19
Natasha Tusikov, October 2011 Regulatory Institutions Network, Australian National University Page 1 of 19 ENFORCING PUBLIC LAWS THROUGH PRIVATE REGULATORY REGIMES: THE CASE OF TRADEMARK INFRINGEMENT NATASHA TUSIKOV 1 Since the mid-1990s, industry and intellectual property (IP) groups have strategically transformed trademark infringement from a commercial concern into a public security problem on the grounds that it threatens states’ economic integrity and poses serious health and safety concerns. 2 This privately constructed ‘public’ security threat is addressed by a non-traditional security institution, a transnational private regulatory regime 3 largely comprised of brand owners (e.g., Gucci) industry associations, private security companies and public law enforcement agencies. These private regimes challenge notions of traditional, state-centric security institutions and clear demarcations between public and private regulatory responsibilities. As this paper observes, these regimes encompass a broad array of regulatory structures, activities, types of authority, and interactions among regulators, regulatees, and beneficiaries of regulation. This paper examines how private institutions use civil and criminal law, as well as non-legal strategies such as educational campaigns, to counter trademark infringement. It builds upon studies of the private regulation of copyright and patent infringement 4 to address significant gaps in the criminological and policing literatures regarding the enforcement of trademark law. 5 Furthermore, the paper aims to contribute to our understanding of how transnational private regulatory regimes enforce public laws. Its exploration of trademark infringement raises critical questions of how to balance public-private interests and how this affects the private enforcement of publicly set laws. 1 PhD candidate at the Regulatory Institutions Network at the Australian National University. 2 See Peter Drahos and John Braithwaite, Information Feudalism: Who Owns the Knowledge Economy? New York: The New Press, (2002). 3 For an excellent discussion of these regimes, see Colin Scott, ‘Private Regulation of the Public Sector: A Neglected Facet of Contemporary Governance’ (2002) 29(1) Journal of Law and Society, 5676; Colin Scott, Fabrizio Cafaggi and Linda Senden, ‘The Conceptual and Constitutional Challenge of Transnational Private Regulation’ (2011) 38(1) Journal of Law and Society 119; and Fabrizio Cafaggi, ‘New Foundations of Transnational Private Regulation’ (2010) 53 European University Institute, Robert Schuman Centre for Advanced Studies <http://cadmus.eui.eu/handle/1814/15284> 140. 4 See, especially, Peter Drahos, ‘Securing the Future of Intellectual Property: Intellectual Property Owners and Their Nodally Coordinated Enforcement Pyramid’ (2004) 36(1) Case Western Reserve Journal of International Law, 5377; and Scott, above n 3. 5 Scholarship on trademark infringement primarily focuses on how firms can detect counterfeits, deter their manufacture, and dissuade consumers from purchasing them. Notable exceptions focusing on enforcement include Simon Mackenzie, ‘Counterfeiting as corporate externality: intellectual property crime and global insecurity’ (2010) 54 Crime, Law and Social Change, 2138; and David S. Wall and Joanna Large, ‘Jailhouse Frocks: Locating the Public Interest in Policing Counterfeit Luxury Fashion Goods’ (2010) British Journal of Criminology, 50 10941116, 1113.

Enforcing Laws Through Private Regulatory Regimes: The Case of Trademark Infringement

  • Upload
    yorku

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  1  of  19      

ENFORCING PUBLIC LAWS THROUGH PRIVATE REGULATORY REGIMES:

THE CASE OF TRADEMARK INFRINGEMENT NATASHA TUSIKOV1

Since the mid-1990s, industry and intellectual property (IP) groups have strategically

transformed trademark infringement from a commercial concern into a public security

problem on the grounds that it threatens states’ economic integrity and poses

serious health and safety concerns.2 This privately constructed ‘public’ security

threat is addressed by a non-traditional security institution, a transnational private

regulatory regime3 largely comprised of brand owners (e.g., Gucci) industry

associations, private security companies and public law enforcement agencies.

These private regimes challenge notions of traditional, state-centric security

institutions and clear demarcations between public and private regulatory

responsibilities. As this paper observes, these regimes encompass a broad array of

regulatory structures, activities, types of authority, and interactions among

regulators, regulatees, and beneficiaries of regulation.

This paper examines how private institutions use civil and criminal law, as well as

non-legal strategies such as educational campaigns, to counter trademark

infringement. It builds upon studies of the private regulation of copyright and patent

infringement4 to address significant gaps in the criminological and policing literatures

regarding the enforcement of trademark law.5 Furthermore, the paper aims to

contribute to our understanding of how transnational private regulatory regimes

enforce public laws. Its exploration of trademark infringement raises critical questions

of how to balance public-private interests and how this affects the private

enforcement of publicly set laws.

                                                                                                                         1PhD  candidate  at  the  Regulatory  Institutions  Network  at  the  Australian  National  University.    2See  Peter  Drahos  and  John  Braithwaite,  Information  Feudalism:  Who  Owns  the  Knowledge  Economy?  New  York:  The  New  Press,  (2002).    3For  an  excellent  discussion  of  these  regimes,  see  Colin  Scott,  ‘Private  Regulation  of  the  Public  Sector:  A  Neglected  Facet  of  Contemporary  Governance’  (2002)  29(1)  Journal  of  Law  and  Society,  56-­‐76;  Colin  Scott,  Fabrizio  Cafaggi  and  Linda  Senden,  ‘The  Conceptual  and  Constitutional  Challenge  of  Transnational  Private  Regulation’  (2011)  38(1)  Journal  of  Law  and  Society  1-­‐19;  and  Fabrizio  Cafaggi,  ‘New  Foundations  of  Transnational  Private  Regulation’  (2010)  53  European  University  Institute,  Robert  Schuman  Centre  for  Advanced  Studies  <http://cadmus.eui.eu/handle/1814/15284>  1-­‐40.    4See,  especially,  Peter  Drahos,  ‘Securing  the  Future  of  Intellectual  Property:  Intellectual  Property  Owners  and  Their  Nodally  Coordinated  Enforcement  Pyramid’  (2004)  36(1)  Case  Western  Reserve  Journal  of  International  Law,  53-­‐77;  and  Scott,  above  n  3.    5Scholarship  on  trademark  infringement  primarily  focuses  on  how  firms  can  detect  counterfeits,  deter  their  manufacture,  and  dissuade  consumers  from  purchasing  them.  Notable  exceptions  focusing  on  enforcement  include  Simon  Mackenzie,  ‘Counterfeiting  as  corporate  externality:  intellectual  property  crime  and  global  insecurity’  (2010)  54  Crime,  Law  and  Social  Change,  21-­‐38;  and  David  S.  Wall  and  Joanna  Large,  ‘Jailhouse  Frocks:  Locating  the  Public  Interest  in  Policing  Counterfeit  Luxury  Fashion  Goods’  (2010)  British  Journal  of  Criminology,  50  1094-­‐1116,  1113.  

