The document discusses an anti-counterfeiting system that uses social media and bounty hunters to locate counterfeit products. It outlines how the system works, including training and paying bounty hunters, using RFID tags and encryption on products, filing complaints with relevant agencies, and ensuring intellectual property rights compliance. The system aims to curb counterfeiting by making it financially rewarding for bounty hunters to report counterfeits through a competitive bounty process.
Yacuna answers UK government HM Treasury on Digital CurrencyYacunaLtd
The UK government and the HM Treasury want to promote innovation and competition in the banking sector. As new types of digital currency are being developed and digital currency businesses are setting up in the UK, they want wants to hear about the benefits of digital currencies for the people that use them and the wider economy.
As a UK-based and regulated business, the <a>Yacuna Group (Yacuna Ltd.)</a> participated in this Call for Information which has been completed yesterday. We like to keep our customers informed about our actions. Therefore, we're publishing our answers to the HM Treasury according to the Freedom of Information Act 2000 (FOIA).
The European Union is the second-largest economy across the globe. It is right behind famous Asian countries like South Korea and Japan in terms of Cryptocurrency investment. If you want to invest in centralized trading solutions or centralized crypto exchange platform, you must have a good understanding of legal compliance and taxation outlook of the EU.
http://pwc.to/1fsT9Uu
Le Bitcoin est une monnaie numérique peer-to-peer qui connait un essor mondial. En 2013, le Bitcoin a obtenu 3,4 millions de mentions sur internet. Aux États-Unis, plusieurs petites et grandes entreprises du divertissement, des médias et des télécommunications ont entrepris des expériences avec cette nouvelle monnaie. PwC a donc mené une enquête auprès des consommateurs en ligne pour recueillir des informations sur la sensibilisation, les attitudes et les comportements liés au Bitcoin.
The eCommerce model of Online PublicationJoseph Man
A group project when studying in HKUST, on the topic of the eCommerce model of Online Publication, analyzing the model from the perspective of consumer, producers and the community, with successful and failure stories studied. Also commenting on the future trends of the industry.
A Business Case Study of Producing Nano Particles for Anti-Counterfeit Joseph Man
In Apr 2014, MIT announced the research result of addoping Nano Particles for Anti-Counterfeit. A group HKUST students did a case study of producing such particles with the reference to the of manufacturing data from Dong Guan, China. The study covers the aspect of marketing, demand analysis, two-sided platform, cost and pofit analysis, as well as challenge of business.
Yacuna answers UK government HM Treasury on Digital CurrencyYacunaLtd
The UK government and the HM Treasury want to promote innovation and competition in the banking sector. As new types of digital currency are being developed and digital currency businesses are setting up in the UK, they want wants to hear about the benefits of digital currencies for the people that use them and the wider economy.
As a UK-based and regulated business, the <a>Yacuna Group (Yacuna Ltd.)</a> participated in this Call for Information which has been completed yesterday. We like to keep our customers informed about our actions. Therefore, we're publishing our answers to the HM Treasury according to the Freedom of Information Act 2000 (FOIA).
The European Union is the second-largest economy across the globe. It is right behind famous Asian countries like South Korea and Japan in terms of Cryptocurrency investment. If you want to invest in centralized trading solutions or centralized crypto exchange platform, you must have a good understanding of legal compliance and taxation outlook of the EU.
http://pwc.to/1fsT9Uu
Le Bitcoin est une monnaie numérique peer-to-peer qui connait un essor mondial. En 2013, le Bitcoin a obtenu 3,4 millions de mentions sur internet. Aux États-Unis, plusieurs petites et grandes entreprises du divertissement, des médias et des télécommunications ont entrepris des expériences avec cette nouvelle monnaie. PwC a donc mené une enquête auprès des consommateurs en ligne pour recueillir des informations sur la sensibilisation, les attitudes et les comportements liés au Bitcoin.
The eCommerce model of Online PublicationJoseph Man
A group project when studying in HKUST, on the topic of the eCommerce model of Online Publication, analyzing the model from the perspective of consumer, producers and the community, with successful and failure stories studied. Also commenting on the future trends of the industry.
A Business Case Study of Producing Nano Particles for Anti-Counterfeit Joseph Man
In Apr 2014, MIT announced the research result of addoping Nano Particles for Anti-Counterfeit. A group HKUST students did a case study of producing such particles with the reference to the of manufacturing data from Dong Guan, China. The study covers the aspect of marketing, demand analysis, two-sided platform, cost and pofit analysis, as well as challenge of business.
Selling online - Prepare your ecommerce projectJohann Savalle
So you want to sell online. Maybe you have never sold a thing in your life, maybe you have a retails store or you are already selling stuff but want to rethink your approach. Have a look at this quick guide, it should help
Most of us wouldn't start our own business. However, some of use may move up to the management role. How would Entreneurship relates to our day-to-day job and affect our attitudes towards our daily decisions?
THE ASOS STRATEGY : THE AMAZING GROWTH OF ONLINE FAST FASHIONJoseph Man
THE ASOS STRATEGY : THE AMAZING GROWTH OF ONLINE FAST FASHION
Study on ASOS.com and the Fashion Industry, about the strategy behind the success of this UK online fashion retailer.
A well-designed web site is user-friendly, helping consumers find what they want fast and then making ordering very easy. Ecommerce sites use online marketing (search engine marketing and social media marketing with blogs, wikis, podcasts and RSS feeds) to reinforce their brand, generate highly targeted traffic and track its conversion rate and ROI.
Moving forward based on Market Trends #BlockchainSubmit Pablo Junco
The presentation was used during the closing session in the Blockchain DLT Summit at Lima, Peru (November 14). Thanks to the summit sponsors UTEC, R3, BCP, and Microsoft Peru.
Title: Match-Maker Ventures’ GDPR insights: Implications of the 72-hours breach notification requirement.
Guest: Daniel Söderberg, CEO of EyeOnID
Match-Maker Ventures’ webinar series continues, addressing another key-aspects of GDPR: data breach notification. Under the upcoming general data protection regulation (GDPR), companies will be required to notify their customers about a data breach within 72-hours. This new requirement and the recent prominent data breach events have brought this topic back on everyone’s agenda.
During the webinar, we will cover the impact of this new requirement for companies and how they should prepare for such an event. In addition, we invited Daniel Söderberg, CEO of EyeOnID, as a guest to approach this topic from a wider perspective. EyeOnID offers a solution that scans for breached data on the internet, the dark-web and beyond. If they find data where it does not belong, they inform organizations and customers. As an expert on the subject matter, Daniel, will provide deeper insights on this topic and will show how his company can help.
Oct 23rd 2014 Offices of Arthur Cox - Presentation by Paul C Dwyer CEO of Cyber Risk International outlining a high level overview of the holistic cyber threat landscape in 2014
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
Like most ecommerce sites, StubHub’s competitors try to scrape their prices, and monitor inventory and customer behavior. Meanwhile, other nefarious actors attempt brute force attacks and transaction fraud. Learn advanced website security and web infrastructure management strategies from StubHub, the world’s largest ticket marketplace, and Distil Networks, the global leader in bot detection and mitigation.
Learn how to:
- Protect prices and product listings from being scraped or monitored by competitors
- Defend your site against brute force login attacks and carding
- Ensure brand secrets and pricing schedules are kept safe
- Increase revenues by ensuring traffic is from legitimate sources
- Protect your brand image, reputation and SEO rankings
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
Supply chain is a complex ecosystem with many participants, that may include governments, transnational companies, brokers and other middlemen, and local farms, factories, and other suppliers. Another reason supply chain is complex is because it cuts across borders, and must adhere to laws and regulations in multiple jurisdictions: global, national, and local.
This report researched the supply chain through the lens of digital identity for tracking and auditing.
Download the reports:
Gaps: bit.ly/NPEreport
Supply Chain: bit.ly/GSCreport
IAB Tuesday Webinar: Tackling ad supported intellectual property infringementIAB Europe
The rise of websites offering intellectual property infringing content has a severe impact on industry in Europe. To tackle the problem, the European Commission has recently issued an Action Plan paving the way towards a “follow the money approach” ie seeking to deprive commercial scale infringers of revenue flows such as digital advertising.
However, tackling ad-supported intellectual property infringement represents several challenges for the digital advertising sector:who should be responsible for identifying infringing content? How do we ensure ads are not served on such websites? What are the responsibilities for the different businesses in the digital advertising chain?
The objective of this free webinar is to provide you with an update on the policy discussion: you’ll hear rights holders’ perspective as well as from the European Commission .It will give you an insight on how the sector is addressing the issue in the biggest European digital advertising market, the UK.
