SlideShare a Scribd company logo
1 of 8
COMBATING INTELLECTUAL
          PROPERTY CRIME IN
         NIGERIA: The Need For
  Multilateral Partnership Against
                A Common Threat
Presented by
Dr. Godwin Okonkwo
Brand Protection Specialist
ANTI-COUNTERFEITING & PIRACY INITIATIVE (ACAPI)
dr.godwin@acapiafrica.org.ng
           Paper presented to the 9th INTERPOL IP Crime Training Seminar, Best Western Hotel,
                                                                   Ikeja, Lagos. June 22, 2011
The facts:

   IP Crime Activities Fund Organised Crime
   IP Crime Activities Are Everywhere
   IP Crime Activities Are Immoral
   IP Crime Activities Infringe on The Laws Of Nigeria
   IP Crime Activities affect Public Health & Safety
   IP Criminals Are Dangerous
Introduction

Intellectual property crime activities such as
  counterfeiting, piracy, knock-offs, product diversion,
  grey market/parallel imports, relabeling, cloning etc
  ultimately hurt the economy. While FAKERS
  illegally enrich themselves, they impoverish our
  country and fellow citizens as their actions lead to
  mass unemployment, widespread poverty and loss of
  revenue for right holders, genuine manufacturers and
  government.
The nature and extent of IP infringements in Nigeria is
 such      that   local     law     enforcement     are
 overwhelmed, civil litigation options are too
 slow, therefore, IP criminals and their agents easily
 get away with these crimes with little or no
 resistance. The criminals are constantly evolving new
 and advanced techniques to evade law enforcement
 and constantly maintain alliances that are
 increasingly transnational in nature. In the
 past, infringers where said to operate at small scales
 and for a limited time. Today, we know that IP
 criminals invest huge funds to perfect their dastardly
 acts and are also able to operate undetected mainly in
 new an emerging markets such as in Africa.
The Same Old Story

   Lack of Training
   Lack of Adequate Funding
   Lack of Human Resources
   Lack of Communication
   Lack of Integrity
   Issues of Jurisdiction
   The China factor
   etc
Cooperation & Collaboration

INTERPOL, the WCO AND WIPO are the key
  international intergovernmental organisations involved in
  the fight against intellectual property crimes and together
  with global business organisations, such as the ICC-
  BASCAP, agree on the principle that business and
  government must work together to achieve more
  effective protection of intellectual property. In Nigeria,
  you will agree that more work can and should be done to
  improve cooperation and coordination among and
  between government authorities and the private sector.
  The rational being that expanding and promoting
  understanding of IP crime related activities, information-
  sharing and cooperation between INTERPOL, other
  enforcement agencies and the private sector will
  effectively facilitate combating IPR crimes.
Working together, we can win the fight against IPR
 Crime

   Policy Advocacy- Private sector
   Public Enlightenment- Government
   Technology Apps- Government & Private sector
   Information Sharing- Private sector
   Financial Support- Government & Private sector
   Training- Government
Conclusion

IPR crimes will continue to undermine innovation and
  economic empowerment unless we take action, take
  responsibility and get involved in the fight. We need
  popular will to drive the political will towards
  combating this menace and if we hope to achieve any
  lasting success, we all need to put aside our
  differences and diversities and see IPR crimes as it
  really is, A Common Threat!

Thank you for your time and God bless us all,
 Everyone.

More Related Content

What's hot

Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismPaul van Heel
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenPaul van Heel
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01guest446b00
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
Amirudin bin Abdul Wahab
Amirudin bin Abdul WahabAmirudin bin Abdul Wahab
Amirudin bin Abdul Wahabeletseditorial
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3safa
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2safa
 
I4ADA 2019 Presentation Stepheni baraki
I4ADA 2019 Presentation  Stepheni barakiI4ADA 2019 Presentation  Stepheni baraki
I4ADA 2019 Presentation Stepheni barakiPaul van Heel
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2Elisha Quaye
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Stef and nick presentation 1
Stef and nick presentation 1Stef and nick presentation 1
Stef and nick presentation 1jessicachappell
 

What's hot (20)

Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Security in a Mobile World
Security in a Mobile WorldSecurity in a Mobile World
Security in a Mobile World
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
Digital citizenship-1
Digital citizenship-1Digital citizenship-1
Digital citizenship-1
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
 
Big Trends in Mobile in 2009
Big Trends in Mobile in 2009Big Trends in Mobile in 2009
Big Trends in Mobile in 2009
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security economics
Security economicsSecurity economics
Security economics
 
Amirudin bin Abdul Wahab
Amirudin bin Abdul WahabAmirudin bin Abdul Wahab
Amirudin bin Abdul Wahab
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
Privacy in an interconnected world
Privacy in an interconnected worldPrivacy in an interconnected world
Privacy in an interconnected world
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
I4ADA 2019 Presentation Stepheni baraki
I4ADA 2019 Presentation  Stepheni barakiI4ADA 2019 Presentation  Stepheni baraki
I4ADA 2019 Presentation Stepheni baraki
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Stef and nick presentation 1
Stef and nick presentation 1Stef and nick presentation 1
Stef and nick presentation 1
 

