information flow between stakeholders and leads to more effective
international law enforcement
The expressed purpose of DIIP is to collect reliable information about transnational organized
criminals from IP crime affected industries. Industries often know the identity of the individuals or
groups who attack them. They are the same people that affected industries take civil actions
against to protect their IP and enforce rights.
Information collected to support civil actions is expensive and typically once the civil action is
complete the information is not used for any other purpose. This information is a valuable resource
since it contains information about transnational organized criminals. Pooling the information in
DIIP adds value to the information and improves its cost effectiveness. Pooled information is
searched to identify links between all IP crime affected industries and can then be used for the
collective benefit of all stakeholders.
The priority is to ensure that confidential and proprietary information provided by participating
industries is not disclosed.
Information contained in DIIP will be subjected to criminal analysis to identify links between
transnational and organized cross-industry sector IP criminal activity, facilitate criminal
investigations, and develop regional and global strategic IP crime reports.
Source: Interpol
Member countries working within the INTERPOL IPR Programme
Source: Interpol
Interpol issued a ‘Recommended Minimum Global Standard’ for the Collection of Information
on Counterfeiting and Piracy by the Private Sector.
The purpose of the INTERPOL Recommended Minimum Global Standard is to provide IP
crime affected private sector entities with guidance about the type of information they should
consider collecting about transnational and organized IP crime attacks on their interests.
It is expected that private sector entities will continue to collect data on their business
activities. The information collected for this purpose, however, will not necessarily be
information which can be used to identify if they are being attacked by the same organized
criminals that are also attacking other entities or industry sectors.
Some private sector entities do systematically collect information about how transnational
and organized IP criminals affect their business. Other private sector entities do not collect
such information, but may wish to do so in the future.
The Recommended Minimum Global Standard provides both types of private sector entities
with recommended minimum standards for the collection of information, which is compatible
with searchable information fields, contained in the INTERPOL DIIP Crime.
In the event that the private sector entities adopt the Minimum Global Standard it will enable
the information to be easily assimilated into the INTERPOL DIIP Crime in accordance with
DIIP Data Handling and Referral Procedures.
The Minimum Global Standard will also enable private sector entities to share information
about transnational and organized IP crime with each other more effectively.
Annex table:
http://www.interpol.int/Public/FinancialCrime/IntellectualProperty/DIIP/ExplanNotes.asp
6.3.2 The Contribution of the Private Sector during the Evidence-Gathering Monitoring
Process210
The monitoring of counterfeit market activities serves two purposes. Firstly it helps to identify
incidents of counterfeit trade and allows for timely responses at an operational level.
Secondly it provides management with information on the development of the counterfeit
market and thus supports decision-making as well as market observations or competitor
analyses for the licit market.
Information exchange across industry associations (and between industry associations and
institutions, law enforcement agencies etc.) is desirable as an illicit producer often targets
more than one brand within the same product category; implementing monitoring processes
is closely related to awareness training.
If a larger number of counterfeit products are sold on a regular basis, illicit actors need to
establish some sort of stable distribution channel to market their products. In such cases,
brand owners must obtain timely data on shipment routes, sales channels and identifying
features of imitation products to ease product inspections at other locations.
Monitoring activities often call for the engagement of local investigators to track down middle
men and the identification of sources of counterfeit production.
210
The main source for the whole paragraph is Staake T., Fleisch E. (2008), “Countering Counterfeit Trade.
Illicit market insights, Best-Practice Strategies, and Management Toolbox”, Springer-Verlag (editions), Berlin
Heidelberg, chapter 5.
Local contacts can also support test purchases in suspect stores or help to analyze warranty
claims, etc. Frequent counterfeit cases also lead to better market insights, thus helping to
identify high-risk distribution channels and typical import routes.
The relevant information sources as well as selected recommendations for organizing data
collection and reporting activities are outlined below:
Customs enforcement statistics
Pro: they provide the basis for counterfeit market share analyses. They also reveal other
information such as locations of production, import routes and addresses; they may help to
predict the future development of counterfeit activities.
Con: official statistics rarely provide timely information, they are strictly dependent on
Customs performance and are thus only of limited value for triggering reaction processes.
Consumer surveys
Pro: they can provide a variety of information on market penetration and the availability of
imitation products, pricing strategies of counterfeit actors, sales channels, consumer
behaviour and awareness, reasons for and against buying counterfeit goods, characteristics
of counterfeit consumers, the perceived impact on the exclusiveness and reputation.
Con: surveys are difficult to design and they are expensive to conduct if the required sample
size has to be high.
