Reference Text for Trainers FAKES Fighting Against Brand Counterfeiting in Three Key European Member States. Towards a More Comprehensive Strategy Reference Text for Trainers June 2011 With the financial support from the Prevention of and Fight against Crime Programme of the European Union European Commission - Directorate-General Home Affairs 1 Reference Text for Trainers This publication reflects the views of the authors only, and the European Commission cannot be held responsible for any use which may be made of the information contained therein 2 Reference Text for Trainers ABBREVIATIONS (ACG) Anti-Counterfeiting Group (ADB/OECD) Asian Development Bank/OECD Anti-Corruption Initiative for Asia and the Pacific (AEP) Automated Entry Processing (AFSSAPS) Agence Française de Sécurité Sanitaire des Produits de Santé (French Agency for Sanitary Safety of Health Products) (APCO) Association of Public Safety Communications Officials (ARIPO) African Regional Industrial Property Organization (ASEM) Asia-Europe Meeting (BASCAP) Business Action to Stop Counterfeiting and Piracy (CBP) Customs & Border Protection (CCIAA) Camera di Commercio, Industria, Artigianato ed Agricoltura (Chamber of Commerce, Industry, Handicraft and Agriculture) (CD) Compact Disc (CEIPI) Centre d’Études Internationales de la Propriété Intellectuelle (CEN) Customs Enforcement Network System (CIB) Counterfeiting Intelligence Bureau (COI) Czech Commercial Inspections (CPU) Czech Anti-Piracy Union (DEA) Drug Enforcement Administration (DGLC) Direzione Generale per la Lotta alla Contraffazione (General Directorate for Combating Counterfeiting) (DIIP) INTERPOL Database on International Intellectual Property (DNRED) Direction Nationale du Renseignement et des Enquêtes Douanières (National Directorate of Customs Intelligence and Investigation) (DVD) Digital Video Disc (EAPO) Eurasian Patent Office (EC) European Commission (EMEA) European Medicines Agency (EPO) European Patent Office (ESPACENET) Europe’s Network of Patent Database (EU) European Union (EUCD) EU Copyright Directive (EUROJUST) European Union’s Judicial Cooperation Unit (EUROPOL) European Police Office (FALSTAFF) Fully Automated Logistical System Against Forgery and Fraud (FBI) U.S. Federal Bureau of Investigation 3 Reference Text for Trainers (FDA) U.S. Food and Drug Administration (FPs) Free Ports (FTZs) Free Trade Zones (GACG) Global Anti-Counterfeiting Group (GATS) General Agreement on Trade in Services (GATT) General Agreement on Tariffs and Trade (GdF) Guardia di Finanza (GICO) Gruppo d’Investigazione sulla Criminalità Organizzata (Investigation Group on Organized Crime) (GPO) General Prosecutors Office (HP) Hewlett Packard (ICAR) International Centre for Asset Recovery (ICC) International Chamber of Commerce (ICE) U.S. Immigration and Customs Enforcement (IFPI) International Federation of the Phonographic Industry (INDICAM) Istituto di Centromarca per la lotta alla contraffazione (Institue for combating counterfeiting) (INTA) International Trademark Association (INTERPOL) International Criminal Police Organisation (IP) Intellectual Property (Ip) Internet protocol (IPC) Intellectual Property Crime (IPO) Intellectual Property Office (IPRs) Intellectual Property Rights (IPT) Intellectual Property Theft (ISA) International Searching Authority (IT) Information Technology (ITU) International Telecommunications Union (LDCs) Less Developed Countries (LEAs) Law Enforcement Agencies (LPs) Legal Practitioners (MDTCA) Ministry of Domestic Trade and Consumer Affairs (MERCE) Monitoraggio e Rappresentazione Commercio Estero (Monitoring and Representation of Foreign Trade) (MHRA) Medicines and Healthcare Products Regulatory Agency (MMECC) Mainstreaming Methodology for Estimating Costs of Crime Project (MoJ) Ministry of Justice (NAC) National Authority of Customs (NCA) National Copyright Administration 4 Reference Text for Trainers (NIPLECC) U.S. National Intellectual Property Law Enforcement Coordination Council (OAPI) African Intellectual Property Organization (OECD) Organisation for Economic Cooperation and Development (OPOs) Other Public Officials (P2P) Peer-to-Peer (PCT) Patent Cooperation Treaty (POAHCCJ) Public Ministry – Prosecutor’s Office attached to the High Court of Cassation and Justice (PoCA) Proceed of Crime Act (QA) Quality Assurance (R&D) Research and Development (RCO) Rapport sur la Contrefaçon et la Criminalité Organisée (RILO/WE) Regional Intelligence Liaison Office for Western Europe (SCICO) Servizio Centrale Investigativo Criminalità Organizzata (Central Investigation Service on Organized Crime) (SCT) Standing Committee on the Law of Trademarks, Industrial Designs and Geographical Indications (SDI) Sistema di Indagine Investigation System (SECI) Southeast Cooperative Initiative (SIRENE) Supplementary Information Request at the National Entries (SIRO) Supporto Informativo Ricerche Operative (SIS) Schengen Information System (SISTER) Sistema Inter Scambio Territtorio (Interchange Territory System) (StAR) Stolen Asset Recovery Initiative (TAXUD) EU Taxation and Customs Union (TLT) Trademark Law Treaty (TRANSCRIME) Joint Research Centre on Transnational Crimes (TRIPS) Trade-Related Aspects of Intellectual Property Rights Agreement (TRP) Tamper Resistant Packaging (UAE) United Arab Emirates (UK) United Kingdom (UKBA) UK Border Agency (UN) United Nations (UNICRI) United Nations Interregional Crime and Justice Research Institute (UNIFAB) Union des Fabricants (URL) Uniform Resource Locator (USA) United States of America (USD) United States Dollar (VoIP) Voice over Internet Protocol 5 Reference Text for Trainers (WCO) World Customs Organization (WCT) WIPO Copyright Treaty (WHO) World Health Organisation (WIPO) World Intellectual Property Organisation (WTO) World Trade Organisation 6 Reference Text for Trainers SECTION 1 Basic Definitions of IPRs and International Treaties, Agreements, Conventions A. BASIC IPRS DEFINITIONS The definitions of Intellectual Property Rights (IPRs) presented in this section will contribute to the general understanding of the various forms in which human creation can be protected by law. Two main categories of IPRs may also be identified within the broader notion of Intellectual Property: Industrial Property and Copyright, the former related to the protection of innovation and trade (through Patents, Utility Models or Trademarks for example) and the latter related to the protection of literary and artistic work. It is important to note that the violation of rights granted by the various forms of IPRs is not indicated by law with different legal definitions for each of them; the only differentiation that is made follows usually the above mentioned distinction between Industrial Property and Copyright. In the former case the violation of the rights granted is referred to as counterfeiting and in the latter case as piracy. These are the notions that we will also use for the purpose of this training manual. 1.1 Copyright and related rights The copyright holder is granted exclusive rights by the Berne Convention for the Protection of Literary and Artistic Work of 9 September 1886 and by a number of national legislations. The term “exclusive” suggests that only the copyright holder may exercise these rights, thereby excluding all unauthorized third parties from exercising them. The copyright holder may also decide not to use any of the rights that are provided for, or to exercise them over a limited period of time. It is possible to distinguish between two different rights granted by copyright: economic rights, which allow the copyright holder to obtain profits if his/her work is used by other parties; and moral rights, which allow the copyright holder to act in order to maintain a connection with the results of his/her creative work. The economic framework of copyright generally allows the author to prohibit or authorize a series of behaviours/actions in relation to his/her creative work, including: the reproduction of the work in various forms; the distribution of copies of this work as well as its public representation; broadcasting of the work by radio/television or through other media; translation into other languages; and adaptations of the work. It should be noted that the ability of the copyright holder to prevent the reproduction, distribution, marketing and importing of copies of his/her work is the central element upon which the economic protection granted by copyright is based. The economic protection is further reinforced by the other rights mentioned above. The strictly commercial element of copyright is supported by an additional element whose specific goal is to guarantee that the origin of the work is always acknowledged. It must be considered separately from the commercial component, in accordance with the provisions of Article 6bis of the Berne Convention. Furthermore, moral rights cannot be transferred (unlike economic rights) and their recognition is only granted to the individual author. The rights analyzed thus far are generally attributed to the author of the artistic, scientific or literary work by the Berne Convention. Although moral rights are always retained by the commercial rights’ holder, they are subject to certain exceptions. Rights deriving from copyright are subject to limitations relative to the individual copies that are legally produced, marketed and acquired by a third party which becomes the owner of the copy in question. The owner is not prohibited from reselling the copy. The only exceptions are cases where 7 Reference Text for Trainers the transfer of ownership occurs between parties operating in different countries where there are importing limits relative to such products. The limitations mentioned above include a series of exceptions that are specified within most national legislation and concern particular categories of goods. The Berne Convention recognizes the free usage of certain categories of works within Article 9 (2) as long as this usage does not interfere with the legitimate rights of the author and does not lie outside the normal usage of the work in question. An example of free usage includes citing specific phrases of a book while mentioning the source of the citation, the author and using a work for illustrative, educational or informational purposes. The determination of a copyright’s duration falls under the competence of national legislation. The minimum guaranteed protection must, in any case and in accordance with Article 7, correspond to the life of the author plus fifty years after his/her death within countries that are bound by the Berne Convention. Individual national legislation differs as to when this protection should begin. In specific cases, the initial date corresponds to the date of creation of the work while other cases provide for the date in which the work has been officially completed. Current trends have involved the lengthening of the period of granted protection in order for the author’s heirs to fully enjoy the fruits of the creative work1. Legal basis for copyright protection Copyright and related rights have a strong social purpose which consists of protecting, encouraging and rewarding creative work2. The legal basis for the protection of “literally and artistic works” has been provided in the Berne Convention for the Protection of Literary and Artistic Work. Article 2 (1) defines and outlines the field of artistic and literary works and states: “The expression ‘literary and artistic works’ shall include every production in the literary, scientific and artistic domain, whatever may be the mode or form of its expression, such as books, pamphlets and other writings; lectures, addresses, sermons and other works of the same nature; dramatic or dramatico-musical works; choreographic works and entertainments in dumb show; musical compositions with or without words; cinematographic works to which are assimilated works expressed by a process analogous to cinematography; works of drawing, painting, architecture, sculpture, engraving and lithography; photographic works to which are assimilated works expressed by a process analogous to photography; works of applied art; illustrations, maps, plans, sketches and three-dimensional works relative to geography, topography, architecture or science.” The Berne Convention currently counts 164 contracting State parties. The World Intellectual Property Organization (WIPO) Copyright Treaty, adopted on 20 December 1996, is a complementary legal tool in the protection of copyright as it applies to categories of works not included in the Berne Convention. The aim of the Copyright Treaty is stated in the preamble: “[…] Recognizing the need to introduce new international rules and clarify the interpretation of certain existing rules in order to provide adequate solutions to the questions raised by new economic, social, cultural and technological developments; Recognizing the profound impact of the development and convergence of information and communication technologies on the creation and use of literary and artistic works […]” Articles 4 and 5 stipulate the protection of computer programmes and compilation of data (databases), respectively. The purposes and scope of the WIPO Copyright Treaty is therefore the extension of copyright granting and protection to software. This is also included within the concept of artistic or literary 1 The part of General Information on Copyright Protection is based on the UNICRI report Counterfeiting: A Global Spread, A Global Threat, pp. 15-17. Online. Available HTTP: http://counterfeiting.unicri.it/report2008.php 2 World Trade Organization (WTO), Trade-related Aspects of Intellectual Property Rights (TRIPS), What are Intellectual Property Rights? Online. Available HTTP: http://www.wto.org/english/tratop_e/trips_e/intel1_e.htm 8 Reference Text for Trainers work being the result of creative scientific work and therefore falling under the scope of Article 2 of the Berne Convention. Currently, the WIPO Copyright Treaty counts 88 contracting State-parties. Industrial Property Patents, utility models, industrial designs, layout designs, trade names/firms, marks and designation of origin and geographical indications are either industrially or commercially applicable and they fall within the industrial property field. The rules for their grant, regulation, conditions of application, registration and protection measures against misuse, abuse and infringement are stipulated in the Paris Convention for the Protection of Industrial Property. It was adopted on 20 March 1883 and is the basic reference document for industrial property3. The substantive provisions of the Convention fall into three main categories: national treatment, right of priority and common rules. They apply to all of the categories of industrial property defined by the Convention. Under the provisions on national treatment, the Convention states that each contracting State must grant the same protection to nationals of the other contracting States. Nationals of non-contracting States are also entitled to national treatment under the Convention if they are domiciled or have a real and effective industrial or commercial establishment in a contracting State. The Convention provides for the right of priority for patents (and utility models, where they exist), marks and industrial designs. This right implies that on the basis of a regular first application filed in one of the contracting States, the applicant may, within a specified period of time (12 months for patents and utility models; 6 months for industrial designs and marks) apply for protection in any of the other contracting States. These later applications will then be regarded as if they had been filed on the same day as the first application. These later applications will have priority (hence the expression “right of priority”) over applications which may have been filed during the given period of time by other individuals for the same invention, utility model, mark or industrial design. Furthermore, these later applications based on the first application, will not be affected by any event that may have taken place during this period. Examples include any publication of the invention or sale of articles bearing the mark or incorporating the industrial design. One of the practical advantages of this provision is that when an applicant requires protection in several countries, she/he is not required to present all her/his applications at the same time but has six or 12 months at his disposal to decide the countries she/he wishes protection and organize the steps she/he must take to secure protection. Industrial Property and Competition law The exclusive rights granted by the State to IPRs holders (especially Patents) must be well balanced to avoid a situation in which the exclusive rights may lead to the creation of a monopoly, hampering the functioning of markets based upon the respect of competition law. At a first view, in fact, these two important pillars of modern trade may seem to be, in principle, naturally opposite. IPRs protecting the innovation by providing a “non-rivalrous” right to exclusive exploitation of the content of the innovation, and competition law protecting the access to a market that has to be granted to different competitors. However, the limit of IPRs exclusive exploitation have been usually identified in the fact that the latter must not pose at risk the social welfare. The provisions contained in art. 7, Art. 8.2 and Art. 40 of the TRIPs Agreement are a good example of how this balance may be achieved. The TRIPS suggests that the abuse of IPRs must be prevented, especially if the latter may hamper the social welfare, and lead to a restriction of trade and limit the international transfer of technology. Article 40 is dedicated to the prevention of anticompetitive practices that may derive from contractual licensing. The Paris Convention on the Protection http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P232_38660 3 of Industrial Property , 9 Reference Text for Trainers 1.2 Patent (industrially applicable) Definition A patent is an exclusive right granted for an invention, which is a product or a process that provides a new way of doing something, or offers a new technical solution to a problem.4 This is made in exchange of public disclosure of the invention. A patent provides the owner of the patent with protection for the invention. The protection is granted for a limited period of time, generally 20 years. 5. Patent protection means that the invention cannot be commercially made, used, distributed or sold without the patent owner's consent. These patent rights are usually enforced in a court, which in most systems holds the authority to stop patent infringement. A court can also declare a patent invalid upon a successful challenge by a third party.6 In general, an invention must fulfil the following conditions to be protected by a patent: it must be of practical use; it must show an element of novelty, i.e. a new characteristic unknown to the body of existing knowledge in its technical field. This body of existing knowledge can be referred to as "prior art". The invention must show an inventive step which could not be deduced by a person with average knowledge of the technical field. Finally, its subject matter must be accepted as "patentable" under law. In many countries, scientific theories, mathematical methods, plant or animal varieties, discoveries of natural substances, commercial methods, or methods for medical treatment (as opposed to medical products) are generally not patentable. The legal basis on patents is principally provided in the Paris Convention7 (Articles. 1§2, 4§A, I, G, 4bis, ter, quarter, 5§A, D, 5 bis (1) (2), ter, quarter) and in the TRIPS Agreement (Art. 27-34). In particular, the Paris Convention provides a few common rules which all contracting States must follow regarding patents. The most significant include:8 patents granted in different contracting States for the same invention are independent from one another: the granting of a patent in one contracting State does not oblige the other contracting States to grant a patent; a patent cannot be refused, annulled or terminated in any contracting State on the grounds of it being refused or annulled or terminated in any other contracting State; the inventor has the right to be named as such in the patent; the grant of a patent may not be refused, and a patent may not be invalidated, on the grounds of the sale of the patented product, or of a product obtained by means of the patented process, is subject to restrictions or limitations resulting from the domestic law; each contracting State that takes legislative measures providing for the grant of compulsory licenses to prevent the abuses which might result from the exclusive rights conferred by a patent may do so with certain limitations. Thus, a compulsory license (license not granted by the owner of the patent but by a public authority of the State concerned) based on failure to work the patented invention may only be granted pursuant to a request filed after three or four years of failure to work or insufficient working of the patented invention and it must be refused if the patentee gives legitimate reasons to justify his inaction. Furthermore, forfeiture of a patent may not be provided for, except in cases where the grant of a World Intellectual Property Organization (WIPO), Frequently Asked Questions/ Patent, http://www.wipo.int/patentscope/en/patents_faq.html#protection 5 Ibid. 6 Ibid. 7 The Paris Convention includes provisions applied on Industrial Property. The articles referred here are either common to all the categories of Industrial Property, or concern exclusively patents. WIPO, Paris Convention on the Protection of Industrial Property, http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P232_38660 8 World intellectual property Organization (WIPO), Summary of the Paris Convention for the Protection of Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html 4 10 Reference Text for Trainers compulsory license would not have been sufficient to prevent the abuse. In such cases, proceedings for forfeiture of a patent may be instituted, only after the expiration of two years from the grant of the first compulsory license. 1.3 Utility model (industrially applicable) Definition A utility model is an exclusive right granted for an invention, which allows the right holder to prevent others from commercially using the protected invention, without his/her authorization, for a limited period of time. Its basic definition may vary between countries (where such protection is available). A utility model is similar to a patent. Utility models are sometimes referred to as "petty patents" or "innovation patents."9 It shall, therefore, be understood as a new technical solution, which is beyond the framework of mere technical skill and is industrially applicable. The utility model is considered as a "low-cost entry point into the intellectual property system."10 Main differences between utility models and patents are the following: The requirements for acquiring a utility model are less stringent than for patents. While the requirement of "novelty" is always to be met, that of the "inventive step" or "nonobviousness" may be much lower or completely absent. In practice, protection for utility models is often sought for innovations of a rather incremental character which may not meet the patentability criteria. The term of protection for utility models is shorter than for patents and varies from country to country (usually between 7 and 10 years without the possibility of extension or renewal). In most countries where utility model protection is available, patent offices do not examine applications as substance prior to registration. This means that the registration process is often significantly simpler and faster. It takes an average of six months. Utility models are much cheaper to obtain and to maintain. In some countries, utility model protection can only be obtained for specific fields of technology and only for products, not processes. Utility models are based on registration principle as patents. The difference is that the granting of a patent is preceded by complete examination of patent application, whereas utility models are preceded by formal examination only.11 Utility models are considered well suited for Small/Medium-sized Enterprises that make "minor" improvements and adaptations to existing products. Utility models are primarily used for mechanical innovations. Only a small number of countries and regions provide the option of utility model protection. This option is not available in Romania. Legal provisions on utility models can be found in the Paris Convention. (Articles 1§2, 4§A, 5§D, 5bis, 11). and in the TRIPS Agreement (Articles 25 and 26).12 1.4 Industrial design (industrially applicable) An industrial design is the ornamental or aesthetic aspect of an article. The design may consist of three-dimensional features, such as the shape or surface of an article or of two-dimensional features, such as patterns, lines or colour. The design is considered to be a purely aesthetic or ornamental element that is incorporated within an object that is mass-produced. Reference is made to products deriving from an industrial process 9 WIPO, Protecting Inventions by Utility Models, What is a Utility model? http://www.wipo.int/sme/en/ip_business/utility_models/utility_models.htm 10 Ibid. 11 Ibid. 12 http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P145_20374 11 Reference Text for Trainers whose aesthetic element serves as a differentiating function with respect to other products of the same category which are created for the same purpose. The aesthetic element is one form of selection criteria used by the consumer. Further examples include: quality, price and function of the marketed good. The need to protect this distinctive element derives from this ability to influence consumer choices. Industrial designs are applied to a wide variety of products of industry and handicraft: from technical and medical instruments to watches, jewellery and other luxury items; from house wares and electrical appliances to vehicles and architectural structures; from textile designs to leisure goods. An industrial design is primarily of an aesthetic nature and does not protect any technical features of the article to which it is applied.13 The owner is defined as the person or entity that has registered the design. When an industrial design is protected, the owner is assured an exclusive right against unauthorized copying or imitation of the design by third parties. This protection is only granted to a design relative to a good produced on an industrial scale that possesses certain specific characteristics (novelty or originality). The originality of the design is not exclusively imposed by the function of the products. Granting protection over the design of widely distributed products such as a simple screw or a belt, would distort the market by creating monopolies in which only one producer would have the possibility of manufacturing and selling screws or belts. In contrast, it is possible to protect a particular design applied to screws or belts if this design represents a novelty and characterizes the producer, thereby rewarding the latter for the effort and creativeness involved in the design and stimulating further research in this area. In most countries, an industrial design must be registered in order to be protected under industrial design law. As a general rule, to be registered, the design must be "new" or "original". Different countries have varying definitions of such terms and variations in the registration process. Generally, "new" means that no identical or similar design is known to have existed before. Once a design is registered, a registration certificate is issued. The term of protection is generally five years. The possibility of further periods of renewal in most cases is up to 15 years.14 Depending on the particular national law and the type of design, an industrial design may also be protected as a work of art under copyright law. In some countries, industrial design and copyright protection can exist concurrently. In other countries, they are mutually exclusive. Once the owner chooses one form of protection, she/he can no longer invoke the other.15 Under certain circumstances an industrial design may also be protectable under unfair competition law, although the conditions of protection and the rights and remedies ensured can be significantly different.16 Legal provisions on industrial design can be found in the Paris Convention (art. 1§2, 4§A, 5§B, D, 5bis, quinquies, 11) and in the TRIPS Agreement (Articles 25 and 26).17 As with patents, marks, trade names and sources of indication, the Paris Convention lays down a common rule regarding industrial designs which all contracting States must follow. This is that industrial designs must be protected in each contracting State, and protection may not be forfeited on the ground that the articles incorporating the design are not manufactured in that State. 1.5 Integrated circuits and Layout-designs (topographies) Integrated circuits and layout-designs are protected by the Treaty on Intellectual property with respect to Integrated circuits (or “Washington Treaty”) adopted on 26 May 1989. It is not yet in force as, currently, it has only 10 Contracting Parties. 13 14 15 16 17 http://www.wipo.int/designs/en/ Ibid. Ibid. Ibid. http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P145_20374 12 Reference Text for Trainers Article 2 of the Treaty outlines the following definitions of these categories of Industrial property: (i) “‘integrated circuit’ means a product, in its final form or an intermediate form, in which the elements, at least one of which is an active element, and some or all of the interconnections are integrally formed in and/or on a piece of material and which is intended to perform an electronic function. (ii) “‘layout-design (topography)’ means the three-dimensional disposition of the elements, however expressed. At least one of which is an active element, and of some or all of the interconnections of an integrated circuit or such a three-dimensional disposition prepared for an integrated circuit intended for manufacture […]” 1.6 Trademarks (commercially applicable) Definition A trademark is a distinctive sign which identifies certain goods or services as those produced or provided by a specific person or enterprise. Its origin dates back to ancient times, when craftsmen reproduced their signatures, or "marks", on their artistic or utilitarian products. Over the years these marks have evolved into today's system of trademark registration and protection. The system helps consumers identify and purchase a product or service to meet their needs due to its nature and quality, as indicated by its unique trademark.18 Article 15.1 of the TRIPS Agreement allows the trademark to be defined as any symbol, name or combination of the latter (given the restrictions described below) which allow the products or services of one company to be distinguished from those of other companies. A trademark provides protection to the owner of the mark by ensuring the exclusive right to use it to identify goods or services or to authorize another to use it in return for payment. The period of protection varies, but a trademark can be renewed indefinitely beyond the time limit on payment of additional fees. Trademark protection is enforced by the courts, which in most systems have the authority to block trademark infringement. In a larger sense, trademarks promote initiative and enterprise worldwide by rewarding the owners of trademarks with recognition and financial profit. Trademark protection also hinders the efforts of unfair competitors, such as counterfeiters, to use similar distinctive signs to market inferior or different products or services. The system enables people with skill and enterprise to produce and market goods and services in the fairest possible conditions, thereby facilitating international trade.19 The possibilities are almost limitless. Trademarks may be one or a combination of words, letters and numerals. They may consist of drawings, symbols or three- dimensional signs (e.g. the shape and packaging of goods), audible signs (e.g. music or vocal sounds), fragrances or colours used as distinguishing features. 20 In addition, several other categories of marks exist. Collective marks are owned by an association whose members use them to identify themselves with a level of quality and other requirements set by the association. Examples would be associations representing accountants, engineers or architects. Certification marks are given for compliance with defined standards, however, they are not confined to any membership. They may be granted to anyone who can certify that the products involved meet certain established standards. The internationally accepted "ISO 9000" quality standards are an example of such widely-recognized certifications.21. To obtain the protection of the distinguishing sign, name or mark, an application for registration of a trademark must be filed with the appropriate national or regional trademark office. The application World Intellectual Property Organization (WIPO), What is a Trademark? http://www.wipo.int/trademarks/en/trademarks.html 19 Ibid. 20 World Intellectual Property Organization (WIPO), About Trademarks, What kinds of trademarks can be registered ? http://www.wipo.int/trademarks/en/about_trademarks.html#function 21 Ibid. 18 13 Reference Text for Trainers must contain a clear reproduction of the sign filed for registration, including any colours, forms or three-dimensional features. The application must also contain a list of goods or services to which the sign would apply. The sign must fulfil certain conditions in order to be protected as a trademark or other type of mark. It must be distinctive, so that consumers can distinguish it and identify a particular product. It must neither mislead nor deceive customers or violate public order or morality.22 Finally, the rights applied for cannot be the same as or similar to rights already granted to another trademark owner. This may be determined through search and examination by the national office, or by the opposition of third parties who claim similar or identical rights.23 Almost all countries register and protect trademarks. Each national or regional office maintains a Register of Trademarks, which contains full application information on all registrations and renewals, facilitating examination, search and potential opposition by third parties. The effects of such a registration are limited to the country (or in the case of a regional registration, countries) concerned.24 To avoid the need to register separately with each national or regional office, WIPO administers a system of international registration of marks. This system is governed by two treaties, the Madrid Agreement Concerning the International Registration of Marks and the Madrid Protocol. A person who has a link (through nationality, domicile or establishment) with a country party to one or both of these treaties may, on the basis of a registration or application with the trademark office of that country, obtain an international registration having effect in some or all of the other countries of the Madrid Union. 25 The Madrid system for the international registration of marks established in 1891 functions under the Madrid Agreement (1891) and the Madrid Protocol (1989). It is administered by the International Bureau of WIPO located in Geneva, Switzerland. Thanks to the international procedural mechanism, the Madrid system offers a trademark owner the possibility to have his/her trademark protected in several countries by simply filing one application directly with the national or regional trademark office.. If the trademark office of a designated country does not refuse protection within a specified period, the protection of the mark is the same as if it had been registered by that Office. The Madrid system also greatly simplifies the subsequent management of the mark, since it is possible to record subsequent changes or to renew the registration through a single procedural step. Further countries may be designated subsequently. Article 4 reads in its two paragraphs: (1) “From the date of the registration so effected at the International Bureau in accordance with the provisions of Articles 3 [Contents of Application for International Registration] and 3ter [Request for “Territorial Extension”], the protection of the mark in each of the contracting countries concerned shall be the same as if the mark had been filed therein direct. The indication of classes of goods or services provided for in Article 3 shall not bind the contracting countries with regard to the determination of the scope of the protection of the mark.” (2) “Every mark which has been the subject of an international registration shall enjoy the right of priority provided for by Article 4 of the Paris Convention for the Protection of Industrial Property [A. to I. Patents, Utility Models, Industrial Designs, Marks, Inventors’ Certificates: Right of Priority], without requiring compliance with the formalities prescribed in Section D of that Article.” 22 World Intellectual Property Organization (WIPO), About Trademarks, How is a trademark registered? http://www.wipo.int/trademarks/en/about_trademarks.html#function 23 Ibid. 24 World Intellectual Property Organization (WIPO), About Trademarks, How extensive is trademark protection? http://www.wipo.int/trademarks/en/about_trademarks.html#function 25 World Intellectual Property Organization (WIPO), Madrid System for the International Registration of Marks, http://www.wipo.int/madrid/en/ 14 Reference Text for Trainers Legal provisions on trademarks can be found in the Paris Convention (articles 1§2, 4§A, 5§C 5bis, 6, 6bis, ter, quarter, quinquies, 6, 6bis, ter, quarter, quinquies, sexies, septies, 7, 7bis, 9-11) 26, and in the TRIPS Agreement (Articles 15-21). The Paris Convention lays out a few common rules which all the contracting States must follow regarding trademarks.27 The Paris Convention does not regulate the conditions for the filing and registration of marks which are determined in each contracting State by the domestic law. Consequently, no application for the registration of a mark filed by a national of a contracting State may be refused, nor may a registration be invalidated, on the ground that filing, registration or renewal has not been made in the country of origin. Once the registration of a mark is obtained in a contracting State, it is independent of its possible registration in any other country, including the country of origin; consequently, the lapse or annulment of the registration of a mark in one contracting State will not affect the validity of registration in other contracting States. Where a mark has been duly registered in the country of origin, it must be accepted on request for filing and protected in its original form in the other contracting States. Registration may still be refused in well-defined cases, such as: when the mark would infringe acquired rights of third parties, when it is devoid of distinctive character, when it is contrary to morality or public order or when it is of such a nature as to be liable to deceive the public. If in any contracting State, the use of a registered mark is compulsory, the registration cannot be cancelled until after a reasonable period and only if the owner cannot justify his inaction. Each contracting State must refuse registration and prohibit the use of marks which constitute a reproduction, imitation or translation liable to create confusion of an already registered by the competent national authority and well-known in that State mark. Each contracting State must likewise refuse registration and prohibit the use of marks which consist of or contain without authorization, armorial bearings, State emblems and official signs and hallmarks of contracting states, provided they have been communicated through the International Bureau of WIPO. The same provisions apply to armorial bearings, flags, other emblems, abbreviations and names of certain intergovernmental organizations. Collective marks must be granted protection. 1.7 Trade names (commercially applicable) A trade name can be defined as, “a name of a business or one of its products which, by use of the name and public reputation, identifies the product as that of the business. A trade name belongs to the first business to use it and the identification and reputation give it value and the right to protect the trade name against its use by others.”28 Furthermore, “trade names are used by profit and non-profit entities, political and religious organizations, industry and agriculture, manufacturers and producers, wholesalers and retailers, sole proprietorships and joint ventures, partnerships and corporations, and a host of other business associations. A trade name may be the actual name of a given business or an assumed name under which a business operates and holds itself out to the public.”29 Legal provisions on trade names can be found in the Paris Convention (articles 1§2, 5bis, 8-10, 10ter).30 The Paris Convention lays out a specific common rule regarding trade names, which all 26 World Intellectual Property Organization (WIPO), Paris Convention for the Protection of Industrial Property http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P113_13775 27 World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the Protection of Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html 28 http://legal-dictionary.thefreedictionary.com/trade+name Ibid. 30 World Intellectual Property Organization (WIPO), Paris Convention for the Protection of Industrial Property http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P113_13775 29 15 Reference Text for Trainers the contracting States must follow: “Protection must be granted to trade names in each contracting State without the obligation of filing or registration.”31 31 World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the Protection of Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html 16 Reference Text for Trainers 1.8 Geographical indications (commercially applicable) Definition A geographical indication is a sign used on goods that have a specific geographical origin and possess A geographical indication is a sign used on goods that have a specific geographical origin and possess qualities, reputation or characteristics that are essentially attributable to that place of origin. Most commonly, a geographical indication includes the name of the place of origin of the goods. Agricultural products typically have qualities that derive from their place of production and are influenced by specific local factors, such as climate and soil. Whether a sign is recognized as a geographical indication is a matter of national law. Geographical indications may be used for a wide variety of products, whether natural, agricultural or manufactured.32 An appellation of origin is a special kind of geographical indication. It generally consists of a geographical name or a traditional designation used on products which have specific qualities or characteristics that are due to the geographical environment in which they are produced. The concept of a geographical indication encompasses appellations of origin.33 The use of geographical indications is not limited to agricultural products. They may also highlight qualities of a product which are due to human factors associated with the place of origin of the products, such as specific manufacturing skills and traditions. That place of origin may be a village or town, a region or a country, for example, “Bohemia” is recognized as a geographical indication in many countries for specific products made in the Czech Republic, in particular crystal ware. 34 A geographical indication points to a specific place, or region of production, that determines the characteristic qualities of the product which originates from that location. It is important that the product derives its qualities and reputation from that location. Since those qualities depend on the place of production, a specific "link" exists between the products and their original place of production. 35 Many geographical indications have acquired valuable reputations which, if not adequately protected, may be misrepresented by dishonest commercial operators. False use of geographical indications by unauthorized parties is detrimental to consumers and legitimate producers. Consumers are deceived into believing they are buying a genuine product with specific qualities and characteristics, when they are actually purchasing an imitation. Legitimate producers are deprived of valuable business and the established reputation of their products is damaged.36 A geographical indication tells consumers that a product is produced in a certain place and has certain characteristics that are due to that place of production. It may be used by all producers who make their products in the place designated by a geographical indication and whose products share specified qualities. Unlike a trademark, the name used as a geographical indication will usually be predetermined by the name of the place of production.37 Geographical indications are protected in accordance with international treaties and national laws under a wide range of concepts, including: special laws for the protection of geographical indications or appellations of origin trademark laws in the form of collective marks or certification marks laws against unfair competition consumer protection laws, or 32 World Intellectual Property Organization (WIPO), About geographical indications, What is a Geographical Indication? http://www.wipo.int/geo_indications/en/about.html#agri 33 Ibid. 34 World Intellectual Property Organization (WIPO), About geographical indications, Can geographical indications only be used for agricultural products? http://www.wipo.int/geo_indications/en/about.html#agri 35 World Intellectual Property Organization (WIPO), About geographical indications, What does a geographical indication do? http://www.wipo.int/geo_indications/en/about.html#agri 36 World Intellectual Property Organization (WIPO), About geographical indications, Why do geographical indications need protection? http://www.wipo.int/geo_indications/en/about.html#agri 37 World Intellectual Property Organization (WIPO), About geographical indications, What is the difference between a geographical indication and a trademark? http://www.wipo.int/geo_indications/en/about.html#agri 17 Reference Text for Trainers specific laws or decrees that recognize individual geographical indications. Applicable sanctions range from court injunctions preventing the unauthorized use the payment of damages and fines or, in serious cases, imprisonment. 