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  2  of  19      

‘Regulation’ here refers broadly to the means that guide any activity, individual or

institution to behave according to formal or informal rules.6 Regulatory regimes,

whether public or private, focus on setting standards, monitoring compliance, and

issuing sanctions for non-compliance.7 Private regimes can derive their power from

statutory or contractual mandates, or if they lack such a mandate, they can wield

power through their wealth, organisation, information or authority.8 Regulatory actors

may undertake a range of different or overlapping responsibilities in the regulation of

trademark infringement. While some actors wield coercive power, others use a

variety of persuasive techniques, such as shaming or educating, to protect

trademarks.

This paper is divided into six sections. After an introduction of the concepts of

intellectual property and trademark infringement in the first section, the second

section argues that the conceptualisation of trademark infringement has shifted from

that of a commercial dispute to that of a serious crime affecting the public, but which

is addressed primarily through private enforcement. The third section explores the

concept of transnational private regulatory regimes and discusses how the network

of mostly private institutions dedicated to trademark infringement comprises such a

regime. The fourth section describes enforcement activities in terms of the

‘regulatory pyramid’.9 This pyramid is an appropriate concept for a discussion of

private regimes as it enables regulators to progress from using ‘soft’ tools at the

base of the pyramid (e.g., warnings) to more coercive, ‘hard’ tools at its apex (e.g.,

incarceration).10 Analysis in the fifth section focuses on the role played by private

security companies in the investigation of this issue on behalf of brand owners, a

critically under-examined area in the criminological and policing literatures. The

paper concludes in the sixth section with a reflection on how transnational private

regulatory regimes challenge our understanding of security institutions, particularly

the division of regulatory responsibilities among actors and the balance between

private interests and public resources.

                                                                                                                         6Sol  Picciotto,  ‘Reconceptualising  Regulation  in  the  Era  of  Globalisation’  (2002)  29(1)  Journal  of  Law  and  Society  1-­‐11,  1.  7Peter  J.  May,  ‘Regulatory  regimes  and  accountability’  (2007)  1  Regulation  &  Governance  8-­‐26,  9.      8Scott,  above  n  3,  62.      9Ian  Ayres  and  John  Braithwaite,  Responsive  Regulation:  Transcending  the  Deregulation  Debate,  Oxford:  Oxford  University  Press  (1992).    10Ibid.    

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  3  of  19      

I. INTELLECTUAL PROPERTY

Despite the entrance of copyright and patents into the mainstream of academic and

public debate, intellectual property, which includes trademarks, remains a highly

specialised and often-misunderstood subject. It is therefore important to clarify

trademarks’ functions and characteristics. Trademarks — a type of ‘industrial’

intellectual property along with patents, industrial designs and trade secrets11 — are

intended to identify the commercial origin of goods (e.g., Nike) and enable

consumers to distinguish specific goods from other similar offerings in the

marketplace. They consist of words, numerals, symbols, colours, audible sounds,

fragrances, three-dimensional shapes, pictures, or a combination of these or other

characteristics.12 Copyright and patents expire after certain period (e.g., for

copyright, often a minimum of life of the author plus 50 years). Trademarks have no

expiry date. They can be renewed indefinitely so long as they are used and

defended against infringement.

Successful trademarks acquire significant commercial value. Top global brands,

such as Coca-Cola and IBM, are each worth billions of dollars,13 making their illicit

appropriation (i.e., infringement) a profitable activity. Goods that infringe trademarks

(i.e., counterfeit goods) are defined as

any goods, including packaging, bearing without authorization a trademark

which is identical to the trademark validly registered in respect of such goods,

or which cannot be distinguished in its essential aspects from such a

trademark, and which thereby infringes the rights of the owner of the

trademark in question under the law of the country of importation.14

Traditionally, the protection of intellectual property rights occurred within what can be

termed a ‘classical’ model of enforcement. Within this model, trademark infringement

was understood as a private commercial concern for which a resolution was

                                                                                                                         11The  other  category  of  intellectual  property  refers  to  copyright  and  related  rights  granted  to  the  authors  of  literary  and  artistic  works,  and  the  rights  of  performers,  producers  of  phonograms  and  broadcasting  organizations.    12Agreement  on  Trade-­‐Related  Aspects  of  Intellectual  Property  Rights,  opened  for  signature  15  April  1994,  s  2,  art  15(1)  (entered  into  force  1  January  1995)  (‘TRIPS’).  13See  Interbrand,  Best  Global  Brands  2010  <http://www.interbrand.com/en/best-­‐global-­‐brands/Best-­‐Global-­‐Brands-­‐2010.aspx>  at  19  August  2011.    14TRIPS,  opened  for  signature  15  April  1994,  s  4  art  51  14(a)  (entered  into  force  1  January  1995).      

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  4  of  19      

generally sought through civil remedies.15 Infringement was understood to cause

primarily financial losses to the affected company and possibly reputational damage

to a specific company and brand.16 Infringement was addressed by a small network

of private actors, specifically, the affected brand owner, in-house legal counsel or

legal firms specialising in intellectual property rights, and, depending on the size of

the affected firm and the nature of the infringement, private investigators.17 Public

authorities played a limited role in tracking down offenders or infringing goods.

II. RECONCEPTUALISING TRADEMARK INFRINGEMENT

The shift away from this classical model to one that conceptualises trademark

infringement as a serious crime against the public occurred through the 1995

Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS).18

TRIPS officially set the stage globally for the securitisation of intellectual property

infringement by requiring member states to criminalise trademark and copyright

infringement and to adopt both civil and criminal penalties.19 In doing so it became

the first multilateral IP regime to incorporate enforcement mechanisms.20 Through its

global standards for IP protection, it also simplified enforcement efforts along one

common (specifically, U.S.-led) line. As the agreement applies to all members of the

World Trade Organisation, TRIPS established a global IP protection baseline, or

‘floor,’ that all other trade agreements21 would subsequently ‘raise’ in terms of

