Intellectual Property Crimes : Research Tools & Strategies

64
Professor Jon R. Cavicchi ©2011

description

 

Transcript of Intellectual Property Crimes : Research Tools & Strategies

Page 1: Intellectual Property Crimes : Research Tools & Strategies

Professor Jon R. Cavicchi©2011

Page 2: Intellectual Property Crimes : Research Tools & Strategies

Global interdisciplinary culturally relative area of searching…

Page 3: Intellectual Property Crimes : Research Tools & Strategies

It is estimated that counterfeiting is a $600 billion a year problem.

• The Facts:– Counterfeiting costs U.S. businesses $200 billion to $250 billion

annually.– Counterfeit merchandise is directly responsible for the loss of

more than 750,000 American jobs.– Since 1982, the global trade in illegitimate goods has increased

from $5.5 billion to approximately $600 billion annually.– Approximately 5%-7% of the world trade is in counterfeit goods.– U.S. companies suffer $9 billion in trade losses due to

international copyright piracy.– Counterfeiting poses a threat to global health and safety.

• Consider the DANGEROUS FAKES: – The Food and Drug Administration estimates that counterfeit

drugs account for 10% of all drugs sold in the United States.– The Federal Aviation Administration estimates that 2% of the 26

million airline parts installed each year are counterfeit, which equals approximately 520,000 parts.

– In 2003, the Motor and Equipment Manufacturers Association cited safety violations due to counterfeit auto parts: brake linings made of compressed grass, sawdust or cardboard; transmission fluid made of cheap oil that is dyed; and oil filters that use rags for the filter element.

Page 5: Intellectual Property Crimes : Research Tools & Strategies
Page 6: Intellectual Property Crimes : Research Tools & Strategies
Page 7: Intellectual Property Crimes : Research Tools & Strategies

Melvin F. Jager, Trade Secrets Law § 4:4. Criminal sanctions—Early property emphasis (West, Database updated October 2010)

Page 8: Intellectual Property Crimes : Research Tools & Strategies
Page 9: Intellectual Property Crimes : Research Tools & Strategies

U.S. Federal Laws

Page 10: Intellectual Property Crimes : Research Tools & Strategies
Page 11: Intellectual Property Crimes : Research Tools & Strategies

Defines research path

• Criminal Copyright Infringement—17 U.S.C. § 506 and 18 U.S.C. § 2319

• Trafficking In Counterfeit Trademarks, Service Marks, and Certification Marks—18 U.S.C. § 2320

• Theft of Commercial Trade Secrets—18 U.S.C. §§ 1831-1839V.

• Digital Millennium Copyright Act—17 U.S.C. §§ 1201-1205

• Counterfeit and Illicit Labels, Counterfeit Documentation and Packaging—18 U.S.C. § 2318

Page 12: Intellectual Property Crimes : Research Tools & Strategies

Trade secrets also are protected from disclosure by the following federal statutes:

•Federal Trade Secrets Act (18 U.S.C.A. § 1905)

National Stolen Property Act(18 U.S.C.A. § 2314)

Federal Espionage Act (18 U.S.C.A. § 794)

Federal Toxic Substances Control Act (15 U.S.C.A. §§ 2601–2629)

Federal Mail Fraud Statute (18 U.S.C.A. § 1341)

Freedom of Information Act (5 U.S.C.A. § 552)

Page 13: Intellectual Property Crimes : Research Tools & Strategies
Page 14: Intellectual Property Crimes : Research Tools & Strategies

Patent Theft as a Business Strategy

• America's largest big tech corporations are now using a business technique called "efficient infringement," which means that they calculate the benefits of stealing someone else's patented technology against the possibility of getting caught, tried in court and being forced to pay damages and penalties. If the benefits exceed the costs, they steal.

• What makes patent theft so attractive is that infringement is not a criminal act and those found guilty face no jail time. Paying up is the worst that can happen to the infringer.

