{"id":1075,"date":"2012-02-05T21:35:58","date_gmt":"2012-02-06T02:35:58","guid":{"rendered":"http:\/\/www.hephaestusproject.com\/blog\/?page_id=1075"},"modified":"2012-02-05T21:40:39","modified_gmt":"2012-02-06T02:40:39","slug":"tpp-tppa-trans-pacific-strategic-economic-partnership-agreement-intellectual-property-chapter","status":"publish","type":"page","link":"https:\/\/www.hephaestusproject.com\/blog\/contentindustry\/billsandtradeagreements\/tpp-tppa-trans-pacific-strategic-economic-partnership-agreement-intellectual-property-chapter\/","title":{"rendered":"TPP &#8211; TPPA  &#8211; Trans-Pacific Strategic Economic Partnership Agreement- Intellectual Property Chapter"},"content":{"rendered":"<p><strong>TPP \u00a0&#8211;\u00a0Trans-Pacific Strategic Economic Partnership<br \/>\n<\/strong>also known as<br \/>\n<strong>TPPA &#8211;\u00a0Trans-Pacific Partnership Agreement<\/strong><\/p>\n<p>Intellectual Property Chapter<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<\/p>\n<p>MODIFIED HANDLING AUTHORIZED*<br \/>\nCOVER PAGE<br \/>\nTRANS-PACIFIC PARTNERSHIP<br \/>\nINTELLECTUAL PROPERTY RIGHTS CHAPTER<br \/>\nDRAFT \u2013 FEBRUARY 10, 2011<br \/>\nDerived From: Classification Guidance<br \/>\ndated March 4, 2010<br \/>\nReason: 1.4(b)<br \/>\nDeclassify on: Four years from entry into<br \/>\nforce of the TPP agreement<br \/>\nor, if no agreement enters<br \/>\ninto force, four years from<br \/>\nthe close of the negotiations.<br \/>\n* This document must be protected from<br \/>\nunauthorized disclosure, but may be mailed<br \/>\nor transmitted over unclassified e-mail or<br \/>\nfax, discussed over unsecured phone lines,<br \/>\nand stored on unclassified computer<br \/>\nsystems. It must be stored in a locked or<br \/>\nsecured building, room, or container.<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<br \/>\nCHAPTER [ ]<br \/>\nINTELLECTUAL PROPERTY RIGHTS<br \/>\nARTICLE 1: GENERAL PROVISIONS<\/p>\n<p>1. Each Party shall, at a minimum, give effect to this Chapter.<br \/>\nInternational Agreements<\/p>\n<p>2. Further to Article 1, the Parties affirm their existing rights and obligations with<br \/>\nrespect to each other under the TRIPS Agreement.<\/p>\n<p>3. Each Party shall ratify or accede to the following agreements by the date of entry into<br \/>\nforce of this Agreement:<\/p>\n<p>(a) Patent Cooperation Treaty (1970), as amended in 1979;<br \/>\n(b) Paris Convention for the Protection of Industrial Property (1967);<br \/>\n(c) Berne Convention for the Protection of Literary and Artistic Works (1971);<br \/>\n(d) Convention Relating to the Distribution of Programme-Carrying Signals<br \/>\nTransmitted by Satellite (1974);<br \/>\n(e) Protocol Relating to the Madrid Agreement Concerning the International<br \/>\nRegistration of Marks (1989);<br \/>\n(f) Budapest Treaty on the International Recognition of the Deposit of<br \/>\nMicroorganisms for the Purposes of Patent Procedure (1977), as amended in<br \/>\n1980;<br \/>\n(g) International Convention for the Protection of New Varieties of Plants (1991)<br \/>\n(UPOV Convention);<br \/>\n(h) Singapore Treaty on the Law of Trademarks (2006);<br \/>\n(i) WIPO Copyright Treaty (1996); and<br \/>\n(j) WIPO Performances and Phonograms Treaty (1996).<\/p>\n<p>4. Each Party shall notify the WTO of its acceptance of the Protocol amending the TRIPS<br \/>\nAgreement done at Geneva on December 6, 2005.<\/p>\n<p>2<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>5. Each Party shall make all reasonable efforts ratify or accede to the following<br \/>\nagreements by the date of entry into force of the Agreement:<\/p>\n<p>(a) Patent Law Treaty (2000); and<br \/>\n(b) Hague Agreement Concerning the International Registration of Industrial<br \/>\nDesigns (1999).<\/p>\n<p>3<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<br \/>\nMore Extensive Protection and Enforcement<\/p>\n<p>4<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>6. A Party may provide more extensive protection for, and enforcement of, intellectual<br \/>\nproperty rights under its law than this Chapter requires, provided that the more<br \/>\nextensive protection does not contravene this Chapter.<br \/>\nNational Treatment<\/p>\n<p>7. In respect of all categories of intellectual property covered in this Chapter, each Party<br \/>\nshall accord to nationals1 of the other Parties treatment no less favorable than it<br \/>\naccords to its own nationals with regard to the protection2 and enjoyment of such<br \/>\nintellectual property rights and any benefits derived from such rights.