stronger enforcement mechanisms and tougher penalties against infringement.22

This global floor constrains states’ options relating to intellectual property

infringement, imposing a relatively rigid system of enforcement and penalties

                                                                                                                         15For  a  historical  perspective  of  IP  protection,  see  Peter  May  and  Susan  Sell,  Intellectual  Property  Rights:  A  Critical  History,  Boulder,  Co.:  Lynne  Rienner  Publishers  (2005).  16Counterfeiting  is  not  a  modern  phenomenon.  For  centuries,  swindlers  have  deliberately  passed  off  imitations  of  a  wide  array  of  goods  as  genuine,  some  of  which  were  dangerous  or  toxic.  Unscrupulous  manufacturers  also  peddled  toxic  or  shoddy  products  under  their  own  brands.  See  Bee  Wilson,  Swindled:  The  Dark  History  of  Food  Fraud,  from  Poisoned  Candy  to  Counterfeit  Coffee  Princeton:  Princeton  University  Press  (2008)  and  Benjamin  G.  Paster,  ‘Trademarks—Their  Early  History’  (1969)  59  Trademark  Reporter  551-­‐572.  17Gregor  Urbas,  ‘Criminal  Enforcement  of  Intellectual  Property  Rights:  Interaction  Between  Public  Authorities  and  Private  Interests’  in  Christopher  Heath  and  Anselm  Kamperman  Sanders  (eds),  New  Frontiers  of  Intellectual  Property  Law:  IP  and  Cultural  Heritage  –  Geographic  Indications  –  Enforcement  –  Overprotection,  Portland,  Oregon:  Hart  Publishing  (2005)  303-­‐322.      18TRIPS,  opened  for  signature  15  April  1994  (entered  into  force  1  January  1995).  See  Drahos  and  Braithwaite,  above  n  2.      19TRIPS,  opened  for  signature  15  April  1994,  s  5  art  61  (entered  into  force  1  January  1995).    20Susan  K.  Sell,  Private  Power,  Public  Law:  The  Globalization  of  Intellectual  Property  Rights  Cambridge:  Cambridge  University  Press  (2003).    21Such  as  the  Anti-­‐Counterfeiting  Trade  Agreement,  opened  for  signature  1  October  2011  (not  yet  entered  into  force)  (‘ACTA’).  ACTA  was  signed  by  the  United  States,  Australia,  Canada,  Korea,  Japan,  New  Zealand,  Morocco,  and  Singapore.    22See  Drahos  and  Braithwaite,  above  n  2  and  Susan  K.  Sell,  ‘The  Global  IP  Upward  Ratchet,  Anti-­‐Counterfeiting  and  Piracy  Enforcement  Efforts:  The  State  of  Play’  Program  on  Information  Justice  and  Intellectual  Property,  Research  Paper  no.  15,  American  University  Washington  College  of  Law,  Washington,  D.C.  (2010)  <digitalcommons.wcl.american.edu/research/15/>  at  10  May  2011.  

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  5  of  19      

standards.23 However, it gives IP owners more legal avenues (i.e., both civil and

criminal remedies) through which to pursue infringement claims.24

TRIPS was the result of lobbying by key U.S. industry officials who successfully

argued that unfair foreign trading practices were endangering U.S. economic

hegemony.25 Intertwined with this powerful narrative were claims of rampant and

rapidly increasing rates of infringement.26 TRIPS itself explicitly refers to “the

international trade in counterfeit goods”27 as one of the key reasons for its existence.

TRIPS thus formalised a fundamental re-conceptualisation of trademark infringement

as a serious crime. Once it was understood as such, many researchers ranked it

alongside other serious transnational crimes, such as illicit drugs and weapons

smuggling.28 Others argued that some cases of infringement are linked to

transnational organised crime and possibly even terrorist networks, though evidence

for these linkages is generally weak.29 Following its transition from a commercial

dispute to a serious, transnational crime, IP associations and some governmental

agencies repeatedly linked trademark infringement to significant health and safety

problems.30

Trademark infringement provokes rather conflicted regulatory responses. Industry

and IP groups are powerful lobbies for the continual ‘ratcheting up’ of protection of

intellectual property.31 They generally argue that greater public resources should be

dedicated to countering trademark infringement because it threatens economic

integrity and creative activity, has linkages to organised crime, and is a prohibitive

cost for brand owners to enforce alone.32 However, some brand owners are reluctant

                                                                                                                         23See  Sell,  above  n  22,  8  and  Peter  Drahos  ‘Thinking  strategically  about  intellectual  property  rights’,  (1997)  21(3)  Telecommunications  Policy  201-­‐211,  202-­‐203.    24Sell  above  n  22,  8.  That  TRIPS  would  strongly  tilt  the  balance  of  intellectual  property  protection  in  favour  of  intellectual  property  owners  is  not  surprising  since  the  agreement  was  the  outcome  of  intense  lobbying  by  a  small  number  of  U.S.  industry  representatives,  see  Drahos  and  Braithwaite,  above  n  2.      25See  Drahos  and  Braithwaite,  above  n  2.      26See  the  International  Chamber  of  Commerce’s  Business  Action  to  Stop  Counterfeiting  and  Piracy,  <http://www.bascap.com/>  at  15  August  2011  and  the  Global  Congress  Combatting  Counterfeiting  and  Piracy,  <  http://www.ccapcongress.net/>  at  12  August  2011.  27TRIPS,  opened  for  signature  15  April  1994,  Preamble  (entered  into  force  1  January  1995).    28See,  for  example,  Serious  Organised  Crime  Agency,  The  United  Kingdom  Threat  Assessment  of  Organised  Crime  (2010)  <http://www.soca.gov.uk/threats>  at  19  September  2011.  29See  Frank  Padavan,  The  Counterfeit  Connection:  The  Counterfeit  Goods  Trade,  Intellectual  Property  Theft  and  Terrorist  Financing,  New  York  State  Senate  Majority  Task  Force  on  Immigration  (2005)  1-­‐108  <http://www.nysl.nysed.gov/scandoclinks/ocm64225740.htm>  at  7  September  2011.  30See  the  Global  Congress  Combatting  Counterfeiting  and  Piracy  reports  on  the  first  to  sixth  Global  Congresses,  <http://www.ccapcongress.net/archives.htm>  at  11  May  2011.      31See  Sell,  above  n  22.    32Urbas,  above  n  17,  305.      

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  6  of  19      

to admit publicly that their goods are being counterfeited and appear ambivalent

about enforcement efforts.33 Some public authorities voice concern about using

public resources to counter what they view as an industry problem,34 while others

attack counterfeiting with apparent zeal.35 However, any public enthusiasm for

addressing counterfeiting in a strategic, concerted manner is generally dampened by

arguments that investigations are often complex and lengthy with low prosecution

success rates and low penalties.36 As a result, public-sector involvement in

counterfeiting cases varies widely. Thus, while the regulation of this (public) security

threat is largely private, it shifts somewhat uneasily between the public and private

sectors as each argues that the other should take up more of the regulatory burden.

III. TRANSNATIONAL PRIVATE REGULATORY REGIMES

The broad network of mostly private institutions involved in regulating trademark

infringement is comprised of brand owners, intellectual property associations, law

firms, anti-counterfeiting associations, dedicated regulatory bodies, private security

companies, governmental and non-governmental agencies, and public law

enforcement agencies.37 This network can be understood as constituting a

transnational private regulatory regime. Transnational private regulation involves a

“body of rules, practices and processes, created primarily by private actors [. . .]

exercising autonomous regulatory power or implementing delegated power,

conferred by international law or by national legislation.”38 Private regulatory regimes

comprise “the full set of actors, institutions, norms and rules that are of importance

for the process and the outcome of [. . .] regulation in a given sector”.39 The principle

                                                                                                                         33See  Mackenzie,  above  n  5  and  Wall  and  Large,  above  n  5.  34For  example,  high-­‐level  U.S.  government  officials  have  reservations  about  policing  intellectual  property  infringements,  as  demonstrated  in  a  2008  letter  obtained  through  a  Freedom  of  Information  Act  request.  In  this  letter,  Stewart  Baker,  the  Assistant  Secretary  for  Policy  at  the  Department  of  Homeland  Security  complained  to  the  Office  of  the  United  States  Trade  Representative  about  ACTA,  saying  the  “cost  of  enforcing  private  rights,  such  as  trademarks,  can  reasonable  be  placed  on  the  beneficiary”  and  that  ACTA  could  limit  the  ‘discretion’  that  customs  agencies  have  in  enforcing  intellectual  property  rights.  Nate  Anderson,  ‘Unhappy  Mounties  sick  of  being  private  copyright  cops’,  ars  technica,  4  May  2011  <http://arstechnica.com/tech-­‐policy/news/2011/05/unhappy-­‐mounties-­‐sick-­‐of-­‐being-­‐private-­‐copyright-­‐cops.ars>  at  13  May  2011.  35For  example,  the  U.S.  Immigration  and  Customs  Enforcement  (ICE)  conducts  ‘Operation  In  Our  Sites’  in  which  rights-­‐holders  refer  allegedly  infringing  websites  to  ICE  which  seizes  the  domain  names  pursuant  to  federal  warrants  and  then  redirects  the  sites  to  display  a  seizure  notice.  See  <http://www.iprcenter.gov/reports/fact-­‐sheets/operation-­‐in-­‐our-­‐sites/view>  at  25  October  2011.  This  operation  is  controversial  with  U.S.  Senator  Ron  Wyden  (D-­‐OR)  arguing  that  the  “domain  name  seizure  process  does  not  appear  to  give  targeted  websites  an  opportunity  to  defend  themselves  before  sanctions  are  imposed.”  Nate  Anderson,  ‘Senator:  domain  name  seizures  ‘alarmingly  unprecedented’’  ars  technica  2  February  2011  <http://arstechnica.com/tech-­‐policy/news/2011/02/senator-­‐us-­‐domain-­‐name-­‐seizures-­‐alarmingly-­‐unprecedented.ars>  at  25  October  2011.        36Urbas,  above  n  17,  306.        37See  Drahos,  above  n  4  in  which  he  explores  the  public  and  private  institutions  focusing  on  IP  as  a  nodal  pyramid.      38Fabrizio  Cafaggi,  ‘The  Architecture  of  Transnational  Private  Regulation’  (2011)  12  European  University  Institute,  Department  of  Law  1-­‐19    <http://cadmus.eui.eu/handle/1814/18256?show=full>  at  15  September  2011.  39Eberlein  and  Grande  2005,  91  cited  in  Scott  et  al.,  above  n  3,  7.      

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  7  of  19      

elements of an effective regulatory regime — rule setting, monitoring, and

enforcement — are not necessarily located within a single organisation, and roles

may be divided amongst different actors.40

One can distinguish among various private regimes by examining who establishes

the rules, the type of mandate the regime operates within, and who oversees and

performs enforcement duties. Rules or standards can be set publicly, privately, or be

some combination of the two. The protection of trademarks, for example, is based

upon publicly set standards, such as TRIPS or the U.S.-led 2010 Anti-Counterfeiting

Trade Agreement (ACTA),41 though private actors have been instrumental in shaping

those standards.42 Privately set standards, such as codes of corporate social

responsibility adopted by individual firms or by corporate associations, can regulate

non-state institutions. These standards can also be applied to states, such as credit-

ratings agencies that use private standards to rank state’s fiscal health. Public and

private standards can build upon one another. For example, some animal welfare

organisations, such as the Royal Society for the Protection of Animals, set private

standards that over time are adopted by governments as they become widely

accepted.

The nature of a private regime’s mandate, whether statutory, contractual or lacking

formal authority, is also an important characteristic, particularly in reference to the

source and type of authority that permits the regime to act.43 Private regulators may

have a statutory mandate for monitoring or enforcing civil or criminal laws, or

undertaking specific duties such as inspections or audits.44 For example, the private

security company Serco operates immigration detention facilities in Australia on

behalf of the Australian Department of Immigration and Citizenship. The regimes’

mandate may be contractual, such as a self-regulatory advertising standards

association, or it may offer certifications, such as those provided by the International

Standards Organisation.45 Private regulators may also lack a formal mandate and, as

a result, instead conduct regulatory activities through public-interest litigation (e.g.,

                                                                                                                         40Scott  et  al.,  above  n  3  and  Scott,  above  n  3,  60.    41ACTA  opened  for  signature  1  October  2011  (not  yet  entered  into  force).        42Drahos  and  Braithwaite,  above  n  2  and  Sell,  above  n  22.    43Scott,  above  n  3,  62.    44Ibid.    45Scott,  above  n  3,  62.  

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  8  of  19      

the American Civil Liberties Union), dissemination of information (e.g., credit rating

agencies) or organising individuals into direct-action campaigns (e.g.,

Greenpeace).46 Absent a legal mandate, organisations in this category can be highly

influential by using their wealth or resources, their possession and distribution of

information, and their capacity to sway the public or policymakers’ opinions.47

A The Private Regulation of Trademark Infringement

The transnational private regulatory regime regulating trademark infringement is

comprised of an array of firms, trade associations, and non-governmental

organisations (e.g., the International Anti-Counterfeiting Association). Public

institutions overall play a relatively minor role.48 Some associations formally or

informally act as a ‘voice’ for multiple other IP-related associations49 in order to

coordinate lobbying efforts. The regime represents a broad array of industries,

ranging from electronics, apparel and accessories, pharmaceuticals, cosmetics and

perfumes to tobacco, food and the automotive sector, with the objective of protecting

and strengthening trademark rights.

The private trademark regime lacks a legal mandate or contractual power, which

means that it must use existing public standards (i.e., civil and criminal law) to

counter trademark infringement.50 Actors within the regime are extremely influential

in using an array of activities, namely lobbying, litigating, shaming and educating to

regulate trademark infringement and these strategies will be explored in more detail

below. The regime’s actors regulate states by lobbying for enhanced protection and

shaming for inadequate provisions. They also regulate specific firms or industry

sectors that may be asked institute a specific response to deter infringement, such

as the International Trademark Association’s ‘Best Practices for Addressing the Sale

of Counterfeits on the Internet.’51 The regime’s members also target individuals,

                                                                                                                         46Ibid.    47Scott,  above  n  3,  66.  48Although  the  regime  is  transnational,  organisations  and  agencies  from  the  United  States  dominate  the  setting  of  standards  and  rules  that  are  then  disseminated  internationally,  see  Drahos  and  Braithwaite,  above  n  2  and  Sell,  above  n  22.        49For  example,  the  United  Kingdom-­‐based  Alliance  Against  Intellectual  Property  Theft  represents  multiple  trade  and  enforcement  organisations  including  the  Federation  Against  Software  Theft,  the  Business  Software  Alliance,  and  the  Motion  Picture  Association.  See  <http://www.allianceagainstiptheft.co.uk>  at  1  September  2011.  50See  Scott,  above  n  3.    51See  the  International  Trademark  Association,  Best  Practices  for  Addressing  the  Sale  of  Counterfeits  on  the  Internet  <http://www.inta.org/Advocacy/Pages/Anticounterfeiting.aspx>  at  28  September  2011.    