INATSUMMIT 2018 - Belgrade April 14th, 2018
How to comply to General Data Protection Regulation and still run a wealthy organization in post-digital economy
Selling online - Prepare your ecommerce projectJohann Savalle
So you want to sell online. Maybe you have never sold a thing in your life, maybe you have a retails store or you are already selling stuff but want to rethink your approach. Have a look at this quick guide, it should help
Most of us wouldn't start our own business. However, some of use may move up to the management role. How would Entreneurship relates to our day-to-day job and affect our attitudes towards our daily decisions?
THE ASOS STRATEGY : THE AMAZING GROWTH OF ONLINE FAST FASHIONJoseph Man
THE ASOS STRATEGY : THE AMAZING GROWTH OF ONLINE FAST FASHION
Study on ASOS.com and the Fashion Industry, about the strategy behind the success of this UK online fashion retailer.
A well-designed web site is user-friendly, helping consumers find what they want fast and then making ordering very easy. Ecommerce sites use online marketing (search engine marketing and social media marketing with blogs, wikis, podcasts and RSS feeds) to reinforce their brand, generate highly targeted traffic and track its conversion rate and ROI.
Moving forward based on Market Trends #BlockchainSubmit Pablo Junco
The presentation was used during the closing session in the Blockchain DLT Summit at Lima, Peru (November 14). Thanks to the summit sponsors UTEC, R3, BCP, and Microsoft Peru.
Title: Match-Maker Ventures’ GDPR insights: Implications of the 72-hours breach notification requirement.
Guest: Daniel Söderberg, CEO of EyeOnID
Match-Maker Ventures’ webinar series continues, addressing another key-aspects of GDPR: data breach notification. Under the upcoming general data protection regulation (GDPR), companies will be required to notify their customers about a data breach within 72-hours. This new requirement and the recent prominent data breach events have brought this topic back on everyone’s agenda.
During the webinar, we will cover the impact of this new requirement for companies and how they should prepare for such an event. In addition, we invited Daniel Söderberg, CEO of EyeOnID, as a guest to approach this topic from a wider perspective. EyeOnID offers a solution that scans for breached data on the internet, the dark-web and beyond. If they find data where it does not belong, they inform organizations and customers. As an expert on the subject matter, Daniel, will provide deeper insights on this topic and will show how his company can help.
Oct 23rd 2014 Offices of Arthur Cox - Presentation by Paul C Dwyer CEO of Cyber Risk International outlining a high level overview of the holistic cyber threat landscape in 2014
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
Like most ecommerce sites, StubHub’s competitors try to scrape their prices, and monitor inventory and customer behavior. Meanwhile, other nefarious actors attempt brute force attacks and transaction fraud. Learn advanced website security and web infrastructure management strategies from StubHub, the world’s largest ticket marketplace, and Distil Networks, the global leader in bot detection and mitigation.
Learn how to:
- Protect prices and product listings from being scraped or monitored by competitors
- Defend your site against brute force login attacks and carding
- Ensure brand secrets and pricing schedules are kept safe
- Increase revenues by ensuring traffic is from legitimate sources
- Protect your brand image, reputation and SEO rankings
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
Supply chain is a complex ecosystem with many participants, that may include governments, transnational companies, brokers and other middlemen, and local farms, factories, and other suppliers. Another reason supply chain is complex is because it cuts across borders, and must adhere to laws and regulations in multiple jurisdictions: global, national, and local.
This report researched the supply chain through the lens of digital identity for tracking and auditing.
Download the reports:
Gaps: bit.ly/NPEreport
Supply Chain: bit.ly/GSCreport
IAB Tuesday Webinar: Tackling ad supported intellectual property infringementIAB Europe
The rise of websites offering intellectual property infringing content has a severe impact on industry in Europe. To tackle the problem, the European Commission has recently issued an Action Plan paving the way towards a “follow the money approach” ie seeking to deprive commercial scale infringers of revenue flows such as digital advertising.
However, tackling ad-supported intellectual property infringement represents several challenges for the digital advertising sector:who should be responsible for identifying infringing content? How do we ensure ads are not served on such websites? What are the responsibilities for the different businesses in the digital advertising chain?
The objective of this free webinar is to provide you with an update on the policy discussion: you’ll hear rights holders’ perspective as well as from the European Commission .It will give you an insight on how the sector is addressing the issue in the biggest European digital advertising market, the UK.
INATSUMMIT 2018 - Belgrade April 14th, 2018
How to comply to General Data Protection Regulation and still run a wealthy organization in post-digital economy
Host, Keynote, and Sponsor presentations from the Connections Summit, co-hosted by AIM, NFC Forum, and RAIN on March 7th, 2018. The Connections Summit was a one-day event featuring a series of speaker-led sessions that focused on how NFC, RFID, and AIDC make the world more connected. The full agenda included keynote presentations, panels, and IoT, Retail & Smart Products, Security & Blockchain, Healthcare, and Market Opportunities tracks.
For additional details see: https://nfc-forum.org/events/connections-summit/
At C4 Ventures we decided to have investment themes because we believe that good investors are those who are knowledgeable about their investment thesis.
We tend to be well known for our Hardware investment theme because of our portfolio companies (Nest, Graphcore, Netatmo, Anki…) but also because there aren’t many VCs investing in Hardware…
Then when I mention our second investment theme, I get often the remark: “Are there still VCs investing in Commerce?”
So I decided to take some time to explain in a few slides what where we invest in the future of commerce and why we think this is a hot topic.
Around the world a range of private and public sector organisations are focused on digital identity as a means of delivering secure and convenient services on line.
On 25 July 2017, AusPayNet hosted a visit from TD bank in Canada to learn first-hand about the opportunities and challenges inherent in rolling out a nationwide, cross-sector digital identity framework.
Speakers at the event were:
* Chuck Hounsell, Senior Vice President Payments, TD Bank
* Andre Boysen, Chief Identity Officer, SecureKey
* David G.W. Birch, Author and Consultant
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Remote sensing and monitoring are changing the mining industry for the better. These are providing innovative solutions to long-standing challenges. Those related to exploration, extraction, and overall environmental management by mining technology companies Odisha. These technologies make use of satellite imaging, aerial photography and sensors to collect data that might be inaccessible or from hazardous locations. With the use of this technology, mining operations are becoming increasingly efficient. Let us gain more insight into the key aspects associated with remote sensing and monitoring when it comes to mining.
Explore our most comprehensive guide on lookback analysis at SafePaaS, covering access governance and how it can transform modern ERP audits. Browse now!
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...Kumar Satyam
According to TechSci Research report, “India Orthopedic Devices Market -Industry Size, Share, Trends, Competition Forecast & Opportunities, 2030”, the India Orthopedic Devices Market stood at USD 1,280.54 Million in 2024 and is anticipated to grow with a CAGR of 7.84% in the forecast period, 2026-2030F. The India Orthopedic Devices Market is being driven by several factors. The most prominent ones include an increase in the elderly population, who are more prone to orthopedic conditions such as osteoporosis and arthritis. Moreover, the rise in sports injuries and road accidents are also contributing to the demand for orthopedic devices. Advances in technology and the introduction of innovative implants and prosthetics have further propelled the market growth. Additionally, government initiatives aimed at improving healthcare infrastructure and the increasing prevalence of lifestyle diseases have led to an upward trend in orthopedic surgeries, thereby fueling the market demand for these devices.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
This article provides a comprehensive guide on how to
effectively manage the convert Accpac to QuickBooks , with a particular focus on utilizing online accounting services to streamline the process.
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
Explore the world of the Taurus zodiac sign. Learn about their stability, determination, and appreciation for beauty. Discover how Taureans' grounded nature and hardworking mindset define their unique personality.
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
As a business owner in Delaware, staying on top of your tax obligations is paramount, especially with the annual deadline for Delaware Franchise Tax looming on March 1. One such obligation is the annual Delaware Franchise Tax, which serves as a crucial requirement for maintaining your company’s legal standing within the state. While the prospect of handling tax matters may seem daunting, rest assured that the process can be straightforward with the right guidance. In this comprehensive guide, we’ll walk you through the steps of filing your Delaware Franchise Tax and provide insights to help you navigate the process effectively.
2. Stop counterfeiting in its tracks through bounty based rewards.
•Our system signs up bounty hunters to locate counterfeit product. They are rewarded if they find the bounty first.
•The system first educates and trains the user on how it works.
•Once trained, they must validate their age and provide banking information that can be validated
•The system works as an anonymous subscription. The bounty hunter is unknown to all.
•Bounty hunters are paid using Paypal.
HOW IT WORKS
HOT BOUNTIES
BOUNTY HUNTERS
CLIENTS
2012 BOUNTIES ISSUED: $5,743,294
ABOUT
RULES
LANGUAGE
WWW.CHOCKOGAMI.COM
Anti Counterfeit Solutions Through Social Media
3. Otterbox Anti-CoComesee what we have going. Great stuff!unterfieting:
•We will develop a an encrypted RFID tag that gets installed in the next generation product design. (The chip will cost .005¢/unit)
•The Chochogami web site will announce total bounty on the item, then allow the bounty hunter to scan for either a counterfeit vendor or factory.
