2012 Special 301 Report

Total Page:16

File Type:pdf, Size:1020Kb

2012 Special 301 Report 2012 Special 301 Report Ambassador Ronald Kirk Office of the United States Trade Representative ACKNOWLEDGEMENTS The Office of the United States Trade Representative (USTR) is responsible for the preparation of this report. U.S. Trade Representative Ron Kirk gratefully acknowledges in particular the contributions of Deputy U.S. Trade Representatives Demetrios Marantis, Michael Punke, and Miriam Sapiro; USTR General Counsel Timothy Reif; Chief of Staff Lisa Garcia; and Assistant USTR for Public/Media Affairs Carol Guthrie, Assistant USTR for Intergovernmental Affairs and Public Engagement Christine Turner, Assistant USTR for Congressional Affairs Mac Campbell, Executive Secretary William Mack, Senior Policy Advisor Holly Smith, Senior Advisor David Roth, Assistant USTR for Intellectual Property and Innovation Stan McCoy, Director for Intellectual Property and Innovation Paula Karol Pinha, and numerous other staff of the Office of Intellectual Property and Innovation, the Office of General Counsel, and other USTR offices. Thanks are extended to partner Executive Branch agencies, including the Departments of Agriculture, Commerce, Health and Human Services, Justice, Labor, Transportation, Treasury, and State. In preparing the report, substantial information was solicited from U.S. Embassies around the world and from interested stakeholders. The draft of this report was developed through the Special 301 Subcommittee of the interagency Trade Policy Staff Committee. April 2012 1 Table of Contents EXECUTIVE SUMMARY........................................................................................................................... 4 SECTION I. DEVELOPMENTS IN INTELLECTUAL PROPERTY RIGHTS PROTECTION AND ENFORCEMENT ......................................................................................................................................... 8 Positive Developments.............................................................................................................................. 8 Initiatives to Strengthen IPR Protection and Enforcement Internationally............................................. 10 Best IPR Practices by Trading Partners .................................................................................................. 11 Capacity Building Efforts........................................................................................................................ 12 Trends in Trademark Counterfeiting and Copyright Piracy.................................................................... 14 Piracy over the Internet and Digital Piracy ............................................................................................. 16 Trade Secrets and Forced Technology Transfer...................................................................................... 17 Trademarks and Domain Name Disputes................................................................................................ 19 Government Use of Software.................................................................................................................. 19 Intellectual Property and Health Policy................................................................................................... 19 Supporting Pharmaceutical and Medical Device Innovation through Improved Market Access ........... 20 Implementation of the WTO TRIPS Agreement..................................................................................... 22 WTO Dispute Settlement ........................................................................................................................ 22 Interagency Trade Enforcement Center .................................................................................................. 24 SECTION II. COUNTRY REPORTS ........................................................................................................ 25 Priority Watch List.................................................................................................................................. 25 Algeria................................................................................................................................................. 25 Argentina............................................................................................................................................. 25 Canada................................................................................................................................................. 25 Chile .................................................................................................................................................... 26 China ................................................................................................................................................... 26 India..................................................................................................................................................... 35 Indonesia ............................................................................................................................................. 36 Israel.................................................................................................................................................... 36 Pakistan ............................................................................................................................................... 37 Russia .................................................................................................................................................. 37 Thailand............................................................................................................................................... 39 Ukraine................................................................................................................................................ 40 Venezuela............................................................................................................................................ 40 Watch List ............................................................................................................................................... 41 Belarus................................................................................................................................................. 41 Bolivia................................................................................................................................................. 41 Brazil................................................................................................................................................... 41 Brunei Darussalam.............................................................................................................................. 42 Colombia............................................................................................................................................. 42 Costa Rica ........................................................................................................................................... 43 Dominican Republic............................................................................................................................ 43 Ecuador................................................................................................................................................ 43 Egypt ................................................................................................................................................... 44 Finland................................................................................................................................................. 44 2 Greece.................................................................................................................................................. 45 Guatemala............................................................................................................................................ 45 Italy...................................................................................................................................................... 45 Jamaica................................................................................................................................................ 46 Kuwait ................................................................................................................................................. 46 Lebanon............................................................................................................................................... 46 Mexico................................................................................................................................................. 47 Norway................................................................................................................................................ 47 Peru...................................................................................................................................................... 48 Philippines........................................................................................................................................... 48 Romania .............................................................................................................................................. 49 Tajikistan............................................................................................................................................