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  9  of  19      

firms, organisations and states that its members suspect of committing or facilitating

trademark infringement, such as websites that provide access to counterfeit goods.52

IV. THE (PRIVATE) REGULATORY PYRAMID

Transnational private regulatory regimes are therefore relatively complex, particularly

when they involve multiple regulatory stakeholders and regulatees, and a range of

regulatory strategies, as is the case with trademarks. These regimes are also often

of a hybrid nature, containing an amalgam of hard- and soft-law instruments and

cooperation (and competition) between governmental and non-governmental

actors.53 Given this complexity, the next

section draws upon the concept of the

regulatory pyramid (see Figure I) to

explore and visualise how this regime

operates and to discuss its regulatory

strategies in detail. This pyramid, which

recognises the involvement of non-

governmental actors in regulatory

activities, is a useful way to analyse

these regimes.54

A Persuasion

At the base of the regulatory pyramid for trademark infringement there are a range of

strategies, particularly lobbying, shaming and educating, that can be influential in

changing behaviour.

1 Lobbying

                                                                                                                         52This  regulation  is  intended  to  benefit  the  private-­‐sector  firms,  associations  and  agencies  that  are  comprise  this  regime  through  the  deterrence  or  prosecution  of  trademark  infringement.  The  general  public  can  also  be  considered  a  beneficiary  if  the  regulatory  efforts  decrease  the  health  and  safety  risks  from  dangerous  or  toxic  counterfeits.    53Scott  et  al.,  above  n  3,  11.      54See  Drahos,  above  n  4  and  Peter  Grabosky,  ‘On  the  interface  of  criminal  justice  and  regulation’  In  Hannah  Quirk,  Toby  Seddon  and  Graham  Smith  (eds)  Regulation  and  Criminal  Justice:  Innovations  in  Policy  and  Research,  Cambridge:  Cambridge  University  Press  (2010)  72-­‐100.      

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  10  of  19    

As part of their broader lobbying strategies for enhanced protection for intellectual

property in general, many IP associations also campaign specifically for stronger

enforcement mechanisms. For example, the Global Congress on Combatting

Counterfeiting and Piracy, the International Trademark Association, and the

International Chamber of Commerce’s Business Action to Stop Counterfeiting and

Piracy (BASCAP)55 use their networks to advocate for strengthened enforcement at

both international and domestic fora. They advocate for more coordinated and

effective partnerships between law enforcement agencies and the private sector,

particularly in terms of data sharing, intelligence sharing, and training, demand more

public resources to counter, and lobby countries to place a higher priority on these

issues. Associations like these act as an umbrella representing multiple trade and

anti-counterfeiting bodies, thus amplifying the associations’ ability to present a

relatively unified voice on issues of enforcement and enabling them to lobby more

effectively and with greater intensity. They also link the largest and most powerful

brand owners and their industry associations to key intergovernmental organisations

with a role in intellectual property enforcement, such as Interpol (IP Rights

Programme), the World Customs Organisation (Enforcement and Compliance), the

World Intellectual Property Organisation (Advisory Committee on Enforcement), the

United Nations Inter-regional Crime and Justice Research Institute and the European

Observatory on Counterfeiting and Piracy.

2 Shaming

Intellectual property rights groups operate campaigns intended to shame states (and

individuals) involved in trademark infringement.56 For example, BASCAP launched

the campaign ‘Fakes Cost More, I Buy Real!’57 Two United Kingdom-based groups,

the Alliance Against Intellectual Property Theft and the Anti-Counterfeiting Group,

respectively operate ‘Real Deal: Working Together to Ensure Fake-Free Markets’

and ‘Get Real…Say No to Fakes’ to encourage the sale and purchase of genuine

                                                                                                                         55The  Global  Congress,  convened  in  2004  by  the  World  Customs  Organisation,  INTERPOL,  and  the  World  Intellectual  Property  Organisation  who  then  invited  representatives  from  the  International  Chamber  of  Commerce/Business  Action  to  Stop  Counterfeiting  and  Piracy,  and  the  International  Trademark  Association,  holds  global  meetings  on  a  near-­‐annual  basis  comprising  representatives  from  industry  and  their  peak  bodies,  inter-­‐governmental  agencies,  and  security  and  policing  organisations.      56Of  course,  the  most  influential  governmental  effort  to  shame  states  for  their  treatment  of  intellectual  property  rights  is  undertaken  by  the  Office  of  the  U.  S.  Trade  Representative  (USTR)  through  its  Special  301  Process.  Each  year,  the  USTR  ranks  countries  with  problematic  records  toward  IP  protection  as  “Watch  List”  or  the  more  serious  “Priority  Watch  List.”      57See  <http://www.ibuyreal.org/>  at  1  October  2011.    

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  11  of  19    

products.58 Brand owners expend significant effort trying to understand consumer

attitudes and behaviours toward counterfeiting and, more importantly, modify

unwanted behaviour.59 Despite these campaigns, however, research indicates that a

sizeable percentage of the general public continues to purchase counterfeit goods,60

meaning that brand owners must continue to fight an uphill (and perhaps ultimately

futile) battle against consumers’ preferences.

3 Educating

IP associations use estimates costing the consequences of trademark infringement

to shape a narrative arguing that this issue threatens state’s economic integrity. For

example, Frontier Economics, in a study commissioned by BASCAP, estimates the

combined domestic and international trade to be worth as much as US$650 billion

annually with projections, if growth continues at a rate of 15% annually, of US$960

billion by 2015.61 While counterfeiting is certainly responsible for economic losses to

industry brand owners, there is considerable debate regarding the extent of losses

and how they should be valued.62 Moreover, this narrative often conflates trademark

infringement with dangerous counterfeit goods although not all counterfeit goods

pose safety problems. Counterfeit ‘safety-critical’ goods, such as pharmaceuticals,

medical equipment or aircraft parts, pose a far greater risk than counterfeit luxury

apparel. Thus, brand owners and intellectual property associations play a powerful

role in shaping how trademark infringement is conceptualised and how it should be

enforced.