38 A number of treaties administered by WIPO provide for the protection of geographical indications, most notably the Paris Convention for the Protection of Industrial Property of 1883, and the Lisbon Agreement for the Protection of Appellations of Origin and Their International Registration. Furthermore, Articles 22 to 24 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) deal with the international protection of geographical indications within the framework of the World Trade Organization (WTO). 39 If a geographical term is used as the common designation of a type of product, rather than an indication of the place of origin of that product, then the term no longer functions as a geographical indication. Where this has occurred in a certain country, then that country may refuse to recognize or protect that term as a geographical indication. For example, the term “cologne” now denotes a certain kind of perfumed toilet water, regardless of whether or not it was produced in the region of Cologne.40 WIPO is responsible for the administration of a number of international agreements which deal partially or entirely with the protection of geographical indications (see, in particular, the Paris Convention for the Protection of Industrial Property and the Lisbon Agreement for the Protection of Appellations of Origin and Their International Registration). Furthermore, through the work of the Standing Committee on the Law of Trademarks, Industrial Designs and Geographical Indications (SCT), made up of representatives of Member States and interested organizations, WIPO explores new ways of enhancing the international protection of geographical indications.41 Legal provisions on trade names can be found in the following articles of the Paris Convention (articles 1§2, 5bis, 10, 10bis) 42 and in the TRIPS Agreement (articles 22-24). B. INTERNATIONAL TREATIES, AGREEMENT AND CONVENTIONS PROTECTING IPRS 1. The WTO Agreement on Trade-related Aspects of Intellectual Property Rights (TRIPS) The Agreement on Trade-related Aspects of Intellectual Property Rights (TRIPS) is an international agreement administered by the World Trade Organization (WTO)43 and negotiated and achieved during the Uruguay Round of the General Agreement on Tariffs and Trade (GATT)44 in 1986-1994. This Agreement introduced, for the first time, intellectual property rules into the multilateral trading system while fixing the minimum standards for many forms of intellectual property regulation. The TRIPS Agreement is an attempt to narrow the differences in the way IP rights are protected around the world, and to bring them under common international rules. 38 World Intellectual Property Organization (WIPO), About geographical indications, How are geographical indications protected? http://www.wipo.int/geo_indications/en/about.html#agri 39 World Intellectual Property Organization (WIPO), About geographical indications, How are geographical indications protected on the international level? http://www.wipo.int/geo_indications/en/about.html#agri 40 World Intellectual Property Organization (WIPO), About geographical indications, What is a "generic" geographical indication? http://www.wipo.int/geo_indications/en/about.html#agri 41 World Intellectual Property Organization (WIPO), About geographical indications, What is a "generic" geographical indication? What is WIPO's role in the protection of geographical indications? http://www.wipo.int/geo_indications/en/about.html#agri 42 World Intellectual Property Organization (WIPO), Paris Convention for the Protection of Industrial Property, http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.html#P113_13775 43 The World Trade Organization (WTO) is an international organization, constituted by 153 members whose objective is to supervise and liberalize international trade. It was established on 1st January 1995, under the Marrakech Agreement and replaced the General Agreement on Tariffs and Trade (GATT) of 1947. For further details visit: www.wto.org. 44 The General Agreement on Tariffs and Trade (GATT) was signed in 1947 by 23 countries. The agreement was designed to provide an international forum to encourage free trade between member states through the regulation and the reduction of tariffs on traded goods, also providing a common mechanism for resolving trade disputes. For further details visit: http://www.wto.org/english/tratop_e/gatt_e/gatt_e.htm. 18 Reference Text for Trainers The TRIPS Agreement establishes how the legislation of the adhering countries must deal with the following issues: copyright; trademarks; geographical indications, including appellations of origin; industrial designs; patents; integrated circuit layout-designs; monopolies for the developers of new plant varieties and trade dress. The main issues considered by the Agreement include: i.) how the basic principles of the trading system and other international intellectual property agreements should be applied; ii.) how to give adequate protection to intellectual property rights; iii.) how countries should enforce those rights adequately in their own territories; iv.) how to settle disputes on intellectual property between members of the WTO and; v.) special transitional arrangements during the period when the new system is being introduced. Finally, TRIPS encompasses the two basic principles that also govern the GATT and General Agreement on Trade and Services (GATS): i.) the national treatment; and ii.) the most-favourednation treatment. TRIPS went one step forward and introduced a third principle according to which intellectual property protection should contribute to technical innovation and the transfer of technology from which both producers and users should benefit and economic and social welfare should be enhanced. Czech Republic is Party to the TRIPS Agreement. 1.2 On Copyright and related rights 1.2.1 The Berne Convention The Berne Convention for the Protection of Literary and Artistic Work of 9 September 1886 has offered the legal basis for the protection of “literally and artistic works”. The Convention rests on three basic principles which are: i) the principle of “national treatment”; ii) the principle of “automatic” protection and; iii) the principle of the “independence” of protection. It contains a series of provisions determining the minimum protection to be granted, as well as special provisions available to developing countries which would like to use them.45 The Convention also provides for “moral rights,” these are, the right to claim authorship of the work and the right to object to any mutilation or deformation or other modification of, or other derogatory action in relation to the work which would be prejudicial to the author’s honour or reputation. The Convention is open to all States. Instruments of ratification or accession must be deposited with the Director General of WIPO. Currently, the Berne Convention counts 164 contracting Stateparties. Czech Republic is Party to the Berne Convention. 1.2.2 The WIPO Copyright Treaty (WCT) The WIPO Copyright Treaty, adopted on 20 December 1996, is a complementary legal tool in the granting and protection of copyright as it applies to categories of works not included in the Berne Convention and therefore constitutes a special agreement under the Berne Convention. The Treaty mentions two subject matters to be protected by copyright: (i) computer programmes, (ii) compilations of data or other material (“databases”), in any form, which by reason of the selection or arrangement of their contents constitute intellectual creations. The Treaty deals with three rights of authors which are: (i) the right of distribution; (ii) the right of rental and (iii) the right of communication to the public. Each of them is an exclusive right, subject to certain limitations and exceptions. The Director General of WIPO is the depositary of the Treaty which is open to States members of WIPO and to the European Community. The Assembly is constituted by the Treaty and currently comprises 88 members. Czech Republic is Party to the WIPO Copyright Treaty. 1.3 On Industrial Property 1.3.1 The Paris Convention 45 For further information on the Berne Convention, see http://www.wipo.int/treaties/en/ip/berne/summary_berne.html 19 Reference Text for Trainers Patents, utility models, industrial designs, lay-out designs, trade names/firms, marks and designation of origin and geographical indications are either industrially or commercially applicable. They fall within the industrial property field. The rules for their grant, regulation, conditions of application, registration and protection measures against misuse, abuse and infringement are stipulated in the Paris Convention for the Protection of Industrial Property, adopted on 20 March 1883, which is the basic reference document for what concerns industrial property.46 The substantive provisions of the Convention fall into three main categories: i) national treatment; ii) right of priority and; ii) common rules47 which apply to all the categories of industrial property defined by the Convention. The Paris Convention contains provisions for the repression of unfair competition (Art. 1, §2 and Art. 10bis). This area of intellectual property is now harmonised at an international level for the first time. On the basis of Art.1 countries to which the convention applies form a Union for protecting industrial property. Focusing on Trademarks, Article 6 of the Convention establishes that the conditions for the filing and the registration of trademarks shall be determined and regulated in each country of the Union by its domestic legislation. Simultaneously, a trademark registered in a country of the Union created by the Paris Convention shall be considered as independent of marks registered in the other countries of the Union, including the country of origin. As specified by Article 6, “an application for the registration of a mark filed by a national of a country of the Union in any country of the Union may not be refused, nor may a registration be invalidated, on the ground that filing, registration or renewal, has not been made in the country of origin”. Currently, there are 173 Contracting Parties of the Paris Convention. Czech Republic is Party to the Paris Convention. 1.3.2 The Patent Cooperation Treaty Apart from the Paris Convention and the TRIPS provisions on patents, there is also the Patent Cooperation Treaty (PCT).48 The PCT, was concluded in 1970 and amended in 1979, 1984 and 2001. It is open to State parties to the Paris Convention for the Protection of Industrial Property. The Treaty makes it possible to seek patent protection for an invention simultaneously in a large number of countries by filing an "international" patent application. This application may be filed by anyone who is a national or resident of a Contracting State. Generally, it may be filed with the national patent office of the Contracting State of which the applicant is a national or resident or with the International Bureau of WIPO in Geneva (at the applicant's option). If the applicant is a national or resident of a Contracting State which is party to the European Patent Convention, the Harare Protocol on Patents and Industrial Designs (Harare Protocol), the revised Bangui Agreement Relating to the Creation of an African Intellectual Property Organization or the Eurasian Patent Convention, The international application may also be filed with the European Patent Office (EPO), the African Regional Industrial Property Organization (ARIPO), the African Intellectual Property Organization (OAPI) or the Eurasian Patent Office (EAPO). Once completed, the international application is then subjected to an "international search." This search is carried out by one of the major patent offices appointed by the PCT Assembly as an International Searching Authority (ISA). The search results in an "international search report," which is, a listing of the citations of such published documents that might affect the patentability of the invention claimed in the international application. At the same time, the ISA prepares a written opinion on patentability. The international search report and the written opinion are communicated by the ISA to the applicant who may decide to withdraw his application, in particular where the said report or opinion makes the granting of patents unlikely. If the international application is not 46 The full text of the Paris Convention can be found at http://www.wipo.int/treaties/en/ip/paris/ World Intellectual Property Organization (WIPO), Summary of the Paris Convention for the Protection of Industrial Property, http://www.wipo.int/treaties/en/ip/paris/summary_paris.html 48 The description and information provided here on the Patent Cooperation Treaty can be found on http://www.wipo.int/pct/en/treaty/about.html 47 20 Reference Text for Trainers withdrawn, it is published by the International Bureau together with the international search report. The written opinion is not published. The procedure under the PCT has the following advantages: (i) the applicant has up to 18 months more than she/he has in a procedure outside the PCT to reflect on the desirability of seeking protection in foreign countries, to appoint local patent agents in each foreign country, to prepare the necessary translations and to pay the national fees etc.; (ii) the search and examination work of patent offices can be considerably reduced or virtually eliminated thanks to the international search report, the written opinion and, where applicable, the international preliminary examination report that accompany the international application and; (iii) since each international application is published together with an international search report, third parties are in a more favourable position to formulate a well-founded opinion about the patentability of the claimed invention. Currently there are 142 Contracting Parties of the Patent Cooperation Treaty. Czech Republic is Party to the PCT. 1.3.3 The Hague Agreement on Industrial Designs49 The Hague Agreement is an international registration system which offers the possibility of obtaining protection for industrial designs in a number of States and intergovernmental organizations by means of a single international application filed with the WIPO. Thus, under the Hague Agreement, a single international application replaces a whole series of applications which, otherwise, should have been effected with different national (or regional) Offices. The Hague Agreement is currently constituted by two international treaties: The Hague Act of 28 November 1960 (the “1960 Act”); and The Geneva Act of 2 July 1999 (the “1999 Act”). The Hague System for the International Registration of Industrial Designs provides a mechanism for registering a design in countries and/or intergovernmental organizations party to the Hague Agreement. It is administered by the International Bureau of WIPO. This System gives the owner of an industrial design the possibility to have his design protected in several countries by simply filing one application with the International Bureau of WIPO, in one language, with one set of fees in one currency (Swiss Francs). The Hague System simplifies the management of an industrial design registration, since it is possible to record subsequent changes or to renew the registration through a single procedural step with the International Bureau of WIPO.50 Advantages of the Hague System The Hague System enables design owners from a Contracting Party to obtain protection for their designs with a minimum of formalities and expense. In particular, they are relieved of the need to make separate national applications in each of the Contracting Parties in which they seek protection, thus avoiding any complications that can arise from procedures and languages which differ between states. The Hague system also avoids the need for constant monitoring of the deadline for renewal of a whole series of national registrations, varying from one State to the other. Furthermore, it avoids the need to pay a series of fees in various currencies. Moreover, by having a single international registration with effect in several Contracting Parties, the subsequent management of the international registration is considerably enhanced. For instance, a change in the name or address of the holder, or a change in ownership for only some or all of the designated Contracting Parties, can be recorded in the International Register and have effect by means of one simple procedural step carried out by the International Bureau. 49 The information on the Hague System presented here are based on the World Intellectual Property Organization (WIPO) document, “The Hague Agreement Concerning the International Registration of Industrial Designs: Main Features and Advantages”, http://www.wipo.int/export/sites/www/freepublications/en/designs/911/wipo_pub_911.pdf 50 Hague System for the International Registration of Industrial Designs, http://www.wipo.int/ hague/en/ 21 Reference Text for Trainers The Hague Agreement has 56 Contracting parties. Czech Republic is NOT Party to the Hague Agreement. 1.3.4 The Washington Treaty on Integrated circuits and Layout-designs (topographies) Integrated circuits, and layout-designs are protected by the Treaty on intellectual property in respect of Integrated circuits (or “Washington Treaty”) adopted on 26 May 1989. It is not yet in force as it has only 10 Contracting Parties. The Czech Republic, Poland and Romania are so far NOT contracting parties. The aim of the treaty is to ensure the protection of Integrated circuits and layout-designs within the territory of each of its members though the offer of a legal ground for the prevention of unlawful actions against Integrated circuits and Layout-designs and for appropriate legal remedies in cases of committed infringements. Art. 4 states: “Each Contracting Party shall be free to implement its obligations under this Treaty through a special law on layout-designs (topographies) or its law on copyright, patents, utility models, industrial designs, unfair competition or any other law or a combination of any of those laws”. 1.3.5 The Madrid Agreement Concerning the International Registration of Marks The Madrid Agreement concerning the International Registration of Marks was adopted in 1891 and entered into force in 1892. The agreement was revised in 1900, 1911, 1925, 1934, 1957 and 1967 and amended in 1979. Any State being a party to the Paris Convention may accede to the Madrid Agreement. The Protocol relating to the Madrid Agreement (Madrid Protocol) was adopted in 1989 and entered into force on 1 December 1995. Under the Madrid Protocol the application for international registration can be based on a trademark application filed in the country of origin. It is administered by WIPO. Due to the international procedural mechanism, the Madrid system offers a trademark owner the possibility to have his trademark protected in several countries by simply filing one application directly with his own national or regional trademark office. An international mark so registered is equivalent to an application or a registration of the same mark effected directly in each of the countries designated by the applicant. If the trademark office of a designated country does not refuse protection within a specified period, the protection of the mark is the same as if it had been registered by that Office. The Madrid system also simplifies the subsequent management of the mark, since it is possible to record subsequent changes or to renew the registration through a single procedural step. In October 2004, the European Community joined the Madrid Protocol System, thus including the possibility to use Community Trademarks as a basis for international trademark applications and for Community Trademarks to be applied for via international route. The Madrid Agreement has 56 members while the Madrid Protocol has 82. Czech Republic is member of both. 1.3.6 The Singapore Treaty on the Law of Trademarks The Singapore Treaty on the Law of Trademarks51 was signed in Singapore in March 2006. The Treaty entered into force in 2009. Czech Republic is NOT Party to the Treaty. The Treaty establishes common standards for procedural aspects of trademark registration and licensing. It maintains the streamlined application formalities of the current Trademark Law Treaty of 1994, but eliminates the provision that required national offices to accept paper applications. This variation allows national trademark offices to progress to an entirely electronic system. The Singapore Treaty applies to marks that can be registered under the law of a Contracting Party. Most importantly it is the first time that non-traditional marks are explicitly recognized in an international instrument dealing with trademark law. The Treaty is applicable to all types of marks including non-traditional visible marks, such as holograms, three-dimensional marks, movement 51 The full text of the Singapore Treaty could be found on: http://www.wipo.int/treaties/en/ip/singapore/ 22 Reference Text for Trainers marks, and non-visible marks, such as sound, olfactory or taste and feel marks. The Regulations provide for the mode of representation of these marks in applications, which may include nongraphic or photographic reproductions. The Treaty also includes a new provision addressing relief measures for failure to comply with time limits during the trademark application process. Special provisions have been drawn up to provide developing and less developed countries (LDCs) with additional technical assistance and technological support as to enable them to take full advantage of the provisions of the Treaty. It was recognized that LDCs shall be the primary and main beneficiaries of technical assistance by Contracting Parties of the WIPO. 1.3.7 The Lisbon Agreement for the Protection of Appellations of Origin and their International Registration 52 The Lisbon Agreement was concluded in 1958, revised in Stockholm in 1967 and amended in 1979. The Agreement is open to States party to the Paris Convention. The aim of the Agreement is to provide for the protection of appellations of origin. Names as such are registered by the International Bureau of WIPO in Geneva upon the request of the competent authorities of the interested contracting State. The International Bureau communicates the registration to the other contracting States. A contracting State may declare that it cannot ensure the protection of a registered appellation within one year. A registered appellation may not be declared to have become generic in a contracting State as long as it continues to be protected in the country of origin. The Lisbon Agreement has 27 members: the Czech Republic is a contracting party. 52 World Intellectual Property Organization (WIPO), Summary of the Lisbon Agreement for the Protection of Appellations of Origin and their International Registration, available at: http://www.wipo.int/treaties/en/registration/lisbon/summary_lisbon.html 23 Reference Text for Trainers SOURCES Organization for Economic Cooperation and Development (OECD) (2007), “The Economic Impact of Counterfeiting and Piracy”, Executive Summary, http://www.oecd.org/dataoecd/13/12/38707619.pdf United Nations Interregional Crime and Justice Research Institute (UNICRI) (2007) “Counterfeiting: A Global Spread, A Global Threat”, available at: http://www.unicri.it/news/07123_Counterfeiting_CRT_Foundation.php World Intellectual Property Organization (WIPO) (2010) About geographical indications, What is a Geographical Indication? http://www.wipo.int/geo_indications/en/about.html#agri World Intellectual Property Organization (WIPO) (2010) About Industrial Designs, available at: http://www.wipo.int/designs/en/about_id.html#protect World Intellectual Property Organization (WIPO) (2010) About Trademarks, What kinds of trademarks can be registered? available at: http://www.wipo.int/trademarks/en/about_trademarks.html#function World Intellectual Property Organization (WIPO) (2010) Frequently Asked Questions/ Patent, available at: http://www.wipo.int/patentscope/en/patents_faq.html#protection World Intellectual Property Organization (WIPO) (2010) Hague System for the International Registration of Industrial Designs, http://www.wipo.int/ hague/en/ World Intellectual Property Organization (WIPO) (2010) Industrial Designs, available at: http://www.wipo.int/designs/en/ World Intellectual Property Organization (WIPO) (2010) Madrid Agreement concerning the International registration of Marks, available at: http://www.wipo.int/madrid/en/legal_texts/trtdocs_wo015.html World Intellectual Property Organization (WIPO) (2010) Madrid System for the International Registration of Marks, available at: http://www.wipo.int/madrid/en/ World Intellectual Property Organization (WIPO) (2010) Patent Cooperation Treaty (PCT) (1970), available at: http://www.wipo.int/pct/en/treaty/about.html World Intellectual Property Organization (WIPO) (2010) Protecting Inventions by Utility Models, What is a Utility model? available at: http://www.wipo.int/sme/en/ip_business/utility_models/utility_models.htm World Intellectual Property Organization (WIPO) (2010) Summary of the Paris Convention for the Protection of Industrial Property, available at: http://www.wipo.int/treaties/en/ip/paris/summary_paris.html World Intellectual Property Organization (WIPO) (2010) Summary of the Lisbon Agreement for the Protection of Appellations of Origin and their International Registration, available at: http://www.wipo.int/treaties/en/registration/lisbon/summary_lisbon.html World Intellectual Property Organization (WIPO) (2010) The Hague Agreement Concerning the International Registration of Industrial Designs: Main Features and Advantages, available at: http://www.wipo.int/export/sites/www/freepublications/en/designs/911/wipo_pub_911.pdf World Intellectual Property Organization (WIPO) (2010) What is a Trademark? available at: http://www.wipo.int/trademarks/en/trademarks.html World Trade Organization (WTO) (2010) PART II — Standards concerning the availability, scope and use of Intellectual Property Rights, available at: http://www.wto.org/english/tratop_e/trips_e/t_agm3b_e.htm#4 World Trade Organization (WTO) (2010) TRIPS: Geographical indications, Background and the Current situation, available at: http://www.wto.org/english/tratop_e/trips_e/gi_background_e.htm 24 Reference Text for Trainers The World Trade Organization (WTO), www.wto.org 25 Reference Text for Trainers SECTION 2 Definitions of Counterfeiting and Piracy and the Involvement of Organized Crime 2.1 Definitions of Counterfeiting and Piracy Counterfeiting and piracy are terms used to describe a range of illicit activities linked to IPR infringement.53 In its broader sense, the term counterfeiting is often used at the international level to indicate the infringement of any intellectual property rights, including trademarks, patents, industrial designs, copyrights and related rights. A distinction between the two concepts of counterfeiting and piracy can be made, where the first term refers to the infringement of the norms ruling the use of trademarks and industrial property in general and the latter refers to the reproduction of copyrighted material without the consent of the right holder. The TRIPS Agreement suggests the definitions of counterfeiting and piracy for the purposes of the agreement. Footnote 14 of art.51 “Suspension of Release by Customs Authorities”, states: (a) "counterfeit trademark goods" shall mean any goods, including packaging, bearing without authorization a trademark which is identical to the trademark validly registered in respect of such goods, or which cannot be distinguished in its essential aspects from such a trademark, and which thereby infringes the rights of the owner of the trademark in question under the law of the country of importation; (b) "pirated copyright goods" shall mean any goods which are copies made without the consent of the right holder or person duly authorized by the right holder in the country of production and which are made directly or indirectly from an article where the making of that copy would have constituted an infringement of a copyright or a related right under the law of the country of importation.54 The International Trademark Association (INTA) defines counterfeiting as “the practice of producing goods, often of inferior quality, and selling them under a brand name without the brand owner’s authorization. Generally, counterfeit goods are sold under a mark that is identical to or substantially indistinguishable from a mark that is registered for the same goods, without the approval or oversight of the trademark owner. Many famous brands, such as COCA-COLA®, MARLBORO®, and MICROSOFT®, are the subject of counterfeiting, as are brands associated with products ranging from peanut butter to aircraft parts. Counterfeiting should be distinguished from trademark infringement or passing off, which involves the use of confusingly similar indicia. Counterfeiting is most prevalent in developing countries with a strong manufacturing capability but generally speaking, counterfeit goods are produced and sold around the globe.”55 The UNESCO World Anti-Piracy Observatory states that piracy “includes the reproduction and distribution of copies of copyright-protected material, or the communication to the public and making available of such material on on-line communication networks, without the authorization of the right owner(s) where such authorization is required by law. Piracy concerns different types of works, including music, literature, films, software, videogames, broadcasting programmes and signals.”56 The same source also mentions an interesting debate on the compatibility between the term of “piracy” and the absence of the commercial purpose in the activity by stating that “[t]raditionally, piracy concerned the unauthorized reproduction and distribution of physical copies 53 Organization for Economic Cooperation and Development (OECD) (2007), “The Economic Impact of Counterfeiting and Piracy”, Executive Summary, http://www.oecd.org/dataoecd/13/12/38707619.pdf 54 World Trade Organization (WTO), Agreement on Trade-related Aspects of Intellectual Property Rights (TRIPS), http://www.wto.org/english/docs_e/legal_e/27-trips.pdf 55 International Trademark Association website, “What is counterfeiting?”, http://www.inta.org/index.php?option=com_content&task=view&id=1534&Itemid=&getcontent=4 56 UNESCO, World Anti-Piracy Observatory, “What is Counterfeiting?”, http://portal.unesco.org/culture/en/ev.phpURL_ID=39397&URL_DO=DO_TOPIC&URL_SECTION=201.html 26 Reference Text for Trainers of protected works, on a commercial scale or with a commercial purpose. However, the rapid development of the Internet and the massive unauthorized on-line use of protected content, where the "commercial" element is often missing, have given rise to a lively debate. The question whether such use constitutes "piracy" and should be treated in the same way as traditional piracy is at the heart of the current copyright debate. […]”57 Numerous definitions of counterfeiting exist in literature. Staake and Fleisch (2008) define counterfeiting as “the unauthorized reproduction of goods, services or documents in relation to which the state confers upon legal entities a statutory monopoly to prevent their exploitation by others”.58 If we specifically refer to products, counterfeiting is defined by the same authors as “the manufacture of articles which are intended to appear to be as similar to the original as to be passed off as genuine items”.59 Different typologies of counterfeiting – or distinctions within the general definition – could be also identified. Staake and Fleisch distinguish between deceptive counterfeiting and non-deceptive counterfeiting: the first refers to cases in which the buyer purchases counterfeit goods in “good faith”, i.e. without knowing that the intellectual property right inherent to the good has been infringed; the second to cases in which the buyer fully knows that the article is the result of an IPR infringement.60 According to Casillo, another distinction could be made between two modalities of counterfeiting: allusion and expropriation.61 The first concept refers to goods which are very similar but intentionally not identical to those already commercialized on the market or to goods which recall other brands or trademarks of famous articles.62 On the contrary, cases of expropriation could be identified when: (a) the original brand is affixed to goods which belong to product categories different from the original one63; (b) the original product is imitated in its format or design or functionality64; (c) goods are produced almost identical to the original articles, by copying brands, trademarks, design, format and technical characteristics. The last case of counterfeited goods almost identical to the original ones is alternatively defined by Casillo as total counterfeiting.65 2.2 Counterfeiting as a financial and IP crime According to the Interpol, Intellectual Property Crime (IPC) is a generic term used to describe a wide range of counterfeiting and piracy offences. It primarily affects the industrial and trade sector, therefore, IPC falls under the classification of financial crimes. Counterfeiting and piracy are undoubtedly among the most serious and widespread crimes under the IPC category and by extension under financial crimes. Other types of financial crimes are currency counterfeiting, money laundering, payment/credit card fraud etc.66 A comprehensive definition of IPC has been made by the Northern Ireland Organized Crime Taskforce according to which IPC involves “counterfeited and pirated goods, manufactured and sold for profit without the consent of the patent or trademark holder.”67 IPC represents one aspect 57 Ibid. Staake, T., Fleisch, E. (2008), “Countering Counterfeit Trade”, Springer (ed.), p.17. 59 Ibid. 60 “Deceptive counterfeiting shall refer to cases where a person or an organization purchases counterfeit goods in the belief they are buying genuine articles; non-deceptive counterfeiting shall refer to cases where a person or an organization purchase counterfeit goods knowing of their counterfeit nature”. Ibid., p.18. 61 See Casillo, S. (1998), “L’irresistibile ascesa dell’industria del falso in Italia”, in Il Mulino, n°4, p.709. 62 Some examples could be done: famous cases of allusion are counterfeiting of perfumes such as Chanel No.5 and Versace (respectively counterfeited as “Cannel 5” and “Versage”) or of car-stereo Pioneer (become “Pioniere”) and even pens (Bic which has been counterfeited as “Bip”). 63 For example the brand of a perfume could be affixed to clothes or other goods which are not perfumes. 64 This is for example the case of reverse engineering or industrial espionage able to lead to the production of products with the same level of quality or functionality. 65 Casillo, S., op. cit., p.698. 66 Information retrieved form the Interpol website, http://www.interpol.int/public/FinancialCrime/default.asp 67 See the Organized Crime Taskforce of Northern Ireland (2002), “The Threat: Assessment 2002. Serious and Organized Crime in Northern Ireland”, the Police Service of Northern Ireland, p.8, http://www.nio.gov.uk/organised_crime_threat_assessment_2002.pdf 58 27 Reference Text for Trainers of the informal economy (black market) which operates in parallel to the formal economy.68 A variety of activities within the informal economy involve organized crime. Examples include: drugs trafficking, human trafficking, smuggling of migrants or counterfeit credit cards and is structured upon practices such as corruption, extortion, blackmail, bribery etc. IPC involves a wide range of criminal actors ranging from individuals to organized criminal groups. IPC includes the manufacturing, transporting, storing and sale of counterfeit or pirated goods. Generally, the above is organized and controlled by criminals or criminal organizations.69 Due to its expansion and its significant economic importance the informal economy favours the perpetration of IPC while IPC in turn continues to nourish informal economy’s networks. Interpol states that IPC is a serious financial concern for producers, brand owners and various companies70 as it contributes towards mass losses in annual turnovers, hampers the Research and Development (R&D) sector and encourages unfair competition which cannot be sustained by legitimate companies. In addition, counterfeiting is a serious threat against the health and safety of consumers in many cases as the compromised quality of counterfeit products put consumers’ life in danger, especially products of “first range” consumption such as medicines, food and beverages, spirits and children’s toys. 2.3 Beyond IPR Infringement: the Negative Impact of Counterfeiting Counterfeiting is generally considered to be a relatively harmless and “victimless” crime.71 Furthermore, from a consumer’s perspective this activity apparently creates some advantages as counterfeit goods are usually low price replicas of costly, desirable goods. Consequently, this allows the average consumer to purchase goods which would otherwise have been out of reach. It may be for this very reason that the repression of counterfeiting has been lower than other types of crime.72 In reality, however, counterfeiting constitutes a serious problem which causes grave repercussions throughout the economy, the state and in many cases, among consumers.73 Adopting the mainstreaming classification of the costs of crime (e.g. the Mainstreaming Methodology for Estimating Costs of Crime project -MMECC)74, three categories of costs can be distinguished: costs in anticipation of crime, costs as a consequence of crime and costs in response to crime. Costs in anticipation of crime, which follow a preventive approach, are incurred when measures are implemented with the objective of reducing the vulnerability of goods to counterfeiting. These costs may include specific expenses (i.e. anti-counterfeiting technologies) or general costs to improve risk-reducing behaviour (i.e. internalization of the company’s code of ethics and principles by employees as to ensure a higher level of confidentiality with regards projects and goods). Costs as a consequence of crime correspond to any costs or losses incurred by victims as a consequence crime. These may include productivity loss, property loss, long term consequences of victimization, legal expenses, health services etc. Ultimately, costs in response of crime are equivalent to expenses incurred for the detection of a crime and the prosecution of offenders (e.g. police, prosecution and legal expenses).75 2.3.1 IPR Holders The IPR holders are usually those companies which manufacture and sell the goods for which they hold IPRs. In general, there are two situations which may increase the risk for companies to become victims of counterfeiting:76 68 Ibid., pp.2-3. Ibid., p.3. 70 Interpol website, op. cit., http://www.interpol.int/public/FinancialCrime/default.asp 71 OECD (2008), op. cit., p.263. 72 Ibid. 73 International Anti-Counterfeiting Coalition (IACC) (2005), “The Negative Consequences of Intellectual Property Theft: Economic Harm, Threats to the Public Health and Safety and Links to Organized Crime and Terrorism”, white paper, Washington. 74 See the MMECC website, http://www.costsofcrime.org/CostingPrinciplesandMethodology/ 75 Ibid. 76 Calovi, F., Vettori, B., Yu J. (2008), op. cit., pp.132-134. 69 28 Reference Text for Trainers when they fail to protect themselves adequately as a result of lack of knowledge regarding the norms related to IPRs and/or they do not apply these norms because they believe them to be a waste of money or they simply chose not to invest to protect the brand; when they contract out or set up company branches in countries where the protection of IPRs is inadequate and/or where countermeasures against such criminal activities are not implemented. To reduce this risk, numerous companies now invest in preventive measures and actions to prevent the crime, such as R& D for the proposal of new products, the hiring of private investigators and/or the introduction of anti-counterfeiting technologies.77 Despite these interventions, companies are still at risk of counterfeiting. The existence of a “counterfeiting industry”, which produces and sells products at a lower price than the originals, has grave repercussions on the legal industry. It should also be noted that the counterfeiting industry also benefits from the fact that it does not incur some costs which are instead applied to a legal industry and the legal market. Examples of such costs include: costs to guarantee high quality standards; costs resulting from the compliance with regulations concerning safety in the workplace and/or quality controls; costs for the purchasing of high quality materials; costs for marketing and R&D (these are incurred by the industry which legally produces the original goods). The counterfeiting industry produces goods which already include R&D value and which do not require any type of marketing, as advertising carried out for the original good is usual enough publicity. Taxes are generally avoided by counterfeiters as their products are usually sold on the black market.78 Lower expenses incurred mean that the counterfeiting industry can produce and sell counterfeit goods at a lower price.79 Consequently, the following can be expected with respect to the legal company: a loss in terms of market share for the company; a reduction in revenues; a loss in terms of job positions. According to a classification system formulated by Bronca, two categories of costs can be distinguished:80 Direct costs: reduction in demand as consumers opt for the cheaper version of the product, financial damages occur due to required changes in productions, as well as investment in R&D. Long term indirect costs: expenses incurred for the registration of a trademark, advertising, investigation costs and legal expenses. According to the Association of Public Safety Communications Officials (APCO), the incidence of counterfeited sporting goods is equivalent to 10-12% of the total value of the sector globally. In the EU alone this incidence is equivalent to 11% and the estimated losses are more than 7.5 billion Euros.81 The World Health Organisation (WHO) estimates that the problem of counterfeit 77 Ghidini G. (1998), “Ricerca e Sviluppo come motore del ‘vantaggio competitivo’: il ruolo della proprietà intellettuale” in Micro&Macro Marketing, n°2, pp.229-244. 78 UNICRI (2007), op. cit., p. 41. 79 Centre d’Etudes Internationales de la Propriété Industrielle (CEIPI) (2004), “Impacts de la contrefaçon et de la piraterie en Europe. Rapport Final”, Université Robert Schuman, Strasbourg, pp.16-17, downloadable at http://counterfeiting.unicri.it/resources.php 80 Bronca, E. (1998), “La contraffazione del marchio” in Micro&Macro Marketing, n°2, August, pp.195-196. 81 APCO (2003), “Global Counterfeiting”, Background Document, p.18. 