•GPS Coordinates and logged when scanned.
•A photo is taken and logged when scanned.
BOUNTY:
$300,000
PRODUCT: 2014 DEFENDER
VENDOR: $2,000 FACTORY:$50,000
SCAN TO WIN!
PREV
NEXT
Anti Counterfeit Solutions Through Social Media
4. RFID TAGS
•We issue RFID tags on your products to specific regions of the world. (Valid vendors scan valid product using the same system. Inventory is centralized)
•We embed them in your latest products to keep track and establish valid product.
•Counterfeiters do not have the database to check in/out the product.
SUPER ENCRYPTION
NFC CCOMPATABLE
HIGH SPEED ENCRYPTION
CARRIES UPC CODE
ESTABLISHES WARRANTY SERVICES
Anti Counterfeit Solutions Through Social Media
5. SOCIAL NETWORKING
•Chochogami works with Facebook to release vital information regarding bounties and resolution. (The world now knows what is going on)
•Traffic to the Chochogami website is directed via Twitter and Facebook
Anti Counterfeit Solutions Through Social Media
6. FACTORY INTEGRATION
•Chochogami installs the automation to embed our custom RFID tags in your product. (The world now knows what is going on)
•We control the integration to prevent vendor tampering with product encryption and identification
7. PRODUCT ENCRYPTION
•Our encryption is secure and issued regional rather than global. (The product that go to a specific region of the world must us a group of secret numbers)
•No one knows the encrypted RFID tag numbers including our clients
Anti Counterfeit Solutions Through Social Media
8. REPORTING
•We provide field support to close down illegal operations. (Our team of counterfeit experts are on the ground solving problems)
•We issue video based power point imagery that takes everyone to the scene of the crime. GPS locations, product count, photos,
•Statistics on how many scans were conducted by bounty hunters.
Anti Counterfeit Solutions Through Social Media
9. TRIPS & TRIMS WIPO SERVICES
•TRIPS[trade-related aspects of intellectual property rights]. (We provide services that conform to these rules).
•TIRMS[trade-related investment measures]. Legislative assistance to member countries.
•We provide a private network for our clients so that they can promote their own bounties.
•There are 21 International Treaties in the field of intellectual property that are administered by WIPO. WIPO is subordinate to the WTO.
Anti Counterfeit Solutions Through Social Media
10. 2010 PIRACY RATES
•DEVELOPED COUNTRIES HAVE LESS
•POOR COUNTRIES HAVE MORE
LOWEST PIRACY
UN ITED STATES
20%
JAPAN
20%
LUXEMBOURG
20%
NEWZEALAND
22%
AUSTRALIAI
24%
AUSTRIA
24%
SWEEDEN
25%
BELGIUM
25%
FINLAND
25%
SWITZERLAND
26%
DENMARK
26%
GERMANY
27%
UNITEDKINGDOM
27%
CANADA
28%
NEDERLAND
28%
NORWAY
29%
ISREAL
31%
SINGAPORE
34%
SOUTHAFRICA
35%
IRELEAND
35%
CZECH REPUBLIC
36%
UAE
36%
TAWAIN
37%
FRANCE
39%
HIGHEST PIRACY
GEORGIA
93%
ZIMBABWE
91%
BANGLEDESH
90%
MOLDOVA
90%
YEMEN
90%
ARMENIA
89%
VENEZUELA
88%
BELERUS
89%
LYBIA
88%
AZERBAJAN
88%
INDONESIA
86%
SHRI LANKA
86%
IRAQ
85%
PAKISTAN
83%
VIETNAM
83%
ALGERIA
83%
PARAQUAY
83%
NIGERIA
82%
CAMEROON
82%
ZIMBIA
82%
GUTAMALA
80%
EL SALVADOR
80%
BOLIVIA
80%
CHINA
79%
“Since TRIPS is part of the WTO agreements, developing countries
that want access to the global market through the WTO must accept the TRIPS agreement and integrate its IPR standards into their national legislation”.
Anti Counterfeit Solutions Through Social Media
11. DISTRIBUTION OF FUNDS
•Our system tracks who the first bounty hunter was that found the cash. (Transactions are processed through PayPal with an option to receive the bounty in BitCoins).
•We provide bitcoin anonymity services to our bounty hunters. The final conversion of funds becomes a digital registry.