B Civil and Criminal Penalties

                                                                                                                         58See  <http://www.allianceagainstiptheft.co.uk/downloads/campaign-­‐pdfs/real%20deal.pdf>  and  <http://www.a-­‐cg.org/guest/pdf/GetRealeaflet2008.pdf>  at  15  August  2011.  59For  example,  see  BASCAP,  2009,  Research  Report  on  Consumer  Attitudes  and  Perceptions  on  Counterfeiting  and  Piracy,  sponsored  by  ICC  BASCAP  (Business  Action  to  Stop  Counterfeiting  and  Piracy)  and  carried  out  by  StrategyOne.  <http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/BASCAP-­‐Consumer%20Research%20Report_Final.pdf>  at  11  August  2011.  60For  example,  see  Jason  Rutter  and  Jo  Bryce,  ‘The  Consumption  of  Counterfeit  Goods:  ‘Here  Be  Pirates?’’  (2008)  42(6),  Sociology,  1146-­‐1164.      61This  study  is  based  on  2008  data.  See  Frontier  Economics  2011,  Estimating  the  global  economic  and  social  impacts  of  counterfeiting  and  piracy,  A  Report  Commissioned  by  Business  Action  to  Stop  Counterfeiting  and  Piracy  (BASCAP),  Frontier  Economics  Ltd.,  London,  United  Kingdom,  February  2011  <www.iccwbo.org/uploadedFiles/.../Global%20Impacts%20-­‐%20Final.pdf>  at  4  May  2011.      62For  example,  see  United  States  Government  Accountability  Office,  Intellectual  Property:  Observations  on  Efforts  to  Quantify  the  Economic  Effects  of  Counterfeit  and  Pirated  Goods  (2010)  Report  to  Congressional  Committees,  GAO-­‐10-­‐423,  12  April  2010  <www.gao.gov/products/GAO-­‐10-­‐423>  at  18  September  2011.  This  report  noted  that  it  was  difficult  to  quantify  the  economic  effects  of  intellectual  property  infringement  and  argued  that  existing  estimates  are  methodologically  problematic.  See  Wall  and  Large,  above  n  5.    

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  12  of  19    

Moving up the pyramid from the strategies described above, regulators have more

coercive options at their disposal. Acting on behalf of brand owners, actors within

private regimes can pursue civil remedies for trademark infringement in isolation of

public law enforcement agencies, for example, undertaking civil litigation. However,

as the private regime lacks a formal mandate for its enforcement, its regulatory

activities do not stretch to the top of the pyramid. If private actors within the regime

wish to seek criminal prosecution in relation to trademark infringement, public law

enforcement agencies must agree to provide assistance.63 Lacking this cooperation,

the private regime does not have access to the most coercive tools at the apex of the

regulatory pyramid.

1 Litigation

Brand owners use litigation or the threat of litigation to protect their trademarks from,

for example, use by unauthorised third parties or use resulting in a likelihood of

confusion.64 Owners “have a legal right and an affirmative obligation to protect their

trademark assets from misuse”; this requires the owner to “proactively police the

relevant market and enforce its rights against violators”.65 The owner may serve

cease-and-desist letters to alert the alleged violator of the owner’s rights and, if this

action is unsuccessful, then file a lawsuit. In terms of regulation, such litigation can

serve to address a particular case of infringement as well as developing precedents

for application to other cases.66 However, there is an important balance to be

achieved between the appropriate protection of trademark rights and when

trademark enforcement tactics become unreasonable and abusive. Many brand

owners undoubtedly undertake reasonable litigation tactics. However, critics of what

is sometimes called ‘trademark bullying’ argue that aggressive and abusive litigation

tactics can harm consumers and small businesses that generally do not have the

resources to counter allegations of infringement.67

                                                                                                                         63Scott,  above  n  3,  72-­‐73.      64TRIPS,  opened  for  signature  15  April  1994,  art  16  (entered  into  force  1  January  1995).  Grounds  also  include  alleged  ‘brand  dilution.’    65United  States  Department  of  Commerce,  Report  to  Congress:  Trademark  Litigation  Tactics  and  Federal  Government  Services  to  Protect  Trademarks  and  Prevent  Counterfeiting,  Conducted  by  United  States  Patent  and  Trademark  Office,  27  April  2011    <www.uspto.gov/ip/TMLitigationReport_final_2011April27.pdf>  at  26  October  2011,  6.  This  study  of  the  extent  to  which  small  businesses  may  be  harmed  by  abusive  trademark  enforcement  tactics  was  a  requirement  of  Public  Law  111-­‐146:  Trademark  Technical  and  Conforming  Amendment  Act  of  2010,  signed  17  March  2010.            66Scott,  above  n  3,  72-­‐73.  67For  example,  the  technology  and  intellectual  property  websites  techdirt  <http://www.techdirt.com>  and  ars  technica  <http://arstechnica.com/>  both  critique  cases  of  abusive  trademark  litigation.  See  also  Leah  Chan  Grinvald,  ‘Shaming  Trademark  Bullies’  (2011)  3  Wisconsin  Law  Review  627-­‐688,  642.  Grinvald  outlines  four  characteristics  of  trademark  bullying:  (1)  unreasonable  interpretation  

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  13  of  19    

Detecting infringing goods and locating alleged counterfeit manufacturers and

distributors, as well as obtaining evidence can be a time-consuming activity for brand

owners focused on the creation and manufacture of new products. Some brand

owners have in-house security units to scour retail outlets and websites for

infringement while others contract out these services. Private security companies

play an important role as the ‘enforcement arm’ for the private regime. Despite this,

the companies’ activities in investigating and obtaining evidence of trademark

infringement on behalf of brand owners have hitherto been largely unexamined.

V The Long (Private) Arm of the Law

Private actors have performed various security-related duties for centuries. The

contemporary private security industry traces its origins to the eighteen-century

England and France.68 The vast contemporary private security industry includes

such diverse activities as guarding (static or patrol), surveillance, investigation,

intelligence, security and risk consultancy, security technology provision, forensic

services, military support duties, and crime-prevention services.69 In the 1980s and

1990s, the private security industry began to expand rapidly and offer an increasingly

diverse range of security-related services.70 A principle reason for this development

was that many industrialised states, beginning with the United Kingdom and United

States, began shifting responsibility for security from the state to individuals and

organisations.71 ‘Security’ then became a commodity to be purchased by individuals

(e.g., home alarm systems) and corporations (e.g., forensic accounting services), a

shift that clearly benefited the burgeoning private security industry.72 The transfer of

security responsibility from state to individual also contributed to perceptions that the

public police are too under-resourced and over-burdened to respond to all crimes.

                                                                                                                                                                                                                                                                                                                                                                                         of  rights,  (2)  intimidation  tactics,  (3)  the  trademark  holder  is  a  large  corporation,  and  (4)  the  accused  infringer  is  a  small  business  or  individual.    68The  origins  of  contemporary  private  security  companies  are  evident  in  the  large-­‐scale  surveillance  and  social  control  policing  techniques  used  by  the  state  in  eighteenth-­‐century  France  and  by  social  control  entrepreneurs  from  eighteen-­‐century  England,  see,  John  L.  McMullan,  ‘The  New  Improved  Monied  Police:  Reform,  Crime  Control,  and  the  Commodification  of  Policing  in  London’,  (1996)  36(1)  British  Journal  of  Criminology,  85-­‐108.  The  most  famous  nineteenth-­‐century  precursor  to  the  contemporary  private  security  company  is  the  Pinkerton  National  Detective  Agency  in  the  United  States,  see  Ward  Churchill,  ‘From  the  Pinkertons  to  the  PATRIOT  Act:  The  Trajectory  of  Political  Policing  in  the  United  States,  1870  to  the  Present’  (2004)  4(1)  New  Centennial  Review,  1-­‐72.    69Jean-­‐Paul  Brodeur,  The  Policing  Web.  Oxford:  Oxford  University  Press  (2010).      70See  Les  Johnston,  The  Rebirth  of  Private  Policing,  New  York:  Routledge  Press  (1992).    71See  David  Garland,  The  Culture  of  Control:  Crime  and  Social  Order  in  Contemporary  Society,  Chicago:  University  of  Chicago  Press  (2001).    72See  Ian  Loader,  ‘Consumer  Culture  and  the  Commodification  of  Policing  and  Security’  (1999)  33  Sociology,  373-­‐392.  