29 Reference Text for Trainers medicines is limited in developed countries in which their presence is less than 1% due to efficient regulatory and control mechanisms. The problem is significant in developing countries (Africa, areas of Asia and areas of Latin America) in which the incidence of counterfeit medicines ranges from 10-30%. It is worth noting that some former Soviet republics have a proportion of counterfeit medicines which is above 20% of market value. Finally, WHO estimates that more than 50% of medicines sold online through sites that conceal their actual postal address are counterfeit.82 According to the Centre for Economics and Business Research, counterfeiting within the pharmaceutical sector has led to a loss of 292 million Euros 83. According to The Motor and Equipment Manufacturers Association, sale of counterfeited spare motor vehicle parts has caused a total loss of 12 billion dollars and a loss of 750,000 jobs.84 According to the WIPO, total losses in the perfume and cosmetics sector are estimated to be 3,017 million Euros.85 Furthermore, according to the Council of Europe, every year counterfeiting causes a total loss of 100,000 jobs within the European Union.86 2.3.2 Consumers’ Health and Safety There are two types of consumers who purchase counterfeit goods: aware consumers and unaware consumers. Consumers of counterfeit clothes and accessories are usually aware of what is being purchased. In this case, the item is purchased as people aspire to move up the social ladder through imitating members of higher social classes through buying a “status symbol” product. Advertising and brands’ reputation amplify this desire. The average consumer, however, does not have enough financial resources to buy such costly goods and may tend to opt for the counterfeit version.87 Accidental consumers are people who buy counterfeit products without being aware of their illegal nature. Deceived consumers sincerely believe to have purchased an authentic product at a convenient price. In such case, it often results in the goods bought not meeting the consumer’s expectations. It is to be noted that low quality of some counterfeit products can be extremely hazardous to the consumers’ health and safety.88 Examples include: pharmaceuticals, electronic components, alimentary products, spare parts for motor vehicles and toys. Such counterfeit goods are usually made from sub-standard materials which have not undergone any sort of safety control, which in some cases may contain harmful substances. For this reason consumers of counterfeit goods tend to be more cautious when purchasing such items and consequently counterfeiters are obliged to produce goods even more similar to the original, making them less distinguishable from one another. Examples of serious consequences caused by counterfeited goods include: numerous deaths in various countries (China, Turkey, Thailand)89 caused by the consumption of counterfeit food and/or beverages; food and/or alcohol poisoning; plane and/or car crashes as a result of counterfeit spare parts used in aircrafts and/or motor vehicles; serious health problems caused by the consumption of counterfeit medicines (often made without or with insufficient active ingredients) or smoking of counterfeit cigarettes (produced by mixing plastic, soil, sand and rodent droppings with tobacco leaf or which contain extremely high nicotine levels); eye, ear, kidney and immune system problems caused by counterfeit batteries (often made with high levels of mercury); inflammation caused by use of fragrant and cosmetic products containing bacteria or toxic substances; safety problems for children who play with counterfeit toys.90 82 WHO (2006), “Counterfeit medicines: an Update on Estimates”, International Medical Products AntiCounterfeiting Taskforce, IMPACT, 15 November available online http://www.who.int/medicines/services/counterfeit/impact/TheNewEstimatesCounterfeit.pdf 83 Centre for Economics and Business Research (CEBR ) (2000), “The Economic Impact of Counterfeiting in Europe”, pp. 2-3. 84 Majid, Y. (2005), “A Deadly Faith in Fakes”, quoted in CEBR (2000), ibid., p.8. 85 World Intellectual Property Organization (WIPO) (2004), “WIPO National Seminar” ibid., p.4. 86 Council of Europe (2004), “Counterfeiting: Problems and Solutions”, Report of the Committee on Economic Affairs and Development. 87 Curcio, A.M (1998), “Desiderio di falso, falso desiderio?” in Micro&Macro Marketing, n°2, pp.215-216. 88 UNICRI (2007), op. cit., pp. 49-50. 89 "Global Counterfeiting” (2003), background document, pp.11-15. 90 Ibid. 30 Reference Text for Trainers Examples of counterfeit goods considered to be hazardous which have been seized include: counterfeit shampoos which contained bacteria or even acid in North America and in Zambia; packages of counterfeit toothpaste which contained toxic substances in Spain; children toys produced with flammable materials in Canada.91 Health and safety costs are not the only costs incurred by consumers. Other costs may include emotional and physical harm (value of reductions in wellbeing experienced by an individual or household as a result of the physical and emotional impact of victimization) and legal expenses (only if the users decide to take legal action).92 2.3.3 National Economy and Society The State is also a victim of the counterfeiting industry, since it has to bear the costs in response to crime. In particular, the State must cover police costs, justice costs, costs deriving from criminal sanctions, costs linked to the drawing-up of a legislative structure which disciplines the crime, as well as the penalties and costs necessary to have effective controls at customs. Further costs incurred by the State include those which derive from crime. These costs can be divided into two categories: Direct losses: national governments may bear losses due to a reduction in tax revenues. A reduction in tax revenues can be caused by different factors. Primarily, it may reflect a reduction of revenues originating from legal companies as a result of less profit earned and thus lower taxes to be paid. A second factor is linked to the fact the counterfeit industry often sells its products on the black market thus avoiding paying taxes. Indirect losses: counterfeiting can lead to general loss of trust in the government’s capacity of ensuring compliance with IPRs. Consequently, there is an ever higher reluctance to establish company branches in countries where counterfeiting is widespread, thus, a reduction in the amount of foreign investments made within these countries. Furthermore, authentic products which are manufactured in countries where the counterfeit industry is notably active tend to be perceived, even though authentic, as low quality goods. This obviously has a negative effect on exports. As a result, the authentic product’s reputation is defamed and the levels of exports are decreased.93 2.4 Types of Counterfeiters Counterfeiters are individuals in various ways involved in activities linked to the unauthorized production of copies of original products with the purpose of generating profits. The decision to invest in the production of counterfeit goods is often based on a cost-benefit analysis. Counterfeiters base their costs assessment on a calculation of the efforts required to produce a particular counterfeit good. Social perceptions, legislation and the level of its enforcement94 are also taken into account. Furthermore, the evaluation of benefits weighs up the opportunities of earning large profit margins at low costs.95 It is to be noted that counterfeiting has until recently been regarded as a “victimless crime” and has not been deemed socially dangerous, therefore its repression has been limited.96 Counterfeiters are often involved in other criminal activities, such as drug and arms trafficking, illegal workforce employment, human trafficking, illegal immigration and money laundering. Furthermore, these individuals may resort to violence as a tool to coerce others to work and/or cooperate with them. These coercive methods may include psychological pressure, blackmail and 91 Ibid., pp.49-51 and UNICRI (2007), op. cit., pp. 49-50. For further information see http://www.costsofcrime.org/CostingPrinciplesandMethodology/ 93 “Global counterfeiting” (2003), ibid., p.16, and UNICRI, (2007), op. cit., p. 49. 94 Williams F.P., Mc Shane M.D. (2002), “Devianza e criminalità”, Il Mulino, Bologna, p.196. 95 OECD (2008), “The Economic Impact of Counterfeiting”, Paris, http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/OECD-FullReport.pdf 96 Ibid., p.87. 92 pp. 47-49, 31 Reference Text for Trainers intimidation.97 Characteristics which, together with the use of coercion, have led to the worldwide involvement of numerous individuals operating alone or more often organized in groups. 2.4.1 Single Counterfeiter Even though counterfeiting activities are often carried out at an international level and require a complex set of skills, which individual companies do not usually possess, smaller scale counterfeiting activities do exist. These small scale activities are carried out by small entrepreneurial organizations constituted mainly by single counterfeiters who may cooperate together and which produce and distribute counterfeited goods. These small scale activities can evolve into larger scale activities if there is a significant amount of capital and the entrepreneur has tight connections with third parties operating in and across different locations.98 In such cases, crimes considered to be typical of those linked to organized crime are committed. This may include the employment of an illegal workforce, corruption of customs officers and police forces, coercive methods such as blackmail and intimidations used to oblige legal companies to produce counterfeit goods. Furthermore, these illegal activities may be facilitated by weak border controls, differences across jurisdictions and a lack of severe and adequate penalties.99 Five types of counterfeiters have been detected by Staake and Fleisch:100 Disaggregators: usually produce replicas of fashion company brands. Goods produced are easily made and are often of poor quality (the machines used during manufacturing may be of poor quality). In order to minimize transport costs these goods are usually sent in large quantities. Disaggregators reduce the risks of detection by choosing countries considered to have weak border controls as places of destination for the goods in question. Imitators: produce replicas of medium quality, thus imitators are required to have specific knowledge regarding the production of the chosen goods. Furthermore, a large amount of initial capital is invested in machinery used for manufacturing the goods. Imitators counterfeit both brands and designs. Their market is mainly national. Fraudsters: produce low quality counterfeit goods. The goods produced are similar in appearance to the original. It is for this reason that their retail price is just slightly lower than the original good. Desperados: produce easily imitable goods, such as medicines and spare parts for motor vehicles. In order to reduce the risk of being detected, desperados produce small quantities of goods to then sell them at high retail prices. Counterfeit smugglers: profit by avoiding tax and violating custom laws. One particular form of ‘counterfeiting’ consists of suppliers selling factory overruns on the black market. Factory overruns are those goods produced in excess with respect to the quantity contractually ordered from the supplier by the retailer. This phenomenon cannot be formally considered as counterfeiting, since neither copyright nor trademark rights are violated (after all, the good being sold is an authentic product). The license agreement stipulated between the two parties (supplier and retailer) is violated. It is to be noted, however, that these products are often included in statistics concerning counterfeit products and their dissemination through business associations. 2.4.2 The Implication of Organized Crime 97 Union des Fabricants (UNIFAB) (2004), “Counterfeiting & Organized Crime Report”, 2nd edition, Paris, p. 11, http://counterfeiting.unicri.it/docs/Union%20des%20Fabricants.Counterfeiting%20and%20Organised%20Crime%20Repo rt.2nd%20edition2004.pdf 98 UNICRI, op. cit., p.110. 99 Savona E.U. (1999), “Trends and Causes of Cross-border (organized) Crime in Europe”, text of the report used during the “Conference on Area of freedom, security and justice in the EU: policy development and practical implementation of criminal law co-operation”, ERA Congress Centre, 18-19 October, Trier (Germany). 100 Staake, T., Fleisch, E. (2008), “Countering Counterfeit Trade. Illicit market insights, Best-Practice Strategies and Management Toolbox”,Springer-Verlag (editions), Berlin Heidelberg, pp.22-54. 32 Reference Text for Trainers The United Nations Convention against Transnational Organized Crime101, adopted by General Assembly resolution 55/25 of 15 November 2000, is the main international instrument in the fight against transnational organized crime. The Palermo Convention entered into force on 29 September 2003, but the Czech Republic has not ratified it. The Convention represents a major step forward in the fight against transnational organized crime and signifies the recognition by Member States of the seriousness of the problems posed by it, as well as the need to foster and enhance close international cooperation in order to tackle those problems. States that ratify this instrument commit themselves to taking a series of measures against transnational organized crime, including the creation of domestic criminal offences (participation in an organized criminal group, money laundering, corruption and obstruction of justice); the adoption of new and sweeping frameworks for extradition, mutual legal assistance and law enforcement cooperation; and the promotion of training and technical assistance for building or upgrading the necessary capacity of national authorities. Counterfeiting is a highly profitable crime and a major source of tax-free income. It is yet another “seed corn” enabling organized criminal groups to invest the profits of crime into other illegal activities. The Palermo Convention represents a significant advancement in the repression of the phenomenon of counterfeiting as irrefutable links between counterfeiting and organized criminal groups have been established. According to Art.5 an organized criminal group is a “structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences established in accordance with this convention, in order to obtain, directly and indirectly, an economic or other material benefit”.102 These criminal groups are characterized by a durable structure which commits criminal offences in order to generate profits. The globalization of markets, together with the widespread distribution of information technologies has led an ever greater demand for illegal goods and services. Consequently, this increase in demand has led to new profit opportunities and the formation of alliances among various organizations.103 These elements provide a better understanding of why a significant portion of counterfeit trafficking is managed by organized criminal groups. There is a demand for illegal products which is satisfied by them. Counterfeit goods may be sought by consumers if there is a lack of products along legal distribution chains or if the prices offered are more advantageous than those of the original products. These counterfeit goods are often transported along the same trade routes used for drug and arms trafficking. Consequently, such goods may be transported in collaboration with the various groups managing other types of illegal trade.104 These relations have, with time, facilitated the evolution of counterfeiting and transformed it into an extremely well organized transitional criminal activity. Organized criminal groups have various economic resources and thus can invest in all types of sectors, including the technological ones, therefore, they can be considered as real illegal mass producers. Direct involvement of the criminal groups in the counterfeiting industry occurs if the counterfeit activity is owned by one of these organized criminal groups. Indirect involvement in counterfeiting occurs when one of these groups decides to endorse a preexisting legal company.105 Organized criminal groups are able to evade border controls by resorting to corruption and/or intimidation which may further result in their products being put on the legal distribution chain.106 Counterfeiting activities ensure a low level of detection and a high level of profitability. Organized criminal groups consider counterfeiting as a way to generate funds which can be then laundered by investing them in other activities, both illicit and licit.107 101 To download the text of the United Nations Convention against Transnational Organised Crime, please visit: http://www.unodc.org/unodc/en/treaties/CTOC/index.html 102 United Nations (2000), “United Nations Convention against Transnational Organized Crime”, Art. 2(a). 103 UNIFAB (2004), op. cit., p.7. 104 UNICRI (2007), op. cit., pp.104-109. 105 Calovi, F., Vettori, B., Yu, J. (2008), “I falsi di moda. Le vulnerabilità del mercato italiano della moda alla contraffazione”, Franco Angeli (editions), Milano, p. 130. 106 UNICRI (2007), op. cit., pp.104-109. 107 “Global counterfeiting” (2003), Background document, p.20. 33 Reference Text for Trainers The Organisation for Economic Co-operation and Development (OECD) states that organized criminal groups are actively involved in producing, smuggling and selling untaxed alcoholic beverages and cigarettes; electronic components; clothes and accessories. This speculation is based on the fact that the previously mentioned sectors are the most profitable and involve less risk.108 According to the Union des Fabricants, the Italian Camorra, Albanian gangs, Asian gangs (especially the Japanese Yakuza) and Turkish clans (in particular the Bucak clan) are the main criminal networks operating in the counterfeiting industry.109 According to police and investigations110, it is thought that the Camorra is specialized in counterfeiting clothes, especially items associated with famous brands. In the Port of Naples alone, according to the Italian Customs Agency, 60% of the goods unloaded are not checked. 1,600,000 tonnes of goods with Chinese origin are unloaded and registered; however, another 1,000,000 tonnes of Chinese goods remain unchecked. It has been estimated that two hundred million Euros of taxes were evaded. Cheap counterfeit products were bought in Eastern countries, where illegal workforces are often employed in the production process of such goods, then shipped over to Italy and unloaded at Port of Naples, to be then loaded onto vans and distributed throughout Italian and other European cities.111 The Camorra is also involved in the production of counterfeit CDs. These CDs are often imported from countries such as Bulgaria and Ukraine.112 The Camorra manages all stages of production, distribution and sales of counterfeit products by financing and controlling the companies which produce the goods. Albanian gangs are particularly active in the port of Antwerp in Belgium and they deal with all types of counterfeit products. Asian gangs are more skilled in the manufacturing and distribution of counterfeit credit cards, software and electronic entertainment devices. Asian gangs are known to collaborate with organized criminal groups in Eastern Europe, Eastern India and Nigeria. The Bucak clan monopolizes the sales of counterfeit clothes in Kusadasi in Turkey.113 The Link between Counterfeiting and other serious Organised Crimes As any serious organised crime, counterfeiting poses a significant threat to the legitimate economy, consumer safety, national values and social stability.114 Nevertheless, IP crime is still considered very attractive to global criminal groups as it is high-profit and low-risk, with inadequate penalties often just a fine and/or a short suspended sentence. Organized crime’s involvement in counterfeiting may be better understood by considering three motivations: consolidating, expanding vertically, and expanding horizontally. In the first, as the entry barrier to piracy is lowered, organized crime entrenches itself in the activity in order to fend off amateur competitors. In the second, a criminal group expands into piracy to derive profit from experience in related criminal activity. For instance, the methods used in human smuggling—forging documents, laundering money, smuggling objects or people across borders, and the like—can be leveraged when turning to piracy and vice-versa. The third, and most prevalent, motivation is expanding into piracy to diversify a criminal group’s illicit revenue streams. The profits made by counterfeiting are often used to fund other serious organized crime such as drugs and arms smuggling, people trafficking, identity theft, money-laundering and child pornography.115 108 OECD (2008), op. cit., pp.87-88. Union des Fabricants, (2004), op. cit., pp.16-17. 110 See, Saviano R. (2006), “Gomorra. Viaggio nell’impero economico e nel sogno di dominio della camorra”, Mondadori (editions), Milano, pp.11-47. 111 Ibid. 112 UNIFAB (2004), op. cit., pp.16-17. 113 Ibid. 114 The Anti-Counterfeiting Group, Links between counterfeiting and other serious organised crime, available at: http://counterfeiting.unicri.it/docs/AntiCounterfeiting%20Group.Links%20between%20Counterfeiting%20and%20Other%20Serious%20Crimes.February2008. UK.pdf 115 RAND Corporation (2009), Film Piracy, Organised Crime and Terrorism, RAND, available at: http://www.rand.org/pubs/monographs/2009/RAND_MG742.appendix.pdf 109 34 Reference Text for Trainers By investigating drugs or other trafficking/corruption-related crimes, it is frequently found that warehouses containing counterfeit products are also discovered. The opposite situation hardly occurs. This is mainly due to the fact that investigations on counterfeiting cases usually are not deep enough to allow discovering possible links with other crimes. For this very reason, in order to make advancements in countering counterfeiting-related crimes and discovering the criminal networks behind them, all the available investigation tools need to be used. Some case studies and news showing the connection between counterfeiting and other organised crimes are reported in the boxes below. Box 1 Operation Lund and human smuggling in Britain On 5th February 2004, 21 illegal Chinese immigrant cockle-pickers drowned as their unlicensed gang master forced them to work in dangerous conditions. Police found evidence that the head of the syndicate ran an extensive human-smuggling operation at his numerous residences. In gathering evidence, police also found more than 4,000 counterfeit DVDs, as well as computers containing counterfeit materials. This case highlighted the “range of possible entry methods exploited by Chinese organized immigration crime groups”. Highlight. This case demonstrates an IPR-infringement crime connection to one of the most infamous incidents of illegal Chinese immigration and labour abuse in England’s history. Piracy revenue was a secondary but important part of this operation: the commercial scale of operation showed a significant investment in equipment and blank media. There was no surveillance or intelligence about how he entered into piracy. Motivation for entry into piracy. This is a case of vertical expansion, as the gang master’s piracy operation was a direct extension of the gang’s primary activity of human smuggling. By expanding into piracy, the gang master was able to capture additional profits from the labour he had at his disposal. Role of law enforcement. Police identified the piracy operation they uncovered; prosecutors successfully convicted the gang master and his accomplice of 11 counts of copyright infringement. Evidence base. The evidence base comprises the court proceedings and press accounts, which provide vivid details of the drowning tragedy and the national response that followed. Police discovered tens of thousands of counterfeit DVDs, disc copiers, and high-end printers in a search of the gang master’s cousin’s residence. Counterfeit DVDs like those found at the residence were being sold by Chinese illegal immigrants in the area. These circumstances suggest that the immigrant cockle-pickers were recruited to also assist in the manufacture and sale of the counterfeit DVDs. The gang master’s cousin was charged with both immigration and trademark offences. Source: Rand Corporation, Safety and Justice Programme 35 Reference Text for Trainers Box 2 Counterfeiting revenues to fund drug trafficking in the U.K. On July 2009 fake goods worth around £3m were seized in one of the biggest-ever counterfeit raids in Manchester. Customs and trading standards officers swooped on a Piccadilly warehouse after a tip-off and found thousands of boxes of bogus gear. Officials believe the warehouse supplied hundreds of shops and market stalls across the country. They are treating it as a body blow to counterfeit gangsters who have plagued Manchester. In 2007, the M.E.N revealed the city was regarded as the country's fake goods capital and officers have continued to target the illegal industry. They are now hunting for the factory's owner - nobody was inside when the doors were smashed down at the Chapeltown Street site. The huge stash included fake Gucci purses, Prada handbags and thousands of boxes of trainers bearing brand names such as Nike and Lacoste. There were also polo shirts, fleeces, t-shirts and coats from bogus top labels such as Armani and Dolce and Gabbana. One pile of boxes contained the popular Australian Ugg boots. Officers also found hundreds of ghd hair straighteners. The company warned that the fakes could be `lethal'. A spokesman for the Anti-Counterfeiting Group said: "There is no doubt that some of the vast sums raised from counterfeiting go to fund drug trafficking". Graham Forbes, from Her Majesty's Revenue and Customs, added: "The gangs behind this form of criminality reap huge profits from their sales which are ploughed straight back into the criminal underworld, feeding activities like drug dealing and fraud." Source: Manchester Evening News Box 3 Counterfeiting and firearms smuggling: the involvement of Camorra U.S. authorities alleged that a band of criminals sent from Italy by the Camorra ran a counterfeiting ring in the tri-state area (New York, New Jersey and Connecticut) that sold knock-off clothing and electronics on street corners, at flea markets and on the Internet. It is claimed the proceeds from the sales were funnelled back to the organized crime leadership in Italy. The alleged leader of the ring imported items such as video cameras, MP3 players and clothing through his company and then placed counterfeit labels on them. Authorities alleged the group working under the leader consisted of dozens of people sent by a Naples-based organized crime family, part of the Camorra organized crime syndicate. After a seven-month investigation, police raided the ring leader’s house, his company warehouse, together with another house where authorities said many Italian nationals allegedly involved in the scam were living. Hundreds of items of counterfeit merchandise, including Apple iPod labels, were recovered from the warehouse, and police also found a number of firearms. Source: CIB Counterfeiting Confidential 36 Reference Text for Trainers Box 4 The case of Ang Bin Hoey Triad in Malaysia Malaysia became a major centre for the production and distribution of pirated films since law enforcement in China and Hong Kong began to crack down aggressively on burning labs and began arresting organized-crime bosses as well as low-level front men in the 1990’s. Many of the counterfeiting operations in Malaysia are said to have ties to organized crime in Taiwan. Ang Bin Hoey Triad comprises a network of more than a hundred street gangs with an estimated 11,000 members. It’s leader is alleged to have controlled more than 1,000 companies, many of them illicit, including several piracy factories. Highlight. This case demonstrates how counterfeiting and piracy operations fit easily into a traditional, hierarchical organized-crime structure. Piracy revenue. The triad profited from counterfeiting and piracy primarily through the extortion of vendors in Kuala Lumpur. Motivation for entry into piracy. This is a case of both consolidation and horizontal expansion. At the street level, the triad’s gangs consolidated its power over territory, in part including profitable counterfeiting and piracy markets among its rackets. The horizontal expansion was made thorough the 1,000 companies the leader is alleged to have controlled across both licit and illicit markets. Role of law enforcement. The Ministry of Domestic Trade and Consumer Affairs handles the enforcement of anti-piracy laws. Over the years enforcement has been met with violence and intimidation from pirates, cumulated with death threats against the MDTCA. Evidence base. Information on ‘Operation Copperhead’ was compiled from numerous press reports and verified by interviews with law enforcement. Source: Rand Corporation, Safety and Justice Programme 37 Reference Text for Trainers SOURCES APCO (2003), “Global Counterfeiting”, Background Document. Bronca, E. (1998), “La contraffazione del marchio” in Micro&Macro Marketing, n°2, August. Calovi, F., Vettori, B., Yu, J. (2008), “I falsi di moda. Le vulnerabilità del mercato italiano della moda alla contraffazione”, Franco Angeli (editions), Milano. Casillo, S. (1998), “L’irresistibile ascesa dell’industria del falso in Italia”, in Il Mulino, n°4. Centre d’Etudes Internationales de la Propriété Industrielle (CEIPI) (2004), “Impacts de la contrefaçon et de la piraterie en Europe. Rapport Final”, Université Robert Schuman, Strasbourg, pp.16-17, downloaded at http://counterfeiting.unicri.it/resources.php Centre for Economics and Business Research (CEBR) (2000), “The Economic Impact of Counterfeiting in Europe”. CIB Counterfeiting Confidential, (August 2008) available at: http://www.iccccs.org/index.php?option=com_content&view=article&id=29&Itemid=3 Council of Europe (2004), “Counterfeiting: Problems and Solutions”, Report of the Committee on Economic Affairs and Development available at http://assembly.coe.int/Documents/AdoptedText/ta04/EREC1673.htm Curcio, A.M. (1998), “Desiderio di falso, falso desiderio?”, in Micro&Macro Marketing, n°2. International Anti-Counterfeiting Coalition (IACC) (2005), “The Negative Consequences of Intellectual Property Theft: Economic Harm, Threats to the Public Health and Safety, and Links to Organized Crime and Terrorism”, white paper, Washington. International Trademark Association, “What is counterfeiting?”, available at: http://www.inta.org/index.php?option=com_content&task=view&id=1534&Itemid=&getcontent=4 Interpol, http://www.interpol.int/Public/FinancialCrime/IntellectualProperty/Default.asp Majid, Y. (2005), “A Deadly Faith in Fakes”, quoted in CEBR (2000) “The Economic Impact of Counterfeiting in Europe”. Manchester Evening News, £ 3m in fake goods seized, available at: http://menmedia.co.uk/manchestereveningnews/news/s/1127317_3m_in_fake_goods_seized Noble, K.R. (2003), “The links between intellectual property crime and terrorist financing”, Text of public testimony of the Secretary General of Interpol, p.2, available at: http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/links.pdf Organization for Economic Cooperation and Development (OECD) (2007), “The Economic Impact of Counterfeiting and Piracy”, Executive Summary, available at: http://www.oecd.org/dataoecd/13/12/38707619.pdf Organized Crime Taskforce of Northern Ireland (2002), “The Threat: Assessment 2002. Serious and Organized Crime in Northern Ireland”, the Police Service of Northern Ireland, p.8, available at: http://www.nio.gov.uk/organised_crime_threat_assessment_2002.pdf RAND Corporation (2009), “Film Piracy, Organised Crime and Terrorism” Saviano, R. (2006), “Gomorra. Viaggio nell’impero economico e nel sogno di dominio della camorra”, Mondadori (editions), Milano. Savona E.U. (1999), “Trends and Causes of Cross-border (organized) Crime in Europe”, text of the report used during the “Conference on Area of freedom, security and justice in the EU: policy development and practical implementation of criminal law co-operation”, ERA Congress Centre, 18-19 October, Trier (Germany). Staake, T., Fleisch, E. (2008), “Countering Counterfeit Trade”, Springer (ed.), p.17. 38 Reference Text for Trainers The Anti-Counterfeiting Group, Links between counterfeiting and other serious organised crime, available at: http://counterfeiting.unicri.it/docs/AntiCounterfeiting%20Group.Links%20between%20Counterfeiting%20and%20Other%20Serious%20 Crimes.February2008 UNESCO, World Anti-Piracy Observatory, “What is Counterfeiting?”, available at: http://portal.unesco.org/culture/en/ev.phpURL_ID=39397&URL_DO=DO_TOPIC&URL_SECTION=201.html Union des Fabricants, (UNIFAB) (2004), “Counterfeiting & Organized Crime Report”, 2nd edition, Paris, http://counterfeiting.unicri.it/docs/Union%20des%20Fabricants.Counterfeiting%20and%20Organis ed%20Crime%20Report.2nd%20edition2004.pdf United Nations Convention against Transnational Organised Crime, available at: http://www.unodc.org/unodc/en/treaties/CTOC/index.html Williams F.P., Mc Shane M.D. (2002), “Devianza e criminalità”, Il Mulino, Bologna World Trade Organization (WTO), Agreement on Trade-related Aspects of Intellectual Property Rights (TRIPS), available at: http://www.wto.org/english/docs_e/legal_e/27-trips.pdf 39 Reference Text for Trainers SECTION 3 Counterfeiting at the European Union Level 3.1 The Normative Framework The Green Paper of 15 October 1998 stated the European Commission’s efforts to define the objectives of the Community strategy against counterfeiting and piracy and identified the areas where improvement was required. The main objectives of the Green Paper are: (a) to assess the economic impact of counterfeiting and piracy in the Single Market; (b) to review the existing legislation in this field, while identifying the problems and the improvements required on the legal front; (c) to examine the need for Community action in this area with reference to the objectives of the Single Market. Furthermore, the document identified four key areas in which improvements could be made in the measures to combat counterfeiting within the EU Single Market: - monitoring by the private sector; - the use of technical devices; - sanctions and other means of enforcing IPRs - administrative cooperation between the competent authorities. Intellectual property is protected by a series of international normative instruments of which the Member States of the European Union are also a Party. In 2001 the European Union adopted Directive 2001/29 /EC on the harmonization of specific aspects of copyright and related rights in the information society (a.k.a. EU Copyright Directive, EUCD), whose aim was to keep the legal framework of the EU Member States in line with the international conventions on the subject. The EUCD aims to maintain a high level of protection for copyright and related rights, considering also the needs arising from the diffusion of digital technology and providing a harmonized protection at the community level. This harmonized protection should grant to all the rights holders the exclusive right to make their works protected by copyright accessible to the public as well as the materials that are protected by other rights. The EU Legislator intervenes to identify the content of specific exclusive rights of economic use as well as the extent of the related exceptions. Furthermore, it provides new forms of protection regarding technological measures designed and used by right holders to prevent any unauthorized act involving their work. Similar protection is also accorded to rights management information. This term can be defined as information provided by the right holder that identifies the work, the author or any other right holder, information regarding the terms and conditions of use of the work, or numbers and codes that represent such information. The Copyright Directive specifies the content of the rights of reproduction, communication to the public and of distribution. Art. 2 confers to authors, performers, phonogram producers, producers and broadcasting organizations the right of reproduction. It outlines the “exclusive right to authorize or prohibit direct or indirect, temporary or permanent reproduction by any means and in any form of”, their works, fixations of their performances, their phonograms, the first fixations of films in respect to the original and copies of their films and fixation of their broadcast. The EUCD confers right holders the exclusive right to authorize or prohibit any communication or transmission to the public, by wire or wireless, of their work, copy of their work and of performances of performers regarding the right of communication to the public (Art. 3) and the right of distribution (Art. 4). Moreover, the authors enjoy the exclusive right to authorize or prohibit the distribution of the original of their works or of copies in any form. The exceptions to the previously mentioned rights are stated in Art. 5. The main principle is to avoid any prejudice to the technological development and to adapt the concepts of use and reproduction to the specificities of digital communication. 40 Reference Text for Trainers The Directive excludes the prohibition of temporary acts of reproduction which are transient or incidental and that constitute an essential and integral part of a technological process. These reproduction acts should, for instance, be performed with the sole purpose of enabling a lawful use of a work or other protected material and should not have independent economic significance. Member States retain the right to provide for further exceptions or limitations to the right of reproduction, the right of communication to the public, and the right of distribution. Articles 6 and 7 are directly related to the implementation of the WIPO Copyright Treaty. They are aimed at ensuring adequate legal protection against the circumvention of the technological measures that are implemented by the right holders to prevent unauthorized acts on their works protected by copyright, and to provide for adequate legal protection for rights management information. The term “technological measures” (art. 6.3) indicates any technology, component or device that, in the normal course of its operation, is designed to prevent acts, with reference to a work, not authorized by the right holder of any copyright or related right. The protection accorded by the EUCD relates to the necessity for the ratifying countries of providing adequate legal measures against the manufacture, import, distribution or sale of devices, products or components which: a) are promoted, advertised or marketed for the purpose of circumvention of the specific technological measures; b) have only a limited commercially significant purpose or are used other than to circumvent the technological measures; c) are primarily designed, produced adapted or performed for the purpose of enabling or facilitating the circumvention of the technological measures (art. 6.2). The concept of rights management information is defined by art. 7 as any information provided by the right holders which identifies the work or other protected materials under the Directive, the author or any other right holder, or information about the terms and conditions of use of the work or of other protected materials, or any number or codes representing such information. The EUCD calls Member States for the provision of adequate legal protection against anyone who a) removes or modifies, without the authorization of the right holder, any rights management information; b) distributes, imports for distribution, broadcasts, communicates or makes available to the public, protected works from which the rights management information has been removed or altered without authorization with the aim of ensuring an effective implementation of the WIPO Copyright Treaty. The individual must, however, know or have reasonable ground to know that by so doing she/he is inducing, enabling, facilitating or concealing any infringement of any copyright or any related right. The EU legislative framework on customs cooperation relies on Council Regulation 1383/2003. Its aim is to improve customs cooperation for the identification of goods infringing an IPR. Art. 2 of the Regulation proposes a distinction between “counterfeit” and “pirated” products. The term “counterfeit goods” is used by the Regulation to identify those goods unlawfully bearing a trademark identical or very similar to the registered one, while the term “pirated goods” indicates goods which are or contain unauthorized copies of a work protected by copyright. The provisions of the regulation, and especially those articles regarding customs actions, are also applicable to those products infringing: a) a patent registered in one of the EU Member States, and b) an indication of origin. Customs actions may be performed upon goods intended for export, import and transit (Art. 1). Customs actions may be initiated by the national customs officers when there is the suspicion that the goods may infringe an IPR and may also be initiated after the presentation of an application for action by the right holder. In the latter case, the request should be sufficiently detailed, describing and indicating the type of alleged infringement. Other information, if available, should concern: the final destination of the identified goods, the scheduled time for their arrival or departure, the means of transport used, the interested countries, and the differences between the original and the infringing products. Furthermore, the applicant has to present a declaration of assumption of responsibility for the damages eventually suffered by the party against whom the customs action is requested. This declaration represents an assurance for the alleged infringer when the measures taken by the customs are revoked in consequence of an act or an omission on the part of the requesting party or in the case in which it is later found that no infringement occurred (Art. 5 and Art. 6). Art. 13 affirms that the competent customs office must receive communication on the initiation of judicial proceedings for the decision on the merits of the case. This must occur within 10 working days from the day in which the notification was received regarding the suspension of 41 Reference Text for Trainers the goods from the channels of commerce or of the seizure of the goods. In the case of inaction on the part of the requesting party the alleged infringing goods are released. The suspension from commerce and the seizure are provided for by Art. 9. In such cases where suspicion arises after a customs control Art. 11 states that, with the consent of the right holder, the alleged infringing goods suspended or seized may be destroyed. In this case, a decision on the merits of the case has yet to be taken as there is only suspicion that the goods are infringing an IPR. For this reason the provision of Art. 11 could only be applied if the customs authorities receive a written declaration, on the part of the owner or of the proprietor of the alleged infringing goods, indicating her/his favourable opinion for the destruction of the said goods. This declaration is presumed if the owner or proprietor does not oppose the request of the destruction of the goods within the established time limits. Art. 16 indicates the measures to which these goods are subjected that have been recognized to infringe an IPR following the end of judicial proceedings. In this situation, the identified goods cannot enter the EU channels of commerce, cannot be exported and must be suspended in case in which they were already traded. Commission Regulation (EC) No 1891/2004 of 21 October 2004 set provisions for the implementation of Council Regulation (EC) No 1383/2003. This regulation defines the natural and legal persons who may represent the right holder or any other person authorized to use the right. This Regulation also specifies the nature of the proof of ownership of intellectual property, while providing a model form and the language requirements for filing a request for action, specifying the type of information necessary in order to facilitate the work of the customs administrations in recognizing the goods that may infringe an intellectual property right. Both the national and customs applications and the procedures for the detention of counterfeit goods by customs have been harmonized in all the EU member states. There is no unified EU customs entity, however, the national customs administrations of the 27 member states: - work together; - are subject to common regulations; - exchange information through a centralized information system. It is to be noted that EU customs practices still have different characteristics in each member state. In addition, even if the means used to enforce IP rights have been harmonized, civil and criminal procedures are different in each Member State. On March 2004, the European Union Institutions adopted the Directive 2004/48/EC, also known as the “IPR enforcement directive”, focused primarily on the protection of IPRs. The preamble to the Directive explicitly recalls the obligations binding the EU Member States in consequence of their participation to the TRIPs Agreement, being the European Community itself a Contracting Party of the Agreement and not only the EU Member States individually. The intervention of the Community Institutions is necessary to harmonize the relevant legislation and practice of the EU Member States, which varies from one member to the other. This is the case for example for what concerns the procedure to be followed by the competent authorities to indicate provisional measures aimed at preserving evidence. The preamble of the Directive foresees a normative framework which presents certain points in common with the TRIPs Agreement, but the act owns, in this case, all the strength that Community legislation has towards the EU Member States. Art. 1 defines the object and scope of the IPR Enforcement Directive: the protection of IPRs, including also industrial property rights. The extent of its application is specified by the following article which states that the Directive has to be applied in any case of infringement of an IPR in a Member State or in the Community, without any prejudice to the application of a more stringent protection in the case in which protection should be provided by other national or Community means. Art. 3 (1) calls Member States for the adoption of remedies and procedures applicable to enforce IPRs. The remedies and procedures should be effective, proportionate and dissuasive, they should not be applied in a manner to create barriers to commerce, and they should not be unnecessary complicated or costly, or entail unreasonable time-limits or unwarranted delays. The Directive adopts the presumption of paternity of the work to the advantage of the person who placed her/his name on the said work. Norms concerning the acquisition and protection of proofs are very similar to the ones contained in the TRIPs. Thus, Articles 6 and 7 provide for: the power, held by the judicial authorities, to order the resistant to present the element of proof at her/his disposal; the 42 Reference Text for Trainers possibility to order provisional measures to protect the elements of proof inaudita altera parte, when there is the possibility that the proofs could be compromised or destroyed; the possibility to subordinate the order of such measures to the lodging, on behalf of the requesting party, of a sum of money as an assurance towards the party against which the measures should be ordered; the payment on behalf of the requesting parties to the alleged infringer of compensation for the damages suffered, in the case in which the ordered measures are revoked for any act or omission of the requesting party or in cases where it is subsequently found that there has been no infringement. The Directive, similarly to the TRIPs Agreement, indicates the possibility for the judicial authorities, (upon request of the claimant) to order the release of information to: a) the infringer or to any person b) found in possession of goods infringing an IPR, or c) commercially distributing such goods, or d) providing services used in infringing activities or e) to any other person indicated by the before mentioned subjects. The Directive presents a more detailed description of the subjects, who bear the obligation to provide information. The same obligation is better defined with regard to its object and it must contain the names and addresses of the producers and of distributors of infringing goods as well as of all the subjects which participated towards the illicit activity. It must also contain an indication regarding the units produced and distributed and the average sale price (art.8). Article 9 provides the power, held by the judicial authorities, to order provisional measures also to prevent an alleged infringement of an IPR or to forbid the continuation of an alleged infringing activity. To achieve this aim the competent authorities may order the subjects to maintain a certain behaviour or may seize the alleged infringing goods. In the case where the alleged infringing activity is an activity conducted on a large scale, the competent authorities may also order the precautional seizure of movable and immovable property of the alleged infringer, including the blocking of her/his bank accounts and other assets. Ordering of such measures is subordinated to the demonstration on the part of the injured party of circumstances likely to endanger the possible recovery of damages. The measure could be ordered inaudita altera parte and could be revoked. The latter could be the consequence of inaction on the part of the requesting party with regard to the initiation of proceedings to decide on the merit of the case, or could also be subsequent to the finding by the competent authorities that no infringement has occurred. In this case, the requesting party could be ordered to pay the damages eventually suffered by the alleged infringer. In the case where the judicial authorities find that an infringement occurred, the Directive, similarly to the TRIPS Agreement, foresees the possibility to suspend, retire from the channels of commerce, or destroy the infringing goods at the expenses of the infringer (Art. 10). For what concerns the compensation for damages, Art. 13 provides for two calculation standards. The first (Art. 13, 1, (a)) assesses the economic consequences suffered by the damaged party while the second (Art. 13, 1 (b)) assesses the economic value of the IPR and of the licenses. The last articles of the Directive call Member States to improve their cooperation and exchange of information also by publishing the relevant Court sentences and informing the Community Institutions about any problem encountered in the implementation of the Directive. Declaration 2005/295/CE of the Commission specifies article 2 of the Directive 2004/48/CE of the European Parliament and of the Council on the observance of intellectual property rights. This declaration of the Commission regards the following intellectual property rights falling within the enforcement of the mentioned directive: royalties; rights in connection with the royalties; rights of makers of topographies; rights of trademarks; rights on designs and models; registered trademarks; rights coming from complementary, protective certifications; geographical indications; rights of public utility; sole right for vegetal inventions; commercial names if protected by sole right of the domestic legislation. The IP Criminal Enforcement Directive (CED) is still at the stage of discussion within the European Institutions. The absolute novelty for the legislative framework put in place by the European Institutions will be that the CED will, for the first time, specifically address criminal law provisions to which Member States will have to conform to enhance the fight against counterfeiting and piracy. 