Viewers also liked

Intellectual Property Crimes CLE
Intellectual Property Crimes CLEIntellectual Property Crimes CLE
Intellectual Property Crimes CLERaymond Dowd
 
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis KontemporerDiskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis KontemporerAn Nisbah
 
Seurity policy
Seurity policySeurity policy
Seurity policyHari Sarda
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspaceTomas Molina
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Abdulkarim Zakaria
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspaceRistya Anditha
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (20)

CYBER CRIME PPT
CYBER CRIME PPTCYBER CRIME PPT
CYBER CRIME PPT
 
Intellectual Property Crimes CLE
Intellectual Property Crimes CLEIntellectual Property Crimes CLE
Intellectual Property Crimes CLE
 
Presentation1
Presentation1Presentation1
Presentation1
 
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis KontemporerDiskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Seurity policy
Seurity policySeurity policy
Seurity policy
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspace
 
Intellectual Property Crimes : Research Tools & Strategies
Intellectual Property Crimes : Research Tools & StrategiesIntellectual Property Crimes : Research Tools & Strategies
Intellectual Property Crimes : Research Tools & Strategies
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Copyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in CyberspaceCopyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in Cyberspace
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Combating IP Crime Through Multilateral Partnerships

PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Media and entertainment Trends
Media and entertainment Trends Media and entertainment Trends
Media and entertainment Trends Tuan Anh Nguyen
 
Submission to the parliamentary joint committee inquiry on the future impact ...
Submission to the parliamentary joint committee inquiry on the future impact ...Submission to the parliamentary joint committee inquiry on the future impact ...
Submission to the parliamentary joint committee inquiry on the future impact ...Alex Malik
 
INTELLECTUAL PROPERTY AND THE NIGERIAN ECONOMY
INTELLECTUAL PROPERTY AND THE NIGERIAN ECONOMYINTELLECTUAL PROPERTY AND THE NIGERIAN ECONOMY
INTELLECTUAL PROPERTY AND THE NIGERIAN ECONOMYHelloTheFirma
 
Sheetal chopra ip crimes
Sheetal chopra ip crimesSheetal chopra ip crimes
Sheetal chopra ip crimespratyush227
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
Intellectual property rights and economic growth
Intellectual property rights and economic growthIntellectual property rights and economic growth
Intellectual property rights and economic growthAlexander Decker
 
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
Forensic Auditing and Public Sector Fraud Detection in Rivers State, NigeriaForensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeriaijtsrd
 
Brochure-Lawctopus-compressed.pdf
Brochure-Lawctopus-compressed.pdfBrochure-Lawctopus-compressed.pdf
Brochure-Lawctopus-compressed.pdftarachand1234
 
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...ijtsrd
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
Could tough anti corruption laws and an exclusive anti-corruption court safeg...
Could tough anti corruption laws and an exclusive anti-corruption court safeg...Could tough anti corruption laws and an exclusive anti-corruption court safeg...
Could tough anti corruption laws and an exclusive anti-corruption court safeg...Alexander Decker
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfVincent Mwando
 
Highlights (short) - 2018 Global Anti-Corruption & Integrity Forum
Highlights (short) - 2018 Global Anti-Corruption & Integrity ForumHighlights (short) - 2018 Global Anti-Corruption & Integrity Forum
Highlights (short) - 2018 Global Anti-Corruption & Integrity ForumOECD Governance
 
INTEGRITY PACT IN INDIA - Glancing Back and Looking Forward
INTEGRITY PACT IN INDIA - Glancing Back and Looking ForwardINTEGRITY PACT IN INDIA - Glancing Back and Looking Forward
INTEGRITY PACT IN INDIA - Glancing Back and Looking ForwardGlobalCompact
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 

Similar to Combating IP Crime Through Multilateral Partnerships (20)

PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
IP report
IP reportIP report
IP report
 
Media and entertainment Trends
Media and entertainment Trends Media and entertainment Trends
Media and entertainment Trends
 
Submission to the parliamentary joint committee inquiry on the future impact ...
Submission to the parliamentary joint committee inquiry on the future impact ...Submission to the parliamentary joint committee inquiry on the future impact ...
Submission to the parliamentary joint committee inquiry on the future impact ...
 