• The most aggressive users of this business model are fifteen of America's largest big tech corporations. Led by Cisco, Intel, IBM, Microsoft and HP, these giants have spent millions of lobbying dollars over the past five years trying to buy legislation in Washington that would weaken the existing U.S. laws on patent infringement.

• Irina D. Manta, The Puzzle of Criminal Sanctions for Intellectual Property Infringement, 24 HARV. J.L. & TECH. __ (forthcoming 2011)

Page 15: Intellectual Property Crimes : Research Tools & Strategies

One defendant, Solo Cup Co., was accused in a lawsuit of erroneously marking 21 billion items, including lids for Starbucks coffee cups. The company had more than 3,000 molds for its products that were stamped with the erroneous patents

Page 16: Intellectual Property Crimes : Research Tools & Strategies

18 U.S.C. § 497Letters patent

• Whoever falsely makes, forges, counterfeits, or alters any letters patent granted or purporting to have been granted by the President of the United States; or

• Whoever passes, utters, or publishes, or attempts to pass, utter, or publish as genuine, any such letters patent, knowing the same to be forged, counterfeited or falsely altered—

• Shall be fined under this title or imprisoned not more than ten years, or both.

Page 17: Intellectual Property Crimes : Research Tools & Strategies

Don’t forget to check foreign laws…• As regards patents, the legislator has provided for very high sanctions

for a crime which, up to now, was interpreted as merely altering or counterfeiting of the patent certificate document.

• Italian law has increased penalties for crimes falling under articles 473 and 474 of the Criminal Code which target trade mark and design counterfeiting but might also encompass patent infringement.

• These two provisions punish, among other things, the production, the introduction into the territory of the state, the possession for sale, and the sale and marketing of goods bearing a counterfeit or an altered sign. Under these articles, as amended, infringers can be punished by imprisonment of between six months and three years and a fine of between €2,500 and €25,000 in cases relating to the manufacture of goods bearing a counterfeit or an altered sign.

Page 18: Intellectual Property Crimes : Research Tools & Strategies

• Indigenous groups gain from the enforcement of intellectual-property rights.

• The respective traditional knowledge — from rain-forest-based medicines to ancient crops for cultivation — have all been poached in the past by multinational corporations that register patents for their own financial statements.

• Panama 2007, new Penal Code of Panama went into effect and among the reforms that were made in the chapter on crimes against intellectual property rights, a section on crimes against the collective rights of indigenous peoples and their traditional knowledge was included. Those who violate the registered collective rights of indigenous peoples can now be sentenced to four to six years imprisonment.

Page 19: Intellectual Property Crimes : Research Tools & Strategies
Page 20: Intellectual Property Crimes : Research Tools & Strategies
Page 21: Intellectual Property Crimes : Research Tools & Strategies

Dedicated IP crime sources

Dedicated IP crime sources

IP sources covering crimes

IP sources covering crimes

Criminal Law sources covering IP

crimes

Criminal Law sources covering IP

crimes

Internet, cyberlaw, computer law sources covering IP crimes

Internet, cyberlaw, computer law sources covering IP crimes

General legal materials with sources on IP

crime

General legal materials with sources on IP

crime

Non-legal sources covering IP crimeNon-legal sources covering IP crimeTreaties & International

AgreementsTreaties & International

Agreements

Page 22: Intellectual Property Crimes : Research Tools & Strategies

So what type of project are you working on?

• Legal Research– Transactional– Litigation

• How to / training materials• Client awareness and education• Public Policy

– Petty criminals treated same as organized crime– Current legal and enforcement effective use of tax

funds?• News• Statistics• Public relations

Page 23: Intellectual Property Crimes : Research Tools & Strategies

Examples : Treatises

Federal and 50-state coverage of cybercrime law by examining each statute to provide text and analysis of key statutory language, then examines elements of the crimes, classifications of offenses under each statute, penalties, remedies available to victims, sentencing guidelines for corporate defendants, seizure of data and files, triggers of other liability, federal enforcement tools, restitution, and case law developments.