43 Reference Text for Trainers Apart from the criticism116 that surrounded the CED since its first appearance as a draft, it is nonetheless very interesting that the EC recognizes that counterfeiting and piracy are supporting the activities of organized crime (and also of terrorist groups) and that specific typologies of counterfeit products – in particular medicines – are a real threat for consumers’ health and safety. This is the starting point that leads the Directive to propose criminal measure to reduce counterfeiting and piracy. The CED, thus, contains provisions on the penalties that have to be inflicted for committing the crime and also on the confiscation of goods of the offender. Patents and Plants Varieties Rights are excluded from the sphere of application of the CED117 that is also applicable only to those activities that are: 1) committed on a commercial scale and 2) intentional. Interesting provisions also relate to the creation of joint investigation teams between Member States that could improve cooperation in these matters. Time will tell the real effectiveness of the CED and which form and scope will have the provisions contained in its final version. 3.2 The Dimensions of Counterfeiting Three estimates, formulated by different institutions and using various data, have been taken into consideration, namely the estimates provided by: 1) TAXUD; 2) WCO; and 3) OECD. Some other measures which have been calculated by other organizations will also be presented. Estimations by the EU Taxation and Customs Union (TAXUD) Statistics provided by the EU Taxation and Customs Union (TAXUD) refer to the number of seizures which take place at the EU border in relation to goods suspected of infringing an IPR. According to Commission Regulation No 1891/2004, national customs across the EU are obliged to provide the EU TAXUD with statistics related to the number of cases involving the seizure of goods suspected of infringing IPRs that, once elaborated, will then be published by TAXUD in an annual report. It must be noted that the statistics provided by TAXUD only take account of: goods which are imported into the EU, goods which are exported out of the EU, re-exports, transshipments and goods in transits. Consequently, all potentially counterfeited goods which may have been produced and consumed within the same country, or the EU, are excluded from the data provided. The result is that any assessment on the extent of counterfeiting which has been carried out using these statistics may underestimate the real magnitude of the phenomenon. In addition, the general accuracy of statistics based on seizures needs to be properly weighed, as many factors (i.e. new legislation, customs performance, effectiveness of customs risk assessment methods) may influence the interception of counterfeit products. Thus an increase or decrease of seizures may not exactly represent the actual trend of the traffic of counterfeit goods and should generally not lead to generalizations. Considering the number of cases involving the seizure of goods suspected of infringing an IPR, in 2009, 43,572 cases were registered on EU borders (a decrease from the 49,381 cases registered in 2008). This phenomenon has been on the increase since 1999, a year in which only one tenth of the amount of these cases were registered (see Image 1) The actual amount of items confiscated in 2009, is approximately 118 millions items (Image 2). It must be noted that these statistics do not refer only to cases of brand counterfeiting, as they include cases of piracy. 116 Criticism related to several aspects of the CED. The fact itself that the European Institutions owned the competence to propose measure falling within the criminal sphere was not clear to many commentators. Other criticized elements related to the contents of the CED, as for example the criminalization of abetting or inciting to commit the crime (which could lead to the criminalization of the advice provided by a lawyer that an IPR was not infringed by acting in a certain way). 117 Mainly because of the complexity of these rights for which it is not always clear if the infringement has been committed. 44 Reference Text for Trainers Image 1 Source: TAXUD Image 2 Source: TAXUD Although the 2009 statistics show a decrease in both the total amount of cases registered and the total amount of products seized, it should be noted that the data indicates an increase in the seizure of counterfeit products that are potentially dangerous to consumers’ health and safety. Medicines represent 10% of the entire amount of detained goods. The TAXUD Report recognizes that counterfeiting does not just affect luxury goods but everyday products (i.e. shampoos, toothpaste, toys and electrical appliances). Counterfeit products intended for daily use and products potentially dangerous for consumers’ health and safety constitute 17 million items intercepted, or 18% of the total amount. More detailed trends for the latter products can be obtained by examining the data of the TAXUD Reports of recent years, both with reference to the number of articles detained (see Images 3, 4 and 5) and to the number of cases registered (see Images 6, 7 and 8). These trends are particularly alarming as they show an increase in the trade of counterfeit goods potentially dangerous for consumers’ health and safety. 45 Reference Text for Trainers Image 3 Counterfeit foodstuffs detained Num ber of articles detained 3500000 3000000 2500000 2000000 1500000 1000000 500000 0 2006 2007 2008 2009 Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports Image 4 Counterfeit toys detained Number of articles detained 8000000 7000000 6000000 5000000 4000000 3000000 2000000 1000000 0 2006 2007 2008 2009 Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports 46 Reference Text for Trainers Image 5 Counterfeit m edical products detained Number of articles detained 14000000 12000000 10000000 8000000 6000000 4000000 2000000 0 2006 2007 2008 2009 Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports Image 6 Counterfeit foodstuffs Number of cases 90 80 70 60 50 40 30 20 10 0 2006 2007 2008 2009 Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports I 47 Reference Text for Trainers mage 7 Counterfeit toys Number of cases 2000 1800 1600 1400 1200 1000 800 600 400 200 0 2006 2007 2008 2009 Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports Image 8 Counterfeit m edical products Number of cases 4000 3500 3000 2500 2000 1500 1000 500 0 2006 2007 2008 2009 Source: UNICRI elaboration based on the TAXUD 2006-2009 Reports Image 9 presents the outcome of the detention of suspected infringing goods, showing that a significant percentage (47.44%) were destroyed using the simplified procedure. 48 Reference Text for Trainers Image 9 Source: TAXUD The provenance118 of counterfeit goods seized at EU borders in 2009 is illustrated by the TAXUD report which provides a breakdown of the origin of goods, per number of products detained. Overall, China is still the most prevalent country of provenance (more than 64% of the total amount of products detained – see Image 10), confirming a trend that is valid since 2003. Image 10 Source: TAXUD 118 The report states that the provenance of the goods is considered (from where they were sent to the EU) and not their real origin (where they were actually produced) since this is often difficult to ascertain due to infringers practices aimed at hiding the country of production/real origin of the goods. Refer to: Report on EU Customs Enforcement of Intellectual Property Rights, Results at the EU Borders – 2009, TAXUD, 2010, page. 13 49 Reference Text for Trainers Other countries were also identified as main countries of provenance for specific products/sectors. This is the case for Turkey for the category “Foodstuffs”, for Egypt for the category “Toys” and for the United Arab Emirates for the category “Medicines”. Finally, the analysis of the means of transport used in 2009 (see Image 11) confirms the trends already shown by the 2008 TAXUD Report, showing an increase in the use of shipments through the postal service. Image 11 Source: TAXUD Estimations by the WCO The World Customs Organization (WCO) provides statistics related to the number of seizures made by customs authorities within countries which are members of the organization. These statistics are usually collected by WCO through the Customs Enforcement Network system (CEN). In 2009, a total number of 13,280 cases (Image 12) involving the seizure of counterfeit goods were reported by the national customs administrations of the WCO Member States, while the total number of products seized totalled 291 million (Image 13). 50 Reference Text for Trainers Image 12 Source: WCO Image 13 Source: WCO The WCO data – similarly to the TAXUD stats – also show an alarming increase in the trade of counterfeit products potentially dangerous for consumers’ health and safety. This is the case of counterfeit pharmaceutical products and of counterfeit spare parts. The great majority of the seizures were performed by customs administrations and only 178 cases were the result of cooperation between customs and police forces. These few cases totalled approximately 15% of the entire amount of products seized, suggesting that improved inter-agency cooperation can greatly benefit the detection activities. As shown by Images 14 and 15, countries such as China, Italy and Mexico are in the top 10 category for what concerns both the number of cases registered and the number of items seized in 2009. This data not only reveals the extent of the problem and but underlines the commitment of the national authorities in the fight against IPR infringements. Image 14 Image 15 51 Reference Text for Trainers Source: WCO Source: WCO The WCO data also identify both the country of origin – in the same way as TAXUD data – and the actual country of departure. In both cases the top 10 list is very similar and it is interesting to note that 99 different countries were identified in the reports as country of origin (see Image 16) and 122 as country of departure (see Image 17). Image 16 Image 17 Source: WCO Source: WCO Finally, six EU Member States are in the top 10 destination countries (see Image 18) while seven are in the top 10 transit countries (see Image 19). Image 18 Image 19 Source: WCO Source: WCO 52 Reference Text for Trainers 3.3 Recent Cases 2010: A Joint Customs Operation (code-named Matthew II) has led to the seizure of more than 16 million cigarettes, 241 kilograms of tobacco products, 6 400 litres of alcohol, 20 tonnes of counterfeit perfumes, 53.418 other counterfeit items such as bags, coats, scarves, wallets, and 1,515.75 kilograms of cannabis. During the operational phase, additional seizures of more than 25 million cigarettes also took place in some EU ports. The operation was organized by the Czech Republic, in close cooperation with Poland and the European Commission (OLAF). (Source: EUROPA Press Release IP/10/418) 2010: In Romania, over 78,000 glass containers inscribed with various brand names including Dolce Gabbana, Clinique and Gucci were seized, on suspicion of being counterfeit goods. (Source: Business Action to Stop Counterfeiting And Piracy (BASCAP) Digest 15-28 February 2010) 2010: Large quantities of counterfeit cigarettes were seized in a number of countries including Ireland, the Netherlands and the UK (Source: BASCAP Digest 15-28 February 2010) 2010: In the UK £180,000 worth of fake medicines were seized in a joint operation between police and the UK Medicine and Healthcare products Regulatory Agency (MHRA). (Source: BASCAP Digest 1-14 March 2010) 2009: The UK Border Agency (UKBA) seized £1,646,173 of counterfeit goods entering into the country in just four months from 1 April. The fakes seized by UKBA officers include England football shirts, GHD branded hair straighteners, designer watches, handbags, shoes and cigarettes. A spokesman said the popular hair straightener and cigarettes were made with potentially dangerous materials. (Source: The independent (Press association)) 2009: Fake goods worth around £3m were seized in one of the biggest-ever counterfeit raids in Manchester. Customs and trading standards officers swooped on a Piccadilly warehouse after a tip-off - and found thousands of boxes of bogus gear. Officials believe the warehouse supplied hundreds of shops and market stalls across the country. Officers also found hundreds of hair straighteners. The company warned that the fakes could be `lethal'. (Source: Manchester Evening News) 2009: Hundreds of Chinese workers were kept in virtual slavery for years as part of a multimillionpound pirate DVD industry uncovered in the UK. The men and women, many of whom lived 11 to a room, were the labour behind an organised crime syndicate that began on a market stall in Hackney, east London, and grew into a £5m illegal industry. Detective Constable Evelyn Steeples said the case revealed the large profits that could be made from organised crime. (Source: The Guardian) 2009: Italian police have seized counterfeit merchandise from China worth more than Euro 20 million ($28 million) during raids on 17 warehouses in Rome. Italy's financial police say 18 Chinese citizens are being investigated for allegedly importing counterfeit goods including clothes, electronics and some 150,000 children's toys. (Source: Associated Press) 2008: Drinkers in Buckinghamshire have been told to be wary of buying cheap bottles of “Glen’s” vodka after counterfeit 70cl bottles were found on sale in Chesham, Aylesbury and Downley. Counterfeit vodka has caused blindness and even death in past instances. Genuine “Glen’s” vodka has an AGC (Allied Glass Containers) logo on the base of the bottle as well as a distinctive glue pattern comprising lines of glue 2mm apart which bind the label to the bottle. (Source: www.thisisbucks.co.uk, 22 January 2008) 53 Reference Text for Trainers 2008: Health authorities in Sierra Leone seized a container filled with banned toothpaste from China, which contained high levels of a toxic substance that could cause kidney and liver failure. In 2007, health authorities in several countries including the United States and Hong Kong warned against brands of Chinese low-cost toothpaste that were found to contain the poisonous chemical diethylene glycol. (Source: Counterfeiting Intelligence Bureau (CIB) Counterfeiting Confidential November) 2008: IBM sued a company that it alleged was selling unsafe counterfeit laptop batteries. The company was alleged to be “offering counterfeit IBM products which posed a substantial threat to the safety of the consuming public.” The discovery of the alleged counterfeits happened after a consumer in Ohio bought a battery for a laptop. The battery caught fire and damaged the laptop. After conducting an examination of the faulty battery, IBM learned that it was not genuine. It then bought 12 Thinkpad batteries from the suspect company for further analysis. All the batteries were found to be counterfeits. (Source: CIB Counterfeiting Confidential January) 2008: MarkMonitor’s “Spring 2008 BrandJacking Index” found airline parts on sale at popular online consumer auction sites. They included valves, gears, flanges, gauges and radar parts. (Source: CIB Counterfeiting Confidential July) 2008: Police in Italy arrested 12 members of an organized criminal gang involved in the distribution of pirate CDs and DVDs. A meticulous investigation had preceded the arrests, which took place in Naples and Milan. A series of raids uncovered six illegal pirate factories, five in Naples and one in Milan, which contained 350 burners. More than 70,000 CDs and DVDs were seized during the raids, alongside more than 100,000 counterfeit inlay cards. The gang members were charged with conspiracy and copyright infringement and might face jail sentences of up to six years. (Source: CIB Counterfeiting Confidential July) 2008: Scottish smokers have been advised to resist the temptation to buy cheaper cigarettes amid fears of what they may actually contain. “Cheap cigarettes” usually meant those that had been smuggled into the U.K. from outside the E.U. However the “bargain cigarette” market is more and more dominated by counterfeit cigarettes, which are packaged to look like the real brands. The fake cigarettes may contain up to 160% more tar, 80% more nicotine, 5.8 times more lead and three times more arsenic, in some cases they had also been found to contain sawdust, beetles and rat droppings. Proceeds from this illicit trade were used to fund other crimes, such as people trafficking and prostitution. (Source: BBC News, 8 March 2008) 2007: Counterfeit Colgate toothpaste, containing diethylene glycol, was found on sale in different Countries: i.e. Spain, the United States of America, Panama, the Dominican Republic and Australia. Spanish authorities seized 100,000 toothpaste tubes and, according to the Spanish newspaper El País, 10,000 packages were distributed in the hospitals in Valencia. (Source: http://webintel.wordpress.com and www.elpais.com) 2007: Counterfeit cigarettes from Eastern Europe and the Far East were reportedly being sold for as little as £1 a packet by shopkeepers in Leicester. The counterfeit cigarettes contained higher levels of tar, arsenic, nicotine and other carcinogens and were smuggled into Leicester and sold to shopkeepers in bulk at heavily discounted prices. Customs officials issued a warning to consumers as the packaging on the fake cigarettes was indistinguishable from the genuine variety. Organized criminal gangs were thought to be behind the scheme for huge profits to be made from selling counterfeit cigarettes. Officials who seized also a shipment worth millions of pounds analysed the ingredients with alarming results. The fake cigarettes contained extremely high levels of arsenic, cadmium, benzene and formaldehyde, a lethal mix of carcinogens. (Source: Leicester Mercury, 31 August 2007) 2007: Couples in East London have been warned after fake Durex condoms were discovered during raids on shops and newsagents. The investigation began when a member of the public 54 Reference Text for Trainers noticed something “not quite right” and contacted the local authorities. Durex warned consumers that despite the packaging looking genuine, the fakes were not effective contraceptives and were unlikely to provide effective protection against sexual diseases. (Source: East London Advertiser, 22 October 2007) 2007: More than a year-long operation into an organized crime ring pirating DVD’s, culminated in a massive anti-piracy operation in which 20 raids across Hong Kong were conducted. The raids took place at a number of locations, including three storage units and three retail outlets, and yielded 14 arrests and 120,000 fake DVD’s. According to the head of the task force conducting the raids the syndicate was one of Hong Kong’s notorious triad gangs. The gang was believed to be selling more than $6,000 worth of DVD’s a day. The fake DVD’s originated in mainland China and then smuggled into Hong Kong using a cross-boundary container lorry, which was also seized. (Source: DPA news) 2007: Russian police intercepted and arrested a criminal group alleged to illegally produce aircraft parts and sell them in Russia, as well as to other nations. The organized group was arrested after allegedly stealing components from the Saturn plant in central Russia and producing and selling civil aircraft parts. (Source: CIB Counterfeiting Confidential September) 2007: The Agence Française de Sécurité Sanitaire des Produits de Santé (AFSSAPS) was informed by the European Medicines Agency (EMEA) about a case of a counterfeit medicine identified in Great Britain. The elements on the products’ distribution network led to the recall of the medicine from the French territory. This was the first case of recall of counterfeit “Plavix” in France. (Source: Emballage Digest, 14 February 2007) 2007: The Italian customs and Guardia di Finanza in Naples seized different shipments of counterfeit products (including fake toys) whose value was estimated at 11,000,000 of Euro. (Source: Italian Customs Agency) 2007: The Medicines and Healthcare Products Regulatory Agency (MHRA) began a criminal investigation after a counterfeit batch of “Casodex” was discovered. The drug, which is used in the treatment of prostate cancer, was found to contain only 75% of the active ingredient bicalutamide. (Source: BBC News, 2 June 2007) 2007: The customs office at the port of Le Havre seized almost 410,000 counterfeit medicines (145kg) and 11 million of medicines with a high pseudo-ephedrine content (two tonnes) for a total estimated value of € 5,8 million. The operation was conducted by customs officers who had been previously informed about a container originating from Syria and destined to Honduras. (Source: Emballage Digest, 17 December 2008) 2007: The link between counterfeiting and organized crime has once again been demonstrated after Italian police uncovered an illegal distributing network operating in Sicily. 2,000 counterfeit CD’s and DVD’s were seized along with guns, ammunition and bomb making equipment. Police then started investigating possible links between those arrested and organized crime, in particular Sicily’s notorious mafia families. (Source: IFPI) 2006: 140,000 counterfeit razor blades were seized in Italy after investigations by the Guardia di Finanza. The products were ready to be inserted into the licit supply chain and sold to unsuspecting buyers. The fake blades may have caused skin irritations and infections. (Source: Confesercenti, Counterfeiting and cybercrime: damages to the economy and to enterprises) 2006: 35,000 counterfeit electrical products were seized by the Italian Guardia di Finanza. The products posed risks of fire and electric or thermal shock. 55 Reference Text for Trainers (Source: Confesercenti, Counterfeiting and cybercrime: damages to the economy and to enterprises) 2006: A laboratory used for the production of fake cosmetics and perfumes was discovered in Rome by the Guardia di Finanza that seized more than 600,000 packages. (Source: Confesercenti, Counterfeiting and cybercrime: damages to the economy and to enterprises) 2006: British authorities identified 18 websites selling counterfeit “Tamiflu”, the websites were based in the UK, Canada, Switzerland, Bahrain, Cyprus, Singapore and Malta, highlighting the worldwide nature of this illicit trade. (Source: CIB, 3 March 2007) 2006: Officials seized in the UK, 5000 packets of counterfeit “Tamiflu”, estimated to be worth £500,000. US customs also seized over four dozen shipments of fake “Tamiflu” in South San Francisco. The shipment was labelled “Generic Tamiflu”. (Source: CIB, 3 March 2007) 2006: The Italian Guardia di Finanza seized 138 tonnes of counterfeit olive oil. The bottles and cans filled with the counterfeit oil looked almost identical to those used by famous producers. (Source: Confesercenti, Contraffazione e criminalità informatica: I danni all’economia e alle imprese) 2006: The Italian customs and the Guardia di Finanza seized a container with 15 tonnes of counterfeit toys originating from China. (Source: Italian Customs Agency) 56 Reference Text for Trainers Sources Business Action to Stop Counterfeiting And Piracy (BASCAP), available at: http://www.iccwbo.org/bascap/id1127/index.html Emballage Digest website, available at: http://www.emballagedigest.fr/ EUROPA Press Release IP/10/418, available at: http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/418 International Federation of the Phonographic Industry (IFPI) website, available at: http://www.ifpi.org/ Italian Customs Agency website, available at: http://www.agenziadogane.it/wps/wcm/connect/ee/ Leicester Mercury website, available at: http://www.thisisleicestershire.co.uk/ TAXUD website, available at: http://ec.europa.eu/taxation_customs/index_en.htm 57 Reference Text for Trainers SECTION 4 Counterfeiting in Czech Republic 1. National Legislation on Intellectual Property Rights Enforcement Below an overview of the main legislative documents on IPRs. Copyright and Related Rights Act No. 121/2000 Coll. on Copyright and Rights Related to Copyright and Amendment to Certain Acts (entered into force on December 1, 2000), amended by: - Act No. 81/2005 Coll. (entered into force on 23 February,2005); - Act No. 61/2006 Coll. (entered into force on 8 March 2006); - Act No. 186/2006 Coll. (entered into force on 1 January 2007); - Act No. 216/2006 Coll. (entered into force on 22 May 2006); - Act No. 168/2008 Coll. (entered into force on 19 May 2008). Decree No. 488/2006 Coll. defining types of devices for making reproductions, types of blank record carriers and the amount of lump-sum remuneration (entered into force on November 10, 2006), amended by Decree No. 408/2008 Coll. (entered into force on 1 January 2009). Industrial Rights: - Act No. 221/2006 Coll. of 25 April 2006, on the Enforcement of Industrial Property Rights and on the Amendment of Industrial Property Protection Acts (Enforcement of Industrial Property Rights Act), which incorporates the relevant EU legislation (Directive 2004/108/EC of 29 April 2004) and regulates the legal remedies serving for IPR enforcement. - Act No. 132/1989 Coll. on the Protection of Rights to New Plant and Animal Varieties, as amended by Act No. 93/1996 Coll.; - Act No. 527/1990 Coll. on Inventions and Rationalization Proposals, as amended by Act No. 519/1991 Coll., Act No. 116/2000 Coll. and Act No. 207/2000 Coll.; - Act No. 529/1991 Coll., on the Protection of Topographies of Semiconductor Products Topographies, as amended; - Act No. 478/1992 Coll. on Utility models, as amended by Act No. 116/2000 Coll.; - Act No. 206/2000 Coll. of 21 June 2000, on the Protection of Biotechnological Inventions and on the Amendment to Act No. 132/1989 Coll. on the Protection of Rights to New Plant and Animal Varieties, as amended by Act No. 93/1996 Coll.; - Act No. 207/2000 Coll. on the Protection of Industrial Designs and on the Amendment to Act No. 527/1990 Coll., on Inventions, Industrial Designs and Rationalization Proposals, as amended; - Act No. 452/2001 Coll. of 29 November 2001 on the Protection of Designations of Origin and Geographical Indications and on the Amendment to Act on Consumer Protection as amended by Act No. 131/2003 Coll. and Act No. 501/2004 Coll.; - Act No. 441/2003 Coll. of 3 December 2003 on Trademarks and on the Amendment to Act No. 6/2002 Coll., on Judgements, Judges, Assessors and State Judgement Administration and on the Amendment to some other Acts (Courts and Judges Act) as amended, (Trademarks Act) as amended by Act No. 501/2004 Coll.; - Act No. 378/2007 of 6 December 2007, on Pharmaceuticals and on Amendments to Some Related Acts. 58 Reference Text for Trainers Other relevant Laws - Penal Code (Act No. 40/2009 Coll.) as amended (entered into force on 1 January 2010); - Civil Code (Act No. 40/1964 Coll.) as amended (entered into force on March 1, 1964). The most important amendment was Act. No. 509/1991 Coll. (entered into force on 1 January 1992); - Code of Civil Procedure (Act No. 99/1963 Coll.),, as amended (entered into force on 1 January 1964); - Act. No. 191/1999 Coll., on Some Measures Regarding Import, Export and Re-import of Goods Infringing Certain Intellectual Property Rights and on Amendment to Certain Acts, as amended (entered into force on 1 December, 2009). 1.2 Relevant Legislation on Criminal Activities Involving Organized Crime The Czech Republic has signed the United Nations Convention against Transnational Organized Crime on 12 December 2000 as well as the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children and the Protocol against the Smuggling of Migrants by Land, Sea and Air. Nonetheless, no action has been taken so far with regard to the third Protocol against the Illicit Manufacturing of and Trafficking in Firearms, their Parts and Components and Ammunition (2001). Moreover, ratification of the Convention as well as of the two already signed Protocols has not taken place yet. In April 2005, the Czech Republic signed the United Nations Convention against Corruption (2003) but the ratification process which will enable the Convention to come into force is still pending. The Czech Republic is also a State-member of the United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (1988) (through succession as Czechoslovakia had signed and ratified the Convention on 7 December 1989 and 4 June 1991, respectively.) The Czech Republic signed and ratified the Council of Europe Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime (1990), on 18 December 1995 and 19 November 1996, respectively. The basic Acts of the Czech Criminal Law are: - Act 1993, on the Execution of Custody; - Act No. 109/1994, on the Code Governing the Execution of Pre-trial Detention; - Act No. 61/1996 Coll., on Selected Measures against the Legalization of the Proceeds of Crime and on the Amendment to related Acts, as amended by Act No. 15/1998 Coll., Act No. 159/2000 Coll., Act No. 239/2001 Coll., Act No. 440/2003 Coll., Act No. 257/2004 Coll., Act No. 284/2004 Coll., Act No. 344/2005 Act No. 444/2005, Act No. 56/2006 Coll., Act No. 57/2006 Coll., and Act No. 70/2006 Coll.; - Act No. 169/1999, on Imprisonment; - Act No. 137/2001 Coil., on the Special Protection of Witnesses and other Persons in Connection with Criminal Proceedings and on the amendment of Act No. 99/1963 Coll., Civil Legal Code, as amended; - Act No. 253/2008 Coll., on Certain Measures against Legitimization of Proceeds of Crime and Terrorist Financing with subsequent amendments; - Regulations according to Article 81 of the Act No. 169/1999Sb. on the imprisonment and on amendments of some related Acts. 59 Reference Text for Trainers Section 129 of the Penal Code (act. 40/2009 Coll.) defines an organized criminal group as a fellowship of several persons with an internal organization structure, with divided functions and division of activities that is focused on continuous committing of deliberate criminal activities. In 2007, the Czech Financial Police was disestablished as an independent police service and its employees were taken over back by the Police Unit for Combating Corruption and Financial Crime and by the Organized Crime Unit both of which belong to the Office of Service of Criminal Police and investigation.119 In addition, during the last years, the MoneyWeb network has been enlarged and currently the relevant police service and almost all banks are connected with the Financial Analytical Unit (FAU) of the Ministry of Finance (MoF). MoneyWeb is used for the information exchange with the Law enforcement for receiving STRs from banks and requesting additional information from the latter.120 For what concerns the fight against trafficking in persons, the “Trafficking in Persons Report 2010 Czech Republic” of the US Department of State, states that the Government of the Czech Republic fully complyd with the minimum standards for the elimination of trafficking. On January 2010, a new section (Section 166) introduced in the Criminal Code to increase the maximum penalty for trafficking from 15 to 16 years' imprisonment and continued to provide excellent protection and assistance to victims of trafficking both within the Czech Republic and also in source countries. With regard to the prosecution of such an offence, the report mentioned that the government demonstrated mixed law enforcement efforts over 2009. During most of the reporting period, the Czech Republic prohibited trafficking for commercial sexual exploitation and labor exploitation through Sections 232a and 204 of its Criminal Code and punishments prescribed under these statutes ranged from 2 to 15 years' imprisonment.121 In late 2010, the Ministry of Interior, introduced a framework of a new anti-corruption strategy. One of the first steps is the establishment of the Anti-corruption Council. The members of the council are experts from various fields – governmental offices, non-governmental organizations and representatives of professional organizations. The council’s tasks consist in preparing legislative and non-legislative measures to enforce anti-corruption efforts. The Police have the main responsibilities in investigating cases of corruption. An anti-corruption guide destined to the citizens has also been created. The main aim of this guide is to encourage citizens to report corruption to the Police or to State prosecutors and to facilitate the procedures by answering frequently asked questions how to tackle corruption. Oncoming actions and measurements of anti-corruption strategy consist of tighter legislative specifications in number of laws leading to prevent corruption behaviour.122 1.3 Focus on Trademarks: Definitions and Conduct Under Section 1 of the Act on Trademarks, a trademark may consist of any sign capable of being graphically represented, particularly words, including personal names, colors, designs, letters, numbers, the shape of goods or their packaging, provided that such a sign is capable of distinguishing the goods and/ or services of an enterprise from those of another enterprise. A collective trademark is any registered sign which is capable of distinguishing goods or services of the members or stakeholders of a legal entity or of the members of an association from the goods and/or services of other persons.123 Section 2 of the Trademark Act provides that a trademark shall be protected when:124 - it is registered in the Register which is kept at the Industrial Property Office; 119 Ibid., p.4 Ibid. 121 United States Department of State (2010), “Trafficking in Persons Report 2010 - Czech Republic”, June 14, online at: http://www.unhcr.org/refworld/docid/4c1883fa2d.html 122 Information published on the official website of the Ministry of the Interior of the Czech Republic, on October 2010: http://www.mvcr.cz/mvcren/article/new-anti-corruption-strategy-introduced.aspx 123 See Section 35, Act on Trademarks. 124 See Section 2, Act on Trademarks. 120 60 Reference Text for Trainers - it is registered in the Czech Republic in the Register of the International Bureau of the WIPO or in the Register of the Office for the Harmonization of National Markets; - it is a recognized trademark within the Czech Republic, as expressed in Article 6 of the Paris Convention. Any natural person or legal entity considered fit to perform legal acts may be proprietor of a registered trademark. The written application for the registration of a sign as a registered trademark must be submitted to the Industrial Property Office in person, by post or electronically jointly with a certified digital signature.125 Chapter V of the Trademarks Act regulates the registration procedure for trademarks. The stages to be followed in applying for a registered trademark are listed below: - the applicant may file an application requesting the registration of a sign as a trademark. The application must include personal details of the applicant or the representative; a list of the goods and/or services to which the trademark will be associated; and a reproduction of the sign to be registered. The applicant must also pay an administrative fee within one month as and from the date the application was first submitted;126 - a formal examination shall be carried out by the IPO. If the application fails to meet the necessary requirements, as listed in Section 19, the applicant may remedy the deficiencies within a given time period. This time period cannot be less than 15 days;127 - if the formal requirements are fulfilled, a substantive examination shall be performed in order to determine whether or not the application can indeed be registered. If, for some reason, the registration is denied or a member of the public objects to the registration of the sign as a trademark,128 the IPO notifies the applicant. On notification the applicant can respond within a given time period. If impediments for registration turn out to be irresolvable the application will be rejected.129 When formal and substantive requirements are fulfilled, the IPO publishes the application in the Official Journal. During the three months following its publication, persons who were previously granted rights which may be potentially be infringed by the sign which is pending registration may oppose to its registration. The IPO is the competent authority on this matter. The opposing procedures are regulated by Sections 25 and 26 of the Trademark Act. Under Section 28 of the Trademark Act, if an application requesting the registration of a sign as a trademark meets all the requirements and no objection is filed or if any opposition proceeding has been refused by a definitive decision, the IPO registers the sign as a trademark which enters it into the Register.130 Once the mark is registered the applicant receives a certificate of registration. 131 The registered trademark is protected for a ten-year period as and from the date of the application requesting registration was first submitted to the IPO. Registration of the trademark is renewable and can be renewed during the last year.132 Counterfeit Goods and Infringement Section 8(2) of Trademarks Act provides that a civil infringement of the exclusive right of the trademark owner is constituted by any use, during the course of trade and without the consent of the trademark proprietor, of: 125 If the filling is done by fax or electronically without a guaranteed electronic signature, the original document must be received by the IPO within five days. Section 42 of the Act on Trademarks provides that any submission to the IPO has to be made in the Czech language. 126 See Section 19, as last amended by the Decree no. 97/2004, which requires specific information when the sign is a three dimensional trademark or if it is created by combination of colors. 127 See Section 21, Act on Trademarks. 128 See Section 24, Act on Trademarks. 129 See Section 22, Act on Trademarks. 130 See Section 44, Act on Trademarks, concerning Register and Official Journal and which enables remote access to those documents. 131 See Section 28, Act on Trademarks. 132 Section 29, Act on Trademarks. 61 Reference Text for Trainers - identical signs which are associated to goods and/or services similar to those for which the trademark has been registered; - signs identical or similar to a registered trademark which are affixed to goods and/or services identical or similar to those for which the trademark has been registered, hence creating confusion among the consumers as a result of the possible association between the counterfeit sign and the registered trademark; - signs identical or similar to a trademark in relation to goods or services which are not similar to those for which the trademark is protected, if the trademark is widely recognized within the Czech Republic, and if use of the sign, without due cause, takes unfair advantage of, or is damaging to, the distinctive nature and/or the repute of the renowned trademark. In particular, the following acts are prohibited: - affixing it to goods or the packaging thereof; - offering goods or putting them on the market or stocking them for such purposes under the sign; - offering or supplying services under the sign; - importing or exporting goods under the sign; or - using the sign on business papers or in advertising. Section 2 of the Act No. 191/1999 defines “counterfeit goods”: - goods and/or packages thereof which bear, without the consent of the registered owner of the trademark, a sign which is identical to or can be mistaken for the trademark registered for the goods in question; - all articles bearing a sign identical or similar to a registered trademark on packaging, labels, stickers, logos, tags, promotional leaflets, operating instructions, warranty documents etc.; - any mould or apparatus specifically designed and/or altered to produce counterfeit trademarks, or goods bearing such trademarks, or digital models of such trademarks. Furthermore, under Section 15, Act No. 191/1999 provides that infringement is also committed by whomever: - has submitted a Customs declaration to release counterfeits or pirated goods for free circulation or to insert them in export procedures; - by having violated Customs regulations, has allowed for counterfeits and/or pirated goods to be released into circulation, inserted them in re-export procedures or in any of the suspension procedures, or in a Free Customs zone or a Free Customs warehouse; - has submitted a request to release counterfeit or pirated goods for re-export or to have inserted them in a Free Customs zone or a Free Customs warehouse; - has exported or imported counterfeits and/or pirated goods; - owns, holds, stores or sells counterfeit and/or pirated goods with Czech Republic borders; - fails to comply with conditions governing the handling of goods withheld as described hereunder. Under Section 16, when one of the above infringements has been committed by a natural person, unless the natural person in question is an entrepreneur, albeit because of recklessness or negligence, it constitutes a petty offence. Section 25 states that the infringement committed by a legal entity or by an entrepreneur constitutes an administrative tort.133 Section 8 of Consumer Act states that the following infringing acts may deceive consumers: - offering or selling goods which violate certain intellectual property rights; 133 See Sections 16 and 25, Consumer Protection Act. 62 Reference Text for Trainers - storage of such goods with the purpose of offering or selling the same.134 2. Statistics on the Czech Republic Recent statistics by TAXUD provide an overview of the number of suspect counterfeit articles intercepted in the period 2006-2009. In the case of the Czech Republic the increase in number over the period under examination is striking (see chart below). Source: European Commission, Taxation and Customs Union, “Report on EU Customs Enforcement of IPRs. Results at the EU Border-2009”, p.19i 134 Under Section 8(6) of the Consumer Protection Act, storage of goods or products violating intellectual property rights means the placement of such goods or products in storage facilities, means of transportation, offices or other nonresidential areas as well as points of sale, including outdoor stands. 