Feeds

EC begins IP enforcement campaign

Pirates face broadside

  • alert
  • submit to reddit

High performance access to file storage

The European Commission has launched a new campaign against piracy and counterfeiting in non-EU countries, in a bid to stem estimated losses of between €120bn and €370bn a year. The commission says the main thrust of the campaign will be to ensure rigorous enforcement of existing intellectual property rights (IPR) laws, focusing on the countries where action is most needed.

Customs authorities across the EU seized around 85m counterfeit items in 2002, and more than 50m in the first half of 2003, according to figures published by the EC in November 2003. In 2002, the illegal goods seized had an estimated value of €2bn.

Pascal Lamy, the EU Trade commissioner, argues that piracy is a menace both inside and outside of the EU. He said: "Some of these fakes, like pharmaceuticals and foodstuffs constitute an outright danger to the public, while others undermine the survival of EU’s most innovative sectors, confronted with the misappropriation of their creations. Adopting new legislation on intellectual property is one thing. But devising the right tools to enforce it is another."

No one particular sector is more vulnerable to piracy than any other: the EC's memo on the subject says that "virtually every IP is being violated on a considerable scale", and that "software producers are as likely to be harmed as small makers of a certain type of tea".

The first step of the campaign is to identify which countries are most problematic, by surveying the member states. In 2003, China, Thailand, Russia, Turkey, Ukraine, Brazil, South Korea and Indonesia were identified as the main offenders. The commission says: "Stress will be put on technical cooperation and assistance to help third countries fight counterfeiting but the Commission will not hesitate to trigger all bilateral and multilateral sanction mechanisms against any country involved in systematic violations."

The EC will also work to raise awareness of the dangers associated with counterfeit goods. Although the extent of the risk to the consumer buying a pirated video is likely to be a poor quality version of the product, counterfeit plane parts or fake medicines, for example, have a greater potential for harm. ®

Related stories

MS extends IP protection to hoi polloi
UK gov moves to bust bootleggers
Software pirates cost $9.7bn in Europe - BSA

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.