Draft Technical Report on Counterfeiting
Total Page:16
File Type:pdf, Size:1020Kb
International Telecommunication Union ITU-T Technical Report TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (21 November 2014) Counterfeit ICT equipment Summary Counterfeiting is widely recognized as a significant and growing socio-economic problem. This Technical Report provides background information on the nature of the issues related to the counterfeiting of information and communication technology (ICT) equipment, a review of the international conventions covering this type of infringement of intellectual property rights and the activities of organizations in the enforcement of these rights, and a description of a range of means to combat the trade in counterfeit products. In addition, a number of national and regional initiatives to combat the counterfeiting of mobile devices are described in Annex A. Keywords Counterfeit, substandard. Reference Number QSTR-COUNTERFEIT. Change log This is version 1 of the ITU-T Technical Report on “Counterfeit ICT Equipment” approved at the ITU-T Study Group 11 Working Party 3 (WP3) meeting held in Geneva, 21 November 2014. Editor: Keith Mainwaring Tel: +46 76 107 6877 UNIS Email: [email protected] QSTR-COUNTERFEIT (2014-11) II CONTENTS 1 Introduction: counterfeiting products – a growing problem ................................................. 6 2 What is counterfeiting? ......................................................................................................... 8 3 Impacts of counterfeit ICT equipment and components ....................................................... 8 3.1 Counterfeit ICT equipment examples ..................................................................... 8 4 Intellectual property rights (IPRs) conventions .................................................................... 12 4.1 The Paris Convention for the Protection of Industrial Property and the Berne Convention for the Protection of Literary and Artistic Works ....................... 12 4.2 World Trade Organization (WTO) Trade-Related Aspects of Intellectual Property Rights (TRIPS) ................................................................................ 12 5 IPR enforcement ................................................................................................................... 13 5.1 World Intellectual Property Organization (WIPO) ................................................. 13 5.2 World Trade Organization – Council for TRIPS .................................................... 14 5.3 UN Office of Drugs and Crime (UNODC) ............................................................. 14 5.4 World Customs Organization (WCO) .................................................................... 14 5.5 European Union ...................................................................................................... 15 5.6 Interpol .................................................................................................................... 16 5.7 United Nations Economic Commission for Europe (UNECE) .............................. 16 5.8 National Initiatives (a few examples) ..................................................................... 16 6 Industry anti-counterfeiting forums ...................................................................................... 17 6.1 International Chamber of Commerce (ICC) ........................................................... 17 6.2 International Anti-Counterfeiting Coalition (IACC) .............................................. 17 6.3 Mobile Manufacturers Forum (MMF) .................................................................... 17 6.4 Association of Service and Computer Dealers International and North American Association of Telecommunications Dealers (AscdiNatd) ............................ 17 6.5 Alliance for Gray Market and Counterfeit Abatement (AGMA) ........................... 17 6.6 British Electrotechnical and Allied Manufacturers Association (BEAMA) Anti- counterfeit Working Group ............................................................................ 17 6.7 UKEA (United Kingdom Electronics Alliance) ..................................................... 18 6.8 Anti-Counterfeiting Group (ACG) ......................................................................... 18 6.9 UNIFAB - Union des Fabricants ........................................................................... 18 6.10 International Electronics Manufacturing Initiative (iNEMI) ................................ 18 7 Measures to combat counterfeit equipment .......................................................................... 18 7.1 Introduction ............................................................................................................. 18 7.2 Abuse of identifiers and type approval logos ......................................................... 21 7.3 International mobile equipment identity (IMEI) .................................................... 21 7.4 Unique identifiers ................................................................................................... 24 7.5 Automatic identification and data capture (AIDC) ................................................ 27 QSTR-COUNTERFEIT (2014-11) III 7.6 Secure printing and hologram labels ...................................................................... 31 7.7 Supply chain management ...................................................................................... 31 7.8 Testing .................................................................................................................... 33 7.9 Databases ................................................................................................................ 33 7.10 Market surveillance .............................................................................................. 34 8 Standards organizations ........................................................................................................ 34 9 Guidelines for combating counterfeiting .............................................................................. 35 10 Conclusions ......................................................................................................................... 36 11 ITU engagement .................................................................................................................. 38 12 References ........................................................................................................................... 41 Annex A Systems for identifying counterfeit mobile devices ................................................. 48 A.1 Examples of measures taken by national administrations and regulators ............. 48 A.2 Examples of joint measures on regional levels ...................................................... 66 QSTR-COUNTERFEIT (2014-11) IV List of Figures Page FIGURE 1: EXAMPLE OF ANATEL’S REQUIRED SECURED LABEL DEFINED BY THEIR RESOLUTION 481/2007 ...................... 19 FIGURE 2: CONFORMITY ASSESSMENT ECOSYSTEM ........................................................................................................... 20 FIGURE 3: PROCEDURE KNOWN AS TROPICALIZAÇÃO (PORTUGUESE FOR TROPICALIZATION) ............................................ 21 FIGURE 4: IMEI FORMAT .................................................................................................................................................. 22 FIGURE 5: UCODE FORMAT ................................................................................................................................................ 25 FIGURE 6. FUNCTIONAL ARCHITECTURE FOR MULTIMEDIA INFORMATION ACCESS TRIGGERED BY TAG-BASED IDENTIFICATION (RECOMMENDATION ITU-T H.621) ........................................................................................................ 26 FIGURE 7: EXAMPLES OF LINEAR BARCODES ..................................................................................................................... 27 FIGURE 8: EXAMPLES OF MATRIX (2-DIMENTIONAL) BARCODES ....................................................................................... 27 FIGURE 9: ISO/IEC 15963 TAG ID FORMAT ...................................................................................................................... 28 FIGURE 10: CLASSES OF UNIQUE TID ISSUERS. .................................................................................................................. 29 FIGURE 11: EXAMPLE OF RFID EMBLEM SPECIFIED IN ISO/IEC 29160 ............................................................................ 30 FIGURE 12: EPCGLOBAL STANDARDS OVERVIEW [59] ...................................................................................................... 31 FIGURE 13: ISO 28000 SECURITY MANAGEMENT SYSTEM ELEMENTS. ............................................................................... 32 FIGURE 14: PROTECTING INTELLECTUAL PROPERTY RIGHTS (ADAPTED FROM UK IP CRIME GROUP TOOLKIT [75]) ....... 36 FIGURE A.1: CENTRAL EIR IMEI DATABASE SOLUTION IN EGYPT .................................................................................... 51 FIGURE A.2: CENTRAL EQUIPMENT IDENTITY REGISTRY STRUCTURE [FROM ANNUAL ACTIVITY REPORT 2010 HTTPS://WWW.ICTA.MU/MEDIAOFFICE/PUBLI.HTM] ........................................................................................................... 55 FIGURE A.3: AISMTRU FUNCTIONS ................................................................................................................................. 59 FIGURE A.4: