06.01.2015 Views

Intellectual Property Protection and Enforcement Manual - Ipr-policy.eu

Intellectual Property Protection and Enforcement Manual - Ipr-policy.eu

Intellectual Property Protection and Enforcement Manual - Ipr-policy.eu

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Br<strong>and</strong> <strong>Protection</strong> <strong>Manual</strong><br />

An Anti-Counterfeiting <strong>and</strong><br />

Piracy Strategy<br />

Making sure that your IP is properly registered <strong>and</strong> recorded is only one component of a successful<br />

anti-counterfeiting <strong>and</strong>, piracy strategy. You also need a formal anti-counterfeiting <strong>and</strong>, piracy plan.<br />

Although there are trade associations <strong>and</strong> government agencies involved in this fight, the ultimate<br />

responsibility for protecting your br<strong>and</strong>s <strong>and</strong> trademarks is yours. Br<strong>and</strong>s <strong>and</strong> trademarks are<br />

among your most valuable assets—a formal plan, as important as any business plan or new product<br />

specifications should be developed. The need for a plan is even more acute if there are significant<br />

health <strong>and</strong> safety risks associated with the products you manufacture. While it is bad to lose sales <strong>and</strong><br />

market share, it is another thing entirely to have your br<strong>and</strong> name used in connection with a fire or<br />

loss of life.<br />

Unfortunately, there is no off-the-shelf solution to your company’s anti-counterfeiting strategy needs.<br />

Every company is unique, <strong>and</strong> each company’s anti-counterfeiting program must be specifically<br />

tailored to its own particular requirements. The following sections provide some suggestions for<br />

building such a strategy.<br />

Internal Monitoring<br />

A successful anti-counterfeiting strategy begins with self-analysis. Counterfeiters prey on companies<br />

with lax security measures <strong>and</strong> porous supply chains. Moreover, companies that turn a blind eye<br />

to the diversion of products into unauthorized markets or channels of trade are asking for trouble<br />

as this gray market provides perfect cover for counterfeiters to introduce their illegitimate goods.<br />

Counterfeiters have an uncanny ability to detect weaknesses in a br<strong>and</strong> owner’s supply chain <strong>and</strong><br />

frequently point to those weaknesses when accused of counterfeiting.<br />

Although getting products to market would appear to be as simple as moving goods from point<br />

A to point B, it is never that easy. Instead, products typically pass through many h<strong>and</strong>s, from<br />

the manufacturing process to distribution to retail. Each exchange provides an opportunity for<br />

counterfeiters to infiltrate the supply chain with counterfeits. Accordingly, br<strong>and</strong> owners should<br />

consider the following for protecting their supply chains. 33<br />

Legitimate Inputs<br />

To ensure that raw materials <strong>and</strong> parts are authentic <strong>and</strong> meet company st<strong>and</strong>ards, br<strong>and</strong><br />

owners should:<br />

•<br />

Purchase materials <strong>and</strong> equipment used in manufacturing from company-authorized<br />

suppliers only. Where possible, source from fully auditable vendors that source<br />

exclusively from original manufacturers, franchised distributors, or the first owners<br />

of the goods.<br />

Page 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!