Intellectual Property Technology Law Journal
VOLUME 20 • NUMBER 8 • AUGUST 2008 Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLPIntellectual Property Technology Law Journal
&
Eight Ways to Minimize the Risk
- f Counterfeiting
By Steven Cooper and Gail M. Eckstein
C
- unterfeiting has been labeled the “Crime of the
T wenty-First Century” by the Federal Bureau of Investigation, and such emphasis is not overstated.
1 Thecounterfeiting business constitutes a staggering 7 percent
- f world trade, and the global counterfeit market is worth
about $600 billion, including a loss to US businesses of about $250 billion per year.
2 Counterfeiting has evenbeen linked as a source of funds for terrorism, drug traf- ficking, and organized crime.
3Reports of counterfeited US products are constantly in the media, and counterfeiting affects a wide array
- f products. The industries hit hardest are those sell-
ing footwear, clothing, wristwatches, pharmaceuticals, and consumer electronics.
4 Many of the knocked-offproducts cause considerable alarm, for example, car brakes, aircraft parts, pharmaceutical products, and baby formula. Companies are well-advised to institute strong pro- grams to prevent and combat the counterfeiting of their
- goods. Although there is no magic bullet that eliminates
counterfeiting altogether, there are a number of impor- tant steps that can and should be taken. Undertaking these steps increases the sales of legitimate products; enhances the public image of the company and its products; and ensures that best practices have been fol- lowed in the event of a later incident that results in bad press or a claim for damages. Implementing the following eight best practices will put companies in a substantially better position to defend themselves against this increasing threat.
- 1. Tighten Supply Chain
The number one goal of counterfeiters is to make their products appear as authentic as possible. This is accomplished by obtaining or copying legitimate pack- aging, cartons, and ingredients that make the counter- feits difficult, if not impossible, to visually distinguish from the real thing. Dishonest suppliers, especially those in more remote areas, will run “night shifts”
- r have products and/or machines exiting “the back
door” to be used or copied by counterfeit operations. Companies must vigilantly monitor their suppliers in
- rder to prevent the misuse or diversion of packag-
ing, cartons, and ingredients from their supply chains. Companies must closely inspect their supply chains for any vulnerabilities to ensure that their vendors do not deal with counterfeiters. This can be accomplished in a number of ways. First, companies should insist that their vendor agree- ments contain language that prohibits such activities; permits random, unannounced audits; and imposes stiff penalties for failure to comply. Second, companies need to undertake random audits, at varying hours, to inspect the workings and their suppliers. Finally, companies should take further steps to comprehensively monitor
Steven Cooper is a partner and Gail M. Eckstein is an associate, in Reed Smith’s Commercial Litigation Group in New- York. The authors, who frequently counsel companies on methods
- f minimizing and combating the counterfeiting of goods, can be