Dr. Michael Geist, Canadian Law Professor and the Canada Research Chair in Internet and E-Commerce Law at the University of Ottawa.

July 11, 2012 (TSR) – Last week, the European Parliament voted overwhelmingly to reject ACTA, striking a major blow to the hopes of supporters who envisioned a landmark agreement that would set a new standard for intellectual property rights enforcement. The European Commission, which negotiates trade deals such as ACTA on behalf of the European Union, has vowed to revive the badly damaged agreement. Its most high-profile move has been to ask the European Court of Justice to rule on ACTA’s compatibility with fundamental European freedoms with the hope that a favourable ruling could allow the European Parliament to reconsider the issue.

While the court referral has attracted the lion share of attention, my weekly technology law column (Toronto Star version, homepage version) reports that there is an alternate secret strategy in which Canada plays a key role. According to recently leaked documents, the EU plans to use the Canada – EU Trade Agreement (CETA), which is nearing its final stages of negotiation, as a backdoor mechanism to implement the ACTA provisions. [UPDATE 7/10: new post on why the concern over ACTA in CETA is warranted] [UPDATE 7/11: EC responds by saying ACTA ISP provisions removed from CETA. Appears likely most of remaining provisions remain]

The CETA IP chapter has already attracted attention due to EU pharmaceutical patent demands that could add billions to provincial health care costs, but the bigger story may be that the same chapter features a near word-for-word replica of ACTA. According to the leaked document, dated February 2012, Canada and the EU have already agreed to incorporate many of the ACTA enforcement provisions into CETA, including the rules on general obligations on enforcement, preserving evidence, damages, injunctions, and border measure rules. One of these provisions even specifically references ACTA. A comparison table of ACTA and the leaked CETA chapter is posted below.   has already attracted attention due to EU pharmaceutical patent demands that could add billions to provincial health care costs, but the bigger story may be that the same chapter features a near word-for-word replica of ACTA. According to the leaked document, dated February 2012, Canada and the EU have already agreed to incorporate many of the ACTA enforcement provisions into CETA, including the rules on general obligations on enforcement, preserving evidence, damages, injunctions, and border measure rules. One of these provisions even specifically references ACTA. A comparison table of ACTA and the leaked CETA chapter is posted below.

The EU has also proposed incorporating ACTA’s criminal enforcement and co-operation chapters into CETA. The criminal provisions were the target of European Parliament criticism for their lack of proportionality and uncertain application.

Canada has similarly pushed for the inclusion of ACTA provisions, proposing identical digital lock rules as well as ACTA-style Internet service provider provisions that raised privacy concerns from the European Data Protection Supervisor. In fact, Canada would like to extend ACTA by mandating an anti-camcording provision (a similar provision is currently voluntary in ACTA).

The European Commission strategy appears to be to use CETA as the new ACTA, burying its provisions in a broader Canadian trade agreement with the hope that the European Parliament accepts the same provisions it just rejected with the ACTA framework. If successful, it would likely then argue that ACTA poses no new concerns since the same rules were approved within the Canadian trade deal.

The backdoor ACTA approach creates enormous risks for Canada’s trade ambitions. Given the huge anti-ACTA movement, the Canada – EU trade deal could face widespread European opposition with CETA becoming swept up in similar protests.

With anti-ACTA sentiment spreading across Europe, Canada should push to remove the intellectual property chapter from CETA altogether.  The move would not be unprecedented. Many of Canada’s free trade agreements feature only limited IP provisions and last year a Canadian parliamentary committee recommended that “domestic copyright policies are not part of any present or future trade negotiations.”

Meanwhile, the U.S. and EU recently announced their own plans to negotiate a trade deal but agreed to keep intellectual property issues out of the talks. If CETA becomes known as ACTA II, the future of the Canada – EU trade deal may hinge on adopting a similar approach.

 