Sampling
Pro: it provides the brand owner with information on how counterfeit goods are sold and
allows for a detailed physical analysis of the products after purchase.
Con: the approach is relatively expensive especially if the authentication procedure is
destructive and if the share of counterfeit articles is small.
Company-internal data
Pro: they can provide timely information on counterfeit occurrences; an analysis of warranty
cases or consumer inquiries constitutes a more sensitive instrument.
Con: the analysis of warranty cases is only applicable with respect to deceptive counterfeit
cases where customers are concerned about unannounced changes in product appearance,
taste etc.
Data on counterfeit production facilities may help to gain a better understanding of the
mechanism of counterfeit trade. Related information facilitates retrospective cross-checks of
other monitoring activities.
Information provided by supply chain partners
Within the corporate world and especially organizations which are not directly affected by a
given counterfeit case, established personal contacts appear to be essential for thorough
information exchange.
Information from competitors often proves helpful as counterfeit actors frequently target more
than one product or brand. Industrial associations play an important role in establishing
contacts among brand-protection experts.
Information from Internet research
The World Wide Web constitutes an important distribution channel especially for nondeceptive counterfeiters and for deceptive counterfeit products that consumers tend to avoid
purchasing in person.
Reporting activities
The information obtained from the various sources has to be organized, processed and put
into a form which is suitable for presentation and communication to a given audience that
does not necessarily consist of anti-counterfeiting experts.
The frequency of reporting depends on the magnitude of threats. Standardized reporting
tools may also help to increase awareness of the problem among senior management,
provide an organ for brand-protection experts, foster information exchange between different
business units and functions, and help to document the company’s anti-counterfeiting efforts.
Reaction processes
Trademark and copyright holders have the prime responsibility for initiating measures to
protect their goods […] the reaction process may be subdivided into 6 steps:
1. Withdrawing counterfeit articles from circulation:
Initiating product seizures is the first step to avert danger from the customer; the brand
owner may require search warrants and support from the police. Seizures become more
difficult the earlier they take place in the counterfeit actor’s value chain. The closer they are
to production, the more likely it is to cut off counterfeit supply.
2. Warning those who are affected by the imitations
The timeliness of information is critical, not only to prevent accidents but also to document
that the company is properly dealing with the case.
3. Finding/eradicate the source of illicit products
Brand owners should approach the occurrence of counterfeit goods in a constructive way
and collect as much information as possible to increase the chance of successful
prosecution of offenders.
4. Seeking the prosecution of offenders
Prosecution of offenders is the logical consequence of identifying illicit actors; even if it is a
difficult process. The importance of tacking legal steps should be stressed, even if they do
not directly affect the illicit financiers. They may lead to seizures of production machinery and
unsettle middle men, which can dramatically increase the cost of counterfeiting.
5. Managing the relationship with the informant and other supportive stakeholders
Most reactions are initiated after receiving hints from individuals such as customs officials or
managers from retail stores who are not directly associated with the brand owner.
6. Refining the anti-counterfeiting strategy
Details from individual cases should be fed back to adjust the monitoring process and
improve prevention techniques
In conclusion, the reaction processes are highly dependent on the affected product, country
and the nature of the individual case.
Box 16
Case Study
Operation Jupiter in South America (2005-2010)
Operation Jupiter was launched with the support and participation of the national police forces of
Argentina, Brazil and Paraguay. Brazilian customs also joined the operation, together with
representatives from pharmaceutical, recording, motion picture and tobacco cross-industry
representative bodies. The operation then involved 7 countries of Latin America; the Romanian
Police was also involved in this Operation.
INTERPOL IPR programme, which spearheaded Operation Jupiter, provides a central point of
reference to facilitate co-operation between law enforcement authorities and the public and private
sectors in the fight against transnational organized IP crime.
Under the umbrella of Operation Jupiter, police and customs agents from Argentina, Bolivia,
Brazil, Chile, Paraguay, Peru and Uruguay carried out 299 co-ordinated enforcement operations
resulting in 311 arrests and the recovery of a range of dangerous products including lifethreatening fake medicines, counterfeit foodstuffs, electrical goods and agrochemicals.
INTERPOL and the WCO worked with participating countries to identify the transnational
organized criminal groups involved in cross-border smuggling and to target resources accordingly.
Police and customs authorities in each country then launched investigations and combined
interventions to disrupt these frequently complex criminal activities.
An important part of Operation Jupiter was the close co-operation and support provided to
investigators by the private sector. “Public-private partnerships like this are pivotal for bringing
criminal counterfeiters to justice, while protecting the innovators, workers and consumers who rely
on intellectual property protection,” said Dr. Mark T. Esper, Executive Vice President of the U.S.