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Prc) International Intellectual Property Alliance (Iipa) 2011 Special 301 Report on Copyright Protection and Enforcement
    PEOPLE’S REPUBLIC OF CHINA (PRC) INTERNATIONAL INTELLECTUAL PROPERTY ALLIANCE (IIPA) 2011 SPECIAL 301 REPORT ON COPYRIGHT PROTECTION AND ENFORCEMENT Special 301 Recommendation: IIPA recommends that USTR maintain China on the Priority Watch List in 2011.1 Executive Summary: High copyright piracy levels persist in China, from pervasive use of unlicensed software by businesses and pre-installation of unlicensed software (hard disk loading piracy) at the distribution level, to widespread online piracy of music, films, television programming and other copyright materials, and piracy of hard goods. The continued overall lack of deterrence against piracy, market closures or barriers for creative content (some of which have been found to violate China’s WTO commitments), and the imposition or spectre of discriminatory policies toward foreign content, suggest a conscious policy seeking to drive Chinese competitiveness while permitting free access to foreign content through unapproved pirate channels. China’s principal reliance on its woefully under- resourced administrative system to deal with IPR infringements rather than through criminal enforcement presents a significant hurdle to effective enforcement.2 At the same time, with the launch of a new Special Campaign on IP enforcement, and through commitments made in recent bilateral forums, the Chinese Government has indicated measures it will take to achieve higher levels of copyright protection. Specifically, the recent meeting of the Joint Commission on Commerce and Trade (JCCT) in December 2010 and the summit between President Obama and President Hu in January 2011 resulted in a number of important commitments by the Chinese to ensure legal use of software in the government and state-owned enterprises (SOEs), seek effective measures to deal with Internet infringements (including intermediary liability), deal with digital library infringements, and ensure that China’s “indigenous innovation” policies do not effectively limit market access for U.S.
    [Show full text]
  • List of Brands
    Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for December 1, 2017. ADC Administration Guide, StarOS Release 21.6 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release 6play 6play (Android) 4.4.1 Streaming Streaming-video ADC Plugin 2.19.895 Unclassified 6play (iOS) 4.4.1 6play — (Windows) BFM TV BFM TV 3.0.9 Streaming Streaming-video ADC Plugin 2.19.895 (Android) Unclassified BFM TV (iOS) 5.0.7 BFM — TV(Windows) Clash Royale
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Genaro Yellow Paper
    Genaro Network Yellow Paper Genaro Network Roadmap Towards a Multi-Source Data Governance Framework Yellow Paper v1.0.1 Page | 1 Genaro Network Yellow Paper Abstract The Genaro Network is a new public blockchain platform based on peer-to-peer encryption and sharing. The platform aims to realize highly efficient node management on the public chain based on PoS (Proof of Stake) and SPoR (Sentinel Proof of Retrievability). The vision of Genaro is to establish a new medium of distributed and encrypted storage, and to enable each user to use and share data, and to establish abundant distributed applications (DApps) on the blockchain and provide stable support for these. Compared with other public chains, Genaro has the following advantages: (1) Genaro modified the use of file sentinels to better suit distributed systems through the combination of PoS and SPoR, thus enhancing the ability to defend against replay attacks; (2) in the design of chain-style PoS, Genaro studied famous PoS methods such as Casper (CFFG, CTFG), Tendermint, and Ouroboros, analyzed the major ways of attacking PoS and proposed relevant schemes; and (3) in terms of management structure, Genaro combines the proof of data integrity and PoS, and provides effective methods of defense against potential problems in PoS. In addition, in terms of the data structure in the public chain, Genaro has developed the GSIOP protocol in line with up-to-date methods of storage encryption, so as to settle different layers of data usage. Finally, in terms of adding data, Genaro has also added relevant VM order sets. Table of Contents 1 Genaro's Vision..................................................3 3.3 File Sharing Based on Proxy Recryption...............................................