Issue ACTA (Final version) CETA IP Draft (as of February 2012)
Scope Each Party shall be free to determine the appropriate method of implementing the provisions of this Agreement within its own legal system and practice.
(Article 2(1))
Each Party shall be free to determine the appropriate method of implementing the provisions of this Agreement within its own legal system and practice.
Nothing in this Agreement creates any obligation with respect to the distribution of resources as between enforcement of intellectual property rights and enforcement of law in general.
(Article 2(2))
Nothing in this Agreement creates any obligation with respect to the distribution of resources as between enforcement of intellectual property rights and enforcement of law in general.
Technological Protection Measures Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors, performers or producers of phonograms in connection with the exercise of their rights in, and that restrict acts in respect of, their works, performances, and phonograms, which are not authorized by the authors, the performers or the producers of phonograms concerned or permitted by law.
(Article 27(5))
Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures41 that are used by authors, performers [CA: of performances fixed in phonograms,] or producers of phonograms in connection with the exercise of their rights in, and that restrict acts in respect of, their works, performances [CA: fixed in phonograms], and phonograms, which are not authorized by the authors, the performers [CA: of performances fixed in phonograms,] or the producers of phonograms concerned or permitted by law. [as proposed by Canada]
In order to provide the adequate legal protection and effective legal remedies referred to in paragraph 5, each Party shall provide protection at least against:
(a) to the extent provided by its law:
(i)    the unauthorized circumvention of an effective technological measure carried out knowingly or with reasonable grounds to know; and
(ii)    the offering to the public by marketing of a device or product, including computer programs, or a service, as a means of circumventing an effective technological measure; and
(b) the manufacture, importation, or distribution of a device or product, including computer programs, or provision of a service that:
(i) is primarily designed or produced for the purpose of circumventing an effective technological measure; or
(ii)    has only a limited commercially significant purpose other than circumventing an effective technological measure.
(Article 27(6))
In order to provide the adequate legal protection and effective legal remedies
referred to in paragraph 5.13(1), each Party shall provide protection at least against: (a) to the extent provided by its law:
(i) the unauthorized circumvention of an effective technological measure carried out knowingly or with reasonable grounds to know; and
(ii) the offering to the public by marketing of a device or product, including computer programs, or a service, as a means of circumventing an effective technological measure; and
(b) the manufacture, importation, or distribution of a device or product, including computer programs, or provision of a service that:
(i) is primarily designed or produced for the purpose of circumventing an effective technological measure; or
(ii) has only a limited commercially significant purpose other than circumventing an effective technological measure.
[as proposed by Canada]
In implementing paragraphs 5 and 6, no Party shall be obligated to require that the design of, or the design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as the product does not otherwise contravene its measures implementing these paragraphs.
(Article 27(6)footnote 15)
In implementing paragraphs 5.13(1) and (2), no Party shall be obligated to require that the design of, or the design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as the product does not otherwise contravene its measures implementing these paragraphs.
[as proposed by Canada]
In providing adequate legal protection and effective legal remedies pursuant to the provisions of paragraphs 5 and 7, a Party may adopt or maintain appropriate limitations or exceptions to measures implementing the provisions of paragraphs 5, 6, and 7. The obligations set forth in paragraphs 5, 6, and 7 are without prejudice to the rights, limitations, exceptions, or defences to copyright or related rights infringement under a Party’s law. (Article 27(8)) In providing adequate legal protection and effective legal remedies pursuant to the provisions of paragraph 5.13(1), a Party may adopt or maintain appropriate limitations or exceptions to measures implementing the provisions of paragraphs 5.13(1) and (2). The obligations set forth in paragraphs 5.13(1) and (2) are without prejudice to the rights, limitations, exceptions, or defences to copyright or related rights infringement under a Party’s law.]
[as proposed by Canada]
Internet Provider Liability Further to paragraph 1, each Party’s enforcement procedures shall apply to infringement of copyright or related rights over digital networks, which may include the unlawful use of means of widespread distribution for infringing purposes. These procedures shall be implemented in a manner that avoids the creation of barriers to legitimate activity, including electronic commerce, and, consistent with that Party’s law, preserves fundamental principles such as freedom of expression, fair process, and privacy. [Footnote 13: For instance, without prejudice to a Party’s law, adopting or maintaining a regime providing for limitations on the liability of, or on the remedies available against, online service providers while preserving the legitimate interests of right holder.]
3.    Each Party shall endeavour to promote cooperative efforts within the business community to effectively address trademark and copyright or related rights infringement while preserving legitimate competition and, consistent with that Party’s law, preserving fundamental principles such as freedom of expression, fair process, and privacy.
4.    A Party may provide, in accordance with its laws and regulations, its competent authorities with the authority to order an online service provider to disclose expeditiously to a right holder information sufficient to identify a subscriber whose account was allegedly used for infringement, where that right holder has filed a legally sufficient claim of trademark or copyright or related rights infringement, and where such information is being sought for the purpose of protecting or enforcing those rights. These procedures shall be implemented in a manner that avoids the creation of barriers to legitimate activity, including electronic commerce, and, consistent with that Party’s law, preserves fundamental principles such as freedom of expression, fair process, and privacy.
(Article 27)
Each Party’s enforcement procedures shall apply to infringement of copyright or related rights over digital networks, which may include the unlawful use of means of widespread distribution for infringing purposes. These procedures shall be implemented in a manner that avoids the creation of barriers to legitimate activity, including electronic commerce, and, consistent with that Party’s law, preserves fundamental principles such as freedom of expression, fair process, and privacy. [CA: For instance, without prejudice to a Party’s law, adopting or maintaining a regime providing for limitations on the liability of, or on the remedies available against, online service providers, while preserving the legitimate interests of right holders, would be permitted].
5.16(2) Each Party shall endeavour to promote cooperative efforts within the business community to effectively address trademark and copyright or related rights infringement while preserving legitimate competition and, consistent with that Party’s law, preserving fundamental principles such as freedom of expression, fair process, and privacy.
5.16(3) A Party may provide, in accordance with its laws and regulations, its competent authorities with the authority to order an online service provider to disclose expeditiously to a right holder information sufficient to identify a subscriber whose account was allegedly used for infringement, where that right holder has filed a legally sufficient claim of trademark or copyright or related rights infringement, and where such information is being sought for the purpose of protecting or enforcing those rights.
These procedures shall be implemented in a manner that avoids the creation of barriers to legitimate activity, including electronic commerce, and, consistent with that Party’s law, preserves fundamental principles such as freedom of expression, fair process, and privacy.]
[proposed by Canada]