63 Reference Text for Trainers Source: European Commission, Taxation and Customs Union, “Report on EU Customs Enforcement of IPRs. Results at the EU Border-2009”, p.12i 2.1 Recent Statistics on Counterfeiting in the Czech Republic135 135 The information (text, tables and graphics) included in paragraph 2.2 are presented in the Czech Trade Inspectorate Annual Report 2009, online at http://www.coi.cz/files/documents/vyrocni-zprava-coi-2009-cti-annual-report2009.pdf 64 Reference Text for Trainers 1,738: number of controls 382: number of controls with confiscated fakes 41,804: number of pieces of confiscated fakes 59,038 (in thousands of CZK): Price of confiscated fakes considering the prices of the originals In 2009, a considerable decrease of the number of fakes confiscated by the CTI was noticed in comparison with the year 2008 (129,955 pieces). This was not due to any decreased number of controls on the issue, but due to more active work of the CTI in cooperation with other State bodies. This way a required legal state in this field was managed to be set. The CTI cooperates with the Customs Administration which – in the contrary to the CTI – has got the right to enter also locked spaces and then perform inspection activities there as well. Results of this work are then shown in the Customs Administration statistics. This way of work is much more effective and provides the CTI with the advantage to use its capacities in other inspection fields. The lower number of confiscated fakes can also be attributed to a broader range of legal competencies given to the Customs authorities on the local market. 65 Reference Text for Trainers The majority of the confiscated goods were fake copies of products of foreign IPRs owners. Among Czech goods there were only exceptions especially products of the Bateria Company (in huge amounts). Most frequently products that were confiscated were infringing rights of the trademarks: Bateria (45.9%), Puma (9.8%), Adidas (6.7%), Nike (6.1%), Gucci (3.7%), Lacoste (3.1%). Out of the total number of confiscated fakes, 933 products were handed over to humanitarian purposes. Other confiscated fakes not fulfilling humanitarian purposes criteria were liquidated. After detecting infringements of unfair commercial practices restriction, concretely infringements of restriction to offer or sell products or services infringing some IPRs and stocking of such products with the view of their offer or sale, the CTI Inspectorates’ directors issued fines in administrative proceedings. When doing so, they take account of the weight of the violation, especially the way it was committed, the circumstances of its commitment and its consequences. 2.3 Cases136 On 29 March 2009, the inspectors of the CTI performed inspections of markets and buy and sale affairs in Hatě. This inspection was focused on sales, offers and storage of goods which violate regulations of the Intellectual Property Law. Inspection was performed by 10 CTI inspectors, in cooperation with the Regional Directorate of Foreign Police. 4,141 fake or counterfeit products were confiscated, such as shoes and clothing of a total value of CZK 10,440,810. On 17 March 2009, the inspectors of the CTI performed inspections of markets and buy and sale affairs in Hatě and Hevlín. They mainly focused on goods as well as on the storage conditions of goods which may violate regulations of the Intellectual Property Law. The inspection was performed by 5 CTI inspectors in cooperation with the Regional Foreign Police Directorate. 470 136 The cases listed in paragraph 2.3 are taken from the Czech Trade Inspectorate website and are briefly reported here as examples. For an exhaustive list of cases of seizures of counterfeits, please see: http://www.coi.cz/en/tiskovy-servis1/tiskove-zpravy-1.html The webpage contains numerous alerts on defective, therefore unsuitable and even dangerous children’s toys and gadgets that pose immediate risks for their health and safety. 66 Reference Text for Trainers fake or counterfeit products were confiscated, such as shoes and clothing in the total amount of CZK 545,320. On 22 November 2009, the CTI performed inspections at the Šenovská market place in Ostrava focusing mainly on counterfeited products. The Foreign police, the Police of the Czech Republic, the Employment Office and the Trade and Licensing Office in Ostrava also participated in this event. A total of 24 sellers, selling shoes, textiles, clothing, glass, leather clothing, household goods and artificial flowers have been inspected. Shortcomings or failures to comply with the applicable laws were found in 21 cases, which represent 87.7% from all inspected sellers. The products that did not comply with the necessary product regulations were recalled from sale. These products represented value in the amount of CZK 3,339. For failure to comply with the applicable consumer protection law, a total of 17 fines were issued, totalling CZK 16,500. On January 2010, the CTI performed controls focused on offering and selling goods infringing various IPRs. All inspectorates on the CTI participated in the controls. The controls took place in marketplaces in border regions. Officers of the Police of the Czech Republic, the Alien Police and the Customs Office took also part. From 119 controls that were performed in total on offer and sale of fakes, in 19 of the premises raided, 4.263 pieces of products infringing IPRs were confiscated of a total value of CZK 13,658,062. These were textile products, watches, jewellery, lather fancy goods, audio and video records, sports products and accessories. The confiscated forgeries were in the majority labelled with trademarks such as Puma, Adidas, Nike, Luis Vuitton, Diesel, Lacoste, Replay. The highest number of detected and confiscated fakes was made by the Jihomoravský and Zlínský Inspectorate of the CTI Authority. Its inspectors confiscated 1,927 fakes of a total value of CZK 2,277,382. The Prague and Středočeský Inspectorate performed controls in the SAPA Marketplace, Tiskařská and the marketplace River Town in PragueHolešovice. This inspectorate confiscated 510 fakes of CZK 11,311,680 of total value. On February 2010, the CTI performed controls to branches focused on products infringing IPRs. All inspectorates of the CTI participated in the controls performed in the marketplaces, marketplaces in the border regions and in shops. 132 controls were performed in total and they were focused on offer and sale of fakes. In 22 checked branches there were confiscated totally 1,301 articles IPRs of a total value of CZK 998,440. The CTIA inspectors cooperated with the members of the Customs Office, the Police of the Czech Republic and the Alien Police. Confiscated products included textile goods, audio and video records, sports products and accessories. The confiscated forgeries were mostly marked under well-known trademarks such as Puma, Adidas, Nike and Luis Vuitton. During February and March 2010 the Ústecký and Liberecký Inspectorate of the CTI performed 11 controls on selling of fakes and imitations in market places of border regions. The controls revealed that products of famous brands were being sold at prices and were of quality not equivalent to the real ones. For example scarves, cups and gloves traded as Chanel were offered for CZK 35 despite that original products of this brand are of thousands of crowns. The Středočeský and Prague Inspectorate of the CTI performed a control on 26 March 2010 focusing on selling, offering and stocking of goods infringing some IPRs on the territory of Prague 9. Six inspectors of the CTI performed the control in cooperation with members of the Police of the Czech Republic. In total 18,720 pieces of forgeries were seized of a total value of CZK 5,616,000, based upon the price of the originals. The confiscated products were traded under the trademark Kappa. The Jihomoravský and Zlínský Inspectorate of the CTI performed on 30 March 2010 in their area of competence marketplaces control focused on selling, offering and stocking goods infringing IPRs. The control activity was performed by 20 inspectors of the CTI in cooperation with members of the Alien Police. The inspectors checked 13 persons in total. Within these controls they took away 696 pieces of fakes such as clothing, shoes and fancy goods in the total amount of CZK 1,148,860. On 12June 2010, the Středočeský and Prague Inspectorate of the CTI carried out a control at the River Side Marketplace in Prague. The control focused on offering and selling goods infringing IPRs. 6 employees of the Středočeský and Prague Inspectorate of the CTI participated in the 67 Reference Text for Trainers control together with 4 members of the Customs Office. During the control, 581 pieces of products infringing IPRs were confiscated of an approximate total amount of CZK 1,867,050. Object to confiscation were especially textile products, watches and leather fancy goods products labelled mostly under trademarks such as Armani, Prada, Gucci, Louis Vuitton, Rado, Dolce&Gabbana, Guess, Peak, Pepe Jeans, Samsøe, Rolex, Diesel, Ed Hardy, Puma, Chanel, Burberry, Levis, Play boy, Lacoste, Replay and Hugo Boss. In the period from 7 to 9 July 2010, the CTI performed a control in cooperation with the Metropolitan Police at the SAPA marketplace in Prague 4. In total, 17 employees of the CTI performed the control and through the activity they confiscated 214 forgeries – textile products illegally labelled with trade-marks “Calvin Klein, Burberry, Diesel, Dolce&Gabbana, Armani, Chanel, Gucci, Guess, G-Star, Polo, Tommy Hilfiger, Prada, Replay and Louis Vuitton. Sales price of their originals would be of about CZK 1,388,050. The controls were focused not only on traded forgeries but also on abiding with the Consumer Protection Act. In the period from April to June 2010, the CTI performed controls focused on sale of jewels containing Czech garnets. The control activity was performed in cooperation with the Customs Administration in the regions of Karlovy Vary, Mariánské Lázně, Plzeň, Prague, České Budějovice a Český Krumlov. The purpose of the control activity was to verify whether sellers were using unfair commercial practices by declaring misleading information on stones used in jewels by calling these stones “Czech garnets”. In total 15 controls were performed in workplaces with this assortment. Part of the controls was an undercover purchase of jewels that were offered by the seller as jewels with Czech garnets. After the necessary technical controls, in 13 cases offering and selling jewels with various stones out of the 15 performed controls, the garnets were not Czech ones. On 25 August 2010, the Středočeský and Praha Inspectorate of the CTI performed a control at the River Side marketplace focused on offering and selling goods infringing IPRs. 8 CTI employees and 4 employees of the Customs Office D8 participated in the control. During the event, 74 products infringing some IPRs were confiscated. The total value of the original products would be CZK 446,890. Objects to confiscation were textile products and leather fancy goods labelled mostly with the trademarks Armani, Gucci, Dolce&Gabanna, Louis Vuitton, Puma, Burberry, Lacoste, Hugo Boss, Levis and Hello Kitty. On 13 October 2010, the Plzeňský and Karlovarský Inspectorate of the CTI performed control activities in cooperation with customs officers and Alien Police at the Svatá Kateřina Marketplace. The inspectors detected fakes in two stalls - Adidas bags and Rolex watches among others – out of a total number of 111 pieces and of a total value of CZK 2,180,000. Textile products of value of about 1 million CZK were also confiscated. In October 2010, the Středočeský and Prague Inspectorate of the CTI performed controls in cooperation with the members of the Police of the Czech Republic and the Regional Directorate of Alien Police service. 2 extraordinary controls focused on infringements of IPRs at the River Town Marketplace in Prague 7 and at the “Tiskařská” Marketplace in Prague 10. In total 19 employees of the CTI and 10 members of the Police of the Czech Republic participated in the controls. During 4 controls, 1,275 pieces of textile products, watches, leather fancy goods and keys lockets that were illegally labelled with trademarks such as Polo, Versace, Pepe Jeans, Gant, Lacoste, Calvin Klein, Burberry, Diesel, Dolce&Gabbana, Armani, Chanel, Gucci, Guess, Tommy Hilfiger, Replay, Adidas, Roberto Cavalli, Bentley, Breitling, Rolex, Cartier, Roxy, Burton, DC, Quicksilver and Louis Vuitton were confiscated. The sale price of the originals would be of CZK 4,372,300. In October 2010, the Plzeňský and Karlovarský Inspectorate of the CTI performed a joint control with the participation of CTI employees and members of the Customs Office and Alien Police at the Svatá Kateřina Marketplace. During the performed control, the CTI inspectors in cooperation with the members of the Customs Office confiscated fakes of a total value over CZK 3,5 million. Those were mostly textile goods illegally marketed under trademarks such as Adidas, Bench, Lacoste, Diesel etc. During the last control on October 3, 2010, goods of a total value of about CZK 3 million had been confiscated. At the same time, the CTI employees 68 Reference Text for Trainers controlled also the level of compliance with the obligations defined by the Act on Consumer Protection and deficiencies in pricing of goods and other information obligations. 3. Remedies and Actions against Counterfeiting: 3.1 Border Measures Act No. 191/1999 specifies conditions under which customs are authorized to implement action in order to counteract parting, owning, holding, storing or selling goods by whose production intellectual property rights have been infringed. Under Act No. 191/1999, Czech Republic allows for three different procedures: Ex officio measures: in accordance with Article 4 of Regulation 1383/2003, if there are grounds to suspect that certain goods infringe an IPR even before a right holder files a request for action and/or before such a request is received, Section 9 allows customs authorities to suspend the release or detain of the alleged infringing goods for a total of three working days. The customs’ office immediately informs the rightholder about the incident and the amount of the products. Subsequently, during the course of the proceedings, the right holder or representative has the right to proceed by means of a simplified procedure or legal action. If, within three working days of notification, no request for action has been filed with the competent customs’ authorities, the customs office must release the suspected goods.137 Preventive application for action: according to Article 5 of the Regulation, the registered owner of a trade mark, the person authorized to use the trademark or his/her representatives may file a request for action, valid for one year. Under Section 4(1) of Act No. 191/1999, this request for action must be filed with the Directorate of Customs in Hradec Králové. If the Directorate grants the actions, the authorized person is invited to deposit a security within 15 days as and from the date of invitation. If the customs office is told to extend detainment of suspected goods, it notifies the right-holder and informs the latter about the quantity of goods. The right-holder may also be given samples and photographs of the suspected goods. The authorized person may also request further details about the declarant, the consignee and the consignor, as well as the origin and provenance of the goods. In such cases, the right owner is obliged to file a lawsuit with the competent court. Any related lawsuits must be filed immediately and customs authorities must be informed, without undue delay, of such legal actions.138 Simplified procedure: Under Section 14 of Act No. 191/1999, customs authorities may accept the right-holder’s request to destroy the alleged infringing goods, without having to proceed to a court ruling on the merit. After receipt of the notification concerning the extended detainment of the suspected goods, the right holder must apply in writing, or in electronic format, within ten working days. The request to destroy the infringing goods must comprise a statement prepared by an expert which confirms that the relevant goods do indeed infringe an IPR. The request must also include consent given by the declarant, holder or owner of the goods for the destruction of the goods in question. This consent shall be presumed if the declarant, holder or owner of the goods does not expressively object to the request within ten days, as and from the date in which the request for consent is issued. The infringing good are then destroyed under the supervision of three customs officers. All expenses incurred are to be paid by the registered right holder. Furthermore, Section 23(6) of the Consumer Protection Act allows customs authorities to exercise controls similar to those carried out by the CTI in order to guarantee the observance of obligations stipulated in Sections 7b, 8 Subsection 2 and 8a of this Act.139 As to effectively fulfil this duty, the 137 See Section 9, Act No. 191/1999. Under Subsection 4, customs office may leave the detained goods with the possessor, ordering not to use, to take away or dispose of them by any means. 138 See Sections 4, 5 and 6, Act No. 191/1999. 139 See Holy, M., Vyplel J., “Czech Republic”, in Anti-counterfeiting 2009 A Global Guide, online at: http://www.worldtrademarkreview.com Under Section 7b of the Consumer Protection Act, it is prohibited to offer, to sell, or to export products or goods intended for humanitarian purposes and labelled with the mark “humanita”. Section 8 of the Consumer Protection Act prohibits deceptive consumers’ transactions. Section 8a of the Consumer Protection Act provides that holders and co-holders of a 69 Reference Text for Trainers authority given to Customs is provided in detail under Section 23b and Section 23c of the Consumer Protection Act (perform checks of legal entities and individuals who manufacture, store, distribute, import, export, purchase and/or supply alleged infringing goods and/or services; enter outlets or storage facilities; require submission of relevant documentation; order seizure of alleged infringing goods).140 Under Section 21 concerning petty offences and Section 29 for administrative torts, Customs authorities within the jurisdiction where the petty offence or the administrative tort has been committed may impose a fine and/or; the confiscation of goods used to perpetrate the offence obtained through or in exchange for goods acquired by the infringements.141 Furthermore, if the court ruling should find that the goods are indeed counterfeit, at the expense of the offender, the customs office shall arrange for: with the consent of the right holder, the removal of the trademark from forfeited or confiscated counterfeit goods and/or other modifications of forfeited or confiscated counterfeit goods; with the consent of the right holder, and after the trademark has been removed, the donating of the counterfeit goods for humanitarian purposes to other State offices and charities and/or NGOs which provide social services and/or which are considered to be active within the health or educational system. 3.2 Civil Sanctions Under Section 6 of Act No. 221/2006 which implements the EU Directive 2004/48, the Council Municipal Court in Prague shall provide court rulings, as the court of first instance, related to: - Disputes on claims concerning IPRs, on claims resulting from damages of an infringement upon the IPRs and on claims to surrender of the unjust enrichment acquired to the prejudice of the beneficiary of the IPRs; - Community Trade Mark or Community Designs. This Court shall also review final administrative decisions issued by the IPO. All these proceedings are conducted and decided in specialized panels composed by three judges before the Municipal Court in Prague.142 In order to achieve communitarian standards related to the protection of IPRs, Section 8, Subsections 4-7 of the Trademarks Act has been repealed by Section 14 of Act No. 221/2006, Enforcement of Industrial Property Rights. Under Section 2 of Act No. 221/2006, persons granted the exclusive right over a trademark: - the right holder or the proprietor of the trademark; - the person entitled to the right of use in accordance with the Trademarks Act, in particular a licensee and a professional organization engaged in the protection of rights and which is duly recognized as an organization with authority to represent the IPRs holders or proprietors.143 At present, the aforementioned authorized persons may instigate the following claims and procedures: patent/copyright certificate/trademarks/registered industrial design or utility model or their representatives must upon request submit to the supervisory authority documentation necessary for assessment of goods or products within 15 business days of receiving such a request. Holders of intellectual property rights are responsible for ensuring that such documentation is truthful, accurate, complete and effective. They must inform the supervisory authority of any changes which may be material for the accuracy of an assessment of goods or products […]. 140 See Section 23b, Consumer Protection Act. 141 See, Section 19 and Section 27, Act No. 191/1999, respectively, for petty offences and administrative torts. 142 See Section 6 of the Act No. 221/2006, Enforcement of Industrial Property Rights Act. 143 See Section 2, Enforcement of Industrial Property Rights Act. Under Subsection 2, the licensee may enforce the right only upon the consent of the right holder or the proprietor. The consent shall not be required when the right holder fails to initiate a claim within one month from the receipt of the licensee’s notification of the infringement. 70 Reference Text for Trainers Information rights. Authorized parties may demand information from third parties who participated in acts which violated an IPR. Such third parties may include persons that, for the purpose of economic benefit: - are keeping infringing goods; - are using or providing infringing services; - are identified by any of the above persons as a producer, complier, distributor, service provider or any other person that has participated in the infringement. Under Section 3, Subsection 2 of Act No. 221/2006, should a third party fail to cooperate in providing the requested information, one may resort to legal proceedings.144 Proceedings on merits. When an infringement has been established, the registered trademark owners can obtain the following corrective measures: - dilatory action: this action requires specific facts about the offence committed. Furthermore, as it may take a few years to conclude the proceedings, the plaintiff has the right to apply for interim relief;145 - removal action and destruction of infringing goods: a court ruling may call for the infringer, or person whose means and/or services were used by third persons for the infringement, to discontinue use of and/or permanently remove all products, materials, machinery, tools and/or equipment designed or used for infringement. In all of these cases, the penalty should be proportionate to the offence committed. If the penalties provided are inadequate, the judge may order the payment of a sufficient pecuniary compensation to the authorized persons;146 - damages: the infringer shall be liable to compensate the proprietor for damages resulting from the infringement of IPRs. In order to calculate damages, the court shall consider the profits obtained through the violation of the law. Should it prove impossible to determine the exact sum of damages, the court may order the payment of an appropriate compensation in a flat amount and equivalent to double the sum due for the license fee which would have had to be paid had the infringer bought a license to use the right; - publication of the court ruling: expenses due for publication are to be paid by the infringer who is defeated in the litigation.147 3.3 Criminal sanctions According to the Czech Criminal Code Act. No. 40/2009 Coll.:148 Trademarks § 268 (1) Each person that enters into circulation or provides services bearing without authorization a trademark the exclusive right in which belongs to someone else, or bearing a confusingly similar trademark or who for this purpose for himself or someone else offers, mediates, manufacturers, imports, exports or otherwise acquires or posses such products or offer or mediates such service, shall be punished by imprisonment of up to two years and/or prohibition of activity, and/or forfeiture of a thing or another property asset. 144 See Section 3, Enforcement of Industrial Property Rights Act. The information shall include: (a) name and surname or corporate business name and place of permanent residence or registered office of the manufacturer, processor, distributor, supplier and other previous possessor of the goods or service infringing the right; (b) details of the manufactured, processed, supplied, stored, received or ordered quantity and of the price received for the given goods or services. 145 Ĉìžkova, D., Zacha, T., 2009, “Czech Republic Protecting your Intellectual Property: New Options for IP Rights Holders, in Building and Enforcing Intellectual Proeprty Value 2009,, www.buildingipvalue.com 146 See Section 4, Subsections 2-3-4, Enforcement of Industrial Property Rights Act. 147 See Section 4, Subsection 5, Enforcement of Industrial Property Rights Acts. 148 24-25. INTA (2010), Criminal prosecution of Counterfeiting and Piracy in Member States of the European Union, pp. 71 Reference Text for Trainers (2) concerns company names and geographical indications (3) The perpetuator shall be punished by imprisonment from six months to five years and/or fine and/or forfeiture of a thing or another property asset, (a) if he/she obtains by an act described in subsection (1) or (2) for him(herself or someone else significant benefit or (b) commits such act to a significant extent (4) The perpetuator shall be punished by imprisonment from three to eight years, (a) if he/she obtains by an act described in subsection (1) or (2) for him/herself or someone else large scale benefit or (b) commits such act in a large extent Copyrights § 270 (1) Each person that infringes in a not negligible manner the statutory rights in copyright, artistic performance, audio or audiovisual recording, radio or television broadcast or database shall be punished by imprisonment of up to two years and/or prohibition of activity, and/or forfeiture of a thing or another property asset. (2) The perpetuator shall be punished by imprisonment from six to five years and/or penalty and/or forfeiture if, (a) the act described in subsection (1) has features of commercial activity or other business, (b) if he/she obtains by an act described in subsection (1) for him/herself or someone else large scale benefit or (c) commits such act to a significant extent (3) The perpetuator shall be punished by imprisonment from three to eight years, (a) if he/she obtains by an act described in subsection (1) for him/herself or someone else large scale benefit or (b) commits such act in a large extent Counterfeiting and imitation of work art § 271 (1) Each person that counterfeits author’s work of art or imitate art demonstration by another author with a view to get a new work considered to be an original work of such author shall be punished by imprisonment up to three years, prohibition of activity or forfeiture or other assets (2) The perpetuator shall be punished by imprisonment from one to six years (a) if he/she commits an act described in subsection (1) as a member of an organized group (b) if he/she obtains by such an act a significant benefit for him/herself or for someone else (c) if he/she commits such act to a significant extent. (3) The perpetuator shall be punished by imprisonment from three to ten years (a) if he/she obtains by an act described in subsection (1) for him/herself or someone else large scale benefit or (b) commits such act in a large extent 72 Reference Text for Trainers SOURCES Act on Trademarks: section 2, 4, 5, 6, 9, 21, 22, 24, 28, 29, 44 Decree no. 97/2004, section 19 Czech Trade Inspectorate Annual Report 2009, available HTTP: http://www.coi.cz/files/documents/vyrocni-zprava-coi-2009-cti-annual-report-2009.pdf INTA (2010), Criminal prosecution of Counterfeiting and Piracy in Member States of the European Union. Ministry of the Interior of the Czech Republic (October 2010), available HTTP: http://www.mvcr.cz/mvcren/article/new-anti-corruption-strategy-introduced.aspx United States Department of State (2010), “Trafficking in Persons Report 2010 - Czech Republic”, June 14, available HTTP: http://www.unhcr.org/refworld/docid/4c1883fa2d.html http://www.coi.cz/en/tiskovy-servis-1/tiskove-zpravy-1.html 73 Reference Text for Trainers SECTION 5 Main Concepts and Suggested Best Practices for Investigations 5.1.1 Detection of Counterfeit Goods and Initiation of the Investigation 149 One of the main aims of this training manual is to provide law enforcers, and all those involved in the detection and identification of counterfeit goods, with the operational tools to improve their counterfeit investigations. For this reason, the investigators should not just stop with identifying the “counterfeit sellers” as they can be considered “the tip of the iceberg” and occasionally also victims of crime. The investigations should aim to achieve the following two specific objectives: 1. Identification of the whole counterfeiting chain, up to and including the production sites; 2. Identification of the involvement of possible criminal organisations.150 The seized goods can also provide a variety of information. Examples include information on the routing of counterfeit goods and evidence against the manufacturers. Furthermore, investigations may lead to the finding of existing links between counterfeiting and organized crime. One important weapon in the fight against counterfeiting is the clear presumption of IPR ownership, putting the onus on the suspect to prove that goods in his/her possession are not counterfeit. A law enforcement officer encountering a product for the first time has to consider the following questions: What is the product and is it illicit or licit? Where can I obtain assistance to confirm my suspicions? Where do I obtain evidence of rights ownership? What evidence is available to support or disprove allegations of IPR infringement? What evidence do I require to support prosecution?151 Investigators and law enforcers should adopt a common strategy aimed at identifying all relevant persons involved in the manufacturing, distribution and sale of counterfeit products. The discovery of the following information could be essential: Companies and persons (partially or totally) involved in the production and distribution network. This information is essential for recognising the possible involvement of an organised crime group and the relevant internal structure152; Money transfers that might constitute important evidence for tracking the illicit trading flows and for obtaining the seizure and confiscation orders; Real estate and property, especially production sites, warehousing or selling points that are not only crucial for seizure and confiscation proceedings, but also key points of the criminal chain. 149 The main source for the whole paragraph is UNICRI (2010), Strategies for technical-juridical training and awareness raising on counterfeiting, (unpublished Italian version). 150 UNICRI (2010), Strategies for technical-juridical training and awareness raising on counterfeiting, (unpublished Italian version), p. 101. 151 See, INTERPOL (2007), Guide To Intellectual Property Crime And Investigations, Lyon. 152 One of the main weak points of all criminal organizations, including those with a “satellite structure”, is represented by the need to acquire enormous quantities of raw materials. The set up of complicated company structures is needed to cover the significant number of purchase orders. Such companies avail themselves usually of just one or two suppliers, easily identifiable as few are the factories producing the necessary raw materials. 74 Reference Text for Trainers Details and registrations of vehicles or other means of transport used in production (movement of raw materials, parts or e.g. packaging) and distribution; Details of mobile communications and IT hardware used in infringements. The complex distribution chain of counterfeit products can complicate any exercise aimed at tracing items back to the various parts of the illicit supply chain. This traffic is managed by veritable transnational criminal networks, capable of progressively refining the methods to conceal and trade products, following well established routes also used for the trafficking of other illicit goods, especially drugs. The methods used to avoid customs controls have evolved rapidly. A common method employed by criminal networks involves transiting the products through several countries in order to conceal their actual origin. This technique is most used when the country of origin is particularly “sensitive”. 153 It is particularly important to highlight that prevention and repression of counterfeiting must be accompanied by thorough information and evidence gathering on the complex system underlying the illegal reproduction of goods. Counterfeiting is a very complex phenomenon that cannot be stopped just by limiting the presence of small traders both licensed and unlicensed or through isolated actions. We need to develop proper strategies to combat counterfeiting in all its complexity.154 It may be useful to specify the main factors that should be taken into account in the investigative framework: The possible origin of the investigation; The analysis of events; The choice of investigative methodology; The data collection plan; The investigative developments. The above steps are not intended to cover all of the countless possibilities arising from different scenarios. They suggest effective investigative activities aimed at identifying and dismantling the criminal organizations that are responsible for managing significant levels of trafficked counterfeit goods, and which are also responsible for causing the most harm to right holders, the State and society as a whole. Investigations should be targeted at understanding the complete criminal scenario, identifying the counterfeiting production-distribution chain (capital, factories, facilities, distribution network, warehouses and equipment in general), in order to identify criminal organizations involved. If these organizations are operating in several countries, the possible application of those norms regarding transnational organized crime should also be verified before adopting them. There are a variety of methods in which investigations on counterfeiting can be initiated, for example: During criminal investigations for a different crime; Receiving a complaint from the right holder, or communications from other institutions; Instances of Customs’ protection; During normal controls of the territory; Other police activities; International cooperation and mutual administrative assistance. The scenario to be investigated will be more or less complex depending on whether investigations will consider: 153 154 UNICRI (2010), “Strategies for technical-juridical training and awareness-raising on counterfeiting”, p. 31. UNICRI (2010), “Strategies for technical-juridical training and awareness-raising on counterfeiting”, p. 34. 75 Reference Text for Trainers Small traders, both licensed and unlicensed, who constitute the last links of the counterfeiting market; Counterfeiting entrepreneurs (the producers and intermediaries trading counterfeit goods). The following information sources can be used to acquire elements in support of the investigation: Information available in existing national databases; Analysis of other open sources; Analysis of databases on trademarks, patents, designs and models, such as: European trademarks (http://oami.europa.eu/) International trademarks (http://wipo.int/portal/index.html.en) European Patents Office (Espacenet, http://www.espacenet.com/index.en.htm) http://www.epo.org/ & Other databases on designs and model. National and regional IP enforcement associations; Related industry associations (such as Union des Fabricants, the pharmaceutical industry associations, etc.) After having collected and analyzed the information of the suspected counterfeit product, the products’ safety and potential risks for consumers should be ascertained. The following distribution and trade channels should be detected: Regular distribution (mix-sale); Mail-order and via the Internet; Out of the regular distribution channels. At the end of this first phase of analysis, investigative hypotheses can be carried out on the following: Subjects involved; Type of infringement and/or crimes committed; Identification of operational modalities; Geographical locations; Driving motives; Time-span. Once these pieces of information are collected, it will be possible to evaluate which of the following investigative methods are considered most appropriate: Inspections at borders; Collection of photographic evidences; Identify people and means; Technical investigations; Identify the production/distribution chain, financial assets etc; Inspections (documents inspections, verification of the information); Surveillance; Ambushes; 76 Reference Text for Trainers Use of informants; Raids; Retrieve declarations and information; Other investigation techniques; Undercover operations. BOX 5 The Romanian common national database A pre-investigative analysis should always be carried out whatever the origin of investigation activity is, through a series of preliminary checks in order to acquire all the useful elements. Primarily, the importance of information sharing tools should be considered. These are the national databases developed in some countries, both in Europe and outside the EU. An outline of the Romanian national common database is detailed below. Information contained within databases can also help customs’ agents and policemen in detecting fake products and preventing their trading. Other main functions of the Romanian national common database are detailed below. The Romanian national Common Database consists of several modules: 1. Penal Case module, which is the main functionality where information regarding infringements and deeds can be entered into the system. The penal case must contain information about origin institution and assignment of prosecutor and investigators. A case number has to be created manually by the user due to the structure and nomination of the case numbers. It also provides the opportunity to search for existing penal cases and view/edit them. Each penal case must be attached to an Infringer. The system provides the opportunity to attach the Penal Case to either a Natural Person or to a Legal Person. 2. Persons module, contains information on infringers, both Natural and Legal persons. The module holds detailed information, such as address, ID and connection to penal cases etc. 3. Right Holder Registration module, provides a searchable overview of selected IPR-related information from SOIT and RCO. The user will be able to perform searches in respective registers. 4. Detainments module, intends to show a listing of searchable details regarding different seized goods etc. from NCA. 5. Reports and Statistics, module allows obtaining of reports and statistics regarding criminal files in the IPR-field, depending on various parameters. The beneficiaries/end users of the IT database are: Public Ministry – Prosecutor’s Office attached to the High Court of Cassation and Justice, (POAHCCJ) General Inspectorate of the Romanian Police (Fraud Investigation Division) General Inspectorate of Romanian Border Police (GIBP) National Authority of Customs (NAC) Romanian Copyright Office (RCO) State Office for Inventions and Trademarks (SOIT). Source: Romanian Public Ministry 77 Reference Text for Trainers BOX 6 VINCI Information Exchange System On 10 April 2008, a system for the protection of intellectual property rights “Leonardo da VINCI” (“VINCI”) was introduced in Poland Responding to the needs of economic environments, this system introduces numerous simplifications for the owners of intellectual property rights. It enables, inter alia: - to collect and process information provided by producers on original and fake goods, necessary for customs services to identify pirate and fake products (eg. photos, contact points for the exchange of information), - entering and processing data about all confiscated illegal products and - preparing various statistical reports, including reports for the European Union. VINCI presented in the European Commission is one of the most modern tools supporting both owners of intellectual property rights (business) and customs services in fighting counterfeiting and piracy. Assumptions underlying VINCI system have been used to create a Community system IT IPR “COPIS”. It is possible that in the near future business will be able to have direct access to the system on the Internet. Source: The (Polish) Team for Counteracting Infringements of Copyright and Related Rights 5.1.2 Border Controls Aiming to Detect Counterfeit Products and Anti-Counterfeiting Technologies Those involved in counterfeiting use a variety of means to introduce their products into the market. The main distribution chains to consumers include market stalls, itinerant small traders, both licensed and unlicensed, and sales over the internet.155 We will now start by analyzing how border controls work and how the infringers sometimes avoid them. We shall outline some useful means already used to detect counterfeit goods before they reach the market. Investigations are rather complex as capital, production units, distribution and market circuits are parcelled out. It may happen, for instance, that counterfeit products sold in Europe are destined for another market and are thus in transit. In order to deceive customs’ authorities, counterfeiters resort to indirect transportation systems, involving hiding the origin of the products by passing through different countries before sending them to their final destination. There are many examples illustrating this manoeuvre: - In September 2003, approximately 15,000 counterfeit glasses (whose estimated value on the French market was 1,262,650 euros) were discovered at Roissy airport, in France. The cargo, coming from Dubai, the most notorious seaport for world counterfeiting, was addressed to Abidjan, Ivory Coast. - In December 2003, customs officials of the cargo control unit of Roissy airport seized approximately 245,000 counterfeit labels of the following trademarks: Lacoste, Timberland, Nike and Ecko. The labels had been shipped from Hong Kong with Morocco as the final destination.156 Counterfeiters try to hide the origin of the products to avoid raising suspicion. For this reason, every counterfeit product has its own circulation and distribution network. There is not a standard pattern, a number of transit countries are chosen due to the mass trafficking of goods (making customs work difficult) or perceived weak controls within these territories and customs units. Some 155 156 IP Crime Group (2010), Annual Report 2009-2010, p. 9. Unions des Fabricants (2005), “Rapport sur la contrefaçon et la criminalité organisée”, p. 13. 