<\/p>\n<p>8. A Party may derogate from paragraph [7] in relation to its judicial and<br \/>\nadministrative procedures, including requiring a national of the other Party to<br \/>\ndesignate an address for service of process in its territory, or to appoint an agent in its<br \/>\nterritory, provided that such derogation is:<\/p>\n<p>(a) necessary to secure compliance with laws and regulations that are not<br \/>\ninconsistent with this Chapter; and<br \/>\n(b) not applied in a manner that would constitute a disguised restriction on<br \/>\ntrade.9. Paragraph [7] does not apply to procedures provided in multilateral agreements to\u00a0which any Party is a party and which were concluded under the auspices of the World\u00a0Intellectual Property Organization (WIPO) in relation to the acquisition or\u00a0maintenance of intellectual property rights.<\/p>\n<p>Application of Agreement to Existing Subject Matter and Prior Acts<\/p>\n<p>1 [For purposes of Articles [___(NT &amp; Judicial\/Admin Procedures)___(GIs\/Nationals), and ___(Performers\/Phonograms\/Related Rights,] a national of a Party shall also mean, in respect of\u00a0the relevant right, an entity of that Party that would meet the criteria for eligibility for protection\u00a0provided for in the agreements listed in [Article 1.3] and the TRIPS Agreement.]<\/p>\n<p>2 [For purposes of this paragraph, \u201cprotection\u201d includes matters affecting the availability, acquisition, scope,\u00a0maintenance, and enforcement of intellectual property rights as well as matters affecting the use of intellectual\u00a0property rights specifically covered by this Chapter. Further, for purposes of this paragraph, \u201cprotection\u201d also\u00a0includes the prohibition on circumvention of effective technological measures set out in Article __.__ and the rights<br \/>\nand obligations concerning rights management information set out in Article __.__]<\/p>\n<p>5<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>10. Except as it otherwise provides, including in Article __ (Berne 18\/TRIPS 14.6), this<br \/>\nChapter gives rise to obligations in respect of all subject matter existing at the date of<br \/>\nentry into force of this Agreement that is protected on that date in the territory of the<br \/>\nParty where protection is claimed, or that meets or comes subsequently to meet the<br \/>\ncriteria for protection under this Chapter.<\/p>\n<p>11. Except as otherwise provided in this Chapter, including Article ___ (Berne 18\/TRIPS<br \/>\n14.6), a Party shall not be required to restore protection to subject matter that on the<br \/>\ndate of entry into force of this Agreement has fallen into the public domain in its<br \/>\nterritory.<\/p>\n<p>12. This Chapter does not give rise to obligations in respect of acts that occurred before<br \/>\nthe date of entry into force of this Agreement.<br \/>\nTransparency<\/p>\n<p>13. Further to Article ___ (Publication), and with the object of making the protection and<br \/>\nenforcement of intellectual property rights transparent, each Party shall ensure that<br \/>\nall laws, regulations, and publicly available procedures concerning the protection or<br \/>\nenforcement of intellectual property rights are in writing and are published,3 or<br \/>\nwhere publication is not practicable, made publicly available, in a national language<br \/>\nin such a manner as to enable governments and right holders to become acquainted<br \/>\nwith them.<\/p>\n<p>ARTICLE 2: TRADEMARKS, INCLUDING GEOGRAPHICAL INDICATIONS<br \/>\nTrademarks<\/p>\n<p>1. No Party may require, as a condition of registration, that a sign be visually perceptible,<br \/>\nnor may a Party deny registration of a trademark solely on the grounds that the sign of which it is\u00a0composed is a sound or a scent.<\/p>\n<p>2. Each Party shall provide that trademarks shall include certification marks. Each Party<br \/>\nshall also provide that geographical indications are eligible for protection as trademarks.4<\/p>\n<p>3 A Party may satisfy requirement for publication by making the law, regulation, or procedure\u00a0available to the public on the Internet.<\/p>\n<p>4 For purposes of this Chapter, geographical indications means indications that identify a good\u00a0as originating in the territory of a Party, or a region or locality in that territory, where a given\u00a0quality, reputation, or other characteristic of the good is essentially attributable to its\u00a0geographical origin. Any sign or combination of signs (such as words, including geographical\u00a0and personal names, as well as letters, numerals, figurative elements, and colors, including single\u00a0colors), in any form whatsoever, shall be eligible to be a geographical indication. The term\u00a0\u201coriginating\u201d in this chapter does not have the meaning ascribed to that term in Article __._\u00a0(Definitions).<\/p>\n<p>6<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>3. Each Party shall ensure that its measures mandating the use of the term customary in<br \/>\ncommon language as the common name for a good or service (\u201ccommon name\u201d) including, interalia, requirements concerning the relative size, placement or style of use of the trademark in\u00a0relation to the common name, do not impair the use or effectiveness of trademarks used in\u00a0relation to such good or service.<\/p>\n<p>4. Each Party shall provide that the owner of a registered trademark shall have the exclusive\u00a0right to prevent all third parties not having the owner\u2019s consent from using in the course of trade\u00a0identical or similar signs, including geographical indications, for goods or services that are\u00a0related to those goods or services in respect of which the owner&#8217;s trademark is registered, where\u00a0such use would result in a likelihood of confusion. In the case of the use of an identical sign,\u00a0including a geographical indication, for identical goods or services, a likelihood of confusion\u00a0shall be presumed.<\/p>\n<p>5. Each Party may provide limited exceptions to the rights conferred by a trademark, such as\u00a0fair use of descriptive terms, provided that such exceptions take account of the legitimate interest\u00a0of the owner of the trademark and of third parties.<\/p>\n<p>6. No Party may require as a condition for determining that a mark is a well-known mark<br \/>\nthat the mark has been registered in the Party or in another jurisdiction. Additionally, no Party\u00a0may deny remedies or relief with respect to well-known marks based solely on the lack of:<\/p>\n<p>(a) a registration;<br \/>\n(b) inclusion on a list of well-known marks; or<br \/>\n(c) prior recognition of the mark as well-known.<\/p>\n<p>7. Article 6bis of the Paris Convention for the Protection of Industrial Property (1967) shall<br \/>\napply, mutatis mutandis, to goods or services that are not identical or similar to those identified\u00a0by a well-known trademark,5 whether registered or not, provided that use of that trademark in\u00a0relation to those goods or services would indicate a connection between those goods or services\u00a0and the owner of the trademark, and provided that the interests of the owner of the trademark are\u00a0likely to be damaged by such use.<\/p>\n<p>8. Each Party shall provide for appropriate measures to refuse or cancel the registration and\u00a0prohibit the use of a trademark or geographical indication that is identical or similar to a well known\u00a0trademark, for related goods or services, if the use of that trademark or geographical\u00a0indication is likely to cause confusion, or to cause mistake, or to deceive or risk associating the\u00a0trademark or geographical indication with the owner of the well-known trademark, or constitutes\u00a0unfair exploitation of the reputation of the well-known trademark.<\/p>\n<p>5<\/p>\n<p>For purposes of determining whether a mark is well-known, no Party shall require that the\u00a0reputation of the trademark extend beyond the sector of the public that normally deals with the\u00a0relevant goods or services.<\/p>\n<p>7<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>9. Each Party shall provide a system for the registration of trademarks, which shall include:<\/p>\n<p>(a) a requirement to provide to the applicant a communication in writing, which may<br \/>\nbe provided electronically, of the reasons for a refusal to register a trademark;<br \/>\n(b) an opportunity for the applicant to respond to communications from the<br \/>\ncompetent authorities, to contest an initial refusal, and to appeal judicially a final<br \/>\nrefusal to register;<br \/>\n(c) an opportunity for interested parties to oppose a trademark application and to seek<br \/>\ncancellation of a trademark registration after it has been granted; and<br \/>\n(d) a requirement that decisions in opposition and cancellation proceedings be<br \/>\nreasoned and in writing. Written decisions may be provided electronically.