Civil Enforcement: Injunctions Each Party shall provide that, in civil judicial proceedings concerning the enforcement of intellectual property rights, its judicial authorities have the authority to issue an order against a party to desist from an infringement, and inter alia, an order to that party or, where appropriate, to a third party over whom the relevant judicial authority exercises jurisdiction, to prevent goods that involve the infringement of an intellectual property right from entering into the channels of commerce.Notwithstanding the other provisions of this Section, a Party may limit the remedies available against use by governments, or by third parties authorized by a government, without the authorization of the right holder, to the payment of remuneration, provided that the Party complies with the provisions of Part II of the TRIPS Agreement specifically addressing such use. In other cases, the remedies under this Section shall apply or, where these remedies are inconsistent with a Party’s law, declaratory judgments and adequate compensation shall be available. (Article 8) 1. Each Party shall provide that, in civil judicial proceedings concerning the enforcement of intellectual property rights, its judicial authorities shall have the authority to issue an order against a party to desist from an infringement, and inter alia, an order to that party, or, where appropriate, to a third party over whom the relevant judicial authority exercises jurisdiction, to prevent infringing goods from entering into the channels of commerce.
2. Notwithstanding the other provisions of this Section, a Party may limit the remedies available against use by government, or by third parties authorized by government, without the use of authorization of the right holders to the payment of remuneration provided that the Party complies with the provisions of Part II of the TRIPS Agreement specifically addressing such use. In other cases, the remedies under this Section shall apply or, where these remedies are inconsistent with a Party’s law, declaratory judgments and adequate compensation shall be available.
Civil Enforcement: Damages Each Party shall provide that, in civil judicial proceedings concerning the enforcement of intellectual property rights, its judicial authorities have the authority to order the infringer who, knowingly or with reasonable grounds to know, engaged in infringing activity to pay the right holder damages adequate to compensate for the injury the right holder has suffered as a result of the infringement. In determining the amount of damages for infringement of intellectual property rights, a Party’s judicial authorities shall have the authority to consider, inter alia, any legitimate measure of value the right holder submits, which may include lost profits, the value of the infringed goods or services measured by the market price, or the suggested retail price.
(Article 9(1))
1.    Each Party shall provide that:
(a)    in civil judicial proceedings, its judicial authorities shall have the authority to order the infringer who knowingly or with reasonable grounds to know, engaged in infringing activity of intellectual property rights to pay the right holder:
(i) damages adequate to compensate for the injury the right holder has suffered as a result of the infringement; or
(ii) the profits of the infringer that are attributable to the infringement, which may be presumed to be the amount of damages referred to in paragraph (i);
(b)    in determining the amount of damages for infringements of intellectual property rights, its judicial authorities may consider, inter alia, any legitimate measure of value that may be submitted by the right holder, including lost profits.
[CA: 2.    For greater certainty, a Party may limit or exclude damages in certain special cases.]
[EU: 2.    These provisions are without prejudice to a Party’s legislation providing for limitations of damages in certain exceptional situations, provided that they preserve the legitimate interests of the right holders.]
Civil Enforcement:
Other Remedies
1.    At least with respect to pirated copyright goods and counterfeit trademark goods, each Party shall provide that, in civil judicial proceedings, at the right holder’s request, its judicial authorities have the authority to order that such infringing goods be destroyed, except in exceptional circumstances, without compensation of any sort.
2.    Each Party shall further provide that its judicial authorities have the authority to order that materials and implements, the predominant use of which has been in the manufacture or creation of such infringing goods, be, without undue delay and without compensation of any sort, destroyed or disposed of outside the channels of commerce in such a manner as to minimize the risks of further infringements.
3.    A Party may provide for the remedies described in this Article to be carried out at the infringer’s expense.
(Article 10)
1.    The Parties shall ensure that the judicial authorities may order, at the request of the applicant and without prejudice to any damages due to the right holder by reason of the infringement, and without compensation of any sort, the definitive removal from the channels of commerce, or the destruction, of goods that they have found to be infringing an intellectual property right. The Parties shall ensure that the judicial authorities may order, if appropriate, destruction of materials and implements predominantly used in the creation or manufacture of those goods. In considering a request for such remedies, the need for proportionality between the seriousness of the infringement and the remedies ordered, as well as the interests of third parties, shall be taken into account.
2.    The Parties shall ensure that the judicial authorities have the authority to order that those remedies shall be carried out at the expense of the infringer, unless particular reasons are invoked for not doing so.
Civil Enforcement:
Information
Without prejudice to its law governing privilege, the protection of confidentiality of information sources, or the processing of personal data, each Party shall provide that, in civil judicial proceedings concerning the enforcement of intellectual property rights, its judicial authorities have the authority, upon a justified request of the right holder, to order the infringer or, in the alternative, the alleged infringer, to provide to the right holder or to the judicial authorities, at least for the purpose of collecting evidence, relevant information as provided for in its applicable laws and regulations that the infringer or alleged infringer possesses or controls. Such information may include information regarding any person involved in any aspect of the infringement or alleged infringement and regarding the means of production or the channels of distribution of the infringing or allegedly infringing goods or services, including the identification of third persons alleged to be involved in the production and distribution of such goods or services and of their channels of distribution.
(Article 11)
Without prejudice to its law governing privilege, the protection of confidentiality of information sources or the processing of personal data, each Party shall provide that, in civil judicial proceedings concerning the enforcement of intellectual property rights, its judicial authorities shall have the authority, upon a justified request of the right holder, to order the infringer or the alleged infringer, to provide to the right holder or to the judicial authorities, at least for the purpose of collecting evidence, relevant information as provided for in its applicable laws and regulations that the infringer or alleged infringer possesses or controls. Such information may include information regarding any person involved in any aspect of the infringement or alleged infringement and regarding the means of production or the channels of distribution of the infringing or allegedly infringing goods or services, including the identification of third persons alleged to be involved in the production and distribution of such goods or services and of their channels of distribution.
Civil Enforcement:
Provisional Measures
1.    Each Party shall provide that its judicial authorities have the authority to order prompt and effective provisional measures:
(a)    against a party or, where appropriate, a third party over whom the relevant judicial authority exercises jurisdiction, to prevent an infringement of any intellectual property right from occurring, and in particular, to prevent goods that involve the infringement of an intellectual property right from entering into the channels of commerce;
(b)    to preserve relevant evidence in regard to the alleged infringement.
