SlideShare a Scribd company logo
1 of 2
Download to read offline
Preparation Identification Containment
Objective: Establish contacts, define procedures,
gather information to save time during an
incident.
 Maintain a list of all legitimate trademarks belonging to your
company and its subsidiaries. This will help in assessing the
situation at hand and prevent you from starting an infringement
procedure on an outdated trademark, an unrelated legitimate
website or social network account.
 Establish a thorough, evidence-based information list related
to your trademarks to support your legal rights:
- Name(s), legitimate domain names and social media
accounts used by your company and its subsidiaries;
- Your trademarked words, symbols, taglines, graphics…
- Trademark registration numbers if applicable;
- International and federal/local trademark registration
offices (USPTO, INPI, etc.) where registered trademarks
have been labelled as such if applicable;
- Any other document establishing clearly that a trademark
belongs to your company.
 Prepare trademark infringement e-mail forms. You will use
them for every trademark infringement case, if possible in several
languages. This will help speed up things when trying to reach out
the registrar, service provider and any other relevant party during
the procedure.
 Promote a central domain management system using
normalized WHOIS fields.
 Promote an ethical online advertisement to avoid appearing in
parked domain names.
Internal contacts
 Maintain a list of all people involved in trademark registration
in the company especially those part of the legal and PR
departments.
 Maintain a list of all people accredited to take decisions on
trademarks and eventual actions regarding trademark
infringement. If possible, obtain a written agreement that gives you
the ability to take this kind of decisions.
External contacts
 Establish and maintain a list of external contacts within
registrars and service providers involved in trademark issues.
Objective: Detect the incident, determine its
scope, and involve the appropriate parties.
Trademark infringement Detection
 Deploy active monitoring of domain names registration
through registries’ zones updates whenever possible or brand
alert services such as DomainTools;
 Set up feeds to monitor usernames, pages and groups on
social networks;
 Analyze HTTP referrers in website logs to identify fraudulent
content downloads and fraudulent mirroring of your websites;
 Set up brand name monitoring with specialized search
engines.
Leverage automation whenever possible to trigger alarms and
improve reaction times.
Involve appropriate parties
 As soon as an infringement is detected, contact the people
in your company who are accredited to take a decision if you
haven’t been empowered to do so on your own.
The decision to act on the fraudulent domain name, group or
user account must be taken as soon as possible.
Collect evidence
 Collect evidence of infringing domain names, websites,
specific URLs (e.g. Facebook vanity URL), pages, groups or
account details.
 Make a time-stamped copy of the infringing material (page,
group, blog, forum, micro-blogging timeline, etc) and take
screenshots if possible.
Objective: Mitigate the infringement effects on
the targeted environment.
 Evaluate the impact of the trademark infringement:
- Can it be used for traffic redirection (cybersquatting,
typosquatting, SEO)?
- Can it be used for spoofing, counterfeiting or
scamming (cybersquatting with redirect to the
corporate website)?
- Can it be used to slander the brand?
 Evaluate the visibility of the infringing component:
- Website visibility (ranking).
- Number of fans or followers on social medias.
 Monitor the dormant, infringing domain for signs of
fraudulent activities:
- See IRM-13-Phishing and IRM-14-Scam for more
information.
11 22 33
Remediation Recovery
Aftermath
Incident Response Methodology
IRM #15
Trademark infringement incident response
Guidelines to handle trademark infringement incidents
___________________________________________________
IRM Author: CERT SG / Jean-Philippe Teissier
IRM version: 1.1
E-Mail: cert.sg@socgen.com
Web: https://cert.societegenerale.com
Twitter: @CertSG
Abstract
Incident handling steps
Objective: Take actions to stop the trademark
infringement.
In most trademark issues, monitoring is usually sufficient.
Remediation must be started only if there’s an impact on your
company or its subsidiaries.
Domain name
 Contact the domain name owner and hosting service
provider to notify them of the trademark infringement and
ask them to remove the fraudulent content.
 Contact the domain name registrar to notify them of the
trademark infringement and ask them to deactivate the
associated domain name or to transfer it to you.
 Ask the domain name owner or registrar to redirect all DNS
requests to your name servers if possible.
 If neither the domain name owner nor the registrar comply
with your requests, initiate an Uniform Domain-Name
Dispute-Resolution Policy (UDRP) procedure if you are
empowered to do so or ask the internal contacts to conduct
it.
Social network account
 Contact the service provider of the infringing page, group or
account to notify them of any violation of their Trademark
Policies or Terms of Service and ask them to deactivate the
infringing account.
 Ask the service provider to transfer the trademarked
account to an existing company account if possible.
In both cases, send e-mails to the contact addresses of the
registrar or service provider. There’s generally an e-mail
address to report abuse, legal or copyright issues.
Fill out a trademark or abuse complain form if available.
Objective: Come back to the previous
functional state.
Assess the end of the infringement case
 Ensure that the infringing domain name, page, group or
account are down or redirected to your company.
 Keep monitoring the infringing domain name, page, group
or account. Sometimes a website can reappear later.
 Acquire the infringing domain name when it is available on
the market.
Objective: Document the incident’s details,
discuss lessons learned, and adjust plans and
defences.
 Consider what preparation steps you could have taken to
respond to the incident faster or more efficiently.
 Update your contacts-lists and add notes as to what is the
most effective way to contact each involved party.
 Consider what relationships inside and outside your
organization could help you with future incidents.
 Collaborate with legal teams if a legal action is required.
This Incident Response Methodology is a cheat sheet dedicated
to handlers investigating on a precise security issue.
Who should use IRM sheets?
 Administrators
 Security Operation Center
 CISOs and deputies
 CERTs (Computer Emergency Response Team)
Remember: If you face an incident, follow IRM, take notes
and do not panic. Contact your CERT immediately if
needed.
6 steps are defined to handle security Incidents
 Preparation: get ready to handle the incident
 Identification: detect the incident
 Containment: limit the impact of the incident
 Remediation: remove the threat
 Recovery: recover to a normal stage
 Aftermath: draw up and improve the process
IRM provides detailed information for each step.
This document is for public use
44 55
66

