ENFORCEMENT
eop_ipec_jointstrategicplan_hi-res
eop_ipec_jointstrategicplan_hi-res
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Office of the Intellectual Property Enforcement Coordinator<br />
38<br />
See World Intellectual Property Organization, “IP5<br />
Statistics Report 2011,” (2011) at p.80, accessed from<br />
http://www.fiveipoffices.org/statistics/statisticsreports/<br />
statisticsreport2011edition/PCT.pdf.<br />
39<br />
See, e.g., Organization for Economic Co-operation and<br />
Development (OECD), “Public Sector Transparency and The<br />
International Investor,” at p. 37 (2003), accessed from https://<br />
www.oecd.org/investment/investment-policy/18546790.pdf.<br />
40<br />
See Office of the U.S. Trade Representative, “2016 Special<br />
301 Report,” at p. 10 (April 2016), accessed from https://ustr.<br />
gov/sites/default/files/USTR-2016-Special-301-Report.pdf.<br />
41<br />
This is based on the design-application statistics for 2016<br />
(January through September) on the website of the World<br />
Intellectual Property Organization (WIPO). During this period,<br />
the top five jurisdictions – among the designated contracting<br />
parties – were the European Union (3,089 design applications),<br />
the United States (1,624), Switzerland (1,462), Turkey (1,033),<br />
and Japan (878). WIPO, “Statistics under the Hague System,”<br />
accessed from http://www.wipo.int/hague/en/statistics/<br />
monthly_stats.jsp?type=DALL&name=6&count=COUNT. The<br />
website for the United States Patent and Trademark Office<br />
(USPTO) has additional information about the Hague System.<br />
See USPTO, “Hague Agreement Concerning the International<br />
Registration of Industrial Designs,” accessed from https://www.<br />
uspto.gov/patent/initiatives/hague-agreement-concerninginternational-registration-industrial-designs.<br />
42<br />
See Office of the National Counterintelligence Executive,<br />
“Foreign Spies Stealing US Economic Secrets in Cyberspace:<br />
Report to Congress on Foreign Economic Collection and<br />
Industrial Espionage, 2009-2011” (October 2011), accessed<br />
from https://www.ncsc.gov/publications/reports/fecie_all/<br />
Foreign_Economic_Collection_2011.pdf.<br />
Efforts to Quantify the Economic Effects of Counterfeit and<br />
Pirated Goods,” (April 2010), accessed from http://www.gao.<br />
gov/new.items/d10423.pdf.<br />
48<br />
Defense Security Service, United States Department of<br />
Defense, “Targeting U.S. Technologies: A Trend Analysis of<br />
Reporting From Defense Industry,” (2012), accessed from http://<br />
www.dss.mil/documents/ci/2012-unclass-trends.pdf.<br />
49<br />
President Barack Obama, “A New Tool Against Cyber<br />
Threats” (April 1, 2015), accessed from https://medium.<br />
com/@PresidentObama/a-new-tool-against-cyber-threats-<br />
1a30c188bc4#.dkbljtcbx.<br />
50<br />
See The White House, “Fact Sheet: Cybersecurity National<br />
Action Plan” (February 6, 2016), accessed from https://www.<br />
whitehouse.gov/the-press-office/2016/02/09/fact-sheetcybersecurity-national-action-plan.<br />
51<br />
Office of Management and Budget, “Category Management<br />
Policy 16-1: Improving the Acquisition and Management<br />
of Common Information Technology: Software Licensing”<br />
(OMB Memorandum M-16-12; June 2, 2016), accessed<br />
from https://www.whitehouse.gov/sites/default/files/omb/<br />
memoranda/2016/m-16-12_1.pdf.<br />
52<br />
Anne Rung, United States Chief Acquisition Officer, and<br />
Tony Scott, United States Chief Information Officer, “Applying<br />
Category Management Principles to Software Management<br />
Practices” (June 2, 2016), accessed from https://www.whitehouse.<br />
gov/blog/2016/06/02/applying-category-managementprinciples-software-management-practices.<br />
53<br />
Executive Order 13103 of September 30, 1998, on “Computer<br />
Piracy” (63 FR 53273; October 5, 1998), accessed from https://<br />
www.gpo.gov/fdsys/pkg/FR-1998-10-05/pdf/98-26799.pdf.<br />
43<br />
See 18 U.S.C. § 1839(3) (definition of “trade secret”); The<br />
Uniform Trade Secret Act, § 1(4) (definition of “trade secret”),<br />
accessed from http://www.uniformlaws.org/shared/docs/<br />
trade%20secrets/utsa_final_85.pdf.<br />
44<br />
Leslie R. Caldwell, Assistant Attorney General, Criminal<br />
Division, United States Department of Justice, “Kolon Industries<br />
Inc. Pleads Guilty for Conspiring to Steal DuPont Trade Secrets<br />
Involving Kevlar Technology: Kolon Sentenced To Pay $360<br />
Million in Restitution And Fines” (April 30, 2015), accessed from<br />
https://www.justice.gov/opa/pr/kolon-industries-inc-pleadsguilty-conspiring-steal-dupont-trade-secrets-involving-kevlar.<br />
45<br />
This Figure is found in The Center for Responsible Enterprise<br />
And Trade and PricewaterhouseCoopers LLP, Economic Impact<br />
of Trade Secret Theft: A framework for companies to safeguard<br />
trade secrets and mitigate potential threats, p. 20 Figure 8<br />
(February 2014), accessed at http://www.pwc.com/us/en/<br />
forensic-services/publications/assets/economic-impact.pdf.<br />
46<br />
Executive Office of the President, “Administration Strategy<br />
on Mitigating the Theft of U.S. Trade Secrets,” at p. 1 (February<br />
2013), accessed from https://www.whitehouse.gov/sites/default/<br />
files/omb/IPEC/admin_strategy_on_mitigating_the_theft_<br />
of_u.s._trade_secrets.pdf.<br />
47<br />
See The Commission on the Theft of American Intellectual<br />
Property, “The IP Commission Report: The Report of the<br />
Commission on the Theft of American Intellectual Property,”<br />
(May 2013), accessed from http://www.ipcommission.org/<br />
report/ip_commission_report_052213.pdf; Government<br />
Accountability Office, “Intellectual Property: Observations on<br />
54<br />
Office of Management and Budget, “Category Management<br />
Policy 16-1: Improving the Acquisition and Management<br />
of Common Information Technology: Software Licensing”<br />
(OMB Memorandum M-16-12; June 2, 2016), accessed<br />
from https://www.whitehouse.gov/sites/default/files/omb/<br />
memoranda/2016/m-16-12_1.pdf.<br />
55<br />
Anne Rung, United States Chief Acquisition Officer, and<br />
Tony Scott, United States Chief Information Officer, “Applying<br />
Category Management Principles to Software Management<br />
Practices” (June 2, 2016), accessed from https://www.whitehouse.<br />
gov/blog/2016/06/02/applying-category-managementprinciples-software-management-practices.<br />
56<br />
OMB Memorandum M-16-02 includes the following directions<br />
to each agency: (1) “No later than 45 days after issuance of<br />
this memo, appoint a software manager, that is responsible<br />
for managing, through policy and procedure, all agency-wide<br />
commercial and COTS [commercial-off-the-shelf] software<br />
agreements and licenses”; (2) “Maintain a continual agencywide<br />
inventory of software licenses, including all licenses<br />
purchased, deployed, and in use…”; and (3) “Analyze inventory<br />
data to ensure compliance with software license agreements,<br />
consolidate redundant applications, and identify other costsaving<br />
opportunities.” Office of Management and Budget,<br />
“Category Management Policy 16-1: Improving the Acquisition<br />
and Management of Common Information Technology: Software<br />
Licensing,” at p. 3 (OMB Memorandum M-16-12; June 2, 2016),<br />
accessed from https://www.whitehouse.gov/sites/default/files/<br />
omb/memoranda/2016/m-16-12_1.pdf.<br />
SECTION 4<br />
151