intellectual property crimes : research tools & strategies
DESCRIPTION
TRANSCRIPT
![Page 1: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/1.jpg)
Professor Jon R. Cavicchi©2011
![Page 2: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/2.jpg)
Global interdisciplinary culturally relative area of searching…
![Page 3: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/3.jpg)
It is estimated that counterfeiting is a $600 billion a year problem.
• The Facts:– Counterfeiting costs U.S. businesses $200 billion to $250 billion
annually.– Counterfeit merchandise is directly responsible for the loss of
more than 750,000 American jobs.– Since 1982, the global trade in illegitimate goods has increased
from $5.5 billion to approximately $600 billion annually.– Approximately 5%-7% of the world trade is in counterfeit goods.– U.S. companies suffer $9 billion in trade losses due to
international copyright piracy.– Counterfeiting poses a threat to global health and safety.
• Consider the DANGEROUS FAKES: – The Food and Drug Administration estimates that counterfeit
drugs account for 10% of all drugs sold in the United States.– The Federal Aviation Administration estimates that 2% of the 26
million airline parts installed each year are counterfeit, which equals approximately 520,000 parts.
– In 2003, the Motor and Equipment Manufacturers Association cited safety violations due to counterfeit auto parts: brake linings made of compressed grass, sawdust or cardboard; transmission fluid made of cheap oil that is dyed; and oil filters that use rags for the filter element.
![Page 4: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/4.jpg)
Trade Secret Theft
![Page 5: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/5.jpg)
![Page 6: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/6.jpg)
![Page 7: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/7.jpg)
Melvin F. Jager, Trade Secrets Law § 4:4. Criminal sanctions—Early property emphasis (West, Database updated October 2010)
![Page 8: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/8.jpg)
![Page 9: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/9.jpg)
U.S. Federal Laws
![Page 10: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/10.jpg)
![Page 11: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/11.jpg)
Defines research path
• Criminal Copyright Infringement—17 U.S.C. § 506 and 18 U.S.C. § 2319
• Trafficking In Counterfeit Trademarks, Service Marks, and Certification Marks—18 U.S.C. § 2320
• Theft of Commercial Trade Secrets—18 U.S.C. §§ 1831-1839V.
• Digital Millennium Copyright Act—17 U.S.C. §§ 1201-1205
• Counterfeit and Illicit Labels, Counterfeit Documentation and Packaging—18 U.S.C. § 2318
![Page 12: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/12.jpg)
Trade secrets also are protected from disclosure by the following federal statutes:
•Federal Trade Secrets Act (18 U.S.C.A. § 1905)
National Stolen Property Act(18 U.S.C.A. § 2314)
Federal Espionage Act (18 U.S.C.A. § 794)
Federal Toxic Substances Control Act (15 U.S.C.A. §§ 2601–2629)
Federal Mail Fraud Statute (18 U.S.C.A. § 1341)
Freedom of Information Act (5 U.S.C.A. § 552)
![Page 13: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/13.jpg)
![Page 14: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/14.jpg)
Patent Theft as a Business Strategy
• America's largest big tech corporations are now using a business technique called "efficient infringement," which means that they calculate the benefits of stealing someone else's patented technology against the possibility of getting caught, tried in court and being forced to pay damages and penalties. If the benefits exceed the costs, they steal.
• What makes patent theft so attractive is that infringement is not a criminal act and those found guilty face no jail time. Paying up is the worst that can happen to the infringer.
• The most aggressive users of this business model are fifteen of America's largest big tech corporations. Led by Cisco, Intel, IBM, Microsoft and HP, these giants have spent millions of lobbying dollars over the past five years trying to buy legislation in Washington that would weaken the existing U.S. laws on patent infringement.
• Irina D. Manta, The Puzzle of Criminal Sanctions for Intellectual Property Infringement, 24 HARV. J.L. & TECH. __ (forthcoming 2011)
![Page 15: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/15.jpg)
One defendant, Solo Cup Co., was accused in a lawsuit of erroneously marking 21 billion items, including lids for Starbucks coffee cups. The company had more than 3,000 molds for its products that were stamped with the erroneous patents
![Page 16: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/16.jpg)
18 U.S.C. § 497Letters patent
• Whoever falsely makes, forges, counterfeits, or alters any letters patent granted or purporting to have been granted by the President of the United States; or
• Whoever passes, utters, or publishes, or attempts to pass, utter, or publish as genuine, any such letters patent, knowing the same to be forged, counterfeited or falsely altered—
• Shall be fined under this title or imprisoned not more than ten years, or both.
![Page 17: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/17.jpg)
Don’t forget to check foreign laws…• As regards patents, the legislator has provided for very high sanctions
for a crime which, up to now, was interpreted as merely altering or counterfeiting of the patent certificate document.