78 Reference Text for Trainers areas are nothing other than turntables: within the EU this is the case with some ports like Antwerp or Rotterdam, or some airports as Schipol or Roissy. Outside Europe, Dubai, and Hong Kong or some ports in the U.S. are considered privileged transit places. Furthermore, counterfeiters make use of every kind of transportation means (by air, land and sea) and recur to the faster transport routes available. The European Commissioner responsible for TAXUD (Taxation and Customs Union), László Kovács declared: "All these techniques and the indirect routes taken by many cargos are similar to the ones used by drugs traffickers, which clearly shows which kind of organisations we are dealing with”157. The origin of the products can also be masked by taking advantage of the so-called Free Trade Zones (FTZs). Goods passing through FTZs or Free Ports (FP) create opportunities for counterfeiters to disguise the true country of origin of goods. They can also take advantage of countries where customs control on shipped or in-transit goods is known to be weak. Over the years quite a number of FTZs and FPs in different countries have been cited in reports as hotspots for counterfeit goods. These include Latvia, Lithuania, Paraguay (Ciudad del Este), UAE (Abu Dhabi and Fujairah), China (Hong Kong, Shanghai and Guangdong), Panama, Taiwan and Mexico.158 BOX 7 Counterfeiting and Free Trade Zones (FTZs) A recent New York Times exposé on the trade in counterfeit pharmaceuticals shows how FTZs can play an important role in facilitating their sale. One particular case revealed a complex supply chain of fake drugs originating in China and ran through Hong Kong, Dubai, the UK, the Bahamas and the US. It was exposed when British customs officials intercepted a large consignment of counterfeit pharmaceuticals at Heathrow Airport. What surprised them was that the shipment had come from the UAE and was bound for the Bahamas - not a route normally used by legitimate pharmaceutical companies. This seizure triggered investigations and raids all over the world. In Dubai, customs officers raided the warehouse of a trading house called Euro Gulf, impounded a significant cache of counterfeit drugs, and charged several people. In the Bahamas, the authorities entered the offices of the Personal Touch Pharmacy and seized drugs worth 4 million USD. As the investigation progressed, in the US and other parts of the world. As well as exposing the complex supply chains counterfeiters’ use, the case revealed the role of FTZ’s in masking the origin of products. According to Ilisa Bernstein, director of pharmacy affairs at the US Food and Drug Administration, “Free Trade Zones allow counterfeiters to evade the laws of the country because often times the regulations are lax in these zones.” Source: ICC Counterfeiting Intelligence Bureau (2009), International Anti-Counterfeiting Directory, p. 27. Since an understanding of the counterfeit goods’ flows can help licit manufacturers, brand owners, and law enforcement agencies to protect the licit supply or to disrupt counterfeit activities a diagrammatic representation of the potential trade routes used by counterfeiters has been created by Europol. This diagram also illustrates connections between criminal groups operating in various countries. 157 Unions des Fabricants (2005), “Rapport sur la contrefaçon et la criminalité organisée”, p. 14. ICC Counterfeiting Intelligence Bureau (2009), “International Anti-Counterfeiting Directory”, p. 27, available at http://counterfeiting.unicri.it/docs/IACD.A%20key%20information%20resource%20to%20combat%20the%20global%20pl ague%20of%20counterfeiting.2009.pdf 158 79 Reference Text for Trainers Unicri 2007, source: Europol International best practices An interesting example of a new tool that allows countries to improve how they track the source of counterfeit goods and also monitor the ports of transit for these fake products is the database elaborated by the United States National Intellectual Property Law Enforcement Coordination Council (NIPLECC), in collaboration with the U.S. Chamber of Commerce, to support Interpol in the establishment of “Interpol Intellectual Property Crime Database”. This new database will allow countries around the world to share information on counterfeiting and piracy to track IP crime and prevent future criminal acts. The database will act as an important new tool for information exchange between countries. It allows countries to share information they hold on counterfeiting and piracy, while also allowing for information to be entered into the database from the individual companies who own the goods that have been stolen.159 Another good practice, presented in box 2 below, is the Customs & Border Protection’s (CBP) online registration system for trademarks and copyright United States National Intellectual Property Law Enforcement Coordination Council (2008), Report to the President and Congress on Coordination of Intellectual Property Enforcement and Protection , p.35. For a more in-depth 159 analysis of this database look also p. xx, chapter 5, part C (a good practice: DIIP). 80 Reference Text for Trainers BOX 8 U.S. Customs & Border Protection IPR registration process: a good practice The U.S. Customs and Border Protection (CBP) is the unified border agency within the Department of Homeland Security responsible of the management, control and protection of national borders at and between the official ports of entry. “CBP’s online registration system for trademarks and copyrights allows rights owners to electronically record their trademarks and copyrights with CBP. CBP personnel use the system daily to make IP infringement determinations. The IPR registration system makes IP information relating to imported merchandise (such as images of trademarks and copyrights, contact information, countries of production, and licensees) readily available to CBP personnel as they are inspecting shipments at the ports of entry in real time. As of the end of 2007, over 21,000 trademarks and copyrights were recorded with CBP. For more information on this tool or to register your trademark or copyright, visit CBP’s e-recordation website”. Source: U.S. Customs and Border Protection, http://www.cbp.gov/xp/cgov/trade/priority_trade/ipr/ For information on border measures as effective means of blocking counterfeit products, see the implementation of the EU Customs Regulation in Czech Republic (Part 3 of this manual). In the following boxes two good practices on customs action (in Ireland and in France respectively) are presented as suggestion for both Czech Republic and the rest of the EU. 81 Reference Text for Trainers BOX 9 Customs action against goods suspected of infringing IPR in Ireland “1. Suspect goods identified in the course of checks carried out at the request of a right-holder The entry of the goods should be monitored in accordance with the terms of the application in question. To facilitate the identification of the goods, suitable arrangements should be made including the insertion of appropriate profiles on the AEP (Automated Entry Processing) system, for the period of the application under consideration. Where imported goods appear to infringe an IPR covered by an application they are to be detained and the right-holder and the person who imported the goods are to be informed. In addition, the detention should be reported immediately to the IPR Co-ordinator. The right-holder is to be provided with a sample of (or asked to view) the goods. Furthermore, he/she is requested to confirm in writing whether or not the goods are counterfeit or pirated, giving reasons by reference to the characteristics of the goods or their packaging or otherwise. The person who imported the goods should also be given the opportunity to inspect them. This person’s name should not be divulged to the right-holder. 2. Suspect goods identified in the course of normal checks During normal checks, if goods are discovered which appear to infringe an IPR, but are not the subject of an application, they are to be detained. The right-holder whose IPR is suspected of being infringed and the person who ipmorted the goods are to be informed. In addition, the detention should be reported immediately to the IPR Co-ordinator. The detention, which can only be for a period of 3 working days, is to allow the right-holder an opportunity to lodge an application with International and Trade Security Branch, Customs Division. If an application is granted, the procedure should be applied. If an application is not lodged within the 3 working days the goods are to be released provided that all customs formalities have been complied with. 3. Follow Up and Reporting Where goods have been detained, a right-holder has 10 working days to confirm that the suspect goods infringe an IPR under National law. In the absence of this confirmation the goods will be released provided that all customs formalities have been complied with. The 10-day working period may be extended by a maximum of 10 further working days if considered necessary. In cases involving perishable goods suspected of infringing an IPR, this period is 3 working days and may not be extended. If the goods are subsequently seized, a written report setting out all the facts shall be forwarded immediately to Anti-Fraud Unit, in accordance with standing instructions on the reporting of seizures. A copy of this report should also be sent to the IPR Coordinator. To facilitate the requirement of quarterly reporting to the Commission of goods seized under these provisions, the report in each case must include the following information: the name of the right-holder, a description of the goods and the brand name of the IPR infringed. For each item, the quantity of goods detained or seized, their customs status, the type of IPR infringed, the means of transport used; and whether commercial or passenger traffic was involved and whether the procedure was initiated in the course of normal checks, or specific checks covered by an application for action”. Source: International & Trade Security Branch, Customs Division (2008), Intellectual Property Rights (IPR), Manual Customs action against goods suspected of infringing certain intellectual property rights and the measures to be taken against goods found to have infringed such rights, Ireland. 82 Reference Text for Trainers BOX 10 Customs action in France “According to law 94-102 of 5th February 1994, counterfeiting is a customs-related crime (articles 38, 215 bis of Code de Douanes). The following customs penalties regarding trademarks counterfeiting include: the seizure of counterfeit goods, means of transport and facilities used to hide the crime; a fine whose value can be once or twice the counterfeit merchandises’ cost (art. 414 Code de Douanes) and with a minimum of 300 Euros (art. 437 Code de Douanes). A 3 years-maximum imprisonment is also incurred. The proceedings are then transmitted to the prosecutor according to art. 40 of the Criminal Procedure Code. The customs action can become customs seizure due to the intervention request sent by a rights’ owner to the Direction Nationale du Renseignement et des Enquêtes Douanières (DNRED). The rights’ owner, within 10 days, has to justify to customs services both the measures decided by the TGI president and whether a civil proceeding was started (art. L.335-10, art. L.521-7 and art. L.716-8 of CPI). The law of 9th March 2004, adapting measures to the new crime evolutions, extended the customs authorities’ prerogatives concerning intellectual property. So, regarding the trademarks counterfeiting, the new article 67 of the Code de Douanes allows customs agents to proceed with undercover operations, with the authorization and under the control of the Public Prosecutor. The European Regulation n° 1383/2003 (22nd July 2003) strengthened the Customs possibilities for action within the European Union. Since 1st July 2004 the Customs are able to act whenever a sufficient suspicion exists, even before the call for action by the IPRs’ owner. This system is applied to all IP rights, including the geographical indications, appellations of origin and the vegetable patents. Moreover, free and harmonized intervention requests are foreseen by this Regulation. The Customs administration have the right of self-directed prosecution in front of the repressive jurisdiction for the implementation of fiscal sanctions, but only if the public action of the common right has been engaged either by the Prosecutor or by the right’s owner. If the public action has not been activated, the Customs will have to close a transaction. Transaction power – regarding Customs – is exerted mainly for low levels of counterfeit products. Customs transactions have no effects over the public action in prosecuting the infringements of common law. For this purpose, the proceeding has to be transmitted to the Public Prosecutor according to art. 40 of the Criminal Procedure Code. Source: Unifab (2004), La lutte anti-contrefaçon. Manuel destiné aux officiers de police judiciaire, 2ème édition, p. 14. 5.1.3 Anti-counterfeiting Technologies The great volume of international commercial trade is not the only involuntary ally of organized crime in the trafficking of counterfeit goods. Modern logistic management of international trade is facilitated thanks to intermodal shipping. Intermediary destinations are often chosen from those hubs which law enforcement authorities do not consider to be “high risk” thereby making the origin of the goods appear less questionable. This creates additional practical difficulties when attempting to detect counterfeit goods.160 The problem becomes more complex when the imported object is not a finished counterfeit product. To avoid border controls, counterfeiters resort to a variety of techniques to disguise the goods; examples include: mixing original and counterfeit products or using double bottomed transportation means. In 2000, a Bulgarian ship transporting goods from Ukraine and ex- 12 UNICRI (2010), “Strategies for technical-juridical training and awareness-raising on counterfeiting” UNICRI (2007), op. cit. 14 CEIPI (2004), p.27 15 International Anti-Counterfeiting Directory (2009), “A key information resource to combat the global plague of counterfeiting”, pp. 8-9. 13 83 Reference Text for Trainers Yugoslavia was inspected. A double bottom was discovered containing more than 220,000 pirated CDs whose value was about USD 500,000.161 The practice of parcelling out the components of a product across several shipments is also very common. Clothes and counterfeit trademarks can be sewn on to clothes that have been shipped separately. Sometimes a product is delivered first, followed later by its packaging. In this case the manufacturing of the product is completed only after its transport, thus subdividing the risks involved in shipping. Since there are many techniques to conceal counterfeit products and to make them increasingly hard to distinguish from the original ones, a variety of detecting measures have been elaborated in the recent years. Some of the most used are outlined below. The report entitled “A key information resource to combat the plague of counterfeiting” published in 2009, provides a series of new anti-counterfeiting technologies available to the market in 2008:162 - Two Australian chemists developed a new rapid forensic test for authenticating antique porcelain after discovering that all porcelain has its own unique ‘fingerprint’. This ‘fingerprint’ allows its history to be traced back to the precise quarry from where the clay was mined, the furnace in which it was fired, and the period in which it was manufactured. The technology involves a laser sampling technique to determine the unique signature of the clay from any porcelain object to be authenticated. - Bayer CropScience also launched its Qualidate fingerprint authentication technique, a new patented technology based on approved food additives developed to protect crop protection products. The system provides a quick and easy test to determine whether or not a product is authentic and of original Bayer CropScience quality. - In 2008 a new tool in the fight against counterfeit wine was also launched. French scientists developed a particle accelerator that can authenticate a wine bottle’s age and detect counterfeits. As testing wine to determine its age is problematic, as such tests are often questionable (especially for wines older than 50 years) this technique analyzes the composition of the bottles. Glass production centres are unique, and production methods have changed over time, leaving on each bottle specific marks. The analysis focuses on the bottle’s glass and not its contents, thus the bottle can remain sealed, during the test. The particle accelerator projects an ion beam at a bottle and then studies the X-rays that are emitted from the glass using a semiconductor detector. The process does not harm the bottle in any way. The test results are then compared with information in a database, which contains an analysis of bottles sent directly from wineries to ensure their provenance. - Another interesting anti-counterfeiting system was launched in Ghana aiming to give consumers first hand information on the authenticity of pharmaceutical products being sold in the country. The system, known as mPedigree, links producers and distributors with consumers and regulators and has been designed to eliminate the information blockage on which counterfeiters thrive. A strategist of the mPedigree platform stated that once the system is operational, it will be the world’s first consumer protection system of its kind. Under the system, drug buyers and/or consumers have the opportunity to check for free whether their purchases are genuine or not, by using their mobile phones to send special, non-duplicable codes embossed on drugs and to receive in a few seconds a response confirming or denying the authenticity of the product concerned. - Sanofi-aventis also inaugurated its Central Anti-Counterfeit Laboratory at the company’s pharmaceutical plant in Tours, France. The laboratory, with its experts and state-of-the-art 84 Reference Text for Trainers equipment, has a three-fold remit in respect of reducing the threat of counterfeit drugs. This involves: conducting direct examinations of packaging items and leaflets as well as definitive chemical tests on suspect samples of commonly counterfeited products; developing test methods and distributing them globally. This would allow any industrial plant in the world to inspect and test, the suspect products corresponding to those manufactured by Sanofi-aventis with the same criteria; and to centralise “Identity Cards” for the counterfeit drugs found, in a single, central database, making it possible to compare different types of counterfeit goods. It should be emphasized that anti-counterfeiting technologies can be taken as example and possibly replicated in similar contexts. Also this underlines the importance of sharing information, both between public and private sector and between the institutions involved in the fight against counterfeiting. Authentication technologies are used to authenticate products. Consequently, these technologies form a source of evidence for the courts and thus aid law enforcement agencies during procedures related to the seizure of infringing goods. Markings are divided in four categories: overt (visible to human eye), hidden (elements incorporated into overt features or packaging which are visible to human eye by means of tools such as reactive pens, laser pointed tools, optical filters or UV lights), covert (elements which can only be detected with specific detection devices), forensic (elements which can only be detected by means of an infield kit or through a laboratory analysis which allows for a more comprehensive analysis). Track and trace technologies are used to follow and analyse the movement of products through supply chains and hence can help enforcement agencies during investigations. Such technologies can provide barcodes or radio frequency identification (i.e. an automatic identification method which is incorporated into a product and is transmitted through radio signals). A good practice is represented by GS1 Standards: they use RFID technology within barcodes in order to manage shipments, inventories & assets and to reduce counterfeiting. The barcodes system enable companies to manage the supply chain more efficiently, thus may help in finding counterfeiting actors operating at that level.163 International Best Practices The Italian Customs Agency own one of the international best practices on computerized customs risk management, entitled FALSTAFF. (Fully Automated Logistical System against Forgery and Fraud). 163 Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in the EU: report on best practices (unpublished version) 85 Reference Text for Trainers BOX 11 A best practice of computerized customs’ risk management Fully Automated Logistical System against Forgery and Fraud (F.A.L.S.T.A.F.F.) The project of fight against counterfeiting – the Fully Automated Logistical System against Forgery and Fraud (FALSTAFF) – developed by the Italian Customs Agency is based on a multimedia database of original products. It is included in the information system of the Agency. Each producer, manufacturer or right holder applying for customs protection generates a record in the database, which contains several data related to the products for which protection is requested – information on routes and quantities traded, technical information for the identification of the product, photos of the trademark and of the product itself as well as packaging information. Customs officers can query the database obtaining real time information and in case of an application for action, they can also refer to the support of experts of trade associations and/or quality certification bodies for the products concerned. The database is also integrated with the customs control circuit, thus allowing for the definition of further risk profiles which result in corresponding actions aimed at protecting trademark rights. The customs control circuit performs a real time analysis of all import and export declarations submitted to custom s and automatically redirects them to the relevant control channels matching those risk profiles. The risk profiles are elaborated also on the basis of parameters indicated in the forms submitted by right holders to the Agency. The implementation of the system is a positive step undertaken by the Italian Customs Agency to meet some of the most urgent needs resulting from the First World Congress on the Fight against Counterfeiting. These include: identifying the highest possible number of counterfeit products and counterfeiting strategies; and taking the fastest possible actions in these respects. These tasks are achievable only through the adoption of electronic technologies. In 2005, FALSTAFF was awarded the Honour Mention in the eEurope Awards, European Oscar for the better initiatives related to eGovernment, held in Manchester. This was as FALSTAFF was an innovative and ambitious project aimed at combating the counterfeiting phenomenon within the European Union single market. It is an excellent example to be followed by the other European customs agencies and can improve the efficacy of cooperation among the EU member states. Source: www.agenziadogane.it/wps/wcm/connect/ed/Servizi/F.A.L.S.T.A.F.F. 86 Reference Text for Trainers 5.1.4 Raids at Production/Stockpiling Points or Local Markets In the previous paragraph, we analyzed how border controls work, within the EU framework, in cases of IPRs infringement. We also explored some technologies implemented to discover and detect counterfeit products. On the basis of preliminary information acquired by law enforcement and border officials, another instrument to counter these criminal practices is the one of Raids, which literally means ‘searching without warning, making a sudden surprise attack’. It is crucial to mention that raids and the related activities are usually carried out with joint teams from different law enforcement agencies including: immigration controls, vehicle standards, trading standards, social welfare fraud investigators and other ‘organized crime’ investigators such as vice squad, drugs, arms etc. The so-called “surprise effect” is carried out in production/stockpiling points and local markets: it is a key tool for acquiring every useful element to identify all the events related to the crimes. For this reason, a prior inspection should be completed to understand the external features of the premises. This would make it easier to safeguard the exits when entering into the buildings or into the warehouses. “In particular, when a search is performed, a series of activities shall be carried out, involving: Examining tax records; Examining the Customs documentation in the case of international transactions; Examining commercial correspondence; Looking for any documentation that may be relevant to the investigation (such as diaries, notes, receipts, correspondence, addresses) on the premises and facilities used for the activity, including motor vehicles used in relation to the business; Looking for any technical documentation (such as declarations of conformity, technical documentation, reports, etc.) or documentation relating to the production processes (in the case of a manufacturer); Verification of permits, notices and licenses to conduct the business (also in the case of e-commerce); Examination of documentation proving ownership of trademarks, licenses, concessions, supply contracts, royalties, etc; Analysis of the quantity and composition of computer equipments (e.g. personal computers, local networks etc.); Acquisition of magnetic media to assist later examination for the identification of any transactions that can be of interest. Special attention should be given to data contained in the hard disks of personal computers used by the owner, or by others with management responsibilities. This can be achieved through backingup the identified hard disks; Identification of all the personnel effectively working in the enterprise, specifying personal identification data, the tasks performed, the date of commencement of the activities, the type of employment responsibilities; 87 Reference Text for Trainers - Performing an analytical inventory (quantity, value and provider) of the existing products (even extending the search to any premises that may be available to the suspect)”.164 The identification of counterfeit products can be performed using two criteria: - - Simple criterion: Very low price; Characteristics of the seller; Lack of distinctive signs, information and labels; Quality of packaging; Complex criterion: Technical advice; Sending samples (including photos) of the product to the right holder; Chemical or physical examination; Analysis and laboratory tests.165 5.1.5 Evidence Gathering and Types of Evidence Presented to the Court in Counterfeiting Cases166 An investigation is an activity aimed at gathering information and evidence and is conducted for many different reasons. The purpose of any investigation is to determine and document facts concerning a particular issue to ensure the law enforcement agency can make informed and sound decisions. Investigation is a general term and can apply to a very general activity or a specific type of information gathering process. Some specific types of investigations include: a complaint investigation, a disaster investigation, a health fraud investigation and a product counterfeiting/tampering investigation.167 An operative list of actions to be carried out during the investigation process is presented below. It can be applied to different forms of fake products posing risks for consumers’ health. Counterfeiting/Tampering Investigations The purpose of these investigations is to determine if counterfeiting/tampering has occurred; the seriousness of the problem; the quantity of affected products on the market; the source of the counterfeiting/tampering; and quick removal from consumers or commerce of any contaminated product. The office specifically assigned to criminal investigations will seek to identify and initiate criminal prosecution of those persons responsible for criminal activity associated with counterfeiting/tampering/threat incidents. Counterfeiting/tampering incidents historically have occurred in unpredictable forms and products. Some ‘standard operating procedures’, in most cases, will suffice for these 164 UNICRI (2010), “Strategies for technical-juridical training and awareness-raising on counterfeiting” These guidelines are the ones outlined by the Italian Guardia di Finanza in the UNICRI (2010) publication, but could prove as a useful example for other European countries. 166 The main source for the whole paragraph is: U.S. Food and Drug Administration (last update march 2010), Investigations Operation Manual, ch. 8, available at http://www.fda.gov/downloads/ICECI/Inspections/IOM/UCM123515.pdf 165 88 Reference Text for Trainers investigations. As events take place, specific instructions for some investigations may be provided by the assigned offices. Prompt resolution is important, especially when a health hazard is involved. The law enforcement official(s) shall attempt to answer the following questions as rapidly as possible: 1. Has counterfeiting/tampering occurred, or can the condition of the product be explained by other means? 2. Is death, injury, or illness associated with the report and, if so, does it appear to be caused by the product counterfeiting/tampering? 3. Does the incident appear to be isolated or widespread? 4. Is it likely that other similarly affected products remain in distribution, and if so, what is the extent and magnitude of distribution? 5. If not isolated, could the product counterfeiting/tampering have occurred at the production facility or in the distribution chain? 6. Can specific persons or points in the distribution chain be identified as possibly causing the problem? Contacting rights owners is an essential step in every investigation process. They can contribute to evidence and information gathering due to their past experiences and knowledge on the original products. - Interviews with informants and/or suspects: 1. Conduct interviews in a location which reduces unnecessary interruptions or distractions. 2. Establish rapport with the person or persons being interviewed to put them at ease. 3. Listen to the person. Let them first tell the story in their own way. Listen carefully to each side. 4. Be genuine and at ease. 5. After hearing the entire story, ask them for more information to fill in details. 6. Ask for clarification of key points. Obtaining details and requesting clarification of key points allows you to obtain an idea of the validity of the person's story through comparison of the accuracy of the details with previous information supplied. 7. Note-taking may put the person being interviewed on edge. If this appears to be the case, do not take notes until you request clarification of key points. Video / audio recording should also be considered. 8. For cases of counterfeiting/tampering, ask who was with the person, what happened in the store, any problems noted with the product at the store, and other questions which will pro-vide you with more information on when, where, or why events took place, who was present, etc. If two investigators are involved in the interview, one should take notes while the other asks the questions. 9. During interviews, watch for changes in attitudes, body language, hesitation in speech, etc., as you observe and listen to the person being interviewed. Describe your observations of body language and personal characteristics in your report. 89 Reference Text for Trainers - Sampling: 1. Whenever a sample is collected for suspected tampering/counterfeiting, you must collect an authentic sample of the same product. It should be from the same lot and code, if at all possible. 2. Collect any containers a suspect may have handled as they placed the tampered product on the shelf. 3. When handling product containers or other evidence associated with tampering/counterfeiting, take care to avoid adding or smearing fingerprints by wearing cotton gloves, using tongs, forceps, or by picking the container up by opposing corners. 4. Identify product containers carefully and in as small an area as possible. 5. Do not open outer containers to identify inner containers or inserts. The sampling is often related to tampering cases, however, in most counterfeiting cases, investigators do not usually collect an authentic sample of the same product. - Retail stores: 1. Before starting any activity at the scene, protect the area to preserve any evidence on the store shelves, floor or adjacent areas and products. 2. Discuss with the firm's management, and/or the personnel in charge of the stocking of the shelves, how material is received and handled prior to being placed on shelves. 3. Document the area using photographs of the product shelves, surrounding area, and any shots which would provide information on the product, its location and store layout. 4. Samples of materials in the area that may be applicable to the investigation are to be collected. 5. Be observant of persons present in the store, as guilty parties are thought often to return to such location, especially when the agency or news media are present. Be alert to statements of store personnel about activities they have observed. Obtain descriptions of the actions, dress and physical characteristics of individuals the employees have noted exhibiting unusual/notable behaviour in the store. 6. Determine if the firm has a closed circuit TV monitoring system and if they maintain tapes. If so, these may be a source of leads. 7. Obtain information about employees terminated in the past year, employee problems, or shoplifters who may wish to cause problems in the store. The key to a successful investigation or inspection is to clearly define the objectives of the operation and to examine each facet of the establishment in light of the objectives. - Manufacturing sites: Aspects of the production/distribution system to inspect for leads may include: 1. Age of facility and date when production of the first batch of the product under investigation was initiated. 2. List of other facilities which produce the product under investigation. 90 Reference Text for Trainers 3. For drugs, list by strength, size of container, name, dosage form, and number of packages per shipping case, all products manufactured or processed at the facility. 4. Obtain the names, titles, addresses, office and residence telephone numbers of representatives of the company. 5. Contract packagers, if any, should be described by name, location and products handled. 6. For the suspect lot, give its lot number, the size of the lot, size and type of containers in which it was packaged, its history of production and distribution beginning with the date of weighing of the raw material, and the dates and description of steps in processing. 7. Describe any locations within the facility where an employee could have access to the product/contaminant being investigated. 8. Describe the characteristics of the suspected product/contaminant within the facility, its container type, its brand and generic name, its lot number, size of container, whether the container is full or partially full and the approximate amount remaining. 9. Describe security for the suspected product/contaminant including limitations of access, where it is stored, and responsibility for controlling access to the material. 10. Describe what legitimate use, if any, the facility has for the suspected product/contaminant in each of the locations found. 11. Determine how often the material is used and whether or not a log of its use is maintained. 12. If a log is maintained, obtain a copy showing its use and discuss with plant management the legitimacy of each such use. 13. Determine whether the firm verifies use and use rates and has a method of determining explanations for any discrepancies noted. 14. Have samples of the suspect product/contaminant been obtained by, for instance the FDA in the case of medicines, or other competent agencies, and if so, what are the results of analysis? 15. Does the firm test for the product/contaminant under investigation? 16. What method is utilized for such testing, and at what frequency? 17. List the facility's sources of raw materials for the suspect lot/product. 18. Evaluate the raw material storage conditions to determine the potential for manipulation of materials. 19. Describe the lot numbering system, any plant identification numbers, and expiration dates placed on retail products and cases. 20. If any product for export is processed at this plant, describe any differences from domestic products. 21. If the product under investigation has tamper resistant packaging (TRP), determine the type of system utilized, and if the system utilized has been evaluated to determine if breaching is possible. If breaching is possible, describe. Describe lot numbers or code numbers placed on TRP and security measures 91 Reference Text for Trainers taken for TRP materials on hand and those sent to contract packagers. Determine whether TRP materials are accountable. 22. If the plant process includes collection of samples for examination on the production line or by laboratory facilities, discuss where the samples are maintained, who has access to them, and their disposition. 23. Report dates and description of each step in processing, including identification of storage locations between steps. Obtain estimates of flow rates and volume of materials in hoppers and drums at key stages. Determine distances between production areas or between processing equipment at critical points. This information can be useful for statistical evaluation of the likelihood of contamination at various points in the process. 24. Include a description of the in-process lot numbering systems for each phase of manufacturing, security for each process and/or product while in storage and during processing. 25. In some types of processes, there are provisions for an individual to ensure sufficient products are placed in each container before being filled. If this is the case in the plant under inspection, describe the circumstances and security for this process. 26. Determine whether the facility hires part-time employees, or transfers employees from one location to another on a temporary basis. Were any present during production of the suspect lot? 27. Describe provisions for determining reliability of employees. 28. Determine if employees can move from area to area within the facility. Describe any restrictions on their movements and if enforced. 29. Describe laboratory control tests and in-process tests performed on the finished packaged product and in-process materials. Determine if reserve samples are retained of all lots. 30. Determine how rejects and reworked materials are handled. 31. Describe any unusual event which may have taken place during the period when the suspect material was within the facility. 32. Determine if the firm has a plan to safeguard against counterfeiting/tampering as part of its quality assurance (Q.A.) programme. If so, determine the implementation date of this plan and review any periodic assessment reports for potential problem areas. - Distribution facilities: It may be necessary to obtain the following information at each level in the distribution chain: 1. Amount of suspect lot on hand at time of inspection. 2. Obtain the turnover rate for the product under investigation. 3. Amount of suspect lot received, and any variations from amount consigned to the facility. 4. Date received. 5. How received. 92 Reference Text for Trainers 6. Name and type of carrier which delivered the product. Determine security of the vehicle or container while in-transit. 7. Obtain distribution history of the suspect lots. 8. Describe the distribution area covered by the facility being inspected and the number of accounts served, whether they are retail or wholesale. 9. Determine if the facility handles any cash and carry orders. 10. Determine if the facility will accept returns and how are they handled. 11. Describe stock rotation practices and how they can be assured. 12. Determine if lot numbers of products distributed can be traced. 13. Describe the method of packing of shipments; for instance, plastic tote bins sealed with nylon tape, intact cartons only, cases are split, etc. 14. Describe the methods of shipment utilized by the warehouse. 15. Describe personnel practices, problems and other information on visitors, contractors, etc. It is often advantageous to produce a pictograph or a timeline chart of the distribution system. This would show basic information on each level in the distribution chain and distances between each link in the chain. It is also often worthwhile to prepare a timeline chart showing the progression of the suspect lot through the manufacturing process to the source of the complaint, including the significant steps in the manufacture and distribution of the suspect product. - Security: Methods used to report this information should be discussed with the supervisor, since an inadvertent release could compromise the facilities security system. 1. General security arrangements including: the number of guards, their shifts, locations, and whether or not they patrol the facility. 2. Describe any closed circuit TV systems, their locations, and any physical barriers to prevent access to the plant grounds and its facility. 3. Describe who is logged in and out of the facility and whether or not employees must display identification badges upon entry. If plant employees are issued uniforms by colour or design, which designate their work station locations, also describe. 4. Determine whether visitors, contractor representatives, cleaning crews, etc., are subject to movement tracking or control, and if any were present during production of the suspect product. 5. If the suspect product was particularly vulnerable to in-plant tampering during certain stages of handling, identify particular employees who had access to product during these stages and interview them individually. There may be occasions when line employees may be able to remember suspicious activities on the part of co-workers or others working in the area when suspect lots were being produced. 6. Describe the security measures taken for the processing area after hours, during work breaks, and at meal times. Be alert to those periods when in-process containers are left unattended on a packing/production line. 93 Reference Text for Trainers 7. Describe any employee relations problems such as layoffs, firings, probations, adverse actions, etc. - Reporting: Reporting an investigation is frequently completed using a memorandum. The format is not as defined in sections as an inspection report. A good rule of thumb to follow is to first summarize what has been done, why or give the reason for the investigation and briefly state the findings. After this, one can go into detail about the investigation was conducted and what was found. Reporting the course of the investigation and relevant findings chronologically works in many situations. For long narratives, using headings will make it easier for the reader to follow the report. Some types of investigations have forms that need to be completed in addition to the narrative. 