2. Each Party shall provide that its judicial authorities have the authority to adopt provisional measures inaudita altera parte where appropriate, in particular where any delay is likely to cause irreparable harm to the right holder, or where there is a demonstrable risk of evidence being destroyed. In proceedings conducted inaudita altera parte, each Party shall provide its judicial authorities with the authority to act expeditiously on requests for provisional measures and to make a decision without undue delay.
3.    At least in cases of copyright or related rights infringement and trademark counterfeiting, each Party shall provide that, in civil judicial proceedings, its judicial authorities have the authority to order the seizure or other taking into custody of suspect goods, and of materials and implements relevant to the act of infringement, and, at least for trademark counterfeiting, documentary evidence, either originals or copies thereof, relevant to the infringement.
(Article 12)
1.    Each Party shall provide that its judicial authorities shall have the authority to order prompt and effective provisional and precautionary measures, including an interlocutory injunction, against a party, or where appropriate, against a third party over whom the relevant judicial authority exercises jurisdiction, to prevent an infringement of an intellectual property right from occurring, and in particular, to prevent infringing goods from entering the channels of commerce.
2.    Each Party shall provide that its judicial authorities have the authority to order the seizure or other taking into custody of the goods suspected of infringing an intellectual property right so as to prevent their entry into or movement within the channels of commerce.
3.    Each Party shall provide that, in the case of an alleged infringement of an intellectual property right committed on a commercial scale, the judicial authorities may order, in accordance with domestic law, the precautionary seizure of property of the alleged infringer, including the blocking of its bank accounts and other assets. To that end, the judicial authorities may order the communication of relevant bank, financial or commercial documents, or access to other relevant information, as appropriate.
Civil Enforcement:
Legal Costs
Each Party shall provide that its authorities have the authority to require the applicant, with respect to provisional measures, to provide any reasonably available evidence in order to satisfy themselves with a sufficient degree of certainty that the applicant’s right is being infringed or that such infringement is imminent, and to order the applicant to provide a security or equivalent assurance sufficient to protect the defendant and to prevent abuse. Such security or equivalent assurance shall not unreasonably deter recourse to procedures for such provisional measures.
(Article 12)
Each Party shall provide that its judicial authorities, where appropriate, shall have the authority to order, at the conclusion of civil judicial proceedings concerning the enforcement of intellectual property rights, that the prevailing party be awarded payment by the losing party of legal costs and other expenses, as provided for under that Party’s law.
Criminal Enforcement:
Offences
1.    Each Party shall provide for criminal procedures and penalties to be applied at least in cases of wilful trademark counterfeiting or copyright or related rights piracy on a commercial scale. For the purposes of this Section, acts carried out on a commercial scale include at least those carried out as commercial activities for direct or indirect economic or commercial advantage.
2.    Each Party shall provide for criminal procedures and penalties to be applied in cases of wilful importation and domestic use, in the course of trade and on a commercial scale, of labels or packaging:
(a)    to which a mark has been applied without authorization which is identical to, or cannot be distinguished from, a trademark registered in its territory; and
(b)    which are intended to be used in the course of trade on goods or in relation to services which are identical to goods or services for which such trademark is registered.
4.    With respect to the offences specified in this Article for which a Party provides criminal procedures and penalties, that Party shall ensure that criminal liability for aiding and abetting is available under its law.
5.    Each Party shall adopt such measures as may be necessary, consistent with its legal principles, to establish the liability, which may be criminal, of legal persons for the offences specified in this Article for which the Party provides criminal procedures and penalties. Such liability shall be without prejudice to the criminal liability of the natural persons who have committed the criminal offences.
(Article 23)
Each Party shall provide for criminal procedures and penalties to be applied at least in cases of wilful trademark counterfeiting or copyright or related rights piracy on a commercial scale.
[footnote: Each Party shall treat wilful importation or exportation of counterfeit trademark goods or pirated copyright goods on a commercial scale as unlawful activities subject to criminal penalties under this Article. A Party may comply with its obligation relating to importation and exportation of counterfeit trademark goods or pirated copyright goods by providing for distribution, sale or offer for sale of such goods on a commercial scale as unlawful activities subject to criminal penalties.]
Such wilful trademark counterfeiting includes cases where distributors or retailers selling counterfeit products openly indicate that they are counterfeit.
For the purposes of this Article, acts carried out on a commercial scale include at least those carried out as commercial activities for direct or indirect economic or commercial advantage.
2. Each Party shall provide for criminal procedures and penalties to be applied in cases of wilful importation and domestic use, in the course of trade and on a commercial scale, of labels or packaging: (a)    to which a mark has been applied without authorization which is identical to or cannot be
distinguished from a trademark registered in its territory; and
(b)    which are intended to be used in the course of trade on goods or in relation to services which are identical to goods or services for which such trademark is registered.
3. With respect to the offences specified in this Article for which a Party provides criminal procedures and penalties, that Party shall ensure that criminal liability for aiding and abetting is available under its law.
4. Each Party shall adopt such measures as may be necessary, consistent with its legal principles, to establish the liability, which may be criminal, of legal persons for the offences specified in this Article for which the Party provides criminal procedures and penalties. Such liability shall be without prejudice to the criminal liability of the natural persons who have committed the criminal offences.
Criminal Enforcement:
Camcording
3. A Party may provide criminal procedures and penalties in appropriate cases for the unauthorized copying of cinematographic works from a performance in a motion picture exhibition facility generally open to the public.
(Article 23)
[CA: Article 24.1.X – Camcording
Each Party shall provide for criminal procedures and penalties to be applied in accordance with its laws and regulations against any person who, without authorization of the theatre manager or the holder of copyright in a cinematographic work, makes a copy of that work or any part thereof, from a performance of the work in a motion picture exhibition facilIn providing adequate legal protection and effective legal remedies pursuant to the provisions of paragraph 5.13(1), a Party may adopt or maintain appropriate limitations or exceptions to measures implementing the provisions of paragraphs 5.13(1) and (2). The obligations set forth in paragraphs 5.13(1) and (2) are without prejudice to the rights, limitations, exceptions, or defences to copyright or related rights infringement under a Party’s law.]ity open to the public.]
Criminal Enforcement:
Penalties
For offences specified in paragraphs 1, 2, and 4 of Article 23 (Criminal Offences), each Party shall provide penalties that include imprisonment as well as monetary fines12 sufficiently high to provide a deterrent to future acts of infringement, consistently with the level of penalties appltrtrnbsp;ied for cr imes of a corresponding gravity.
(Article 24)
For offences specified in paragraphs 1, 2 [CA: insertion of camcording paragraph number from above TBD] and 3 of Article 24.1 (Criminal Offences), each Party shall provide penalties that include imprisonment as well as monetary fines48 sufficiently high to provide a deterrent to future acts of infringement, consistently with the level of penalties applied for crimes of a corresponding gravity.
Criminal Enforcement:
Seizure, Forfeiture and Destruction