<\/p>\n<p>10. Each Party shall provide a:<\/p>\n<p>(a) system for the electronic application for, and electronic processing, registering,<br \/>\nand maintenance of, trademarks; and<br \/>\n(b) publicly available electronic database, including an online database, of trademark<br \/>\napplications and registrations.<\/p>\n<p>11. Each Party shall provide that:<\/p>\n<p>(a) each registration and publication that concerns a trademark application or registration that\u00a0indicates goods or services shall indicate the goods or services by their names, grouped\u00a0according to the classes of the classification established by the Nice Agreement<br \/>\nConcerning the International Classification of Goods and Services for the Purposes of<br \/>\nthe Registration of Marks (1979), as revised and amended (Nice Classification); and<br \/>\n(b) goods or services may not be considered as being similar to each other solely on<br \/>\nthe ground that, in any registration or publication, they are classified in the same<br \/>\nclass of the Nice Classification. Conversely, each Party shall provide that goods<br \/>\nor services may not be considered as being dissimilar from each other solely on<br \/>\nthe ground that, in any registration or publication, they are classified in different<br \/>\nclasses of the Nice Classification.<\/p>\n<p>12. Each Party shall provide that initial registration and each renewal of registration of a<br \/>\ntrademark shall be for a term of no less than ten years.<\/p>\n<p>13. No Party may require recordation of trademark licenses to establish the validity of the<br \/>\nlicense, to assert any rights in a trademark, or for other purposes.<\/p>\n<p>Geographical Indications<\/p>\n<p>8<br \/>\nThis Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>14. If a Party provides the means to apply for protection or petition for recognition of<br \/>\ngeographical indications, through a system of protection of trademarks or otherwise, it shall, withrespect to those applications or petitions, as relevant:<\/p>\n<p>(a) accept those applications and petitions without requiring intercession by a Party<br \/>\non behalf of its nationals;<br \/>\n(b) process those applications or petitions with a minimum of formalities;<br \/>\n(c) ensure that its regulations governing filing of those applications or petitions are<br \/>\nreadily available to the public and clearly set out the procedures for these actions;<br \/>\n(d) make available contact information sufficient to allow the general public to obtain<br \/>\nguidance concerning the procedures for filing applications or petitions and the<br \/>\nprocessing of those applications or petitions in general; and allow applicants,<br \/>\npetitioners, or their representatives to ascertain the status of, and to obtain<br \/>\nprocedural guidance concerning, specific applications and petitions; and<br \/>\n(e) ensure that applications or petitions for geographical indications are published for<br \/>\nopposition and provide procedures for opposing geographical indications that are<br \/>\nthe subject of applications or petitions.<br \/>\n(f) each Party shall also provide procedures to cancel a registration resulting from an<br \/>\napplication or a petition.15. (a) Each Party shall provide that the grounds for refusing protection or recognition of\u00a0a geographical indication and for allowing opposition to, and cancellation of, a\u00a0geographical indication shall include the following:<\/p>\n<p>(i) the geographical indication is likely to cause confusion with a trademarkor geographical indication that is the subject of a good faith pending application or registration in the territory of such Party and that has a priority date that predates the protection or recognition of the later geographical indication in such territory;<br \/>\n(ii) the geographical indication is likely to cause confusion with a trademarkor geographical indication, the rights to which have been acquired in the\u00a0territory of the Party through use in good faith, that has a priority date thatpredates the protection or recognition of the later geographical indicationin such territory;<br \/>\n(iii) the geographical indication is likely to cause confusion with a trademark\u00a0or geographical indication that has become well known in the