Step 1 Registered Payment
Step 2 Bitcoin Payment
Anti Counterfeit Solutions Through Social Media
12. FINANCIAL GAINSE ARE DRIVEN BY REPORTING COUNTERFEIT IS
•Our system drives traffic through financial gains. (Greed over powers the benefits of turning a blind eye or supporting these corrupt factions).
•No one knows if they were first to the bounty hence they keep trying to find the next bounty. The only way they know that the bounty has been found is when it gets transferred into their bank account.
Anti Counterfeit Solutions Through Social Media
13. WORLD TRADE ORGANIZATION CLIENT SCREEN
•We track how countries that are governed under WTO –TIPPS Agreements behave.
•Reports are compiled with simplified ranking
•Dispute settlements will be monitored and ranked for successes and failures
•WTO Members will all be notified of the countries ranking
•We provide a 10 point filing to roll up the problem.
Article 63Transparency…………………………………………………...…
Article 65Transitional Arrangements……………………………………….
Article 64 Dispute Settlement……………………………………………….
Article 65Transitional Arrangements……………………………………….
Article 66Least-Developed Country Members……………………………
Article 67Technical Cooperation…………………………………………….
Article 68Council for Trade-Related Intellectual Property Rights……….
Article 69International Cooperation…………………………………………
Article 71Review and Amendment………………………………………….
Article 72Reservations……………………………………………………….
Article 73Security Exceptions……………………………………………….
Anti Counterfeit Solutions Through Social Media
14. OUR 10 POINT PROCESS
•PATENTS: a company must register its patents and trademarks with the appropriate Chinese agencies and authorities for those rights to be enforceable in China.
•COPYRIGHTS: Foreign companies seeking to distribute their products in China are advised to register their marks and/or logos with the China Trademark Office
•FILE COMPLAINTS: We file complaints on our clients behalf with all agencies.
•CHINA CURRENT IPR ENVIRONMENT: China was the number one source of counterfeit products that were seized at the United States border last year. (2013 –Beijing China USA Embassy)
•LARGE SCALE: On average, 20 percent of all consumer products in the Chinese market are counterfeit.(2013 –Beijing China USA Embassy)
•CHINA TRIPS: Since joining the World Trade Organization, China has strengthened its legal framework and amended its IPR laws and regulations to comply with the WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS).
Anti Counterfeit Solutions Through Social Media
15. ROLL UP COUNTERFIET IN CHINA
Anti Counterfeit Solutions Through Social Media
We Draft Complaints: Our team gathers information from system for a specific location. We draft a report with location, and proof for distribution instantly. Reports can be automatically filed within 24 hours of finding a hot spot.
We Make Sure Your Products are Registered: We take information you provide us with and insure that your products are registered properly in China.
We release the bounty when your product rolls out into the market place. The hunt is on to find counterfeit products.
16. State Intellectual Property Office (SIPO) No 6 XituchengRoadHaidianDistrictP.O. Box 8020Beijing, China 1000088Tel: (86.10) 6209-3268Fax: (86.10) 6201-9615Website:http://www.sipo.gov.cn(Chinese/English)
State Administration for Industry and Commerce (SAIC) Trademark Office8 SanliheEast RoadXichengDistrictBeijing, 100820Tel: (86.10) 6803-2233Fax: (86.10) 6801-0463Websites:http://www.tmo.gov.cn(Chinese/English)
National Copyright Administration of China (NCA) 85 DongsiNan DajieBeijing, China 100703Tel: (86.10) 6512-7869 or 6527-6930Fax: (86.10) 6512-7875Website:http://www.ncac.gov.cn
General Administration of Quality Supervision Inspection and Quarantine (AQSIQ) 9 East Ma Dian RoadHaidianDistrict, Beijing, China 100088Website:http://www.aqsiq.gov.cn
Anti Counterfeit Solutions Through Social Media
We File Reports With These Agencies
17. General Administration of Customs6 JianguomenneiDaJieBeijing, China 100730Tel: (86.10) 6519-5243 or 6519-5399Fax: (86.10) 6519-5394Website:http://www.customs.gov.cn(Chinese)
Beijing Customs:http://www.bjcustoms.gov.cn/
Shanghai Customs:http://www.shcus.gov.cn/apec/index
Nanjing Customs:http://www.nj-customs.gov.cn/
Shenzhen Customs:http://www.sz-customs.gov.cn/
Guangzhou Customs:http://haiguan.gzfeihua.com/customs.htm
Tianjin Customs:http://www.tjc.gov.cn/
Ningbo Customs:http://www.nbedi.com/
WE FILE WITH CHINESE CUSTOMS
Anti Counterfeit Solutions Through Social Media
18. ADDRESSING INFRINGMENT IS A 2 TRACK SYSTEM
•LOCAL COMPLAINT: The first and most prevalent is the administrative track, whereby an IP rights holder files a complaint at the local administrative office.