1.    With respect to the offences specified in paragraphs 1, 2, 3, and 4 of Article 23 (Criminal Offences) for which a Party provides criminal procedures and penalties, that Party shall provide that its competent authorities have the authority to order the seizure of suspected counterfeit trademark goods or pirated copyright goods, any related materials and implements used in the commission of the alleged offence, documentary evidence relevant to the alleged offence, and the assets derived from, or obtained directly or indirectly through, the alleged infringing activity.
2.    Where a Party requires the identification of items subject to seizure as a prerequisite for issuing an order referred to in paragraph 1, that Party shall not require the items to be described in greater detail than necessary to identify them for the purpose of seizure.
3.    With respect to the offences specified in paragraphs 1, 2, 3, and 4 of Article 23 (Criminal Offences) for which a Party provides criminal procedures and penalties, that Party shall provide that its competent authorities have the authority to order the forfeiture or destruction of all counterfeit trademark goods or pirated copyright goods. In cases where counterfeit trademark goods and pirated copyright goods are not destroyed, the competent authorities shall ensure that, except in exceptional circumstances, such goods shall be disposed of outside the channels of commerce in such a manner as to avoid causing any harm to the right holder. Each Party shall ensure that the forfeiture or destruction of such goods shall occur without compensation of any sort to the infringer.
4.    With respect to the offences specified in paragraphs 1, 2, 3, and 4 of Article 23 (Criminal Offences) for which a Party provides criminal procedures and penalties, that Party shall provide that its competent authorities have the authority to order the forfeiture or destruction of materials and implements predominantly used in the creation of counterfeit trademark goods or pirated copyright goods and, at least for serious offences, of the assets derived from, or obtained directly or indirectly through, the infringing activity. Each Party shall ensure that the forfeiture or destruction of such materials, implements, or assets shall occur without compensation of any sort to the infringer.
5.    With respect to the offences specified in paragraphs 1, 2, 3, and 4 of Article 23 (Criminal Offences) for which a Party provides criminal procedures and penalties, that Party may provide that its judicial authorities have the authority to order:
(a)    the seizure of assets the value of which corresponds to that of the assets derived from, or obtained directly or indirectly through, the allegedly infringing activity; and
(b)    the forfeiture of assets the value of which corresponds to that of the assets derived from, or obtained directly or indirectly through, the infringing activity.
(Article 25)
1.With respect to the offences specified in paragraphs 1, 2 and 3 of Article 24.1 (Criminal Offences) for which a Party provides criminal procedures and penalties, that Party shall provide that its competent authorities have the authority to order the seizure of suspected counterfeit trademark goods or pirated copyright goods, any related materials and implements used in the commission of the alleged offence, documentary evidence relevant to the alleged offence, and the assets derived from, or obtained directly or indirectly through the alleged infringing activity.
2.    Where a Party requires the identification of items subject to seizure as a prerequisite for issuing an order referred to in paragraph 1, that Party shall not require the items to be described in greater detail than necessary to identify them for the purpose of seizure.
3. With respect to the offences specified in paragraphs 1, 2 and 3 of Article 24.1 (Criminal Offences) for which a Party provides criminal procedures and penalties, that Party shall provide that its competent authorities have the authority to order the forfeiture or destruction of all counterfeit trademark goods or pirated copyright goods. In cases where counterfeit trademark goods and pirated copyright goods are not destroyed, the competent authorities shall ensure that, except in exceptional circumstances, such goods hall be disposed of outside the channels of commerce in such a manner as to avoid causing any harm to the right holder. Each Party shall ensure that the forfeiture or destruction of such goods shall occur without compensation of any sort to the infringer.
4. With respect to the offences specified in paragraphs 1, 2 and 3 of Article 24.1 (Criminal Offences) for which a Party provides criminal procedures and penalties, that Party shall provide that its competent authorities have the authority to order the forfeiture or destruction of materials and implements predominantly used in the creation of counterfeit trademark goods or pirated copyright goods and, at least for serious offences, of the assets derived from, or obtained directly or indirectly, through the infringing activity. Each Party shall ensure that the forfeiture or destruction of such materials, implements, or assets shall occur without compensation of any sort to the infringer.
5. With respect to the offences specified in paragraphs 1, 2 and 3 of Article 24.1 (Criminal Offences) for which a Party provides criminal procedures and penalties, that Party may provide that its judicial authorities have the authority to order:
a) the seizure of assets the value of which corresponds to that of the assets derived from, or obtained directly or indirectly through the allegedly infringing activity; and
b) the forfeiture of assets the value of which corresponds to that of the assets derived from, or obtained directly or indirectly through the infringing activity.
Criminal Enforcement:
Ex Officio Enforcement
Each Party shall provide that, in appropriate cases, its competent authorities may act upon their own initiative to initiate investigation or legal action with respect to the criminal offences specified in paragraphs 1, 2, 3, and 4 of Article 23 (Criminal Offences) for which that Party provides criminal procedures and penalties.
(Article 26)
Each Party shall provide that, in appropriate cases, its competent authorities may act upon their own initiative to initiate investigation or legal action with respect to the criminal offences specified in paragraphs 1, 2 and 3 of Article 24.1 (Criminal Offences) for which a Party provides criminal procedures and penalties.]
Border Measures: Provision of Information Each Party shall permit its competent authorities to request a right holder to supply relevant information to assist the competent authorities in taking the border measures referred to in this Section. A Party may also allow a right holder to supply relevant information to its competent authorities.
(Article 15)
[EU: Article 25.1 – Provision of Information from the Right Holder
Each Party shall permit its competent authorities to request a right holder to supply information that may reasonably be expected to be within the right holder’s knowledge to assist the competent authorities in taking the border measures referred to in this Article. Each Party also allow a right holder to supply such information to its competent authorities.]
[Canada opposed]
Border Measures: Scope 1.    Each Party shall adopt or maintain procedures with respect to import and export shipments under which:
(a)    its customs authorities may act upon their own initiative to suspend the release of suspect goods; and
(b)    where appropriate, a right holder may request its competent authorities to suspend the release of suspect goods.
2.    A Party may adopt or maintain procedures with respect to suspect in-transit goods or in other situations where the goods are under customs control under which:
(a)    its customs authorities may act upon their own initiative to suspend the release of, or to detain, suspect goods; and
(b)    where appropriate, a right holder may request its competent authorities to suspend the release of, or to detain, suspect goods.
(Article 16)
1.    Each Party shall include in the application of this Section goods of a commercial nature sent in small consignments.
2.    A Party may exclude from the application of this Section small quantities of goods of a non-commercial nature contained in travellers’ personal luggage.
(Article 14)
1. Each Party shall adopt or maintain procedures with respect to import [EU: and export] shipments under which a right holder may request its competent authorities to suspend the release of, or detain goods suspected of infringing an IPR [CA: For the purposes of this Article, goods infringing an intellectual property right shall at least include goods that are subject to footnote 14 of Article 51 of the Agreement on Trade-Related Aspects of Intellectual Property Rights.] [EU: notably in respect of:
(a) trademark;
(b) copyright;
(c) geographical indication; and
(d) design.]
[EU: 2. Each party may enable such procedures to be made in respect of goods which involve infringements of other intellectual property rights.]
3. Each Party shall adopt or maintain procedures with respect to import [EU: and export] shipments under which its competent authorities may act upon their own initiative to suspend the release of, or to detain goods suspected of infringing an IPR [EU: notably in respect of those listed in paragraph 1.]
[EU: 4. For the purposes of this provision:
(a) “Import shipments” means shipments of goods brought into the territory of the parties from a place outside that territory, excluding goods that have been cleared for home consumption;
(b) “Export shipments” means shipments of goods which are to be taken from the territory of the parties to a place outside that territory.]
[CA: 4. Each Party may exclude from the application of the above provisions small quantities of goods of a non-commercial nature contained in travellers’ personal luggage or sent in small consignments.]
Border Measures: Application by the Right Holder 1.    Each Party shall provide that its competent authorities require a right holder that requests the procedures described in subparagraphs 1(b) and 2(b) of Article 16 (Border Measures) to provide adequate evidence to satisfy the competent authorities that, under the law of the Party providing the procedures, there is prima facie an infringement of the right holder’s intellectual property right, and to supply sufficient information that may reasonably be expected to be within the right holder’s knowledge to make the suspect goods reasonably recognizable by the competent authorities. The requirement to provide sufficient information shall not unreasonably deter recourse to the procedures described in subparagraphs 1(b) and 2(b) of Article 16 (Border Measures).
2.    Each Party shall provide for applications to suspend the release of, or to detain, any suspect goods7 under customs control in its territory. A Party may provide for such applications to apply to multiple shipments. A Party may provide that, at the request of the right holder, the application to suspend the release of, or to detain, suspect goods may apply to selected points of entry and exit under customs control.
3.    Each Party shall ensure that its competent authorities inform the applicant within a reasonable period whether they have accepted the application. Where its competent authorities have accepted the application, they shall also inform the applicant of the period of validity of the application.
4.    A Party may provide that, where the applicant has abused the procedures described in subparagraphs 1(b) and 2(b) of Article 16 (Border Measures), or where there is due cause, its competent authorities have the authority to deny, suspend, or void an application.
(Article 17)
1. Each Party shall provide that its competent authorities require a right holder that requests the procedures described in Article 25.2 to provide adequate evidence to satisfy the competent authorities that, under the law of the Party providing the procedures, there is prima facie an infringement of the right holder’s intellectual property right, and to supply sufficient information that may reasonably be expected to be within the right holder’s knowledge to make the suspect goods reasonably recognisable by the competent authorities. The requirement to provide sufficient information shall not unreasonably deter recourse to the procedures described in Article 25.2.
2. Each Party shall provide for applications to suspend the release of, or to detain goods suspected of infringing an IPR listed Article 25.2, [EU: under customs control in its territory][CA: to suggest alternate wording]. The competent authorities may provide for such applications to apply to multiple shipments. Each Party may provide that, at the request of the right holder, the application to suspend the release of, or to detain suspect goods may apply to selected points of entry and exit under customs control.
3. Each Party shall ensure that its competent authorities inform the applicant within a reasonable period whether they have accepted the application. Where its competent authorities have accepted the application, they shall also inform the applicant of the period of validity of the application.
4. A Party may provide that, where the applicant has abused the procedures described in Article 25.2, or where there is due cause, its competent authorities have the authority to deny, suspend, or void an application.
Border Measures: Security Each Party shall provide that its competent authorities have the authority to require a right holder that requests the procedures described in subparagraphs 1(b) and 2(b) of Article 16 (Border Measures) to provide a reasonable security or equivalent assurance sufficient to protect the defendant and the competent authorities and to prevent abuse. Each Party shall provide that such security or equivalent assurance shall not unreasonably deter recourse to these procedures. A Party may provide that such security may be in the form of a bond conditioned to hold the defendant harmless from any loss or damage resulting from any suspension of the release of, or detention of, the goods in the event the competent authorities determine that the goods are not infringing. A Party may, only in exceptional circumstances or pursuant to a judicial order, permit the defendant to obtain possession of suspect goods by posting a bond or other security.
(Article 18)
Each Party shall provide that its competent authorities have the authority to require a right holder that requests the procedures described in Article 25.2 to provide a reasonable security or equivalent assurance sufficient to protect the defendant and the competent authorities and to prevent abuse. Each Party shall provide that such security or equivalent assurance shall not unreasonably deter recourse to these procedures. [CA: A Party may provide that such security may be in the form of a bond conditioned to hold the defendant harmless from any loss or damage resulting from any suspension of the release of, or detention of, the goods in the event the competent authorities determine that the goods are not infringing. A Party may, only in exceptional circumstances or pursuant to a judicial order, permit the defendant to obtain possession of suspect goods by posting a bond or other security.]
Border Measures: Determination as to Infringement Each Party shall adopt or maintain procedures by which its competent authorities may determine, within a reasonable period after the initiation of the procedures described in Article 16 (Border Measures), whether the suspect goods infringe an intellectual property right.
(Article 19)1.    Each Party shall provide that its competent authorities have the authority to order the destruction of goods following a determination referred to in Article 19 (Determination as to Infringement) that the goods are infringing. In cases where such goods are not destroyed, each Party shall ensure that, except in exceptional circumstances, such goods are disposed of outside the channels of commerce in such a manner as to avoid any harm to the right holder.
2.    In regard to counterfeit trademark goods, the simple removal of the trademark unlawfully affixed shall not be sufficient, other than in exceptional cases, to permit release of the goods into the channels of commerce.
3.    A Party may provide that its competent authorities have the authority to impose administrative penalties following a determination referred to in Article 19 (Determination as to Infringement) that the goods are infringing.
(Article 20)
Each Party shall adopt or maintain procedures by which its competent authorities may determine, within a reasonable period after the initiation of the procedures described in Article 25.2, whether the suspect goods infringe an intellectual property right.Article 25.6 – Remedies
1. Each Party shall provide that its competent authorities have the authority to order the destruction of goods following a determination referred to in Article 25.5 that the goods are infringing. In cases where such goods are not destroyed, each Party shall ensure that, except in exceptional circumstances, such goods are disposed of outside the channels of commerce in such a manner as to avoid any harm to the right holder.
2. In regard to counterfeit trademark goods, the simple removal of the trademark unlawfully affixed shall not be sufficient, other than in exceptional cases, to permit release of the goods into the channels of commerce.
3. Each Party may provide that its competent authorities have the authority to impose administrative penalties following a determination referred to in Article 25.5 that the goods are infringing.

br / s intellectual property right, and to supply sufficient information that may reasonably be expected to be within the right holderlink rel=

Originally published here.

____________________
AUTHOR: Dr. Michael Geist 

Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law. He has obtained a Bachelor of Laws (LL.B.) degree from Osgoode Hall Law School in Toronto, Master of Laws (LL.M.) degrees from Cambridge University in the UK and Columbia Law School in New York, and a Doctorate in Law (J.S.D.) from Columbia Law School.  Dr. Geist is an internationally syndicated columnist on technology law issues with his regular column appearing in the Toronto Star and the Ottawa Citizen.  Dr. Geist is the editor of From “Radical Extremism” to “Balanced Copyright”: Canadian Copyright and the Digital Agenda (2010) and In the Public Interest:  The Future of Canadian Copyright Law (2005), both published by Irwin Law, the editor of several monthly technology law publications, and the author of a popular blog on Internet and intellectual property law issues. Dr. Geist serves on many boards, including the CANARIE Board of Directors, the Canadian Legal Information Institute Board of Directors, the Privacy Commissioner of Canada’s Expert Advisory Board, the Electronic Frontier Foundation Advisory Board, and on the Information Program Sub-Board of the Open Society Institute. He has received numerous awards for his work including the Kroeger Award for Policy Leadership and the Public Knowledge IP3 Award in 2010, the Les Fowlie Award for Intellectual Freedom from the Ontario Library Association in 2009, theElectronic Frontier Foundation’s Pioneer Award in 2008, Canarie’s IWAY Public Leadership Awardfor his contribution to the development of the Internet in Canada and he was named one of Canada’s Top 40 Under 40 in 2003.  In 2010, Managing Intellectual Property named him on the 50 most influential people on intellectual property in the world.

****************

ACTA BACKGROUND TO INFORM THOSE WHO DO NOT KNOW

The European Parliament overwhelmingly rejected the controversial Anti-Counterfeiting Trade Agreement on Wednesday by 478 votes to 39.

The Anti-Counterfeiting Trade Agreement (ACTA) was negotiated mostly in secret, between various countries and the EU over the last four years. Many states have already signed up for ACTA, well before the widespread web protests over SOPA.

It is a proposed plurilateral agreement for the purpose of establishing international standards on intellectual property rights enforcement. The agreement aims to establish an international legal framework for targeting counterfeit goods, generic medicines and copyright infringement on the Internet, and would create a new governing body outside existing fora, such as the World Trade Organization, the World Intellectual Property Organization, or the United Nations.

ACTA was first developed by Japan and the United States in 2006. Canada, the European Union (represented in the negotiations by the European Commission, the EU Presidency and EU Member States) and Switzerland joined the preliminary talks throughout 2006 and 2007. Official negotiations began in June 2008, for which Australia, Mexico, Morocco, New Zealand, the Republic of Korea and Singapore joined in the 8th meeting hosted by New Zealand.
The agreement was signed in October 2011 by Australia, Canada, Japan, Morocco, New Zealand, Singapore, South Korea, and the United States. In January 2012, the European Union and 22 countries which are member states of the European Union signed as well. ACTA was slipped through the European Council in an agriculture and fisheries meeting in December. Some of its more aggressive language has been removed from more recent iterations of the treaty, particularly concerning “disconnection of internet access”. No signatory has ratified (formally approved) the agreement, which would come into force after ratification by 6 countries. After entry into force, the treaty would only apply in those countries that ratified it.
ACTA is supported by major copyright holders including pharmaceutical companies, movies studios and record labels. Lobbying organisations include GlaxoSmithKline, Pfizer, Sanofi-Aventis, Monsanto Company, Time Warner, Sony, Verizon, The Walt Disney Company, the Motion Picture Association of America, News Corporation, and Viacom.
The result had been widely expected internationally and means that the agreement cannot become law in the European Union or any of its member states. The vote came after a last-ditch attempt by the European People’s Party to have it delayed was shot down. You see, the international agreement can only enter into force if ratified by six of the 11 signatories: the E.U., Australia, Canada, Japan, South Korea, Mexico, Morocco, New Zealand, Singapore, the U.S. and Switzerland.
Below is Wired UK great breakdown at the seriousness of this to everyone’s freedoms:
This is how serious it is: If ratified, there are penalties for breaching the trade agreement. The particular criminal sanction is up to the signatories, but it will mean prison and large fines for companies that that are accused of copyright piracy on a “commercial scale” (watch video). This could mean any website found to be hosting pirated content that has a large audience or even those companies deemed to be “aiding and abetting” copyright infringement, which could extend to ISPs, but not necessarily to the average individual at home using Bittorrent to download a song.

What are the main criticisms of Acta?

I. It is undemocratic

Acta has been largely negotiated behind closed doors, with many participating parties being forced to sign NDAs before being allowed to see Acta documents. It is very difficult to find out who wrote it and what happened during the negotiations. It is highly unusual for criminal sanctions of this scale to be negotiated without democratic process. Organisations that have tried to find out more information about the processes used have failed to uncover all of the details. “Even if you are in favour of more copyright, you should be against ACTA because it has not been done democratically,” says Andrew Robinson, the Pirate Party’s Culture, Media & Sport spokesperson (you can read ananalysis of Acta by the Pirate Party).

The European Parliament voted almost unanimously against Acta on this basis by adopting Written Resolution 12. This included the statement that “economic and innovation risks must be evaluated prior to introducing criminal sanctions where civil measures are already in place” and that all documents related to the negotiations be made publicly available.

That doesn’t really matter because Members of the European Parliament haven’t been consulted. It is even being negotiated outside of existing trade bodies such as the World Trade Organisation and the World Intellectual Property Organisation.

II. It blurs the lines between piracy and counterfeiting

Just as Mary Whitehouse would continually refer to “sex-and-violence” in broadcasting as if they were the same thing, so Acta appears to refer to piracy and counterfeiting in the same breath as if they were the same thing. Piracy and counterfeiting are not the same thing. Counterfeiting generally requires the person receiving the copied goods to be deceived into thinking it is real. Jérémie Zimmermann from the French Lobbying group La Quadrature du Net, explains: “This element of language is known to us as part of the vocabulary of the ‘copyright Talibans’, as we call it. If you treat Chinese manufacturers who create counterfeit DVDs or medicines in the same way you treat individuals sharing not-for-profit in their homes you know that you will have problems.”

“They are trying to sneak through a lot of the copyright stuff by pretending it’s about counterfeiting,” says the Pirate Party’s Robinson.

III. It criminalises copyright infringement when there are civil sanctions already

According to the controversial Article 23, criminal penalties should be applied “in cases of wilful trademark counterfeiting or copyright or related rights piracy on a commercial scale”, although the phrase “commercial scale” is not clearly defined and specifically removes the intentionality, i.e. it doesn’t matter whether a company intends to make a profit from the pirated content, it only matters whether it has the scale of a commercial operation. Criminal sanctions should also be made available for those “aiding and abetting” infringement on a commercial scale. Critics argue that this means that ISPs and data centres would potentially be liable for aiding and abetting any commercial website that features a copyright infringing piece of content. “This is the nuclear weapon against any actor on the internet,” says Jérémie Zimmermann. He believes that the criminal section of Acta will be used as a weapon to ensure that ISPs cooperate with rights holders. As the Sakharov laureates warn: “In the name of copyright enforcement, the European Union and other signatories would be bound to put pressure on internet actors, compelling them to monitor and police the network.”

IV. It creates a barrier to changing national law

ACTA takes away from democratic governments the right to set their own copyright policy or patent policy. This means that if lobbying organisations such as the Pirate Party manage to sway the UK government with regards to reducing copyright terms, they won’t be able to effect change without breaking a trade agreement.


LEAVE A REPLY

Please enter your comment!
Please enter your name here