territory of\u00a0the Party and that has a priority date that predates the protection or\u00a0recognition of the later geographical indication in such territory; and<\/p>\n<p>9<br \/>\nThis Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(iv) the geographical indication is a generic term for the goods or services<br \/>\nassociated with the geographical indication in the Party\u2019s territory;<br \/>\n(b) For purposes of this section, the date of protection of the geographical indication<br \/>\nin a territory of a Party shall be:<\/p>\n<p>(i) in the case of protection or recognition provided as a result of an<br \/>\napplication or petition, the date of such application or petition was filed;<br \/>\nand<br \/>\n(ii) in the case of protection or recognition provided through other means, the<br \/>\ndate of protection or recognition specified under the Party\u2019s laws.<\/p>\n<p>16. If a Party elects to register or otherwise designate any sign as a geographical indication<br \/>\nby means other than an ordinary application for protection under the Party\u2019s domestic<br \/>\nprocedures, whether pursuant to an agreement with a government or a governmental entity or<br \/>\notherwise, that Party must:<\/p>\n<p>(a) provide, within its territory, an opportunity for interested parties to oppose<br \/>\nsuch designations or registrations, and to seek cancellations of such<br \/>\ndesignations or registrations;<br \/>\n(b) require that decisions in such oppositions and cancellations are reasoned and in<br \/>\nwriting; and<br \/>\n(c) provide that the grounds for such oppositions and cancellations include those set<br \/>\nforth in paragraph [15].<\/p>\n<p>17. No Party shall, whether pursuant to an agreement with a government or a governmental<br \/>\nentity or otherwise:<\/p>\n<p>(a) in the case of geographical indications for goods other than wines or spirits,<br \/>\nprohibit third parties from using translated versions of the geographical<br \/>\nindication;6<br \/>\n(b) prohibit third parties from using a term that is evoked by the geographical<br \/>\nindication; or<br \/>\n(c) prohibit third party uses of any component of a multi-component geographical<br \/>\nindication protected by virtue of the agreement, even if (i) such components are<br \/>\n6 For greater certainty, nothing in this Agreement shall prohibit a Party from barring third<br \/>\nparties from using translations of geographical indications if: (1) such uses give rise to a<br \/>\nlikelihood of confusion, and (2) the geographical indications became protected through means\u00a0other than an agreement between a Party and a government or governmental entity.<\/p>\n<p>10<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>generic, or (ii) third- party use of such components would not give rise to a<br \/>\nlikelihood of confusion.<\/p>\n<p>18. For purposes of this Agreement, a term is generic if it is the term customary in common<br \/>\nlanguage as the common name for the goods or services associated with the trademark or<br \/>\ngeographical indication.7<\/p>\n<p>19. In connection with proceedings referred to in paragraphs [15 and 16], a Party\u2019s authorities<br \/>\nshall take into account the following factors:<\/p>\n<p>(a) whether the term is used to refer to the type of product in question in<br \/>\ndictionaries, newspapers, relevant websites, publicly-available research<br \/>\ndatabases, or any other competent sources, including but not limited to, the<br \/>\nHarmonized Commodity Description and Coding System;<br \/>\n(b) whether a standard promulgated by the Codex Alimentarius uses the term to<br \/>\nrefer to the type of product in question;<br \/>\n(c) whether persons other than the person who claims rights in the term use the<br \/>\nterm as the name for the type of product in question;<br \/>\n(d) whether the product in question is imported into the Party\u2019s territory, in<br \/>\nsignificant quantities, from outside the proposed protected region, and whether<br \/>\nthose imported products are named by the term; and<br \/>\n(e) whether the product associated with the term is manufactured or traded in<br \/>\nsignificant quantities outside the proposed protected region.<\/p>\n<p>20. [Placeholder for possible provision that may identify examples of particular outcomes<br \/>\nthat would result from the application of the factors enumerated in paragraph 19.]