12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Office of the Intellectual Property Enforcement Coordinator<br />

• To understand how to put “big data” to work<br />

to better understand, and minimize, commercial<br />

exploitation of copyrighted content. How to<br />

increase transparency and better insight into criminal<br />

exploitation across ad networks, payment processing,<br />

and other digital transactions in order to understand<br />

the characteristics of the illicit actor, and support<br />

efforts to preserve the integrity of the exploited<br />

platforms and services? For example, available<br />

generalized and anonymized data on terminated<br />

advertising or payment processing accounts (such<br />

as, for example, duration of account, dollar flow,<br />

general geographical location, etc.) may improve<br />

benchmarking of enforcement initiatives and enable<br />

stakeholders to identify opportunities for further<br />

advancement of underlying policy objectives.<br />

• To understand common tactics employed by<br />

operators of websites that promote counterfeit<br />

goods or unauthorized content. For example, how do<br />

illicit actors exploit various domain environments to<br />

successfully evade law enforcement through “domain<br />

name hopping” and other strategics?<br />

Research on Trade Secret Theft is Needed…<br />

• To assess the magnitude of trade secret theft. Research<br />

is needed into the scale and economic impacts of<br />

trade secret theft on the U.S. economy, including the<br />

impact to the competitiveness of U.S. exports, national<br />

economic interests, and the jobs market.<br />

• To assess the degree of cybersecurity preparedness<br />

in the private sector. Further research is needed on<br />

the share of U.S. businesses, including SMEs, that<br />

are actively engaged in cybersecurity prevention,<br />

monitoring, and resiliency planning.<br />

• To determine global remedies and procedural<br />

difficulties faced by rights holders. Comprehensive<br />

comparative legal analysis of trade secret protections<br />

and procedures around the world would increase<br />

many rights holders’ understanding of the markets<br />

in which they operate. Analysis of experiences<br />

prosecuting trade secret rights abroad, including<br />

effectiveness of administration of trade secret laws,<br />

would also benefit rights holders and policymakers.<br />

SECTION 4<br />

147

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!