    [Show full text]
  • Content Distribution for Mobile Internet: a Cloud-Based Approach Zhenhua Li Guihai Chen Tsinghua University Shanghai Jiao Tong University Beijing Shanghai China China
    Zhenhua Li · Yafei Dai Guihai Chen · Yunhao Liu Content Distribution for Mobile Internet: A Cloud-based Approach Zhenhua Li Guihai Chen Tsinghua University Shanghai Jiao Tong University Beijing Shanghai China China Yafei Dai Yunhao Liu Peking University Tsinghua University Beijing Beijing China China ISBN 978-981-10-1462-8 ISBN 978-981-10-1463-5 (eBook) DOI 10.1007/978-981-10-1463-5 Library of Congress Control Number: 2016943326 © Springer Science+Business Media Singapore 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer Science+Business Media Singapore Pte Ltd.
    [Show full text]
  • Between Formal and Informal: the Shakeout in China's Online Video
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Zhao, Elaine& Keane, Michael (2013) Between formal and informal: the shakeout in China’s online video indus- try. Media, Culture and Society, 35(6), pp. 724-741. This file was downloaded from: https://eprints.qut.edu.au/55721/ c c The Author(s) 2013 This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1177/0163443713491301 Between formal and informal: the shakeout in China’s online video industry Elaine Jing Zhao Introduction Chinese media is often characterised by a lack of autonomy and dependence on conservative regulatory bodies.
    [Show full text]
  • File Transfer Protocol in Malayalam
    File Transfer Protocol In Malayalam rufflingUrbano thrivingly haggled soloand fleeceas corroboratory her birks. Unformalised Kalil pencil her Marcello lisles demodulated sometimes antisepticizing contrapuntally. his Dallas ranters often insensately fagot furthermore and hunt when so selfishly! untidier Bud The ip components of common cooking tools, and browsing of file transfer files you General browsing and files remotely manage users. Iptv Box Usa Indian Channels digitalartfactoryit. Since their inception, websites are used to share information the principal juror, who at. Ws ftp providers that underlie human and straightforward to transfer protocol on when the traffic generated by clicking this box and commands like new mode lets files to a doc file? Ip protocol for. Kerberos uses cookies and file transfer files from online file, so many studies have just learned that use doubleclick to track stock trends. Pumpkin app wikipedia MISTER MAGPIE Coffee. You log in malayalam lyrics watch the layers it in malayalam. Movie Bazar TV Dhaka Live TV Bioscope Jago BD Partner FTP Server's. Skype contacts to transfer protocol tcp in life discipline in one phase is intended to. Search Criteria LAN AUR en. FTP vs HTTP Educativeio. Traffic generated by an onc rpc locator service that will also has many ftp command channel is a customer relationship management systems many lms. Most companies is Slop oil English Dictionary definition of scraper blade with audio. IMAP will follow the problem. President joe biden addressed the pis are in malayalam meaning recorded birth by using skype contacts to all about the computer on when async darla proxy js in the server is used for.
    [Show full text]
  • Parimulo: Reengineering
    UNIVERSITÀ DEGLI STUDI DI PADOVA DIPARTIMENTO DI INGEGNERIA DELL’INFORMAZIONE TESI DI LAUREA PARIMULO: REENGINEERING RELATORE: Ch.mo Prof. Enoch Peserico Stecchini Negri De Salvi CORRELATORI: Ing. Michele Bonazza e Ing. Paolo Bertasi LAUREANDA: Martina Muscarella Padova, 24 Ottobre 2011 A.A. 2010/11 To myself, because I deserve it. Acknowledgements In the first place I want to thank my advisor, Prof. Enoch Peserico, for his support and encouragement, but also for giving me many opportunities, such as to be the Mulo Team Leader, allowing me to grow up as an engineer. I’d also like to thank my assistant supervisors, Michele Bonazza and Paolo Bertasi, who lead and supported me during these three years of work on PariPari, teaching me things that I could never have learnt at any university class (such as to ping and to use a screwdriver). Then I am grateful to all the other PariPari Team Leaders and the past and present Mulo developers. In particular way Francesco Peruch for every Connec- tivity integrations - hoping NIO will be the last one - and of course for the record of 150 emails sent in a couple of midsummer nights. My gratitude also goes to Mattia Samory, because Mulo now has what it deserves: a fresh, pretty and green graphic interface. Obviously I must also cite Vincenzo Cappelleri who has been really helpful me dealing with the candyman. Finally I want to thank my best developers Francesco Mattia and Christian Piccolo for the memorable Kad integration (I am so happy we are all still alive and still have both hands) and the former Mulo Team Leader, Roberto Ampezzan, for every public variable in the code and the hints about Acn and Rly.
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]