•JUDICIAL: The second is the judicial track, whereby complaints are filed through the court system. (China has established specialized IP panels in its civil court system throughout the country.)
CHINA INTELECTUAL PROPERTY ENFORCEMENT SYSTEM: China established the State Intellectual Property Office (SIPO), with the vision that it would coordinate China’s IP enforcement efforts by merging the patent, trademark and copyright offices under one authority.
•State Administration on Industry and Commerce (SAIC), Trademark Office
Anti Counterfeit Solutions Through Social Media
19. CLIENT BENEFITS -LEGAL
•Sole Sourcing on all Anti-Counterfeiting Efforts.
•Report and Monitor all Legal Remedies under TRIPS
•Filing and Court Management costs become lower through group client funding
•We establish a mutually supportive relationship between the WTO and the World Intellectual Property Organization (referred to in this Agreement as "WIPO"
JUDGES & MAGISTRATES
WTO/WIPO FILINGS
LOCAL LAW ENFORCEMENT
Anti Counterfeit Solutions Through Social Media
20. IP BACKGROUND CHECKS UNDER TRIPS
•We verify that your IP is valid in the country we are working to extinguish. (Provide PTO files for each product).
•We hyperlink your PTO filings with our bounty. Each Bounty has been assigned to a PTO patent, trade mark, or provisional patent.
SECTION 1: COPYRIGHT AND RELATED RIGHTS
SECTION 2: TRADEMARKS
SECTION 3: GEOGRAPHICAL INDICATIONS
SECTION 4: INDUSTRIAL DESIGNS
SECTION 5: PATENTS
SECTION 6: LAYOUT-DESIGNS (TOPOGRAPHIES) OF INTEGRATED CIRCUITS
SECTION 7: PROTECTION OF UNDISCLOSED INFORMATION
SECTION 8: CONTROL OF ANTI-COMPETITIVE PRACTICES IN CONTRACTUAL LICENCES
STANDARDS CONCERNING THE AVAILABILITY, SCOPE
AND USE OF INTELLECTUAL PROPERTY RIGHTS
Anti Counterfeit Solutions Through Social Media
21. EVIDENCE
Article 43.1: The judicial authorities shall have the authority, where a party has presented reasonably available evidence sufficient to support its claims and has specified evidence relevant to substantiation of its claims which lies in the control of the opposing party, to order that this evidence be produced by the opposing party, subject in appropriate cases to conditions which ensure the protection of confidential information.
Article 41.2 : Procedures concerning the enforcement of intellectual property rights shall be fair and equitable. They shall not be unnecessarily complicated or costly, or entail unreasonable time-limits or unwarranted.
Article 41.3: Decisions on the merits of a case shall preferably be in writing and reasoned. They shall be made available at least to the parties to the proceeding without undue delay. Decisions on the merits of a case shall be based only on evidence in respect of which parties were offered the opportunity to be heard.
PART III -TRIPS
ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS
Anti Counterfeit Solutions Through Social Media
22. EVIDENCE
Article 43.1: The judicial authorities shall have the authority, where a party has presented reasonably available evidence sufficient to support its claims and has specified evidence relevant to substantiation of its claims which lies in the control of the opposing party, to order that this evidence be produced by the opposing party, subject in appropriate cases to conditions which ensure the protection of confidential information.
Article 45.1,2 : Damages The judicial authorities shall have the authority to order the infringer to pay the right holder damages adequate to compensate for the injury the right holder has suffered because of an infringement of that person’s intellectual property right by an infringer who knowingly, or with reasonable grounds to know, engaged in infringing activity.
The judicial authorities shall also have the authority to order the infringer to pay the right holder
expenses, which may include appropriate attorney's fees. In appropriate cases, Members may authorize the judicial authorities to order recovery of profits and/or payment of pre-established damages eveywherethe infringer did not knowingly, or with reasonable grounds to know, engage in infringing activity.