94 Reference Text for Trainers BOX 12 In summary: How to operate? The police officer getting knowledge or checking up on a counterfeiting-related fact should act gradually by: - Gathering whatever information concerning the fact (that will inform the Public Prosecutor), as charges, written documents or complaints, even interviewing, if possible, informed people and other customers of counterfeiters; - Paying close attention in acquiring the notitia criminis, by researching all information sources considered suitable; - Aiming at detecting the counterfeiting chain (capitals, factories, structures, distribution network, warehouses and generic tools), by activating each informative and investigation source whenever a criminal organization is involved, according to the Palermo Convention’s definition; - Contacting another law enforcement agency or a specialized organisation (tax police, customs, port authorities, associations or privates involved in countering counterfeiting etc.) when his/her expertise is not adequate in order to delve into fiscal aspects or other issues concerning immigration or job conditions; - Taking care, as carefully and promptly as possible when gathering data to send to administrative centres in order to improve the implementation of the prevention and repression of those crimes; - Finally, the rights’ owner should be informed in order to initiate civil or criminal proceedings, and ask for compensation with prejudicial consequences for the counterfeiter. Other countering instruments The experience in the carrying out of investigations showed that the producer is different from the small traders both licensed and unlicensed: the unlicensed, often clandestine, can be punished through expulsion; while the licensed trader is usually an underground entrepreneur, can be efficiently punished by civil or criminal measures. Sanctioning the associative bond can act as a powerful deterrent with both direct and indirect consequences. The main deterrent for the counterfeiter is being damaged in his/her own entrepreneurial activity. If the seizures of the destruction of thousands of counterfeit goods may be an economic loss, the confiscation of an apartment, a bank account or a licence, or the forfeiture of driving licence or documents for leaving one’s country is the real deterrence. Usually, the criminal sanctions’ effects are more preventative than repressive. The sanction creates a deterrent effect due to its existence, by creating insecurity among the criminals. Deterrence can be carried out by making counterfeiting less interesting and attractive. If counterfeiting is also a way of laundering ‘dirty money’, we can assume that by increasing sanctions, using counterfeiting for this aim would no longer appear attractive. Source: Italian Ministry of the Interior 5.1.6 Internet Investigation The use of the Internet for the advertisement/sale of counterfeit products has created an independent distribution process. It directly targets final users, contributing to ordinary distribution and sometimes overlapping it. The Internet is an important supply channel for the counterfeiters as it allows them to simultaneously supply products at the retail and wholesale level. The data provided by the U.S. Food and Drug Administration (FDA), indicates that 10 million parcels enter the USA every year. This demonstrates that the use of the Internet 95 Reference Text for Trainers as a distribution channel is rapidly growing. The OECD predicts that the volume of sales over the internet will rise by 20%-30% per year, thus, potentially increasing the distribution of infringing products. The Internet guarantees anonymity due to the impersonal nature of online commercial exchanges. - Auction sites and online marketplaces. The auction sites are well used routes to market, sell and distribute counterfeit products, including digital files, CDs and DVDs. Recent years have seen a growth in more established market places, such as Amazon and eBay. Currently, there are over 90 UK based auction websites. The past year has seen action being taken to try and tackle this issue, in particular through joint work with the auction sites. The Internet Auction Working Group is led and chaired by trading standards. It is developing ways to harmonise the approach to removing sites that sell infringing products, with the aim of reducing the burden on enforcement and agencies brand holders. The group is also looking to introduce a code of practice for auction sites. - Another key area is where dedicated websites have been set up to sell specific fake or pirated content. In some instances, items are clearly advertised as fake or their price might indicate that they are not legitimate products. In other instances the products are represented as genuine articles. - Criminal activity through P2P file sharing sites, for example by running or hosting a site, continues to be an area of serious risk. Much of the discussion and debate regarding P2P in 2009/10 has centred on the civil infringement issues resulting from the large volumes of consumers who are making use of P2P technology to download unlawfully copied content. These activities do not typically fall into the category of IP crime although civil law breaches may be occurring (also involve criminality). - Streaming sites are a concern to the audio-visual sector as a whole. They raise particular concerns for those involved in audiovisual rights around sporting events. It is the “live” nature of the sporting event which provides the greatest appeal to a prospective audience. It is at risk of piracy by means of live streaming on the Internet. Online purchases seriously jeopardize the identifying function given to trademarks, as it is practically impossible for the consumer to know who or what is behind an Internet site. Furthermore, the consumer may not have physical contact with the good she/he intends to acquire, but must trust the images that are presented on the online store. The combination of these factors, which could be defined as conditions of non-verifiability – creates a fertile ground for the development of illegal activities which aim to sell replicated products. Due to this level of anonymity, the investigations implemented by the law enforcement officials have been considerably more difficult”.168 It is necessary to take into consideration the dynamism of the Internet when regarding investigations within the digital environment. The Internet can easily and rapidly modify itself. It may happen that those responsible for the websites can alter the webpage contents and format while the investigations are in progress after having realized that they are being investigated. For this reason, while carrying out the inquiries, some 168 IPO Crime Group, IP crime Report 2009/2010, United Kingdom, p.10 and following. 96 Reference Text for Trainers information and documents need to be noted down, so as to identify and retain evidence about websites and contents investigated. Examples are listed below: - precise webpage address, through the URL (Uniform Resource Locator) - download of the webpage in a digital support. It is possible to verify its content and the existence of any business advertisement related to the products or services offered through the webpage (banners) - day and time periods during which the non-authorized activities are carried on - Ip (Internet Protocol) addresses from which the acts have been realized - Download of products or services offered in the web - Certification made by the rights’ owner, in which is proved that the investigated portals is not authorized for carrying out these activities - Nicknames of forum users, the ones who make non-authorized exploitations”.169 International Best Practices In 2004, an investigation related to various Internet sites and the pharmaceutical distribution chain was implemented by the US Immigration and Customs Enforcement (see box below). The Immigration and Customs Enforcement (ICE) believes that the Internet is the preferred tool for criminals involved in the trafficking of counterfeit medicines. Nevertheless, the Internet is also a preferred supply channel for other products posing a risk to consumers’ health and safety, such as spare parts for aircraft.170 169 Ministerio de Cultura de España (2008), Manual de buenas practicas para la prosecución de los delitos contra la propiedad intelectual. 170 L'Espresso, available HTTP: http://espresso.repubblica.it/dettaglio-archivio/1077207. 97 Reference Text for Trainers BOX 13 Internet investigations by the US Immigration and Customs Enforcement (ICE) Operation Ocean Crossing – February 2005 The ICE discovered a trade network of counterfeit medicines originating from China and directed towards the US, the UK and other European nations. This trade was managed by a Chinese criminal organization that was linked to an American citizen. Three Chinese citizens operating in the province of Tianjin were arrested and the following was seized: more than 55,000 packages of counterfeit Viagra and Cialis, 75,000 loose pills, a device used to seal pharmaceutical packages and a significant amount of counterfeit trademarks bearing the Viagra inscription. In September 2005, a police operation was implemented in three facilities with in the region of Henanth were involved in the production of counterfeit drugs. This operation led to the arrest of eight Chinese citizens and the seizure of more than 222,000 pills of counterfeit Viagra, 70,000 loose pills, 260 kilograms of raw materials and 580,000 counterfeit Viagra trademarks. At the same time, U.S. authorities arrested a US citizen who subsequently pleaded guilty to the charge of importing counterfeit drugs. Onelinepillbox.com Investigations conducted by the ICE, the FDA and the Drug Enforcement Administration (DEA) led to the discovery of an Internet site, onlinepillbox.com, which offers regulated drugs and substances with out requiring a valid medical prescription. These substances were sent to US consumers through regular mail. It was later discovered that the delivered substances were unauthorized drugs from Thailand, the Philippines and Mexico. Source: US Immigration and Customs Enforcement (ICE), www.ice.gov BOX 14 Case study on auction sites March 2010 saw the eventual conviction of three men who defrauded buyers out of hundreds of thousands of pounds through the sale of counterfeit goods through eBay following investigations and raids in 2007 and 2008 by Sandwell Trading Standards. One of the men was jailed for 12 months and the other two were given suspended sentences and unpaid work in the community. The men were convicted under the Trade Marks Act 1994 for offences relating to the possession and sale of a range of counterfeit goods through the auction website. The goods included trainers, clothing, perfume, handbags and sunglasses and were being sold to consumers as genuine products. The men now face a Proceed of Crime Act hearing. Source: www.sandwell.gov.uk 5.1.7. Financial Investigations A financial investigation is a combination of the more traditional investigative techniques and those used by auditors for 3,000 years. What makes financial investigation any different from other techniques used by law enforcement? The reason for creating a paper trail is to enable someone to reconstruct what happened, to whom, and for the use of criminal investigators. Although much of an auditor’s time is spent reviewing financial documents, a substantial amount is devoted to interviewing people, asking questions about the records and about specific transactions. The links that exist between counterfeiting and organized crime today are proven and recognized at the international level. The potential and financial profits are becoming 98 Reference Text for Trainers more and more attractive.171 As a case in point, we may refer to the creation of companies operating with the sole purpose of laundering or reinvesting proceeds of crimes originating from the same criminal group or transferred to it from other criminal organizations for this purpose. In this context, counterfeiting represents a new investment opportunity. The counterfeiting enterprise also benefited from the already existing financial profits that were at the disposal of criminal groups rendering it a surprisingly flexible activity, capable of reacting quickly to variations in product demand and to enforcement controls. Channels and methods used for the introduction, trade and sale of other illicit products were also ready to be used for fake products. In Italy, for instance, in the territories where the Mafia-type organizations are stronger, they have been able to force legitimate shops to sell their counterfeit products as a substitute to extorting protection money from them. Counterfeiting and its huge economic potential are in the process of being fully exploited by organized crime. Following this assumption, there is no reason to replicate only luxury products since every product in the market can be replicated due to the modern technologies available. From medicines to toys, from spare parts to food and beverages, everything can be and is counterfeited. The rule of profit maximization is also at the basis of the search for the cheapest raw materials, which often involves using substandard, toxic or poisonous substances for a variety of products, turning them into real dangers for consumers’ health and safety.172 Two short examples are presented below showing how financial investigations can be successful. In July 2002, during the breaking up of an important network of luxury counterfeited trademarks in Southern Italy (specifically in Naples and Teramo), the Italian Guarda di Finanza discovered some significant money transfers between London and Naples, concerning revenues generated by the counterfeiting business. In December 2004, a counterfeiter’s network was broken up in Tours, France. Thirteen individuals were investigated; counterfeit trousers and shirts, equivalent to 25 cubic metres of fabric were seized. In addition, many bank accounts were frozen, some properties bought with ‘dirty money’ have been embargoed prior to forfeiture and huge sums of cash have been confiscated. 173 Counterfeiting is considered an easy and profitable investment yielding massive sums of ‘dirty money’ from the different types of trafficking involved. It is frequently just part of a much wider criminal portfolio and its participants cooperate with the other criminal organizations. According to ICE, partnerships between the public and private sectors may represent one of the strongest means to detect, deter, disrupt and deny criminal organizations illicit profits and material support required to fuel their evil acts. In the case study (Box 6) we provide an example of good practice on financial investigations and the possible vulnerabilities and red flag indicators of criminal activity are presented. The role of the private sector in countering counterfeiting is later analyzed in this manual. 171 172 173 UNICRI (2010), op.cit., p.33. UNICRI (2010), op.cit., p.34. Unions des Fabricants (2005), Rapport sur la contrefaçon et la criminalité organisée. 99 Reference Text for Trainers BOX 15 Case Study: Counterfeit of alcoholic drinks in Romania (use of shell companies, offshore centres – real estate investment) A and B are two companies working in the domain of alcoholic drinks (production and sale), whose associates and administrators are Romanian citizens. Company B designated as administrator a non-resident citizen from a Middle East country for 39 days. Police indicated that he was acting in Romania under 3 false identities and was member of a criminal network. The Romanian Financial Intelligence Unit (FIU) received information from the Border Police that company A exported to a Free Zone an important quantity of alcoholic drinks to be packed and labeled. The control noticed that the export documents mentioned that the merchandise was “alcohol”, but the product was packed and labeled in bottles specific to “Ballantyne’s Scotch Whisky”. According to company A’s representatives it was meant to be sold on the Romanian market. The tax police when controlling the headquarters of company B found that the invoices issued to company A were registered as being stolen and that the means of transport registered were not proper for transporting alcohol. It appeared that such “commercial operations” had been made by the two companies many times before. The loss to the state budget made by A company by not paying taxes was calculated at more than 8,300,000 lei (2,5 million US$). A few months after these transactions, C company (a Romanian company) became the beneficiary of an external loan for 12 million US$, the transfer being made by a bank situated in another offshore jurisdiction. The majority associates of that company is a foreign company registered in the second offshore jurisdiction (from where the money came), and the administrators of the company are the same Romanian citizens involved in A and B companies mentioned above. In this case, in order for company C to give its external transfer a legal aspect, company C and its non-resident associate made an external loan agreement registered at the Romanian National Bank, on the private debt. This facto would allow them to get a legal form for their further transfers with explanation “credit reimbursement”. The administrator of company C used these to buy more tourist resorts (hotels, boarding houses) in Romania. Source: Moneyval, Money laundering and counterfeiting, Typologies Report 2007-2008 100 Reference Text for Trainers 5.1.8 Use of Informants and other Special Investigative Techniques The use of informants is fundamental to investigative work. It is accompanied with the opportunity to receive clear intelligence about the activities of an individual or groups of people acting illegally. On occasion, it can also give rise to serious problems and abuses. Informants must be given clear and unambiguous instructions about what they can and cannot do. For this reason it is important to carry out a risk analysis before deploying an informant, not only for the safety of the individual concerned but for the organisation as a whole. This risk analysis should include an assessment of the motives of the informant. In some countries the regulations controlling the use of informants are stringently enforced and any deviation from them can lead to defendants subsequently being released and embarrassment being caused to law enforcement and industry.174 The generic term “informant” is often used by police and prosecutors to describe a wide variety of individuals who confidentially provide them with information concerning criminal activities175. The Black’s Law Dictionary, a legal resource for lawyers, defines an informant as “A person who informs or prefers an accusation against another, whom she/he suspects of the violation of some penal statute”. The testimony of witnesses must be considered with more caution than the testimony of others: for instance, a paid informer or a witness who has been promised that he/she will not be charged or prosecuted may have reason to make a false statement. Terms used to identify informants and methods of utilizing informants can differ drastically from region to region and within different agencies. The list provided below is reported by the American FBI Manual of Investigative Operations and Guidelines and concerns the factors considered in determining an individual’s suitability to be an informant176: 1. whether the person appears to be in a position to provide information concerning violations of law that are within the scope of authorized […] investigative activity 2. whether the individual is willing to voluntarily provide information 3. whether the individual appears to be directed by others to obtain information 4. whether there is anything in the individual’s background that would make him/her unfit for use an informant 5. whether the nature of the matter under investigation and the importance of the information being furnished outweigh the seriousness of any past or contemporaneous criminal activity of which the informant may be suspected 6. whether the motives of the informant in volunteering to assist the police appear to be reasonable and proper 7. whether the information that the informant can provide could be obtained in a more timely and effective manner through other sources or by a less intrusive means Interpol, Guide to IP crime and investigations, 2007, p.29. Fitzgerald D.G. (2007), Informants and undercover investigations: a practical guide to Law, Policy and Procedure, Taylor & Francis Group, New York, p.1. 176 Fitzgerald D.G. (2007), Informants and undercover investigations: a practical guide to Law, Policy and Procedure, Taylor & Francis Group, New York, pp. 4-5. 174 175 101 Reference Text for Trainers 8. whether the informant is sufficiently reliable and trustworthy, and whether there is an adequate means by which to verify his/her truthfulness 9. whether the individual appears to be willing to conform to the agency’s rules regarding his/her operation 10. whether the police will be able to adequately monitor and control the activities of the informant 11. whether the use of the informant could compromise an investigation or subsequent prosecution that may require the government to move for a dismissal of the case. With organized crime the informants can be particularly difficult to control, though they are most of times essential for the investigators’ job. One of the responsibilities of the analysts (investigator) is to corroborate an informant’s information (by checking on whether it is substantiated by other intelligence) and to determine the informant’s reliability. The following terminology states a scale of reliability for the informants:177 Reliable - no doubt of the person's authenticity; past information reliable in all instances Usually Reliable - some doubt, but past information has been reliable in most instances Fairly Reliable -- some doubt, but past information has been reliable on average Not usually Reliable - there is doubt, and past information has only been reliable on occasion Unreliable - there is great doubt; past experience has proven it to be unreliable but that doesn't mean that this piece of info now is not reliable. Wiretapping represents a more adequate response to the complexity and transnational nature of criminal activities and criminal trafficking, often supporting the possibility to achieve a "mapping" of criminals behind this illegal phenomenon. It is also important to highlight the importance of controlling data communication, since in several operations conducted it has been shown that the heads of criminal organizations made extensive use of the VoIP (Voice over Internet Protocol), and in particular of Skype, for their communications. A variety of measures can also be used in the fight against counterfeiting in terms of assets’ control. These measures are aimed at identifying the criminal turnover and profits, analyzing the suspects’ movable and immovable properties, money, and values for which a preventive seizure can be proposed to the Competent Authority, in view of the possible adoption of further measures178. Furthermore, where the illegal proceeds were not subject to the previously mentioned penal measures, it is always possible, and appropriate, to proceed with controls on tax evasion. In particular, this activity must be primarily aimed at detecting and targeting the evasive behaviour put in place by natural/legal persons involved in different phases of the production of illicit products, APS University, professor Tom O’Connor website, available HTTP: www1.apsu.edu/oconnort/3220/3220lect07a.htm 178 For instance, confiscation, also in case of disproportion of the assets if compared to the declared income (in some countries). 177 102 Reference Text for Trainers often identified by the omission of tax records or the issue of documents for nonexistent transactions. For a more in-depth analysis of assets recovery see also paragraph 6.2.5. 5.1.9 Confiscation and Management of Confiscated Counterfeit Products The principle behind forfeiture is ancient and is commonly regarded as a logical and fair response to its detractors: the criminal. The criminal cannot keep the fruits of his/ her crime, nor can the instruments or tools used to commit the crime be allowed to stay in criminal hands. Forfeiture is the legal process by which the government may confiscate those items.179 In respect of the involvement of organized crime in counterfeiting offences, the Convention against Transnational Organized Crime (a.k.a. Palermo Convention)180 defines the guidelines both for seizures of goods and for the management of confiscated goods/crime seized proceeds. Art. 12 – Confiscation and seizure “1. States Parties shall adopt, to the greatest extent possible within their domestic legal systems, such measures as may be necessary to enable confiscation of: (a) Proceeds of crime derived from offences covered by this Convention or property the value of which corresponds to that of such proceeds; (b) Property, equipment or other instrumentalities used in or destined for use in offences covered by this Convention. 2. States Parties shall adopt such measures as may be necessary to enable the identification, tracing, freezing or seizure of any item referred to in paragraph 1 of this article for the purpose of eventual confiscation. 3. If proceeds of crime have been transformed or converted, in part or in full, into other property, such property shall be liable to the measures referred to in this article instead of the proceeds. 4. If proceeds of crime have been intermingled with property acquired from legitimate sources, such property shall, without prejudice to any powers relating to freezing or seizure, be liable to confiscation up to the assessed value of the intermingled proceeds. 5. Income or other benefits derived from proceeds of crime, from property into which proceeds of crime have been transformed or converted or from property with which proceeds of crime have been intermingled shall also be liable to the measures referred to in this article, in the same manner and to the same extent as proceeds of crime. 6. For the purposes of this article and article 13 of this Convention, each State Party shall empower its courts or other competent authorities to order that bank, financial or commercial records be made available or be seized. States Parties shall not decline to act under the provisions of this paragraph on the ground of bank secrecy. 7. States Parties may consider the possibility of requiring that an offender demonstrate the lawful origin of alleged proceeds of crime or other property liable to confiscation, to 179 Schott P.A. (2006), Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism, World Bank, Washington D.C. 180 To download the full text of the Palermo Convention please visit: http://www.unodc.org/unodc/en/treaties/CTOC/index.html#Fulltext 103 Reference Text for Trainers the extent that such a requirement is consistent with the principles of their domestic law and with the nature of the judicial and other proceedings. 8. The provisions of this article shall not be construed to prejudice the rights of bona fide third parties. 9. Nothing contained in this article shall affect the principle that the measures to which it refers shall be defined and implemented in accordance with and subject to the provisions of the domestic law of a State Party.” Art. 14 - Disposal of confiscated proceeds of crime or property 1. Proceeds of crime or property confiscated by a State Party pursuant to articles 12 or 13, paragraph 1, of this Convention shall be disposed of by that State Party in accordance with its domestic law and administrative procedures. 2. When acting on the request made by another State Party in accordance with article 13 of this Convention, States Parties shall, to the extent permitted by domestic law and if so requested, give priority consideration to returning the confiscated proceeds of crime or property to the requesting State Party so that it can give compensation to the victims of the crime or return such proceeds of crime or property to their legitimate owners. 3. When acting on the request made by another State Party in accordance with articles 12 and 13 of this Convention, a State Party may give special consideration to concluding agreements or arrangements on: (a) Contributing the value of such proceeds of crime or property or funds derived from the sale of such proceeds of crime or property or a part thereof to the account designated in accordance with article 30, paragraph 2 (c), of this Convention and to intergovernmental bodies specializing in the fight against organized crime; (b) Sharing with other States Parties, on a regular or case-by-case basis, such proceeds of crime or property, or funds derived from the sale of such proceeds of crime or property, in accordance with its domestic law or administrative procedures. Corrective measures involving counterfeit goods181 Recall from the market, definitive removal and/or destruction of counterfeit goods are the corrective measures contemplated by the EU Directive on the Civil Enforcement of Intellectual Property Rights (IPRED) as remedies in the cases of IPR infringement. However, as highlighted by the EU Counterfeiting and Piracy Observatory, even if all EU Member States have adopted these remedies, “it is unclear in certain member states from whom the infringing products may be recalled/removed”.182 This is due to “the scarcity of precedents/relevant court cases”. For instance, in many countries it is not specified if the costs for removing and destroying the infringing goods must be borne by the infringer, the IPR holder or the state. The general principles of these corrective measures are explained below. 1. Destruction of counterfeit goods: 181 Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in the EU: report on best practices (unpublished version) 182 See EU Counterfeiting and Piracy Observatory, Corrective Measures in IPR infringements, p. 1. It can be downloaded here: http://ec.europa.eu/internal_market/iprenforcement/observatory/index_en.htm. 104 Reference Text for Trainers According to IPRED, destruction of goods infringing IPR should be the general principle. Goods have to be destroyed in order to avoid to the infringer advantages for his/her activity: they should not be able to distribute counterfeit products on the market after removing the infringing items (e.g. trademarks or brands or logos). As mentioned before, it is not clear by whom the destruction costs must be borne: in principle, in civil proceedings, costs must be paid by the infringer: they are borne by the right owner, who must be reimbursed by the infringer. In criminal proceedings, destruction is usually performed by state officials, mainly by the police, and the destruction costs are borne by the State. However, practices vary country by country: in Greece the costs of destruction are borne by the State, whereas storage costs are paid by right holders. In Belgium, Luxembourg and the Netherlands the destruction of goods is deemed to be a penalty and can only be imposed on a defendant who has been convicted. 2. Secondary use of counterfeit goods: Even if destruction of counterfeit goods should be the general rule, sometimes a secondary use of fakes is also allowed. After removing the infringing items (e.g. brands, trademarks, logos, etc), goods could be donated to charities, recycled or reused. Some precedents exist: counterfeit goods can be reused in Estonia, Denmark, Germany, Hungary, Italy, Portugal, Romania, Sweden and UK. In Denmark, Germany, Hungary and UK the secondary use is not allowed in customs proceedings. In Finland the secondary use appears to be the general rule, when destruction is ordered only recycling can be implemented. In some countries, on the contrary, the secondary use is prohibited: France, Greece, Latvia, Belgium, Netherlands and Slovenia. In Poland “secondary use of goods is not explicitly mentioned as a remedy available to the plaintiff in civil proceedings”. 3. Definitive removal of counterfeit goods from commercial channels In order to be destroyed and/or reused, counterfeit goods and other products infringing IPR must be firstly removed from commercial channels. Compared to market recall, which is a temporary measure, the removal of counterfeit goods from the market is definitive and aimed at the destruction of the goods. As noted by the EU Counterfeiting and Piracy Observatory, the removal of products from the commerce is necessary, “otherwise only the infringing products already seized or still present at the infringer’s premises […] would in the end, be destroyed”. As we have seen earlier, this practice is implemented differently according to differences in national legislations. For instance, it is unclear if goods must be removed only if they are still in the hands of the infringer, if the measure can also be put in place when products are already in commerce, when distributed by wholesalers and retailers or even possessed by customers/consumers/end-users. In many countries, when goods are already in commerce or in the hands of consumers, it is no more than an obligation for the infringer to inform all his/her customers notifying them of the infringement, and offering them the possibility to sell back the fakes (e.g. in the Netherlands) and/or to give back goods to the infringer at their own expense (e.g. Germany). In other countries, such as in UK, if the court orders the destruction of goods (and their removal from the market), this order applies irrespectively, no matter who holds the product. 4. Recall of counterfeit goods from commercial channels 105 Reference Text for Trainers Different from the definitive removal, recalls of counterfeit goods from the market must be considered temporary or precautionary measures: this implies that the recall can be reversed or the goods can be marketed again after the IPR attached to the goods expires. However, as noted by the EU Counterfeiting and Piracy Observatory, “this interpretation seems to be inconsistent with the deterrence purpose of these measures, since it would give the infringers the possibility of retaining at least a part of the economic benefit coming from their infringing activity”, enabling them to wait for the expiration of the IPR with no consequences for its counterfeiting activity. 5.1.10 Inter-sectorial Cooperation between Customs and Police Services and International Collaborators Inter-sectorial cooperation In order to optimize the available police resources within the territory and offering to the consumers a better security service related to the IP crimes, it should be necessary that the specific coordination protocols existing between Law Enforcers, Customs authorities etc. include specific agreements concerning the following issues:183 - Information exchange, in order to obtain an accurate analysis of the situation concerning these kinds of crime, aimed at promoting the corresponding policies and police operation. - Development and integration of databases. With respect to the existing laws related to data protection, the development and implementation of specific databases of persons, companies, and all the information linked to these crime activities, both for statistical aims and for understanding, for a better knowledge of piracy/counterfeiting organized networks’ modus operandi within a country. This could really represent a step forward in countering counterfeiting and piracy. (see also par. B.2.1) - Participation by the Local Police to the juridical police offices. Most certainly, there can be no efficient enforcement of IPR without appropriate cooperation among the various institutions having competencies on IP matters. In Czech Republic184, cooperation between the state administration authorities in the area of IPR enforcement proceeds in two platforms. One was established in July 1997, when an agreement between four state administration authorities was signed. Gradually, the necessity of cooperation with other subjects arose, which is why eight state authorities in total cooperate within the framework of the agreement. Another platform of the cooperation is an interdepartmental advisory committee for the abatement of IPR infringement of the Ministry of Industry and Trade. Presently the “Agreement of Cooperation” is composed by the following eight state administration authorities: - the Czech Commercial Inspection - the Police of the Czech Republic - the Industrial Property Office 183 Ministerio de Cultura de España (2008), Manual de buenas practicas para la prosecución de los delitos contra la propiedad intelectual ELSO Group (2007), Enforcement of Intellectual Property Rights. Teaching Materials, volume I, book II, Czech Republic. 184 106 Reference Text for Trainers - the Ministry of Finance – General Customs Directorate - the Ministry of Industry and Trade – department of Trade Licensing - the Ministry of Finance – Central Financial and Tax Directorate - the Ministry of Culture - the State Agricultural and Food Inspection The set of measures adopted is as follows: media policy area; area of education; analytical area; technical and organizational area; area of legislation; interdepartmental cooperation area and international cooperation area. It is important to mention that the Czech Commercial Inspection started its activities in the field of the abatement of IPR infringement in 1994, when approached by the Police of Czech Republic with a request of assistance in this area. The COI conducted inspection purchases for the police, and its inspection protocol provided the foundation for the commencing of criminal proceedings (see par. 5.2.1). In 2000, after the amendments to Consumer Protection Act and Act on the Czech Commercial Inspection the COI became an inspection authority with competencies to abate the rights infringements using statutory means. Another important field of cooperation is between the COI (Czech Commercial Inspection) and NGOs, such as the International Federation of the Phonographic Industry (FPI) and the Czech Anti-Piracy Union (CPU) and with the right owners. A comprehensive information system was created for all persons and institutions participating in the abatement of IPRS infringement; it is available since the 2004 at the internet site www.dusevnivlastnictvi.cz. At the European level, a significant progress in this direction was achieved by the Council Act of 28 November 2002, with a Protocol amending the Europol Convention. The Protocol stipulates that Europol can ask the competent authorities of Member States to initiate conduct or coordinate criminal investigations in specific cases. If the competent authorities decide not to positively respond to this request, they shall inform Europol of their decision unless it has to be kept confidential for reasons related to national security or for the success of other ongoing investigations. The Protocol also provides for the inclusion in the Europol Convention of an article regarding the participation of Europol officials in joint investigation teams if they are investigating crimes falling within the Europol competence. The cooperation possibilities contemplated by the creation of joint investigative teams are potentially highly innovative. Joint and common investigations carried out by different countries imply in fact that they should be valid and enforceable by the courts of all countries taking part in the investigation. The creation of joint investigative teams can be performed under specific conditions: - They must arise from complex investigations conducted by a Member State but having repercussions in other countries of the European Union; - They must investigate crimes that require coordinated action with the participation of more than one Member State. Investigation teams will be headed by a representative of the competent Member State in which the team operates and will operate in accordance with the law of the Member State in which the team is intended to conduct its operations. Furthermore they will be created only with the mutual agreement of the Member States concerned, for a specific purpose and for a limited period extendable only with the agreement of all the parties. 107 Reference Text for Trainers Another instrument at the European level is the Supplementary Information Request at the National Entries (SI.RE.NE) and is a link service ensuring a continuous assistance, 24h per day, for the police forces of EU Member countries. This is one of the so called "compensation mechanisms” adopted by the EU to balance the effects of the free movement of persons and vehicles, since in the Schengen no internal border controls are usually foreseen. The SI.RE.NE offices are a unique point of contact, where representatives of all the National authorities related to the Schengen Information System operate. Their main task is the analysis of "reports" included in the Schengen Information System (SIS) and the implementation of specific monitoring measures. They also play a key role in crossborder police cooperation. In particular, these offices provide additional information for the alerts, coordinate the measures related to alerts in the SIS, and ensure that appropriate measures are taken in different cases, for instance: if a wanted person is arrested, if a person who had already been refused entry attempts to enter the Schengen area, if a missing person is found or a stolen car or ID document are seized. EUROJUST is an agency of the European Union dealing with judicial co-operation. It is composed of national prosecutors, magistrates or police officers of equivalent competence from each of the EU states. Its task is to enhance the effectiveness of the national authorities when they are dealing with the investigation and prosecution of cross-border and organised crime. The Southeast Cooperative Initiative, SECI Center, is an operational regional organization bringing together police and customs authorities from 13 member countries in Southeast Europe. The Center supports the national customs and law enforcement agencies by offering a trusty environment for information sharing, knowledge development, joint planning and common action in the field of trans-border crime. Member States of SECI Center are: Albania, Bosnia and Herzegovina, Bulgaria, Croatia, Greece, Hungary, F.Y.R. of Macedonia, Moldova, Montenegro, Romania, Serbia, Slovenia and Turkey. The SECI Center's network is composed of the Liaison Officers of Police and Customs Authorities from the member countries, supported by 13 National Focal Points established in each member state. The NFP representatives stay in permanent contact with the liaison officers in the headquarters and keep close relationships with the police and customs authority in the host country. The National Focal Points assure the rapid information flow, by collecting and distributing the information requests and answers from and to the law enforcement agencies and the headquarters liaison officers. The SECI Center will transform into SELEC - Southeast European Law Enforcement Center - once two thirds of the Member States have deposited their instruments of ratification of the Convention of SELEC signed on the 9th December 2009, during a ceremony organized in Bucharest, Romania, together with celebrating 10 years of the SECI Center185. International Collaborations186 Counterfeiting is a transnational crime, since counterfeit goods are often produced in countries other than the ones where they are purchased and consumed. Counterfeit 185 For a more in-depth analysis of SECI Center’s activities: http://www.secicenter.org/m105/Home 108 Reference Text for Trainers goods are often transported across borders, thus involving different customs and border authorities. For these reasons, international collaborations musts to be properly set up and promoted in order to combat counterfeiting. We itemise in the following paragraphs some of the most important International agreements signed during recent years and some police/customs operations carried out at the international level. International Agreements 1. The EU-US Action Strategy for the Enforcement of IPR was adopted at the EUUSA Summit held in Vienna on 21st June 2006. This Action Strategy has three main goals: 1) promote enforcement of related laws by customs and border control officials, 2) strengthen cooperation among the parties, 3) promote publicprivate partnerships. 2. In order to achieve the first goal, the Action Strategy introduces measures such as the exchange of IPR border enforcement practices and experiences, as well as the exchange of information on IPR seizures and the introduction of a joint IPR border enforcement action. As far as the second goal is concerned, bilateral networks with third countries have been created, in primis with China and Russia. Such networks facilitate the exchange of information, technical assistance and joint industrial practices related to the enforcement of relevant laws. With regard to the third goal, joint public-private discussions have been organised and representatives from various business sectors have been invited to exchange information and intelligence with law enforcement agencies. 3. The EU-China Project on the protection of the IPR, launched in 2007, defines which technical assistance shall be provided by EU to China with regards to the enforcement of China’s IPR regulation. Such technical assistance includes: 1) the training of custom officers ; 2) the exchange of expertise, best practices and know-how; 3) cooperation between a network of authorities, including Chinese and European right holders and other stakeholders; and 4) techniques for a more effective enforcement of IPR regulations. 4. This agreement should increase the level of trust in future EU-China trade relationships. 5. According to the Agreement on Trade, Development and Co-operation between the European Community and its Member States and the Republic of South Africa, which entered in force on 1st January 2000, the Community may provide technical assistance to South Africa in the preparation of laws and regulations for protection of IPR; the establishment and reinforcement of domestic offices and other agencies involved in enforcement and protection, including the training of personnel. 6. According to the Framework Trade and Co-operation Agreement between the European Community, its Member States and Korea, which entered in force on 1st April 2001, parties should respect the obligations contained in multilateral IPR conventions, integrate the TRIPS within their national legislation and facilitate cooperation between customs authorities. 186 Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in the EU: report on best practices (unpublished version) 109 Reference Text for Trainers International Operations 1. The Joint Customs Operation “Infrastructure”, carried out in November/December 2007, was the first IPR enforcement operation undertaken by Customs and Border Protection (CBP) and the European Union. It created a close relationship between European Union and United States customs reinforcing the EU-US Action Strategy for the Enforcement of Intellectual Property Rights. The operation consisted of cooperation and the exchange of information, concerning counterfeit goods, between EU and US customs. This action strategy was implemented especially for the seizure of counterfeit integrated circuits and computer networking equipment. In all, over 360,000 counterfeited integrated circuits bearing over 40 different trademarks were seized. These kinds of goods were chosen for the strategy because they have an IPR infringement risk and also a high safety risk. 2. Joint Customs Operation “Diabolo II”. The Asia-Europe Meeting (ASEM) is a form of informal cooperation between Asia and Europe which started in 1996. Many initiatives have been suggested to strengthen relationship between these two continents in the fight against counterfeit goods. One of the objectives of ASEM partners is to increase customs cooperation. During the 7th meeting, held in Yokohama in November 2007, it was decided to implement operation “DIABOLO II”. This operation was signed by all 27 EU Member States and 13 Asian countries (Burma/Myanmar, Cambodia, Indonesia, Japan, Laos, Malaysia Mongolia, Pakistan, the Philippines, Singapore, Republic of Korea, Thailand, and Vietnam). DIABOLO II was organised and coordinated by the European Commission. The operation focused on containers shipped from Asian ports of loading to EU ports of discharge. Each country appointed a national contact point which was responsible for the gathering of national data and its transmission to other countries, ensuring its confidentiality. This operation, focused mainly on counterfeited cigarettes but also on other products, leading to the seizure of more than 65 million counterfeited cigarettes and 369,000 other counterfeited items, bearing over 20 different trademarks. 