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  14  of  19    

The globalisation of production and distribution processes, outsourcing, and

significant technological developments, all of which are characteristic of

contemporary industry, facilitated the mass production of counterfeit goods.73 In

response to this flood of counterfeit goods, particularly from China, some brand

owners responded by staffing dedicated in-house security teams within the

company. Companies without in-house security hired private security companies on

contract to detect infringement of their brands worldwide, locate offenders for civil or

criminal prosecution, and seize infringing goods. Private actors have long assisted

businesses in tracking down suspected thieves, fraudsters and counterfeiters. In

perhaps one of the earliest cases in January 1902, a music publisher in London,

England hired a private detective agency to illegally raid a warehouse that was being

used to store pirated sheet music and seize five hundred copies.74 Since those early

raids, the private security industry has expanded dramatically and offers specialised

services to protect trademarks on behalf of brand owners, a practice referred to in

the industry as ‘brand protection’ services.

A Brand Protection Services

Some multinational companies offer these services along with a wide variety of

others (e.g., kidnap protection) in dozens of countries. These companies include

GardaWorld, Gamble Investigations International, Kroll, and Kessler International.75

Other companies specialise in investigating IP infringement, such as the Los

Angeles-based Marksmen Inc. or the London-based Cerberus Investigations Ltd.76

These companies tend to emphasize their investigative reach to counterfeiting

hotspots, such as Filley and Associates, headquartered in San Francisco, with

offices in Guilin, Shanghai, Nanning, and Guangzhou, China.77

Brand protection services encompass a wide range of investigative and enforcement

activities that vary among companies. In general, these companies, acting on behalf                                                                                                                          73See  Mackenzie,  above  n  5  and  Thorsten  Staake  and  Elgar  Fleisch,  Countering  Counterfeit  Trade:  Illicit  Market  Insights,  Best-­‐Practice  Strategies,  and  Management  Toolbox  Düsseldorf,  Germany:  Springer  (2008).    74See  Adrian  Johns,  Piracy:  The  Intellectual  Property  Wars  from  Gutenberg  to  Gates,  Chicago:  University  of  Chicago  Press  (2009)  332.    75Information  on  the  companies’  brand  protection  services  was  obtained  from  the  companies’  websites.  See  <http://www.garda-­‐world.com/whatwedo/services/investigation/>,  <http://www.gambleinvestigations.com/our-­‐services/brand-­‐protection>,  <http://www.krollconsulting.com/investigative-­‐forensic/misuse-­‐intellectual-­‐property/>,  <http://www.investigation.com/intellectual_property.htm>  at  5  October  2011.      76See  <http://www.marksmen.com/pages/index.html>  and  <http://cerberusip.com/ip-­‐investigations>  at  5  October  2011.      77See  <http://www.filley.com/en/intellectual-­‐property-­‐investigation.php>  at  5  October  2011.      

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  15  of  19    

of brand owners, locate counterfeit products, identify alleged producers and

distributors, interview witnesses, obtain evidence of infringement, and assist in the

execution of court orders. Identifying trademark-infringing activities can involve

relatively straightforward investigations in which the private security company makes

‘pretext’ or ‘test’ purchases of suspect goods at retail or wholesale outlets or online

to gather evidence of infringement for criminal or civil prosecution. As part of its

investigation, the company may establish ‘front,’ or ‘cover,’ companies supported by

telephone and fax numbers, websites and email addresses, credit cards and bank

accounts to facilitate the confidential purchase of suspected counterfeits. These

investigative activities can also be considerably more complex, involving the covert

surveillance of manufacturing and retail locations suspected of involvement in

counterfeiting to identify offenders, or even placing undercover operatives at all

levels of production and sales within the counterfeiting operation to gather evidence.

Some security companies specialise in systematically monitoring online auction and

trading sites for evidence of trademark infringement given the centrality of the

Internet to the advertisement and distribution of counterfeit goods.78 Examples of

such companies include OpSec Security, Commercial Security International, and

Cerberus Investigations Ltd., all based in the United Kingdom.79 Such companies,

acting on behalf of brand owners, capture images of infringing webpages for

evidence, make test purchases, report incidents of infringement to search engines

for removal of webpages or entire websites and also serve offending sellers with

cease-and-desist orders. Unlike traditional reactive policing which responds after

crimes have been committed, there can be a proactive element to brand protection

services. For example, the Virginia, U.S.-based Cyveillance80 monitors Internet

domain names to ensure that web traffic is directed toward legitimate sites and not

misdirected toward sites selling counterfeit goods.

Private security companies also offer other investigation-related services relating to

trademark protection. For example, Commercial Security International and Cerberus

Investigations Ltd. conduct common law searches to clear prospective trademarks

                                                                                                                         78Such  online  auction  and  trading  sites  include  eBay,  eBid,  amazon.com,  craigslist,  alibaba.com,  and  ioffer.      79See  <http://www.opsecsecurity.com/en/brand-­‐protection>,  <http://comsechq.com/investigations/intellectual-­‐property-­‐investigations>  at  7  October  2011.  See  also  Cerberus,  above  n  72.    80See  <http://www.cyveillance.com/web/solutions/enterprise/solutions/brand-­‐protection.php>  at  9  October  2011.      

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  16  of  19    

for clients prior to registration, and conduct ‘in use’ trademark verification to

determine the nature of use before a client acquires the trademark. They also

undertaken covert ‘brand exposure’ audits to ensure brands are maintaining their

value and conduct investigations on parallel import trade. They acquire Internet

domain names covertly on behalf of brand owners to ensure lower prices. These

companies also monitor signage (to ensure proper use of trademarks) and trade

fairs, often using front companies, to identify counterfeit products on display, obtain

samples for evidence and deliver, on behalf of brand owners, cease-and-desist

letters.81

B Private Enforcement of Public Rules

As the enforcement arm of the private regulatory regime, private security companies

occupy a key niche in the regulation of trademark infringement. Their activities are

an interesting example of third-party enforcement which usually refers to non-

governmental actors that enforce publicly and privately set rules and laws using

powers granted through legal mandates or contract.82 However, as these companies

lack legal or contractual authority in the context of trademark infringement, they are

limited in the security services they can provide. Private security personnel operating

in private spaces (e.g., a shopping mall or airport) can control access to and

behaviour in certain spaces, require submission to searches and seizures, issue

‘move on’ orders, and temporarily detain people.83 These powers, which derive from

property law, mean that the public accepts certain conditions as a requirement for

entering and using the facility. However, in relation to the investigation of trademark