PART III -TRIPS
DAMAGES
23. Albania
Dominican Republic
Liechtenstein
Saint Kitts and NevisAngola
Ecuador
Lithuania
Saint LuciaAntigua and BarbudaEgypt
Luxembourg
Saint Vincent & the GrenadinesArgentinaEl Salvador
Macao, China
SamoaArmeniaEstonia
Madagascar
Saudi ArabiaAustralia
European Union
Malawi
SenegalAustria
Fiji
Malaysia
Sierra Leone
Bahrain, Kingdom
Finland
Maldives
Singapore
Bangladesh
FranceMali
Slovak RepublicBarbados
GabonMalta
SloveniaBelgium
The Gambia
Mauritania
Solomon IslandsBelize
Georgia
Mauritius
South AfricaBeninGermany
Mexico
Spain
Bolivia,
Ghana
Moldova
Sri LankaBotswana
GreeceMongolia
SurinameBrazil
GrenadaMontenegro
SwazilandBrunei Darussalam
Guatemala
Morocco
SwedenBulgaria
GuineaMozambique
SwitzerlandBurkina FasoGuinea-Bissau
Myanmar
Chinese TaipeiBurundi
Guyana
Namibia
Tajikistan
CambodiaHaitiNepal
TanzaniaCameroonHondurasNetherlands
ThailandCanada
Hong Kong, ChinaNew Zealand
MacedoniaCape Verde
Hungary
Nicaragua
TogoCentral African Republic
IcelandNiger
TongaChad
India
Nigeria
Trinidad and TobagoChile
Indonesia
Norway
TunisiaChina
Ireland
Oman
TurkeyColombiaIsrael
Pakistan
UgandaCongo
Italy
Panama
UkraineCosta Rica
Jamaica
Papua New Guinea
United Arab EmiratesCôte d'Ivoire
Japan
Paraguay
United KingdomCroatia
Jordan
Peru
United States of AmericaCuba
Kenya
Philippines
UruguayCyprus
Korea, Republic
Poland
VanuatuCzech Republic
Kuwait
Portugal
VenezuelaDemocratic Republic of theCongo
Kyrgyz Republic
Qatar
Viet NamDenmark
Laos
Romania
ZambiaDjiboutiLatvia
Russian Federation
Zimbabwe
Dominica
Lesotho
Rwanda
•159 WTO member countries managed under TIPPS rules
Anti Counterfeit Solutions Through Social Media
24. EVIDENCE
Article 43.1: The judicial authorities shall have the authority, where a party has presented reasonably available evidence sufficient to support its claims and has specified evidence relevant to substantiation of its claims which lies in the control of the opposing party, to order that this evidence be produced by the opposing party, subject in appropriate cases to conditions which ensure the protection of confidential information.
Article 45.1,2 : Damages The judicial authorities shall have the authority to order the infringer to pay the right holder damages adequate to compensate for the injury the right holder has suffered because of an infringement of that person’s intellectual property right by an infringer who knowingly, or with reasonable grounds to know, engaged in infringing activity.
The judicial authorities shall also have the authority to order the infringer to pay the right holder
expenses, which may include appropriate attorney's fees. In appropriate cases, Members may authorize the judicial authorities to order recovery of profits and/or payment of pre-established damages eveywherethe infringer did not knowingly, or with reasonable grounds to know, engage in infringing activity.
PART III -TRIPS
STOPPING IT AT THE BOARDER
Anti Counterfeit Solutions Through Social Media
25. EVIDENCE
Article 43.1: The judicial authorities shall have the authority, where a party has presented reasonably available evidence sufficient to support its claims and has specified evidence relevant to substantiation of its claims which lies in the control of the opposing party, to order that this evidence be produced by the opposing party, subject in appropriate cases to conditions which ensure the protection of confidential information.
USA FILINGS: To report an IPR-related trade complaint or get more information, call 1-866-999- 4258. In addition, the Department of Commerce’s Trade Compliance Center (TCC) actively monitors and tracks trade barrier complaints filed by U.S. businesses. As well, the TCC maintains a trade barrier toolkit on its website, which provides comprehensive advice on dealing with trade problems. Companies seeking to file a trade barrier complaint with the TCC may do so online.
FILING COMPLAINTS
Anti Counterfeit Solutions Through Social Media
26. BURDON OF PROOF
•http://en.wikipedia.org/wiki/Anti-Counterfeiting_Trade_Agreement
•http://www.finnegan.com/resources/articles/articlesdetail.aspx?news=27e895ac-592f- 446a-9757-10e2924585ce
•The Best Protection is Prevention
•Though China is a party to international agreements to protect intellectual property (including the WIPO, Berne and Paris Conventions, among others), a company must register its patents and trademarks with the appropriate Chinese agencies and authorities for those rights to be enforceable in China.
Anti Counterfeit Solutions Through Social Media