<\/p>\n<p>21. Where a determination is made that a multi-component term is protected as a<br \/>\ngeographical indication, each Party shall provide the possibility that particular components of the\u00a0compound term may, be considered generic, based upon the factors set forth in paragraph [19].<\/p>\n<p>22. Each Party shall permit the use, and as appropriate, shall provide for the registration, of\u00a0signs or indications that identify services or products other than wines or spirits, and that\u00a0reference a geographical area that is not the true place of origin of the services or of the product,provided that:<\/p>\n<p>(a) the sign or indication is used in a manner that does not mislead the public as to the<br \/>\ngeographical origin of the goods or services;\u00a07 No Party shall preclude the possibility that a term that it recognized as a trademark or geographical indication\u00a0may not, at a time following that designation, become a generic designation for the associated goods or services.<br \/>\n11<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(b) use of the sign or indication does not constitute an act of unfair competition<br \/>\nwithin the meaning of Article 10bis of the Paris Convention (1967);<br \/>\n(c) use of the sign or indication would not cause a likelihood of confusion with<br \/>\nrespect to an earlier-in-time similar or identical trademark or geographical<br \/>\nindication that is used for identical or similar goods or services; and<br \/>\n(d) where a request for registration is concerned, the sign or indication is not a<br \/>\ngeneric term for the associated goods or services.<\/p>\n<p>ARTICLE 3: DOMAIN NAMES ON THE INTERNET<\/p>\n<p>1. In order to address the problem of trademark cyber-piracy, each Party shall require that\u00a0the management of its country-code top-level domain (ccTLD) provide an appropriate procedure\u00a0for the settlement of disputes, based on the principles established in the Uniform Domain-Name\u00a0Dispute-Resolution Policy.<br \/>\n2. Each Party shall require that the management of its ccTLD provide online public access<br \/>\nto a reliable and accurate database of contact information concerning domain-name registrants.<\/p>\n<p>ARTICLE 4: COPYRIGHT AND RELATED RIGHTS<\/p>\n<p>1. Each Party shall provide that authors, performers, and producers of phonograms8 have the\u00a0right9 to authorize or prohibit all reproductions of their works, performances, and phonograms,10\u00a0in any manner or form, permanent or temporary (including temporary storage in electronic\u00a0form).<br \/>\n2. Each Party shall provide to authors, performers, and producers of phonograms the right to\u00a0authorize or prohibit the importation into that Party\u2019s territory of copies of the work,<br \/>\nperformance, or phonogram made without authorization, or made outside that Party\u2019s territory\u00a0with the authorization of the author, performer, or producer of the phonogram.11<\/p>\n<p>8 References to \u201cauthors, performers, and producers of phonograms\u201d refer also to any<br \/>\nsuccessors in interest.<\/p>\n<p>9 With respect to copyrights and related rights in this Chapter, the \u201cright to authorize or\u00a0prohibit\u201d and the \u201cright to authorize\u201d refer to exclusive rights.<\/p>\n<p>10 With respect to copyright and related rights in this Chapter, a \u201cperformance\u201d means a<br \/>\nperformance fixed in a phonogram unless otherwise specified.<\/p>\n<p>11 With respect to copies of works and phonograms that have been placed on the market by the relevant right\u00a0holder, the obligations described in Article [4.2] apply only to books, journals, sheet music, sound recordings,\u00a0computer programs, and audio and visual works (i.e., categories of products in which the value of the copyrighted\u00a0material represents substantially all of the value of the product). Notwithstanding the foregoing, each Party may<\/p>\n<p>12<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>3. Each Party shall provide to authors, performers, and producers of phonograms the right to\u00a0authorize or prohibit the making available to the public of the original and copies of their works,\u00a0performances, and phonograms through sale or other transfer of ownership.