infringement, private security companies lack a legal or contractual mandate, as

brand owners cannot bestow any particular authority on them. Thus, these

companies can either act in cooperation with public law enforcement agencies at the

agencies’ discretion, or they operate within the powers accorded to ordinary

citizens.84

                                                                                                                         81Some  of  the  private  security  companies  are  also  involved  in  manufacturing  products,  such  as  holograms,  intended  to  make  counterfeits  easier  to  detect  or  more  difficult  to  manufacture,  for  example,  see  OpSec  Security,  above  n  75.  Trademark  infringement  has  also  created  a  substantial  (and  profitable)  spin-­‐off  industry  of  recycling  and  disposing  of  counterfeits.  See  David  Blakemore,  A  Study  Relating  to  Existing  Methods  of  Disposal  and  Destruction  of  Counterfeit  Goods  and  Pirated  Goods  Within  the  Asia  Pacific  Region,  World  Intellectual  Property  Organisation,  Advisory  Committee  on  Enforcement  Sixth  Session,  Geneva,  December  1-­‐2,  2010,  produced  3  September  2010  <http://www.wipo.int/edocs/mdocs/enforcement/en/wipo_ace_6/wipo_ace_6_8.pdf>  at  25  October  2011.            82See  Scott  et  al.,  above  n  3,  11  and  Grabosky,  above  n  54.    83See  Rick  Sarre  ‘Private  Security  in  Australian:  some  Legal  Musings’  Journal  of  the  Australasian  Law  Teachers  Association  3(1)  2  2010,  45-­‐54  and  Philip  Stenning,  ‘Powers  and  Accountability  of  Private  Police’  (2000)  8  European  Journal  on  Criminal  Policy  and  Research,  325-­‐352.    84For  an  extensive  discussion  of  the  legal  rights  and  powers  of  private  security  providers  in  the  Australian  context,  see  Sarre,  above  n  83.  

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  17  of  19    

Given ongoing corporate campaigns for greater enforcement, the private regulation

of trademark infringement would appear to be a growth industry for the private

security industry. Despite the number of companies appearing to offer brand

protection services, there is surprisingly little information indicating the extent to

which brand owners use these services, which services are most commonly used

and for what types of goods, or their efficacy in terms of addressing trademark

infringement. Questions of authority, oversight and legitimacy in relation to the

private security industry are of growing interest to both scholars and practitioners

alike, particularly given the industry’s rapid expansion and vast array of security-

related services.85 Further research therefore is needed to explore in more detail

how private security companies investigate trademark infringement on behalf of

brand owners, interactions among public-private regulators, the efficacy of this

private regulation, and how these private security companies can contribute to our

understanding of private regulatory regimes.

VI CONCLUSION: BALANCING PRIVATE INTERESTS AND PUBLIC RESOURCES

This paper’s exploration of trademark infringement raises critical questions about

balancing public-private interests. The public benefit of addressing trademark

infringement is clear in cases of counterfeit safety-critical goods (e.g., medical

equipment, food, or pharmaceuticals). However, the benefit is less clear in relation to

non-safety-critical counterfeit goods. The tendency of some industry and

governmental officials to conflate all counterfeits into the category of ‘dangerous’ is

problematic and, more importantly, unhelpful in terms of determining how public and

corporate resources can most effectively be deployed to address trademark

infringement. Moreover, this conflation deliberately obscures patterns of consumer

behaviour in which some individuals knowingly and willingly purchase counterfeit

goods while others mistakenly purchase ‘deceptive’ counterfeits.

The complexity and variety of private regimes requires researchers to determine

empirically the division of responsibilities among actors, their relationships, and each

                                                                                                                         85See  for  example,  Martin  Gill  and  Jerry  Hart,  ‘Enforcing  Corporate  Security  Policy  using  Private  Investigators’  (1999)  7  European  Journal  of  Criminal  Policy  and  Research,  245-­‐261  and  Stenning,  above  n  79.    

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  18  of  19    

regime’s particular mix of ‘public-ness’ and ‘private-ness’.86 The regulation of

trademark infringement is an interesting case through which to explore how security

institutions intersect public, private and international law and what this interaction

means in relation to the private enforcement of publicly set laws. The private regime

examined in this paper does not establish rules or laws itself, but is a dominant

influence in pushing forward ever-stronger IP laws through multilateral and

plurilateral international trade agreements (e.g., TRIPS and ACTA respectively) and

enhancing civil and criminal sanctions within individual states.87 The regime lacks a

legal or contractual mandate for its protection of IP, requiring it to operate within

existing civil and criminal law within specific states or employ a range of non-legal

and persuasive strategies (e.g., educational campaigns). The regime also

demonstrates a particular type of public-private regulatory interaction or ‘co-

regulation.’ It can undertake civil-law remedies against trademark infringement in

isolation of the state and participate in joint activities, such as coordinated public

education campaigns. However, brand owners and IP associations require the

cooperation of public authorities to pursue criminal-law remedies. Public authorities,

in turn, generally require cooperation from brand owners to confirm infringement for

criminal investigations, a challenge for publicity-adverse brand owners. Thus, one

can observe a complex and shifting interface between public and private actors and

between civil and criminal law.

The paper’s preliminary exploration of the private regime regulating trademark

infringement lays the groundwork for future empirical analysis. Empirical studies of

the regime would help conceptually map its members, clarify their individual and

collective roles and responsibilities, and provide insight into public-private regulatory

interactions. In general, there is an absence of empirical work on the enforcement of

trademark law by either public or private actors and the efficacy of those operations

in reducing trademark infringement or the risk from safety-critical counterfeits.

Moreover, the balance between private interests and public resources in the policing

of counterfeit goods requires further study, as does the public benefit in regulating

non-safety-critical counterfeit goods.

                                                                                                                         86Jeroen  van  der  Heijden,  ‘Friends,  Enemies  or  Strangers?  On  Relationships  between  Public  and  Private  Sector  Service  Providers  in  Hybrid  Forms  of  Governance’  (2011)  33(3)  Law  &  Policy,  367-­‐390,  368-­‐370.  87See  Drahos  and  Braithwaite  above  n  2  and  Sell  above  n  22.    

Natasha  Tusikov,     October  2011      Regulatory  Institutions  Network,  Australian  National  University    

Page  19  of  19    

Future research can build upon this paper’s analysis of the role that private security

companies play in the investigation of trademark infringement. Additional research is

necessary to examine in more detail what brand protection services these

companies provide, how they are delivered and how these companies interface with

other private actors within the private regime and with public law enforcement

agencies. Such research would also contribute to a greater understanding of the

governance of the private security industry, a topic of increasing importance given

this industry’s ongoing problems of legitimacy and accountability. Finally, future

research is necessary to further develop the concept of co-regulation, particularly for

contexts in which private actors who lack legal or contractual mandates undertake

enforcement duties to protect (largely) private interests. A necessary component of

this research entails an examination of the social and legal implications of such third-

party enforcement, particularly in terms of its legitimacy, oversight and benefit to the

public interest.88

                                                                                                                         88See  Scott  et  al.,  above  n  3  and,  above  n  54.