More Related Content

What's hot

ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_Tahmid Munaz
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistMorrison & Foerster
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issuesebusinessmantra
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 

What's hot (10)

ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
 

Viewers also liked

Coaching especial de Multinivel
Coaching especial de MultinivelCoaching especial de Multinivel
Coaching especial de MultinivelManuel Frutos
 
Managing groups tutorial (diigo)
Managing groups tutorial (diigo)Managing groups tutorial (diigo)
Managing groups tutorial (diigo)Paul L
 
Using your wiki tutorial (pbworks)
Using your wiki tutorial (pbworks)Using your wiki tutorial (pbworks)
Using your wiki tutorial (pbworks)Paul L
 
Installing and using the diigo toolbar tutorial (diigo)
Installing and using the diigo toolbar tutorial (diigo)Installing and using the diigo toolbar tutorial (diigo)
Installing and using the diigo toolbar tutorial (diigo)Paul L
 
FORMULARIO VISA SCHENGEN - ESPAÑA
FORMULARIO VISA SCHENGEN - ESPAÑAFORMULARIO VISA SCHENGEN - ESPAÑA
FORMULARIO VISA SCHENGEN - ESPAÑAyoigrapa
 
Understanding your-menstrual-cycle and body system
Understanding your-menstrual-cycle and body systemUnderstanding your-menstrual-cycle and body system
Understanding your-menstrual-cycle and body systemRufus Yamoah
 
case of a blunt trauma to the left eye causing traumatic hyphema
case of a blunt trauma to the left eye causing traumatic hyphemacase of a blunt trauma to the left eye causing traumatic hyphema
case of a blunt trauma to the left eye causing traumatic hyphemaSamten Dorji
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 