Chamber of Commerce’s Global Intellectual Property Centre.
Since the first phase of Operation Jupiter in 2005 – which involved just three countries – operations
throughout the region have so far resulted in nearly 700 arrests and the seizure of goods worth an
estimated USD 290 millions.
Source: Interpol
6.3.3 Cooperation Initiatives with the Business Sector
As several studies and reports emphasize, some business sectors are more exposed to
brand counterfeiting and IPR violations than others. Consequently, a more active role in
suggesting anti-counterfeiting initiatives can be expected from the sectors most at risk.
Common initiatives promoted by sector-related associations, as well as liaison with public
authorities and public institutions are examples of best practices.
1) Liaison between EU customs administrations and the pharmaceutical sector
A meeting was held on 14th September 2009 between the EU Commission, EU customs
administrations and EU pharmaceutical companies in Brussels. It was the first step in an
ongoing liaison between those parties. The main issue discussed regarded the effectiveness
of the seizure of goods suspected of infringing IPRs, carried out by customs during EU
border controls.
Participants discussed customs measures relating to the enforcement of patent rights at the
border, in particular the need to protect such rights effectively, whilst ensuring that “the
legitimate flow of and access to genuine generic products from manufacturer to customer
outside the EU was not restricted” (from the Joint Statement after the meeting, see below).
As a result of this meeting, EU custom authorities will extend and improve their collaboration
with EU pharmaceutical companies in order to prevent any chance that the detention of
suspected goods might hinder the legal trade of medicines. Such measures should speed up
control procedures and the procedures related to the releasing of suspected goods. Customs
will notify EU pharmaceutical companies about each and every case of goods suspected of
infringement. This joint commitment to act demonstrates the will to act in accordance with
EC Regulation 1383/2003.
2. Liaisons between Custom authorities and the semiconductor industry
The liaisons between customs experts and manufacturers of semiconductor devices
concerning anti-counterfeiting issues cover the following countries: China, Chinese Taipei,
European Union, Japan, Korea and the United States (countries adhering to the GAMS Governments/Authorities Meeting on Semiconductors).
For the first time, representatives from each of the six major regions involved in the
manufacturing of semiconductor devices (joined in the GAMS), met to discuss the problems
posed by counterfeit semiconductor products. On 21st – 22nd September 2009, customs
experts from China, Chinese Taipei, the European Union, Japan, Korea and the United
States convened in Korea, together with representatives from their relevant industries and
trade ministry officials. During the meeting customs experts shared experiences and best
practices in the fight against counterfeited semiconductor devices. Customs experts also
reaffirmed the need for governments to join forces and increase joint government/industry
cooperation in the fight against the counterfeit industry. It was also mentioned that a
particularly effective countermeasure, is that which gives customs officers access to
information about products manufactured and processes implemented by the semiconductor
industry. This type of information facilitates the identification of suspected counterfeit
products.211
211
The main source of this paragraph is Transcrime (2010), Anti-brand counterfeiting in the EU: report on
best practices, unpublished version, pp. 57-59.
SOURCES
Agenzia Delle Dogane, www.agenziadogane.it/wps/wcm/connect/ed/Servizi/F.A.L.S.T.A.F.F.
BBC News, International counterfeit goods raids
http://news.bbc.co.uk/2/hi/uk_news/8576691.stm
BBC Newsround, How well can you spot a fake?