33 books on computer

crimes

33 books on computer

crimes

25 books on counterfeiting25 books on

counterfeiting

95 books on copyright piracy

95 books on copyright piracy

Page 24: Intellectual Property Crimes : Research Tools & Strategies
Page 25: Intellectual Property Crimes : Research Tools & Strategies

Use criminal search terms in foreign law compilations

Page 26: Intellectual Property Crimes : Research Tools & Strategies
Page 27: Intellectual Property Crimes : Research Tools & Strategies

Same with legal periodicals

• Joseph W. Cormier et al, INTELLECTUAL PROPERTY CRIMES,46 Am. Crim. L. Rev. 761 (Spring 2009)

Search in Legal Resource Index TI,IN("INTELLECTUAL PROPERTY" PATENT TRADEMARK COPYRIGHT "TRADE SECRETS" COUNTERFEIT! PIRACY & CRIM!) = 411 articles

Page 28: Intellectual Property Crimes : Research Tools & Strategies
Page 29: Intellectual Property Crimes : Research Tools & Strategies

Lexis 50 state surveys

Copyrights - Registration, protection and enforcement of copyrights, including written materials, sound recordings and computer software licensing

Trade & Service Marks - Registration, protection, and enforcement of trade names, domain names, trade marks, trade brands and service marks

Trade Secrets - Trade secret protections and remedies for misappropriation, highlighting deviations from the Uniform Trade Secret Act

Page 30: Intellectual Property Crimes : Research Tools & Strategies
Page 31: Intellectual Property Crimes : Research Tools & Strategies

Cases

• Use Wexis tabs & Libraries• Use secondary sources• KeyCite and Shepardize• Donald M. Zupanec, Criminal Liability for

Misappropriation of Trade Secrets, 84 A.L.R.3d 967 (updated weekly)

Page 32: Intellectual Property Crimes : Research Tools & Strategies

Federal agencies

Repeal of Coordination Council Pro IP Act 2008

Repeal of Coordination Council Pro IP Act 2008

Page 33: Intellectual Property Crimes : Research Tools & Strategies

201015 New

Assistant Attorney Generals

201015 New

Assistant Attorney Generals

Page 36: Intellectual Property Crimes : Research Tools & Strategies

Who really is in charge?

Who really is in charge?

Page 37: Intellectual Property Crimes : Research Tools & Strategies
Page 38: Intellectual Property Crimes : Research Tools & Strategies

Establishing the relationship between IPC and terrorist financing

• Link between organized crime groups and counterfeit goods is well established. – Direct involvement where the relevant terrorist group

is implicated in the production, distribution or sale of counterfeit goods and remits a significant proportion of those funds for the activities of the group.

– Indirect involvement where sympathizers or militants are involved in IPC and remit some of the funds, knowingly to terrorist groups via third parties.

– D-Company, led by Dawood Ibrahim, major crime syndicate practicing extortion, smuggling, contract killing, and counterfeiting. Alleged funding of 1993 Mumbai bombings, ties with al-Qaeda and Laskhar-e-Taiyiba Consolidated List).

Page 39: Intellectual Property Crimes : Research Tools & Strategies

• Goals– enforcement program designed to

thwart illicit exports of licensable items and sensitive technology targeted for procurement by terrorists and rogue nations.

– prevent rogue nations, terrorist groups, and international criminal organizations from obtaining conventional and nonconventional weapons and their components, as well as critical technology that could assist parties acting contrary to U.S. national security interests.

– Translation: "No U.S. high-tech goodies for bad guys."

Page 40: Intellectual Property Crimes : Research Tools & Strategies

• Intellectual Property Crime Statistics from the Attorney General's Annual Report– These annual statistics

contain summaries of available copyright and trademark statistics, segregated by statutory provision and preceded by a brief description of each offense. Also included are summaries of the overall totals and totals associated with matters and cases referred by the U.S. Customs Service to the U.S. Attorneys.

The list of cases on [IP crimes], which was ever intended to be comprehensive, is no longer being updated. They haven’t taken it down either, but they promised to put in a note saying this. I think that’s what we figured out. They advised searching the press releases with the search box on the main page to update the old list. I hope the WestDockets methodology works out, that’s really the best way, I think, but it takes time to edit.

