HOME

TheInfoList



OR:

Brand protection is the process and set of actions that a right holder undertakes to prevent third parties from using its
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
without permission, as this may cause loss of revenue and, usually more importantly, destroys
brand equity Brand equity, in marketing, is the worth of a brand in and of itself – i.e., the social value of a well-known brand name. The owner of a well-known brand name can generate more revenue simply from brand recognition, as consumers perceive the prod ...
, reputation and trust. Brand protection seeks primarily to ensure that
trademarks A trademark (also written trade mark or trade-mark) is a type of intellectual property consisting of a recognizable sign, design, or expression that identifies products or services from a particular source and distinguishes them from othe ...
,
patents A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an enabling disclosure of the invention."A ...
, and
copyrights A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, educatio ...
are respected, though other intellectual property rights such as
industrial design rights An industrial design right is an intellectual property right that protects the visual design of objects that are purely utilitarian. An industrial design consists of the creation of a shape, configuration or composition of pattern or color, or co ...
or
trade dress Trade dress is the characteristics of the visual appearance of a product or its packaging (or even the design of a building) that signify the source of the product to consumers. Trade dress is an aspect of trademark law, which is a form of intelle ...
can be involved.
Counterfeiting To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value tha ...
is the umbrella term to designate infringements to intellectual property, with the exception of the term piracy which is sometimes (colloquially) used to refer to
copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, ...
. A more narrow definition of brand protection which focuses on trademark infringement, is sometimes used. Counterfeiting of physical goods that  involves trademark infringement is indeed one of the predominant forms of intellectual property infringement. However, both copyright and patent infringement are possible without an associated trademark infringement, and both may result in loss of revenue and of brand equity. Eliminating diversion,
gray market A grey market or dark market (sometimes confused with the similar term " parallel market") is the trade of a commodity through distribution channels that are not authorized by the original manufacturer or trade mark proprietor. Grey market pr ...
, or product theft and resale, are generally considered as well as part of a brand protection strategy, even though an intellectual property may not be necessarily infringed.


Organisational measures

Registration and management of intellectual property is considered a pre-requisite to launching a brand protection strategy. Effective brand protection measures generally involve implementing prevention processes, monitoring processes, and reaction processes. Internally, the anti-counterfeiting unit will report to top management, develop the brand protection processes, and collaborate closely with the relevant functions for each region and business unit. It will organise training and promote a culture of managing sensitive information carefully with external stakeholders. internally and externally. For large organisations, an effective brand protection strategy requires collaboration and cooperation   between departments, functions, and geographies, as well as with external stakeholders such as customs, law  enforcement agencies, governments, industry partners including competitors, retailers and online marketplaces, and suppliers. It requires training of personnel and the development of a company culture of managing sensitive information carefully, both internally and externally.  It can however be difficult to secure sufficient budget and resources as losses due to intellectual property infringement are difficult to quantify. Methods exist to quantify the return on investment of elements of a brand protection strategy such as the use of product authentication systems, yet organisations must first acknowledge the existence and significance of the problem. A cross-industry benchmark was made with the person in charge of anti-counterfeiting of 45 companies with global market presence. The two organisational measures that were judged as most effective are those that help with the integrity of the supply chain, and those that contribute to securing distribution channels.


Technical measures


Counterfeit detection

According to the EUIPO, counterfeiting detection technologies may be classified into five main categories: electronic, marking, chemical and physical, mechanical and technologies for digital media.
ISO standard The International Organization for Standardization (ISO ) is an international standard development organization composed of representatives from the national standards organizations of member countries. Membership requirements are given in A ...
12931 provides guidelines and performance criteria to help brand owners define the particular authentication elements for either the packaging or material good itself, based on a counterfeiting risk analysis. Overt security feature, such as a
security hologram Security holograms are labels with a hologram printed onto it for sale security reasons. Holograms on security labels are very difficult to forge because they are replicated from a master hologram which requires expensive, specialized and technol ...
or optically variable ink, can be verified by an untrained user with human senses (typically by eyesight). Covert security features are verified with an off-the-shelf or purpose-built authentication tool. Both covert and overt security features may also go through the use of specialised equipment by a skilled expert. Overt security features have been criticised for their ineffectiveness, but others argue that they can be "extremely difficult to replicate". Covert security features used to be verifiable by very few people, and consumers were unaware of their presence. However, according to the ISO standard 12931, a smartphone is technically equivalent to an off-the-shelf covert authentication tool, yet it is a mass-market device which opens authentication on a large scale. Furthermore, it can support overt security authentication by providing the instructions, after a
QR code A QR code (an initialism for quick response code) is a type of matrix barcode (or two-dimensional barcode) invented in 1994 by the Japanese company Denso Wave. A barcode is a machine-readable optical label that can contain information about t ...
scan, to visually verify an overt authentication element. According to the ISO standard 12931, track and trace solutions alone, e.g. a serialised
2D barcode A barcode or bar code is a method of representing data in a visual, machine-readable form. Initially, barcodes represented data by varying the widths, spacings and sizes of parallel lines. These barcodes, now commonly referred to as linear or o ...
placed on each product, is not authentication. QR Codes have indeed no protection against exact copy, unless additional techniques are used in combination. Furthermore, QR codes can be vulnerable to being spoofed, where the counterfeiter uses a new QR code to redirect the consumer to a fake authentication response page. There are ways to address this fraud, for example by encouraging users to authenticate through visiting a trusted channel such as the brand owner's website or social media account. A number of techniques exist, such as digital watermarks and secure graphics which are added into QR codes to make them robust against copy, and an app can be used to authenticate. There is also ongoing research on the authentication of blank paper and printed material by extracting the surface fingerprint through a smartphone scan.


Consumer engagement and distribution channels monitoring

Distributed channels can be monitored, and illicit activity detected, from the analysis of the data generated from the QR Code scans. Consumers can be incentivised to scan QR Codes or NFC tags on products, not necessarily for the primary purpose of verifying authenticity, but to obtain relevant information about the product or to engage in a loyalty program. The large quantity of data collected from the scans allows to monitor distribution channels without the need for hiring investigators, and on a much larger scale. Consumers may actually demand the ability to verify that the product is authentic, and this creates an opportunity to engage with the brand.


Online monitoring

With the growth of e-commerce, brand protection activities need to increasingly take place online. Online brand protection software monitor the Internet and help identify the Web sites that are likely to sell counterfeit, propose grey market goods or misuse the brand and its attributes.


Supply chain integrity

The implementation of
track and trace In the distribution and logistics of many types of products, track and trace or tracking and tracing concerns a process of determining the current and past locations (and other information) of a unique item or property. This concept can be s ...
solutions to capture events as goods move through the legitimate supply chain helps to monitor and detect illicit activities. The control of ordered quantities of products or components from third party suppliers can be made by providing them with secure serialised labels which must be affixed to each item.


References

{{Reflist


External links


Michigan State University Center for Anti-Counterfeiting and Product Protection
*
list of brand protection global organizations
*
glossary
Brand management Intellectual property law Anti-counterfeiting Security Fraud