http://news.bbc.co.uk/cbbcnews/hi/newsid_7650000/newsid_7657300/7657362.stm
CEIPI (Centre d’études internationales de la propriété intellectuelle), (2004) Impacts de la
contrefaçon et de la piraterie en Europe – Rapport Final:
Dewan, Mohan Multi Pronged Effective Strategy For Anti Counterfeit Actions,
http://EzineArticles.com/?expert=Mohan_Dewan
DGLC (Direzione Generale per la Lotta alla Contraffazione) – Ufficio Italiano Brevetti e
Marchi, (2009), Rapporto sulle attività del 2009
EU Counterfeiting and Piracy Observatory, Corrective Measures in IPR infringements, online
available HTTP:
http://ec.europa.eu/internal_market/iprenforcement/observatory/index_en.htm
EUROPOL, Camorra-type clan behind massive counterfeiting of power tools and clothing,
press release, available at:
http://www.europol.europa.eu/index.asp?page=news&news=pr100521.htm
Fitzgerald D.G., (2007) “Informants and undercover investigations: a practical guide to Law”,
Policy and Procedure, New York: Taylor & Francis Group
http://counterfeiting.unicri.it/docs/IACD.A%20key%20information%20resource%20to%20co
mbat%20the%20global%20plague%20of%20counterfeiting.2009.pdf
http://counterfeiting.unicri.it/docs/study_ceipi_counterfeiting_fr.pdf
ICC Counterfeiting Intelligence Bureau, (2009) International Anti-Counterfeiting Directory
INDICAM, (2005) Lotta alla contraffazione e tutela penale, fact sheet of Indicam Congress of
28 February, Milan
International & Trade Security Branch, Customs Division, (2008) Intellectual Property Rights
(IPR) Manual Customs action against goods suspected of infringing certain intellectual
property rights and the measures to be taken against goods found to have infringed such
rights, Ireland
International Anti-Counterfeiting Directory, (2009) A key information resource to combat the
global plague of counterfeiting
INTERPOL Database on International Intellectual Property,
http://www.interpol.int/public/FinancialCrime/IntellectualProperty/DIIP/Default.asp
INTERPOL Database on International Intellectual Property (DIIP) Crime,
http://www.interpol.int/Public/FinancialCrime/IntellectualProperty/DIIP/ExplanNotes.asp
INTERPOL, (2007) Guide To Intellectual Property Crime And Investigations, Lyon
IPO Crime Group, IP crime Report 2009/2010, United Kingdom
Ministerio de Cultura de España, (2008) Manual de buenas practicas para la prosecución de
los delitos contra la propiedad intelectual, Spain
Ministero dell’Interno, (2004) “Commercio abusivo e vendita di prodotti contraffatti: come
agire”, Manuale operativo, Rome, Italy
Schott P.A., (2006) Reference Guide to Anti-Money Laundering and Combating the
Financing of Terrorism, World Bank, Washington D.C.
Staake T., Fleisch E., (2008) Countering Counterfeit Trade. Illicit market insights, BestPractice Strategies, and Management Toolbox, Berlin Heidelberg: Springer-Verlag
The Anti-Counterfeiting Group (seventh revision, April 2010), ACG guidance note.
Guidelines for Witnesses in Counterfeiting, based upon the Criminal Procedure Rules 2010,
effective from 5 April 2010
The Canadian IP Council, Intellectual Property: Enforcement Manual. A Practical and Legal
Guide for Protecting Your Intellectual Property Rights
The Partnership for Safe Medicines, (2005) Counterfeit Drugs in Europe, fact sheet, online
available HTTP: http://www.safemedicines.org/resources/europe.pdf
Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand
Counterfeiting in the EU: Report on International and National Existing Standards
(unpublished version)
Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand
Counterfeiting in the EU: report on best practices (unpublished version)
Tual D. (2008), Evolution de la lutte contre la contrefaçon et la piraterie en Afrique – éléments
d’analyse et perspectives, Belgium
U.S. Customs and Border Protection, http://www.cbp.gov/xp/cgov/trade/priority_trade/ipr/
UNICRI (United Nations Interregional Crime and Justice Research Institute), (2010)
Strategies for technical-juridical training and awareness raising on counterfeiting,
(unpublished Italian version)
UNICRI (United Nations Interregional Crime and Justice Research Institute), (2010)
Strategies for technical-juridical training and awareness-raising on counterfeiting, Turin
UNICRI (United Nations Interregional Crime and Justice Research Institute) & UNODC
(United Nations Office on Drugs and Crime), (2008) Investigation, prosecution and
adjudication of drug-related cases in Afghanistan
UNIFAB (Unions des Fabricants), (2004) La lutte anti-contrefaçon. Manuel destiné aux
officiers de police judiciaire, 2nd edition
UNIFAB (Unions des Fabricants), (2005) Rapport sur la contrefaçon et la criminalité
organisée, 3rd edition, available at : http://www.unifab.com/doc/2005/rapport_c05.pdf
United Nations, Guidelines on the Role of the Prosecutors, Adopted by the Eight United
Nations Congress on the Prevention of Crime and Treatment of Offenders, Havana, Cuba,
27 August to September 1990
United States Food and Drug Administration (last update march 2010), Investigations
Operation Manual, chapter 8, available at:
http://www.fda.gov/downloads/ICECI/Inspections/IOM/UCM123515.pdf
United States National Intellectual Property Law Enforcement Coordination Council, (2008)
Report to the President and Congress on Coordination of Intellectual Property Enforcement
and Protection
Vilau D.M., (2010) Anti-counterfeiting measures, country chapter: Romania
WIPO (World Intellectual Property Organisation) (2006), Advisory Committee on
Enforcement, Romanian efforts to improve awareness of decision makers and public on
issues related to the enforcement of intellectual property rights, Geneva
Download