• Italian law has increased penalties for crimes falling under articles 473 and 474 of the Criminal Code which target trade mark and design counterfeiting but might also encompass patent infringement.
• These two provisions punish, among other things, the production, the introduction into the territory of the state, the possession for sale, and the sale and marketing of goods bearing a counterfeit or an altered sign. Under these articles, as amended, infringers can be punished by imprisonment of between six months and three years and a fine of between €2,500 and €25,000 in cases relating to the manufacture of goods bearing a counterfeit or an altered sign.
![Page 18: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/18.jpg)
• Indigenous groups gain from the enforcement of intellectual-property rights.
• The respective traditional knowledge — from rain-forest-based medicines to ancient crops for cultivation — have all been poached in the past by multinational corporations that register patents for their own financial statements.
• Panama 2007, new Penal Code of Panama went into effect and among the reforms that were made in the chapter on crimes against intellectual property rights, a section on crimes against the collective rights of indigenous peoples and their traditional knowledge was included. Those who violate the registered collective rights of indigenous peoples can now be sentenced to four to six years imprisonment.
![Page 19: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/19.jpg)
![Page 20: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/20.jpg)
![Page 21: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/21.jpg)
Dedicated IP crime sources
Dedicated IP crime sources
IP sources covering crimes
IP sources covering crimes
Criminal Law sources covering IP
crimes
Criminal Law sources covering IP
crimes
Internet, cyberlaw, computer law sources covering IP crimes
Internet, cyberlaw, computer law sources covering IP crimes
General legal materials with sources on IP
crime
General legal materials with sources on IP
crime
Non-legal sources covering IP crimeNon-legal sources covering IP crimeTreaties & International
AgreementsTreaties & International
Agreements
![Page 22: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/22.jpg)
So what type of project are you working on?
• Legal Research– Transactional– Litigation
• How to / training materials• Client awareness and education• Public Policy
– Petty criminals treated same as organized crime– Current legal and enforcement effective use of tax
funds?• News• Statistics• Public relations
![Page 23: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/23.jpg)
Examples : Treatises
Federal and 50-state coverage of cybercrime law by examining each statute to provide text and analysis of key statutory language, then examines elements of the crimes, classifications of offenses under each statute, penalties, remedies available to victims, sentencing guidelines for corporate defendants, seizure of data and files, triggers of other liability, federal enforcement tools, restitution, and case law developments.
33 books on computer
crimes
33 books on computer
crimes
25 books on counterfeiting25 books on
counterfeiting
95 books on copyright piracy
95 books on copyright piracy
![Page 24: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/24.jpg)
![Page 25: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/25.jpg)
Use criminal search terms in foreign law compilations
![Page 26: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/26.jpg)
![Page 27: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/27.jpg)
Same with legal periodicals
• Joseph W. Cormier et al, INTELLECTUAL PROPERTY CRIMES,46 Am. Crim. L. Rev. 761 (Spring 2009)
Search in Legal Resource Index TI,IN("INTELLECTUAL PROPERTY" PATENT TRADEMARK COPYRIGHT "TRADE SECRETS" COUNTERFEIT! PIRACY & CRIM!) = 411 articles
![Page 28: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/28.jpg)
![Page 29: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/29.jpg)
Lexis 50 state surveys
Copyrights - Registration, protection and enforcement of copyrights, including written materials, sound recordings and computer software licensing
Trade & Service Marks - Registration, protection, and enforcement of trade names, domain names, trade marks, trade brands and service marks
Trade Secrets - Trade secret protections and remedies for misappropriation, highlighting deviations from the Uniform Trade Secret Act
![Page 30: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/30.jpg)
![Page 31: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/31.jpg)
Cases
• Use Wexis tabs & Libraries• Use secondary sources• KeyCite and Shepardize• Donald M. Zupanec, Criminal Liability for
Misappropriation of Trade Secrets, 84 A.L.R.3d 967 (updated weekly)
•
![Page 32: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/32.jpg)
Federal agencies
Repeal of Coordination Council Pro IP Act 2008
Repeal of Coordination Council Pro IP Act 2008
![Page 33: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/33.jpg)
201015 New
Assistant Attorney Generals
201015 New
Assistant Attorney Generals
![Page 35: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/35.jpg)
Read Prof. Koepsel’s
recent article in Franklin Pierce IP Center Newsletter
Read Prof. Koepsel’s
recent article in Franklin Pierce IP Center Newsletter
![Page 37: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/37.jpg)
![Page 38: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/38.jpg)
Establishing the relationship between IPC and terrorist financing
• Link between organized crime groups and counterfeit goods is well established. – Direct involvement where the relevant terrorist group
is implicated in the production, distribution or sale of counterfeit goods and remits a significant proportion of those funds for the activities of the group.
– Indirect involvement where sympathizers or militants are involved in IPC and remit some of the funds, knowingly to terrorist groups via third parties.
– D-Company, led by Dawood Ibrahim, major crime syndicate practicing extortion, smuggling, contract killing, and counterfeiting. Alleged funding of 1993 Mumbai bombings, ties with al-Qaeda and Laskhar-e-Taiyiba Consolidated List).
![Page 39: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/39.jpg)
• Goals– enforcement program designed to
thwart illicit exports of licensable items and sensitive technology targeted for procurement by terrorists and rogue nations.
– prevent rogue nations, terrorist groups, and international criminal organizations from obtaining conventional and nonconventional weapons and their components, as well as critical technology that could assist parties acting contrary to U.S. national security interests.
– Translation: "No U.S. high-tech goodies for bad guys."
![Page 40: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/40.jpg)
• Intellectual Property Crime Statistics from the Attorney General's Annual Report– These annual statistics
contain summaries of available copyright and trademark statistics, segregated by statutory provision and preceded by a brief description of each offense. Also included are summaries of the overall totals and totals associated with matters and cases referred by the U.S. Customs Service to the U.S. Attorneys.
The list of cases on [IP crimes], which was ever intended to be comprehensive, is no longer being updated. They haven’t taken it down either, but they promised to put in a note saying this. I think that’s what we figured out. They advised searching the press releases with the search box on the main page to update the old list. I hope the WestDockets methodology works out, that’s really the best way, I think, but it takes time to edit.
Katie ZeiglerReference LibrarianUS Department of Justice1425 NY Ave; Rm. 9004Tel: 202-616-8942Fax: 202-616-8718
Email 5/10
![Page 41: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/41.jpg)
![Page 42: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/42.jpg)
• Compiled sources– Wexis
• Arnold & Porter• GAO
– IP Library– Thomas
Always look for compiled sources. This example is UNH e-resource
LexisNexis Congressional
Always look for compiled sources. This example is UNH e-resource
LexisNexis Congressional
![Page 43: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/43.jpg)
Congress Refuses Wide Access
Look for free and low fee sites
UNH IP MallOpen CRS
Congress Refuses Wide Access
Look for free and low fee sites
UNH IP MallOpen CRS
![Page 44: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/44.jpg)
Troll for Policy Research Sources
![Page 46: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/46.jpg)
IPAA has Country Reports & other
stats
IPAA has Country Reports & other
stats
![Page 47: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/47.jpg)
![Page 48: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/48.jpg)
![Page 49: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/49.jpg)
![Page 50: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/50.jpg)
Hot topic of numerous conferences & CLE
![Page 51: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/51.jpg)
• STEALING TRADE SECRETS AS A FEDERAL CRIME : THE ECONOMIC ESPIONAGE ACT
• PROSECUTING INTELLECTUAL PROPERTY CRIMES
• THEFT OF TRADE SECRETS : CRIMINAL REMEDIES
![Page 52: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/52.jpg)
For Public Policy try Non-legal data
• Your turn…try to find something on your paper topic using
![Page 53: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/53.jpg)
This is a UNH Law licensed interdisciplinaray database with international policy documents
This is a UNH Law licensed interdisciplinaray database with international policy documents
![Page 54: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/54.jpg)
NEW ELECTRONIC RESOURCE UNH LAW 2011
NEW ELECTRONIC RESOURCE UNH LAW 2011
![Page 55: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/55.jpg)
![Page 56: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/56.jpg)
International Law Enforcement
![Page 57: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/57.jpg)
Regional : Europe
The Directive on the enforcement of intellectual property rights such as copyright and related rights, trademarks, designs or patents was adopted in April 2004.
The Directive requires all Member States to apply effective, dissuasive and proportionate remedies and penalties against those engaged in counterfeiting and piracy and so creates a level playing field for right holders in the EU. It means that all Member States will have a similar set of measures, procedures and remedies available for rightholders to defend their intellectual property rights (be they copyright or related rights, trademarks, patents, designs, etc) if they are infringed.
![Page 58: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/58.jpg)
National IP Offices
![Page 59: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/59.jpg)
News
• Web pages– Industry specific– Popular e.g. CNN– RSS feeds
• Email newsletters• Blogs• Clipping services and alerts• Social media
![Page 60: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/60.jpg)
![Page 61: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/61.jpg)
Social media
![Page 62: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/62.jpg)
Fact research other universe of sources…
![Page 63: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/63.jpg)
Private Investigators
![Page 64: Intellectual Property Crimes : Research Tools & Strategies](https://reader034.vdocuments.site/reader034/viewer/2022042606/546830a2af7959925f8b68c0/html5/thumbnails/64.jpg)
The end is only the beginning…the Library and Librarians are your
collaborators to success