Viewers also liked (11)

Coaching especial de Multinivel
Coaching especial de MultinivelCoaching especial de Multinivel
Coaching especial de Multinivel
 
Folder Rubbens kookketels
Folder Rubbens kookketelsFolder Rubbens kookketels
Folder Rubbens kookketels
 
Regimenes xmpara entregar
Regimenes xmpara entregarRegimenes xmpara entregar
Regimenes xmpara entregar
 
Managing groups tutorial (diigo)
Managing groups tutorial (diigo)Managing groups tutorial (diigo)
Managing groups tutorial (diigo)
 
Using your wiki tutorial (pbworks)
Using your wiki tutorial (pbworks)Using your wiki tutorial (pbworks)
Using your wiki tutorial (pbworks)
 
Installing and using the diigo toolbar tutorial (diigo)
Installing and using the diigo toolbar tutorial (diigo)Installing and using the diigo toolbar tutorial (diigo)
Installing and using the diigo toolbar tutorial (diigo)
 
FORMULARIO VISA SCHENGEN - ESPAÑA
FORMULARIO VISA SCHENGEN - ESPAÑAFORMULARIO VISA SCHENGEN - ESPAÑA
FORMULARIO VISA SCHENGEN - ESPAÑA
 
Lecture 05 Drugs in Pregnancy
Lecture 05 Drugs in PregnancyLecture 05 Drugs in Pregnancy
Lecture 05 Drugs in Pregnancy
 
Understanding your-menstrual-cycle and body system
Understanding your-menstrual-cycle and body systemUnderstanding your-menstrual-cycle and body system
Understanding your-menstrual-cycle and body system
 
case of a blunt trauma to the left eye causing traumatic hyphema
case of a blunt trauma to the left eye causing traumatic hyphemacase of a blunt trauma to the left eye causing traumatic hyphema
case of a blunt trauma to the left eye causing traumatic hyphema
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 

Similar to Irm 15-trademark infringement

Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach SecurityMetrics
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
GlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetGlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetIngenico ePayments
 
You will register your trademark, after reading this!!!
You will register your trademark, after reading this!!!You will register your trademark, after reading this!!!
You will register your trademark, after reading this!!!Corpstore Business Solutions
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Shift-Law-Guide.pdf
Shift-Law-Guide.pdfShift-Law-Guide.pdf
Shift-Law-Guide.pdfShiftLaw
 
IP Protection in Social Media
IP Protection in Social MediaIP Protection in Social Media
IP Protection in Social MediaClark Wilson
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaBrian Miller, Solicitor
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
5 Steps to Manage a Data Breach
5 Steps to Manage a Data Breach5 Steps to Manage a Data Breach
5 Steps to Manage a Data BreachSecurityMetrics
 
Video ip audit by clive bonny
Video ip audit by clive bonnyVideo ip audit by clive bonny
Video ip audit by clive bonnyClive Bonny
 
Why does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programWhy does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programCharles Steve
 
The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceAffiliate Summit
 
Self Registration Portal for Emergency Notification Systems
Self Registration Portal for Emergency Notification SystemsSelf Registration Portal for Emergency Notification Systems
Self Registration Portal for Emergency Notification SystemsJeremy Smith
 
What Is Creative Writing. Essay Topics And Example
What Is Creative Writing. Essay Topics And ExampleWhat Is Creative Writing. Essay Topics And Example
What Is Creative Writing. Essay Topics And ExampleLiz Adams
 

Similar to Irm 15-trademark infringement (20)

Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
GlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetGlobalCollect Data Breach Factsheet
GlobalCollect Data Breach Factsheet
 
You will register your trademark, after reading this!!!
You will register your trademark, after reading this!!!You will register your trademark, after reading this!!!
You will register your trademark, after reading this!!!
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Shift-Law-Guide.pdf
Shift-Law-Guide.pdfShift-Law-Guide.pdf
Shift-Law-Guide.pdf
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
 