3. Operation “Mamba” Operation “MAMBA” is the first combined INTERPOL and WHO (World Health Organization) operation targeting counterfeit pharmaceutical products. The operation was carried out by the WHO’s International Medical Products AntiCounterfeiting Taskforce (IMPACT). The aim of IMPACT is to raise awareness of the dangers of counterfeit medical products and to curb their manufacture and distribution. In many countries, especially in Africa, counterfeit medical products (such as fake anti-malarial drugs) represent a big problem. Operation Mamba is deployed in Uganda and Tanzania. In this Operation multiple law enforcement agencies (police, drugs and financial crime authorities) joined forces to confiscate counterfeit medicines. INTERPOL and IMPACT organized a two-day training course in each country on methods and procedures of anti-counterfeiting, to support cross-agency efforts to combat transnational organized criminals who manufacture and distribute counterfeit medical products throughout Africa. An investigative guide produced by the Permanent Forum on International Pharmaceutical Crime was also distributed. 4. Operation Matthew II 110 Reference Text for Trainers The Joint Customs Operation, code-named Matthew II, was aimed at detecting the smuggling of cigarettes in commercial consignments entering the EU by road. The operational phase took place from 24 November to 3 December 2009 and large seizures of cigarettes carried in personal cars and buses were reported. Controls were focused on methods of transport entering the EU customs territory from third countries via the eastern EU border. The operation was organised by the Czech Republic, in close cooperation with Poland and the European Commission (OLAF) which provided organizational and technical support. All Member States were invited to participate in the JCO Matthew II, as were Europol and the WCO/RILO WE (World Customs Organization / Regional Intelligence Liaison Office for Western Europe). The WCO/RILO WE supported the joint operation by means of analytical activity. Selected non-EU Member States (Croatia, Russia, Serbia, Norway and Switzerland) were also invited to participate in this operation. The Operation has led to the seizure of more than 16 million cigarettes, 241 kilograms of tobacco products, 6 400 litres of alcohol, 20 tonnes of counterfeit perfumes, 53.418 other counterfeit items such as bags, coats, scarves, wallets, and 1.515,75 kilograms of cannabis. During the operational phase, additional seizures of more than 25 million cigarettes also took place in some EU ports. 5.2. Prosecution. Legal Proceedings 5.2.1 Jurisdiction in Case of Counterfeiting: Criminal or Civil Case Criminal procedure For both trademark counterfeiting and copyright piracy, anyone (regardless of whether they have been injured or not) may file a criminal complaint describing the alleged criminal conduct of another person and requesting the prosecutor or police to initiate criminal proceedings. Also, the police or customs may initiate criminal proceedings when they discover criminal activity.187 The task of the courts in the criminal proceedings is to decide the guilt of the accused person and to inflict punishments specified by law and/or order other measures. The purpose of the criminal proceedings is to detect a criminal act by a lawful procedure, establish its perpetrator, investigate a deed that accomplishes the criminal law of substance and bring the offender before the court which will decide the issue of his/her guilt or innocence. If the court finds the offender guilty, it shall impose a penalty or a protective measure on him/her, or it shall refrain from punishment, and then shall execute the penalty or the protective measure, if these were imposed. From the view point of enforcement of the IPR, the courts have the competence in the criminal proceedings in case of the below said criminal acts. - Criminal act of infringement of rights to trademark and other sign (section 268, Penal Code) - Criminal act of infringement of protected industrial property rights (section 269, Penal Code) The International Trademark Association (INTA) (2010), Criminal Prosecution of Counterfeiting and Piracy in Member States of the European Union, September, pp 73-75. 187 111 Reference Text for Trainers - Criminal act of infringement of copyright, rights related to copyright and database rights (section 270, Penal Code) - Criminal act of falsification and imitation of a work of fine art (section 271, Penal Code)188 Civil procedures “The task of the courts in the civil proceedings is to decide on the rights, obligations and law-protected interests of natural and legal persons and the state. The private-law nature of the intellectual property is reflected in the fact that in all cases of infringement of the intellectual property rights, civil proceedings may be initiated upon the motion (action) made by entitled, i.e. actively legitimated, person. Several fundamental rights may be sought through a civil action” 189. In civil procedure the following rights are foreseen190: - Negatory Right - Right to Elimination of Consequences or Desctruction of Goods - Right to Information - Right to Satisfaction - Right to Compensation - Right to Surrender of Unjust Enrichment - Declaratory Action 5.2.2 Main proceedings 188 Ibid. 189 ELSO group (2007), Enforcement of Intellectual Property Rights. Teaching materials, Volume II, Book II, Czech Republic, pp. 11 190 For a more in-depth analysis see ELSO (2007), pp.11-16. 112 Reference Text for Trainers BOX 16 Good practice in Poland on counterfeit medicines-related preparatory proceedings In order to eliminate the phenomenon of counterfeit medicinal products, we should concentrate above all on fighting illegal trade in these products. One of extraordinary meetings of the CMP Team in 2008 was devoted to the problem of illegal trade in medicinal products in sex shops. As a result of decisions made during the meeting, shops previously selected by the Police have been controlled. The control was conducted by police officers in cooperation with pharmaceutical inspectors from Provincial Pharmaceutical Inspectorates and with sanitary inspectors. Within the framework of the operation (conducted simultaneously in seven voivodships) 1 fitness club and 68 sex shops were controlled. In these places, numerous cases of trade in medicinal products (in one place 400 packages of medicinal products used for treating erectile dysfunction were confiscated) and in medicinal products unauthorized for marketing (containing yohimbine) were detected and numerous dietary supplements were called into question. According to the data as of December 2008, out of 14 preparatory proceedings 3 were dismissed (due to the lack of statutory features of a prohibited act or due to insignificant social noxiousness of an act) and 2 proceedings were suspended (due to extended time needed to obtain an expert’s opinion). Three cases were handed over to a Regional Prosecutor’s Office with a motion for the approval of bills of indictment. The remaining preparatory proceedings are in progress. Similar operations were repeated in 2009. As a result of these operations, 22 preparatory proceedings were instituted. In 6 of these proceedings charges have already been brought and 2 of them have ended with bringing bills of indictment. In five cases proceedings were dismissed, while in 11 remaining cases proceedings are in progress.In three cases sanitary inspectors imposed fines. Source: Team for Counteracting Infringement of Copyright and Related Rights (2009), Special Report 5.2.3 Bringing Evidence into Court Existing practices in the U.K. 191 The general principle with criminal proceedings within the United Kingdom is that a witness should give evidence orally in a court of law or, as an alternative, a written statement. In advance of any trial, a prosecutor must disclose the existence of the statement identifying the counterfeit goods to the defence. The defence can request for a copy of the statement and of any test results based on experts’ findings on the counterfeit goods. A clear and concise expert’s statement can contribute greatly towards encouraging a ‘guilty’ plea; while any contradictions in such statements will encourage the evidence to be contested and/or enter for a ‘not guilty’ plea. A witness bringing evidence into court must primarily give details regarding her/his qualifications and her/his appropriate experience. Furthermore, her/his statement should 191 The source of this paragraph is The Anti-Counterfeiting Group (seventh revision, April 2010), ACG guidance note. Guidelines for Witnesses in Counterfeiting, based upon the Criminal Procedure Rules 2010, effective from 5 April 2010. 113 Reference Text for Trainers give details on the literature or other information used by or provided in reaching a particular opinion. For instance, she/he can declare if the trademark owner has a manual for identifying counterfeit goods. All information given must be proven to have substance. The expert witness should provide the information received that led to the preparation of the report/witness statement. The witness must prove that the trademark is officially registered. The integrity of the counterfeits’ sample plays a pivotal role in the trial. It is also necessary to identify when the sample was received. It is preferred not to identify any individual involved. Anyone who makes a statement, whether within the UK or abroad may be called to give evidence in person at court. It is the witness’ responsibility to attend court, even if the arranged time is inconvenient. The witness should describe the sample, by stating the points of difference between the genuine and the counterfeit item. It may be relevant in some cases to exhibit a genuine product to compare against the counterfeit version. 5.2.4 The Prosecutor’s Role in the Criminal Case The basic role and function of prosecutors vary considerably among legal systems, particularly with the civil law system and the common law system. The role that prosecutors may can vary significantly in the pre-trial phase – during the actual investigation of a crime.192 In inquisitorial systems, as in Italy, ‘the prosecutor is duty bound to begin investigations immediately on receipt of a notitia criminis, that is, as soon as she/he is aware of the possible commission of a criminal offence. If, after investigation, the Prosecutor considers that there is sufficient evidence to prosecute, she/he is legally bound to prosecute. Yet she/he does not enjoy any discretionary power. Though, discretionary power exists in other civil law countries such as in France and Belgium, it is tightly controlled within the UK. As emphasised in the preamble of the United Nations Guidelines on the Role of the Prosecutors, it is essential for States ‘to ensure that prosecutors possess the professional qualifications required for the accomplished of their functions, through improved methods of recruitment and legal professional training, and through the provision of all necessary means for the proper performance of their role in combating criminality, particularly in its new forms and dimensions’193. The UN guidelines include several paragraphs, which stress the importance of the role of the prosecutor in maintaining the rule of law and criminal justice. Prosecutors shall perform an active role in criminal proceedings. Responsibilities include: institution of prosecution; when authorized by law or consistent with local practice, in the investigation of crime, supervision over the legality of these investigations; supervision of the execution of court decision and the exercise of other functions as representatives of the public interest. In Czech Republic, the Act. No. 283/1993 Coll. on the Public Prosecutor’s Office came into force on 1st January 1994. During its preparation, various models of conception of the position of the prosecution, or the newly established public prosecutor’s office, within the system of state bodies, were referred to. Most often it was suggested that the public 192 104 UNICRI & UNODC, Investigation, prosecution and adjudication of drug – related cases (200?), pp.102- 193 United Nations, Guidelines on the Role of the Prosecutors, Adopted by the Eight United Nations Congress on the Prevention of Crime and Treatment of Offenders, Havana, Cuba, 27 August to September 1990 114 Reference Text for Trainers prosecutor’s office form separate system of state authorities designed to represent the state in cases defined by law. However, an opinion was put through politically, that the public prosecutor’s offices should be arranged as a part of the executive power, within the framework of the Ministry of Justice.194 Existing practices in Romania For Romania, a central role in ensuring the proper enforcement of IPR and coordination of the various institutions in this field was recently entrusted to the General Prosecutors Office (GPO)195, a department of the Public Ministry196. According to the Romanian Constitution the Public Ministry functions under the Minister of Justice’s (MoJ) authority. It should be clearly stated that the MoJ retains no authority over cases but only has a coordinating role. According to the legal provisions, upon proposal of the general prosecutor the MoJ, set up, by Order 412/2006 a specialized IPR unit, within the GPO. The unit is composed of 10 prosecutors specializing in IP crime and organized in two tiers: − Operative sub-unit: prosecutors effectively working on IPR cases − Studies sub-unit: prosecutors centralizing data countrywide, studying the process of investigation of IPR cases, drafting analyses and disseminating them in the country, for the appropriate, unified and efficient enforcement of IPR. This structure acts as a central hub for coordinating the other institutions. Its responsibilities include: centralizing the relevant data needed for the enforcement of IPR from the other institutions and private entities; coordinating the development of activities of the Prosecutor’s Office and all prosecutors within Romania (including resources and training); monitoring the implementation of the National Strategy - Action Plan; organizing meetings to optimize the working methods and establishing best solutions to streamline the legislation and its implementation; and ensuring communication and cooperation between Government institutions and anti piracy/counterfeiting groups. Another important measure includes the appointment in each prosecutor’s office attached to tribunals of at least one prosecutor to deal with IP cases. Special training programmes are designed and organised for these prosecutors. This measure is taken according to the Action Plan. It should be regarded as bringing the penal IP cases up to the level of tribunals and prosecutors offices. Furthermore, it reflects the growing importance now placed upon IP crime. Government Emergency Ordinance n. 190/2005 includes provisions to increase efficiency in prosecuting offences against IPR: 1. IPR offences are prosecuted ex officio and the possibility of amiable settlement of criminal litigation has been eliminated 2. IPR offences are under the jurisdiction of tribunals 194 ELSO (2007), p. 27. 195 The General Prosecutors Office is officially named the Prosecutors Office attached to the High Court of Cassation and Justice and is the central prosecutorial structure that coordinates the other prosecutors’ offices countrywide. The GPO and the rest of prosecutors offices, which function attached to the courts, form the Public Ministry 196 WIPO, Advisory Committee on Enforcement, Romanian efforts to improve awareness of decision makers and public on issues related to the enforcement of intellectual property rights (2006), p.6 115 Reference Text for Trainers 3. IPR offences are investigated by more experienced prosecutors at the level of county offices (minimum 4 years length of service) 4. IPR offences related to organized crime are investigated by the specialized department within the Prosecutors’ Office attached to the High Court of Cassation and Justice197 6.2.5 Asset Recovery Asset recovery is a very recent field of international activity in countering a variety of crimes. It involves an efficient and effective criminal justice system, sound preventive policies, and transparent financial regulations. The high priority given to asset recovery initiated numerous international initiatives. Examples include the StAR (the Stolen Asset Recovery Initiative), the ADB/OECD AntiCorruption Initiative for Asia and Pacific, the International Centre for Asset Recovery (ICAR) at the Basel Institute on Governance, U4 Anti-Corruption Resource Centre and other entities. Article 6 and article 12 of the UN Convention on Transnational Organized Crime (the Palermo Convention) deal with such areas, particularly on the criminalization of the laundering of proceed of crime and the confiscation and seizure of those proceeds of crime. Asset recovery is relevant in cases of seizure or forfeiture of counterfeit goods. Recovered assets and proceeds of illegal counterfeiting activities may be used in order to compensate the material (and moral) damages of the victims. Existing good practices in EU Some EU countries’ internal laws already possess such measures. - In Austria, for the civil remedies and in particular the proceedings on merits, “(b) in case of negligence, the payment of damages – including lost of profits and moral damages – or the handing over of any asset made by the infringement” is foreseen. - In Belgium, the civil measures adopted only deal with the seizure of counterfeit goods during the preliminary proceedings. Proceeds generated by illegal activity, personal or real goods of the suspected infringer and the freezing of the infringers’ bank account. As far as the damages within the proceedings on merits concern: “(c) the confiscation of all profits made by the unauthorized use of registered trademark” is stated. - In Estonia, civil law holders may claim compensation for damages, whether material or moral. Material damages may include damage to assets and loss of profits. - In the Czech Republic, within the proceedings on merit, the removal action and destruction of infringing goods can occur. The court can consider the profits obtained through the violation of the law in order to calculate damages. Assets recovery measures are taken into consideration by the national laws mainly within the civil remedies, as mentioned previously. The shortage of juridical measures concerning this challenging matter can be regarded as a gap in the national and 197 Ibid, p.16 116 Reference Text for Trainers European legislative framework. An important step forward should involve both single States and the EU as a whole. Furthermore, applied research in this field may play a significant role. 5.3. The Role of Private Sector 5.3.1 Experience Exchange and Knowledge Sharing and Cooperation with the Private Sector in Terms of Information-Exchange Prosecutions of IP crime depend on the cooperation between IP owners and law enforcement. Without the sharing of information, prosecutors can neither determine the most effective overall enforcement strategies, nor meet the burden of proof in a given case. The Canadian IP council – is a Canadian business coalition designed to provide a central voice to press for stronger IP protection both in Canada and worldwide. They suggest the following steps for private sector collaboration with law enforcements198: - Conduct a thorough investigation: investigations encompass a variety of investigative steps including interviewing witnesses, acquiring counterfeit goods, conducting surveillance of suspects as well as an examination of computers and other services - Document all investigative steps: maintain a record of investigative steps employed (to be presented to law enforcement and entered into evidence) - Preservation of evidence - Contact law enforcement agencies without delay: early referral is the best way to ensure that all investigative avenues are fully explored - Assist in the identification of stolen IP: law enforcement may call upon an owner’s representative or expert to examine items obtained during an investigation to determine their origin or authenticity […] in certain investigation LEA may wish to have an intellectual property owner present during the execution of a search warrant to help agents identify specific items to be seized. - Share the results of internal investigations or civil lawsuits with law enforcement - Participate in law enforcement task forces - Help train law enforcement authorities - Registering IP by ‘private sector’: the resources of law enforcement and customs are limited; the private sector should provide them as much information as possible. They also have to designate a central point of contact (an individual or a group) which Customs can work with, to deal with the counterfeiting problem. - Help Customs to be helped by them: providing customs with tools, like a dedicated email address for them to send in info or request; a secure webpage; a reference manual etc. 198 The Canadian IP Council, Intellectual Property: Enforcement Manual. A Practical and Legal Guide for Protecting Your Intellectual Property Rights, p.19 117 Reference Text for Trainers - Help train customs official: there is no substitute for one-on-one training; training seminars [by enterprises] should be complemented by the distribution of product identification manuals, security feature identifiers etc. - Responding to inquiries regarding suspect goods - Following up on seizures Existing best practices in the EU INTERPOL works as a catalyst to encourage police, customs, international organizations, the public health sector, cross-industry representative bodies, IP crime affected industries and other stakeholders to work together to combat transnational organized counterfeiting and piracy. The database that INTERPOL is developing within the IPR programme to further improve the exchange of information and intelligence on this subject is presented below: 118 Reference Text for Trainers BOX 17 Database on International Intellectual Property Interpol The INTERPOL Database on International Intellectual Property (DIIP) Crime is an autonomous iBase database containing information on transnational and organized IP crimes. It has been specifically developed to be a depository for private sector industry information on transnational and organized IP crime. The DIIP Crime neither competes with established public sector IP crime databases nor duplicates existing IP crime data collection mechanisms. Data contained in the database will be subjected to criminal analysis to identify links between transnational and organized cross-industry sector IP criminal activity; facilitate criminal investigations; and develop regional and global strategic IP crime reports. INTERPOL does not disclose information contained in DIIP. Participating industries receive feedback in the form of referrals indicating that two or more industries are being targeted by the same transnational organized criminals. Arising benefits: It is used to inform and facilitate law enforcement interventions in transnational organized IP crime It is used to produce regional and global strategic IP crime reports Improves the information flow between stakeholders and leads to more effective international law enforcement The expressed purpose of DIIP is to collect reliable information about transnational organized criminals from IP crime affected industries. Industries often know the identity of the individuals or groups who attack them. They are the same people that affected industries take civil actions against to protect their IP and enforce rights. Information collected to support civil actions is expensive and typically once the civil action is complete the information is not used for any other purpose. This information is a valuable resource since it contains information about transnational organized criminals. Pooling the information in DIIP adds value to the information and improves its cost effectiveness. Pooled information is searched to identify links between all IP crime affected industries and can then be used for the collective benefit of all stakeholders. The priority is to ensure that confidential and proprietary information provided by participating industries is not disclosed. Information contained in DIIP will be subjected to criminal analysis to identify links between transnational and organized cross-industry sector IP criminal activity, facilitate criminal investigations, and develop regional and global strategic IP crime reports. Source: Interpol Member countries working within the INTERPOL IPR Programme Source: Interpol Interpol issued a ‘Recommended Minimum Global Standard’ for the Collection of Information on Counterfeiting and Piracy by the Private Sector. The purpose of the INTERPOL Recommended Minimum Global Standard is to provide IP crime affected private sector entities with guidance about the type of information they should consider collecting about transnational and organized IP crime attacks on their interests. 119 Reference Text for Trainers It is expected that private sector entities will continue to collect data on their business activities. The information collected for this purpose, however, will not necessarily be information which can be used to identify if they are being attacked by the same organized criminals that are also attacking other entities or industry sectors. Some private sector entities do systematically collect information about how transnational and organized IP criminals affect their business. Other private sector entities do not collect such information, but may wish to do so in the future. The Recommended Minimum Global Standard provides both types of private sector entities with recommended minimum standards for the collection of information, which is compatible with searchable information fields, contained in the INTERPOL DIIP Crime. In the event that the private sector entities adopt the Minimum Global Standard it will enable the information to be easily assimilated into the INTERPOL DIIP Crime in accordance with DIIP Data Handling and Referral Procedures. The Minimum Global Standard will also enable private sector entities to share information about transnational and organized IP crime with each other more effectively. Annex table: http://www.interpol.int/Public/FinancialCrime/IntellectualProperty/DIIP/ExplanNotes.asp 5.3.2 The Contribution of the Private Sector during the Evidence-Gathering Monitoring Processes199 The monitoring of counterfeit market activities serves two purposes. Firstly it helps to identify incidents of counterfeit trade and allows for timely responses at an operational 199 The main source for the whole paragraph is Staake T., Fleisch E. (2008), “Countering Counterfeit Trade. Illicit market insights, Best-Practice Strategies, and Management Toolbox”, Springer-Verlag (editions), Berlin Heidelberg, chapter 5. 120 Reference Text for Trainers level. Secondly it provides management with information on the development of the counterfeit market and thus supports decision-making as well as market observations or competitor analyses for the licit market. Information exchange across industry associations (and between industry associations and institutions, law enforcement agencies etc.) is desirable as an illicit producer often targets more than one brand within the same product category; implementing monitoring processes is closely related to awareness training. If a larger number of counterfeit products are sold on a regular basis, illicit actors need to establish some sort of stable distribution channel to market their products. In such cases, brand owners must obtain timely data on shipment routes, sales channels and identifying features of imitation products to ease product inspections at other locations. Monitoring activities often call for the engagement of local investigators to track down middle men and the identification of sources of counterfeit production. Local contacts can also support test purchases in suspect stores or help to analyze warranty claims, etc. Frequent counterfeit cases also lead to better market insights, thus helping to identify high-risk distribution channels and typical import routes. The relevant information sources as well as selected recommendations for organizing data collection and reporting activities are outlined below: Customs enforcement statistics Pro: they provide the basis for counterfeit market share analyses. They also reveal other information such as locations of production, import routes and addresses; they may help to predict the future development of counterfeit activities. Con: official statistics rarely provide timely information, they are strictly dependent on Customs performance and are thus only of limited value for triggering reaction processes. Consumer surveys Pro: they can provide a variety of information on market penetration and the availability of imitation products, pricing strategies of counterfeit actors, sales channels, consumer behaviour and awareness, reasons for and against buying counterfeit goods, characteristics of counterfeit consumers, the perceived impact on the exclusiveness and reputation. Con: surveys are difficult to design and they are expensive to conduct if the required samples size has to be high. Sampling Pro: it provides the brand owner with information on how counterfeit goods are sold and allows for a detailed physical analysis of the products after purchase. Con: the approach is relatively expensive especially if the authentication procedure is destructive and if the share of counterfeit articles is small. Company-internal data Pro: they can provide timely information on counterfeit occurrences; an analysis of warranty cases or consumer inquiries constitutes a more sensitive instrument. 121 Reference Text for Trainers Con: the analysis of warranty cases is only applicable with respect to deceptive counterfeit cases where customers are concerned about unannounced changes in product appearance, taste etc. Data on counterfeit production facilities may help to gain a better understanding of the mechanism of counterfeit trade. Related information facilitates retrospective crosschecks of other monitoring activities. Information provided by supply chain partners Within the corporate world and especially organizations which are not directly affected by a given counterfeit case, established personal contacts appear to be essential for thorough information exchange. Information from competitors often proves helpful as counterfeit actors frequently target more than one product or brand. Industrial associations play an important role in establishing contacts among brand-protection experts. Information from Internet research The World Wide Web constitutes an important distribution channel especially for nondeceptive counterfeiters and for deceptive counterfeit products that consumers tend to avoid purchasing in person. Reporting activities The information obtained from the various sources has to be organized, processed and put into a form which is suitable for presentation and communication to a given audience that does not necessarily consist of anti-counterfeiting experts. The frequency of reporting depends on the magnitude of threats. Standardized reporting tools may also help to increase awareness of the problem among senior management, provide an organ for brand-protection experts, foster information exchange between different business units and functions, and help to document the company’s anticounterfeiting efforts. Reaction processes Trademark and copyright holders have the prime responsibility for initiating measures to protect their goods […] the reaction process may be subdivided into 6 steps: Withdrawing counterfeit articles from circulation: Initiating product seizures is the first step to avert danger from the customer; the brand owner may require search warrants and support from the police. Seizures become more difficult the earlier they take place in the counterfeit actor’s value chain. The closer they are to production, the more likely it is to cut off counterfeit supply. Warning those who are affected by the imitations The timeliness of information is critical, not only to prevent accidents but also to document that the company is properly dealing with the case. Finding/eradicate the source of illicit products Brand owners should approach the occurrence of counterfeit goods in a constructive way and collect as much information as possible to increase the chance of successful prosecution of offenders. Seeking the prosecution of offenders 122 Reference Text for Trainers Prosecution of offenders is the logical consequence of identifying illicit actors; even if it is a difficult process. The importance of tacking legal steps should be stressed, even if they do not directly affect the illicit financiers. They may lead to seizures of production machinery and unsettle middle men, which can dramatically increase the cost of counterfeiting. Managing the relationship with the informant and other supportive stakeholders Most reactions are initiated after receiving hints from individuals such as customs officials or managers from retail stores who are not directly associated with the brand owner. Refining the anti-counterfeiting strategy Details from individual cases should be fed back to adjust the monitoring process and improve prevention techniques In conclusion, the reaction processes are highly dependent on the affected product, country, and the nature of the individual case. BOX 18 Case Study - Operation Jupiter in South America (2005-2010) Operation Jupiter was launched with the support and participation of the national police forces of Argentina, Brazil and Paraguay. Brazilian customs also joined the operation, together with representatives from pharmaceutical, recording, motion picture and tobacco cross-industry representative bodies. The operation then involved 7 countries of Latin America. INTERPOL IPR programme, which spearheaded Operation Jupiter, provides a central point of reference to facilitate co-operation between law enforcement authorities and the public and private sectors in the fight against transnational organized IP crime. Under the umbrella of Operation Jupiter, police and customs agents from Argentina, Bolivia, Brazil, Chile, Paraguay, Peru and Uruguay carried out 299 co-ordinated enforcement operations resulting in 311 arrests and the recovery of a range of dangerous products including life-threatening fake medicines, counterfeit foodstuffs, electrical goods and agrochemicals. INTERPOL and the WCO worked with participating countries to identify the transnational organized criminal groups involved in cross-border smuggling and to target resources accordingly. Police and customs authorities in each country then launched investigations and combined interventions to disrupt these frequently complex criminal activities. An important part of Operation Jupiter was the close co-operation and support provided to investigators by the private sector. “Public-private partnerships like this are pivotal for bringing criminal counterfeiters to justice, while protecting the innovators, workers and consumers who rely on intellectual property protection,” said Dr. Mark T. Esper, Executive Vice President of the U.S. Chamber of Commerce’s Global Intellectual Property Centre. Since the first phase of Operation Jupiter in 2005 – which involved just three countries – operations throughout the region have so far resulted in nearly 700 arrests and the seizure of goods worth an estimated USD 290 millions. Source: Interpol 5.3.3 Cooperation Initiatives with the Business Sector As several studies and reports emphasize, some business sectors are more exposed to brand counterfeiting and IPR violations than others. Consequently, a more active role in 123 Reference Text for Trainers suggesting anti-counterfeiting initiatives can be expected from the sectors most at risk. Common initiatives promoted by sector-related associations, as well as liaison with public authorities and public institutions are examples of best practices. 1) Liaison between EU customs administrations and the pharmaceutical sector A meeting was held on 14th September 2009 between the EU Commission, EU customs administrations and EU pharmaceutical companies in Brussels. It was the first step in an ongoing liaison between those parties. The main issue discussed regarded the effectiveness of the seizure of goods suspected of infringing IPRs, carried out by customs during EU border controls. Participants discussed customs measures relating to the enforcement of patent rights at the border, in particular the need to protect such rights effectively, whilst ensuring that “the legitimate flow of and access to genuine generic products from manufacturer to customer outside the EU was not restricted” (from the Joint Statement after the meeting, see below). As a result of this meeting, EU custom authorities will extend and improve their collaboration with EU pharmaceutical companies in order to prevent any chance that the detention of suspected goods might hinder the legal trade of medicines. Such measures should speed up control procedures and the procedures related to the releasing of suspected goods. Customs will notify EU pharmaceutical companies about each and every case of goods suspected of infringement. This joint commitment to act demonstrates the will to act in accordance with EC Regulation 1383/2003. 2. Liaisons between Custom authorities and the semiconductor industry The liaisons between customs experts and manufacturers of semiconductor devices concerning anti-counterfeiting issues cover the following countries: China, Chinese Taipei, European Union, Japan, Korea and the United States (countries adhering to the GAMS - Governments/Authorities Meeting on Semiconductors). For the first time, representatives from each of the six major regions involved in the manufacturing of semiconductor devices (joined in the GAMS), met to discuss the problems posed by counterfeit semiconductor products. On 21st – 22nd September 2009, customs experts from China, Chinese Taipei, the European Union, Japan, Korea and the United States convened in Korea, together with representatives from their relevant industries and trade ministry officials. During the meeting customs experts shared experiences and best practices in the fight against counterfeited semiconductor devices. Customs experts also reaffirmed the need for governments to join forces and increase joint government/industry cooperation in the fight against the counterfeit industry. It was also mentioned that a particularly effective countermeasure, is that which gives customs officers access to information about products manufactured and processes implemented by the semiconductor industry. This type of information facilitates the identification of suspected counterfeit products.200 200 The main source of this paragraph is Transcrime (2010), Anti-brand counterfeiting in the EU: report on best practices, unpublished version, pp. 57-59. 124 Reference Text for Trainers SOURCES Agenzia Delle Dogane, available at: www.agenziadogane.it/wps/wcm/connect/ed/Servizi/F.A.L.S.T.A.F.F. BBC News, International counterfeit goods raids http://news.bbc.co.uk/2/hi/uk_news/8576691.stm BBC Newsround, How well can you spot a fake? http://news.bbc.co.uk/cbbcnews/hi/newsid_7650000/newsid_7657300/7657362.stm CEIPI (Centre d’études internationales de la propriété intellectuelle), (2004) Impacts de la contrefaçon et de la piraterie en Europe – Rapport Final: Dewan, Mohan Multi Pronged Effective Strategy For Anti Counterfeit Actions, http://EzineArticles.com/?expert=Mohan_Dewan DGLC (Direzione Generale per la Lotta alla Contraffazione) – Ufficio Italiano Brevetti e Marchi, (2009), Rapporto sulle attività del 2009 EC Directorate General for Enterprise & industry, Making IPR Work for SMEs, Annex B: Best practices, available HTTP: http://ec.europa.eu/enterprise/newsroom/cf/document.cfm?action=display&doc_id=4055 &userservice_id=1&request.id=0 EC Directorate General for Enterprise & industry, Making IPR Work for SMEs, Annex C: Inventory IPR Enforcement Support Measures, avaiable HTTP: http://ec.europa.eu/enterprise/newsroom/cf/document.cfm?action=display&doc_id=4056 &userservice_id=1&request.id=0 ELSO group (2007), Enforcement of Intellectual Property Rights. Teaching materials, Volume II, Book II, Czech Republic EU Counterfeiting and Piracy Observatory, Corrective Measures in IPR infringements, online available HTTP: http://ec.europa.eu/internal_market/iprenforcement/observatory/index_en.htm EUROPOL, Camorra-type clan behind massive counterfeiting of power tools and clothing, press release, available at: http://www.europol.europa.eu/index.asp?page=news&news=pr100521.htm Fitzgerald D.G., (2007) “Informants and undercover investigations: a practical guide to Law”, Policy and Procedure, New York: Taylor & Francis Group http://counterfeiting.unicri.it/docs/IACD.A%20key%20information%20resource%20to%20 combat%20the%20global%20plague%20of%20counterfeiting.2009.pdf http://counterfeiting.unicri.it/docs/study_ceipi_counterfeiting_fr.pdf ICC Counterfeiting Intelligence Bureau, (2009) International Anti-Counterfeiting Directory INDICAM, (2005) Lotta alla contraffazione e tutela penale, fact sheet of Indicam Congress of 28th february, Milan International & Trade Security Branch, Customs Division, (2008) Intellectual Property Rights (IPR) Manual Customs action against goods suspected of infringing certain 125 Reference Text for Trainers intellectual property rights and the measures to be taken against goods found to have infringed such rights, Ireland International Anti-Counterfeiting Directory, (2009) A key information resource to combat the global plague of counterfeiting International Intellectual Property Alliance (IIPA) (2010), Report on Copyright protection and enforcement, Special 301: Poland INTERPOL, Database on International Intellectual Property, http://www.interpol.int/public/FinancialCrime/IntellectualProperty/DIIP/Default.asp INTERPOL Database on International Intellectual Property (DIIP) Crime, http://www.interpol.int/Public/FinancialCrime/IntellectualProperty/DIIP/ExplanNotes.asp INTERPOL, (2007) Guide To Intellectual Property Crime And Investigations, Lyon IPO Crime Group, IP crime Report 2009/2010, United Kingdom Inventory of IPR enforcement support measures in each country (EU), available HTTP: http://www.innovaccess.eu/enforcement_best_practices.html Ministerio de Cultura de España, (2008) Manual de buenas practicas para la prosecución de los delitos contra la propiedad intelectual, Spain Ministero dell’Interno, (2004) “Commercio abusivo e vendita di prodotti contraffatti: come agire”, Manuale operativo, Rome, Italy Schott P.A., (2006) Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism, World Bank, Washington D.C. Staake T., Fleisch E., (2008) Countering Counterfeit Trade. Illicit market insights, BestPractice Strategies, and Management Toolbox, Berlin Heidelberg: Springer-Verlag Team for Counteracting Infringement of Copyright and Related Rights (2009), Special Report,Poland The Anti-Counterfeiting Group (seventh revision, April 2010), ACG guidance note. Guidelines for Witnesses in Counterfeiting, based upon the Criminal Procedure Rules 2010, effective from 5 April 2010 The Canadian IP Council, Intellectual Property: Enforcement Manual. A Practical and Legal Guide for Protecting Your Intellectual Property Rights The International Trademark Association (INTA) (2010), Criminal Prosecution of Counterfeiting and Piracy in Member States of the European Union, September The Partnership for Safe Medicines, (2005) Counterfeit Drugs in Europe, fact sheet, online available HTTP: http://www.safemedicines.org/resources/europe.pdf Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in the EU: Report on International and National Existing Standards (unpublished version) Transcrime (Joint Research Centre on Transnational Crime), (2010) Anti Brand Counterfeiting in the EU: report on best practices (unpublished version) Tual D. (2008), Evolution de la lutte contre la contrefaçon et la piraterie en Afrique – éléments d’analyse et perspectives, Belgium 126 Reference Text for Trainers U.S. Customs and Border Protection, http://www.cbp.gov/xp/cgov/trade/priority_trade/ipr/ UNICRI (United Nations Interregional Crime and Justice Research Institute), (2010) Strategies for technical-juridical training and awareness raising on counterfeiting, (unpublished Italian version) UNICRI (United Nations Interregional Crime and Justice Research Institute), (2010) Strategies for technical-juridical training and awareness-raising on counterfeiting, Turin UNICRI (United Nations Interregional Crime and Justice Research Institute) & UNODC (United Nations Office on Drugs and Crime), (2008) Investigation, prosecution and adjudication of drug-related cases in Afghanistan UNIFAB (Unions des Fabricants), (2004) La lutte anti-contrefaçon. Manuel destiné aux officiers de police judiciaire, 2nd edition UNIFAB (Unions des Fabricants), (2005) Rapport sur la contrefaçon et la criminalité organisée, 3rd edition, available at : http://www.unifab.com/doc/2005/rapport_c05.pdf United Nations, Guidelines on the Role of the Prosecutors, Adopted by the Eight United Nations Congress on the Prevention of Crime and Treatment of Offenders, Havana, Cuba, 27 August to September 1990 United States Food and Drug Administration (last update march 2010), Investigations Operation Manual, chapter 8, available at: http://www.fda.gov/downloads/ICECI/Inspections/IOM/UCM123515.pdf United States National Intellectual Property Law Enforcement Coordination Council, (2008) Report to the President and Congress on Coordination of Intellectual Property Enforcement and Protection 127