Katie ZeiglerReference LibrarianUS Department of Justice1425 NY Ave; Rm. 9004Tel: 202-616-8942Fax: 202-616-8718

Email 5/10

Page 41: Intellectual Property Crimes : Research Tools & Strategies
Page 42: Intellectual Property Crimes : Research Tools & Strategies

• Compiled sources– Wexis

• Arnold & Porter• GAO

– IP Library– Thomas

Always look for compiled sources. This example is UNH e-resource

LexisNexis Congressional

Always look for compiled sources. This example is UNH e-resource

LexisNexis Congressional

Page 43: Intellectual Property Crimes : Research Tools & Strategies

Congress Refuses Wide Access

Look for free and low fee sites

UNH IP MallOpen CRS

Congress Refuses Wide Access

Look for free and low fee sites

UNH IP MallOpen CRS

Page 45: Intellectual Property Crimes : Research Tools & Strategies

Websites & Pubs of Special Interest Groups

Page 46: Intellectual Property Crimes : Research Tools & Strategies

IPAA has Country Reports & other

stats

IPAA has Country Reports & other

stats

Page 47: Intellectual Property Crimes : Research Tools & Strategies
Page 48: Intellectual Property Crimes : Research Tools & Strategies
Page 49: Intellectual Property Crimes : Research Tools & Strategies
Page 50: Intellectual Property Crimes : Research Tools & Strategies

Hot topic of numerous conferences & CLE

Page 51: Intellectual Property Crimes : Research Tools & Strategies

• STEALING TRADE SECRETS AS A FEDERAL CRIME : THE ECONOMIC ESPIONAGE ACT

• PROSECUTING INTELLECTUAL PROPERTY CRIMES

• THEFT OF TRADE SECRETS : CRIMINAL REMEDIES

Page 52: Intellectual Property Crimes : Research Tools & Strategies

For Public Policy try Non-legal data

• Your turn…try to find something on your paper topic using

Page 53: Intellectual Property Crimes : Research Tools & Strategies

This is a UNH Law licensed interdisciplinaray database with international policy documents

This is a UNH Law licensed interdisciplinaray database with international policy documents

Page 54: Intellectual Property Crimes : Research Tools & Strategies

NEW ELECTRONIC RESOURCE UNH LAW 2011

NEW ELECTRONIC RESOURCE UNH LAW 2011

Page 55: Intellectual Property Crimes : Research Tools & Strategies
Page 56: Intellectual Property Crimes : Research Tools & Strategies

International Law Enforcement

Page 57: Intellectual Property Crimes : Research Tools & Strategies

Regional : Europe

The Directive on the enforcement of intellectual property rights such as copyright and related rights, trademarks, designs or patents was adopted in April 2004.

The Directive requires all Member States to apply effective, dissuasive and proportionate remedies and penalties against those engaged in counterfeiting and piracy and so creates a level playing field for right holders in the EU. It means that all Member States will have a similar set of measures, procedures and remedies available for rightholders to defend their intellectual property rights (be they copyright or related rights, trademarks, patents, designs, etc) if they are infringed.

Page 58: Intellectual Property Crimes : Research Tools & Strategies

National IP Offices

Page 59: Intellectual Property Crimes : Research Tools & Strategies

News

• Web pages– Industry specific– Popular e.g. CNN– RSS feeds

• Email newsletters• Blogs• Clipping services and alerts• Social media

Page 60: Intellectual Property Crimes : Research Tools & Strategies
Page 61: Intellectual Property Crimes : Research Tools & Strategies

Social media

Page 62: Intellectual Property Crimes : Research Tools & Strategies

Fact research other universe of sources…

Page 63: Intellectual Property Crimes : Research Tools & Strategies

Private Investigators

Page 64: Intellectual Property Crimes : Research Tools & Strategies

The end is only the beginning…the Library and Librarians are your

collaborators to success