IP Protection in Social Media
IP Protection in Social MediaIP Protection in Social Media
IP Protection in Social Media
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social Media
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
5 Steps to Manage a Data Breach
5 Steps to Manage a Data Breach5 Steps to Manage a Data Breach
5 Steps to Manage a Data Breach
 
Video ip audit by clive bonny
Video ip audit by clive bonnyVideo ip audit by clive bonny
Video ip audit by clive bonny
 
Why does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programWhy does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-program
 
The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing Compliance
 
Self Registration Portal for Emergency Notification Systems
Self Registration Portal for Emergency Notification SystemsSelf Registration Portal for Emergency Notification Systems
Self Registration Portal for Emergency Notification Systems
 
Irm 8-blackmail
Irm 8-blackmailIrm 8-blackmail
Irm 8-blackmail
 
What Is Creative Writing. Essay Topics And Example
What Is Creative Writing. Essay Topics And ExampleWhat Is Creative Writing. Essay Topics And Example
What Is Creative Writing. Essay Topics And Example
 

More from Kasper de Waard

More from Kasper de Waard (9)

Cheatsheet: Netcat
Cheatsheet: NetcatCheatsheet: Netcat
Cheatsheet: Netcat
 
Cheatsheet: Metasploit
Cheatsheet: MetasploitCheatsheet: Metasploit
Cheatsheet: Metasploit
 
Cheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regexCheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regex
 
Cheatsheet: Google Search
Cheatsheet: Google SearchCheatsheet: Google Search
Cheatsheet: Google Search
 
Irm 12-insiderabuse
Irm 12-insiderabuseIrm 12-insiderabuse
Irm 12-insiderabuse
 
Irm 10-social engineering
Irm 10-social engineeringIrm 10-social engineering
Irm 10-social engineering
 
Irm 6-website-defacement
Irm 6-website-defacementIrm 6-website-defacement
Irm 6-website-defacement
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
Irm 4-ddos
Irm 4-ddosIrm 4-ddos
Irm 4-ddos
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Recently uploaded (20)