Guidelines on Intellectual Property Rights
Guidelines on Intellectual Property RightsGuidelines on Intellectual Property Rights
Guidelines on Intellectual Property Rights
 
INTELLECTUAL PROPERTY AND THE NIGERIAN ECONOMY
INTELLECTUAL PROPERTY AND THE NIGERIAN ECONOMYINTELLECTUAL PROPERTY AND THE NIGERIAN ECONOMY
INTELLECTUAL PROPERTY AND THE NIGERIAN ECONOMY
 
Sheetal chopra ip crimes
Sheetal chopra ip crimesSheetal chopra ip crimes
Sheetal chopra ip crimes
 
IOSI-April2015
IOSI-April2015IOSI-April2015
IOSI-April2015
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Intellectual property rights and economic growth
Intellectual property rights and economic growthIntellectual property rights and economic growth
Intellectual property rights and economic growth
 
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
Forensic Auditing and Public Sector Fraud Detection in Rivers State, NigeriaForensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
Forensic Auditing and Public Sector Fraud Detection in Rivers State, Nigeria
 
Brochure-Lawctopus-compressed.pdf
Brochure-Lawctopus-compressed.pdfBrochure-Lawctopus-compressed.pdf
Brochure-Lawctopus-compressed.pdf
 
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Could tough anti corruption laws and an exclusive anti-corruption court safeg...
Could tough anti corruption laws and an exclusive anti-corruption court safeg...Could tough anti corruption laws and an exclusive anti-corruption court safeg...
Could tough anti corruption laws and an exclusive anti-corruption court safeg...
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Highlights (short) - 2018 Global Anti-Corruption & Integrity Forum
Highlights (short) - 2018 Global Anti-Corruption & Integrity ForumHighlights (short) - 2018 Global Anti-Corruption & Integrity Forum
Highlights (short) - 2018 Global Anti-Corruption & Integrity Forum
 
INTEGRITY PACT IN INDIA - Glancing Back and Looking Forward
INTEGRITY PACT IN INDIA - Glancing Back and Looking ForwardINTEGRITY PACT IN INDIA - Glancing Back and Looking Forward
INTEGRITY PACT IN INDIA - Glancing Back and Looking Forward
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 

Combating IP Crime Through Multilateral Partnerships

  • 1. COMBATING INTELLECTUAL PROPERTY CRIME IN NIGERIA: The Need For Multilateral Partnership Against A Common Threat Presented by Dr. Godwin Okonkwo Brand Protection Specialist ANTI-COUNTERFEITING & PIRACY INITIATIVE (ACAPI) dr.godwin@acapiafrica.org.ng Paper presented to the 9th INTERPOL IP Crime Training Seminar, Best Western Hotel, Ikeja, Lagos. June 22, 2011
  • 2. The facts:  IP Crime Activities Fund Organised Crime  IP Crime Activities Are Everywhere  IP Crime Activities Are Immoral  IP Crime Activities Infringe on The Laws Of Nigeria  IP Crime Activities affect Public Health & Safety  IP Criminals Are Dangerous
  • 3. Introduction Intellectual property crime activities such as counterfeiting, piracy, knock-offs, product diversion, grey market/parallel imports, relabeling, cloning etc ultimately hurt the economy. While FAKERS illegally enrich themselves, they impoverish our country and fellow citizens as their actions lead to mass unemployment, widespread poverty and loss of revenue for right holders, genuine manufacturers and government.
  • 4. The nature and extent of IP infringements in Nigeria is such that local law enforcement are overwhelmed, civil litigation options are too slow, therefore, IP criminals and their agents easily get away with these crimes with little or no resistance. The criminals are constantly evolving new and advanced techniques to evade law enforcement and constantly maintain alliances that are increasingly transnational in nature. In the past, infringers where said to operate at small scales and for a limited time. Today, we know that IP criminals invest huge funds to perfect their dastardly acts and are also able to operate undetected mainly in new an emerging markets such as in Africa.
  • 5. The Same Old Story  Lack of Training  Lack of Adequate Funding  Lack of Human Resources  Lack of Communication  Lack of Integrity  Issues of Jurisdiction  The China factor  etc
  • 6. Cooperation & Collaboration INTERPOL, the WCO AND WIPO are the key international intergovernmental organisations involved in the fight against intellectual property crimes and together with global business organisations, such as the ICC- BASCAP, agree on the principle that business and government must work together to achieve more effective protection of intellectual property. In Nigeria, you will agree that more work can and should be done to improve cooperation and coordination among and between government authorities and the private sector. The rational being that expanding and promoting understanding of IP crime related activities, information- sharing and cooperation between INTERPOL, other enforcement agencies and the private sector will effectively facilitate combating IPR crimes.
  • 7. Working together, we can win the fight against IPR Crime  Policy Advocacy- Private sector  Public Enlightenment- Government  Technology Apps- Government & Private sector  Information Sharing- Private sector  Financial Support- Government & Private sector  Training- Government
  • 8. Conclusion IPR crimes will continue to undermine innovation and economic empowerment unless we take action, take responsibility and get involved in the fight. We need popular will to drive the political will towards combating this menace and if we hope to achieve any lasting success, we all need to put aside our differences and diversities and see IPR crimes as it really is, A Common Threat! Thank you for your time and God bless us all, Everyone.