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

Irm 15-trademark infringement

  • 1. Preparation Identification Containment Objective: Establish contacts, define procedures, gather information to save time during an incident.  Maintain a list of all legitimate trademarks belonging to your company and its subsidiaries. This will help in assessing the situation at hand and prevent you from starting an infringement procedure on an outdated trademark, an unrelated legitimate website or social network account.  Establish a thorough, evidence-based information list related to your trademarks to support your legal rights: - Name(s), legitimate domain names and social media accounts used by your company and its subsidiaries; - Your trademarked words, symbols, taglines, graphics… - Trademark registration numbers if applicable; - International and federal/local trademark registration offices (USPTO, INPI, etc.) where registered trademarks have been labelled as such if applicable; - Any other document establishing clearly that a trademark belongs to your company.  Prepare trademark infringement e-mail forms. You will use them for every trademark infringement case, if possible in several languages. This will help speed up things when trying to reach out the registrar, service provider and any other relevant party during the procedure.  Promote a central domain management system using normalized WHOIS fields.  Promote an ethical online advertisement to avoid appearing in parked domain names. Internal contacts  Maintain a list of all people involved in trademark registration in the company especially those part of the legal and PR departments.  Maintain a list of all people accredited to take decisions on trademarks and eventual actions regarding trademark infringement. If possible, obtain a written agreement that gives you the ability to take this kind of decisions. External contacts  Establish and maintain a list of external contacts within registrars and service providers involved in trademark issues. Objective: Detect the incident, determine its scope, and involve the appropriate parties. Trademark infringement Detection  Deploy active monitoring of domain names registration through registries’ zones updates whenever possible or brand alert services such as DomainTools;  Set up feeds to monitor usernames, pages and groups on social networks;  Analyze HTTP referrers in website logs to identify fraudulent content downloads and fraudulent mirroring of your websites;  Set up brand name monitoring with specialized search engines. Leverage automation whenever possible to trigger alarms and improve reaction times. Involve appropriate parties  As soon as an infringement is detected, contact the people in your company who are accredited to take a decision if you haven’t been empowered to do so on your own. The decision to act on the fraudulent domain name, group or user account must be taken as soon as possible. Collect evidence  Collect evidence of infringing domain names, websites, specific URLs (e.g. Facebook vanity URL), pages, groups or account details.  Make a time-stamped copy of the infringing material (page, group, blog, forum, micro-blogging timeline, etc) and take screenshots if possible. Objective: Mitigate the infringement effects on the targeted environment.  Evaluate the impact of the trademark infringement: - Can it be used for traffic redirection (cybersquatting, typosquatting, SEO)? - Can it be used for spoofing, counterfeiting or scamming (cybersquatting with redirect to the corporate website)? - Can it be used to slander the brand?  Evaluate the visibility of the infringing component: - Website visibility (ranking). - Number of fans or followers on social medias.  Monitor the dormant, infringing domain for signs of fraudulent activities: - See IRM-13-Phishing and IRM-14-Scam for more information. 11 22 33
  • 2. Remediation Recovery Aftermath Incident Response Methodology IRM #15 Trademark infringement incident response Guidelines to handle trademark infringement incidents ___________________________________________________ IRM Author: CERT SG / Jean-Philippe Teissier IRM version: 1.1 E-Mail: cert.sg@socgen.com Web: https://cert.societegenerale.com Twitter: @CertSG Abstract Incident handling steps Objective: Take actions to stop the trademark infringement. In most trademark issues, monitoring is usually sufficient. Remediation must be started only if there’s an impact on your company or its subsidiaries. Domain name  Contact the domain name owner and hosting service provider to notify them of the trademark infringement and ask them to remove the fraudulent content.  Contact the domain name registrar to notify them of the trademark infringement and ask them to deactivate the associated domain name or to transfer it to you.  Ask the domain name owner or registrar to redirect all DNS requests to your name servers if possible.  If neither the domain name owner nor the registrar comply with your requests, initiate an Uniform Domain-Name Dispute-Resolution Policy (UDRP) procedure if you are empowered to do so or ask the internal contacts to conduct it. Social network account  Contact the service provider of the infringing page, group or account to notify them of any violation of their Trademark Policies or Terms of Service and ask them to deactivate the infringing account.  Ask the service provider to transfer the trademarked account to an existing company account if possible. In both cases, send e-mails to the contact addresses of the registrar or service provider. There’s generally an e-mail address to report abuse, legal or copyright issues. Fill out a trademark or abuse complain form if available. Objective: Come back to the previous functional state. Assess the end of the infringement case  Ensure that the infringing domain name, page, group or account are down or redirected to your company.  Keep monitoring the infringing domain name, page, group or account. Sometimes a website can reappear later.  Acquire the infringing domain name when it is available on the market. Objective: Document the incident’s details, discuss lessons learned, and adjust plans and defences.  Consider what preparation steps you could have taken to respond to the incident faster or more efficiently.  Update your contacts-lists and add notes as to what is the most effective way to contact each involved party.  Consider what relationships inside and outside your organization could help you with future incidents.  Collaborate with legal teams if a legal action is required. This Incident Response Methodology is a cheat sheet dedicated to handlers investigating on a precise security issue. Who should use IRM sheets?  Administrators  Security Operation Center  CISOs and deputies  CERTs (Computer Emergency Response Team) Remember: If you face an incident, follow IRM, take notes and do not panic. Contact your CERT immediately if needed. 6 steps are defined to handle security Incidents  Preparation: get ready to handle the incident  Identification: detect the incident  Containment: limit the impact of the incident  Remediation: remove the threat  Recovery: recover to a normal stage  Aftermath: draw up and improve the process IRM provides detailed information for each step. This document is for public use 44 55 66