<\/p>\n<p>4. In order to ensure that no hierarchy is established between rights of authors, on the one<br \/>\nhand, and rights of performers and producers of phonograms, on the other hand, each Party shall\u00a0provide that in cases where authorization is needed from both the author of a work embodied in a \u00a0phonogram and a performer or producer owning rights in the phonogram, the need for the\u00a0authorization of the author does not cease to exist because the authorization of the performer or\u00a0producer is also required. Likewise, each Party shall provide that in cases where authorization is\u00a0needed from both the author of a work embodied in a phonogram and a performer or producer\u00a0owning rights in the phonogram, the need for the authorization of the performer or producer does\u00a0not cease to exist because the authorization of the author is also required.<\/p>\n<p>5. Each Party shall provide that, where the term of protection of a work (including a<br \/>\nphotographic work), performance, or phonogram is to be calculated:<\/p>\n<p>(a) on the basis of the life of a natural person, the term shall be not less than the life<br \/>\nof the author and 70 years after the author\u2019s death; and<br \/>\n(b) on a basis other than the life of a natural person, the term shall be:<\/p>\n<p>(i) not less than 95 years from the end of the calendar year of the first<br \/>\nauthorized publication of the work, performance, or phonogram, or<br \/>\n(ii) failing such authorized publication within 25 years from the creation of<br \/>\nthe work, performance, or phonogram, not less than 120 years from the<br \/>\nend of the calendar year of the creation of the work, performance, or<br \/>\nphonogram.<\/p>\n<p>6. Each Party shall apply Article 18 of the Berne Convention for the Protection of Literary<br \/>\nand Artistic Works (1971) (Berne Convention) and Article 14.6 of the TRIPS Agreement, mutatis\u00a0mutandis, to the subject matter, rights, and obligations in this Article and Articles [5] and [6].<\/p>\n<p>7. Each Party shall provide that for copyright and related rights, any person acquiring or\u00a0holding any economic right in a work, performance, or phonogram:<\/p>\n<p>(a) may freely and separately transfer that right by contract; and<br \/>\n(b) by virtue of a contract, including contracts of employment underlying the creation<br \/>\nof works, performances, and phonograms, shall be able to exercise that right in<br \/>\nthat person\u2019s own name and enjoy fully the benefits derived from that right.<br \/>\nprovide the protection described in Article [4.2] to a broader range of goods.<\/p>\n<p>13<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>8. [Placeholders for provision on (1) exceptions and limitations, (2) Internet<br \/>\nretransmission, and (3) any other appropriate copyright\/related rights provisions]<br \/>\nTechnological Protection Measures<\/p>\n<p>9. (a) In order to provide adequate legal protection and effective legal remedies against the<br \/>\ncircumvention of effective technological measures that authors, performers, and<br \/>\nproducers of phonograms use in connection with the exercise of their rights and that<br \/>\nrestrict unauthorized acts in respect of their works, performances, and phonograms, each<br \/>\nParty shall provide that any person who:<\/p>\n<p>(i) circumvents without authority any effective technological measure that<br \/>\ncontrols access to a protected work, performance, phonogram, or other<br \/>\nsubject matter; or\u00a0(ii) manufactures, imports, distributes, offers to the public, provides, or<br \/>\notherwise traffics in devices, products, or components, or offers to the<br \/>\npublic or provides services, that:\u00a0(A) are promoted, advertised, or marketed by that person, or by another\u00a0person acting in concert with that person and with that person\u2019s<br \/>\nknowledge, for the purpose of circumvention of any effective\u00a0technological measure,\u00a0(B) have only a limited commercially significant purpose or use other\u00a0than to circumvent any effective technological measure, or\u00a0(C) are primarily designed, produced, or performed for the purpose of\u00a0enabling or facilitating the circumvention of any effective\u00a0technological measure,\u00a0shall be liable and subject to the remedies set out in Article [12.12]. Each Party\u00a0shall provide for criminal procedures and penalties to be applied when any<br \/>\nperson, other than a nonprofit library, archive, educational institution, or public<br \/>\nnoncommercial broadcasting entity, is found to have engaged willfully and for<br \/>\npurposes of commercial advantage or private financial gain in any of the<br \/>\nforegoing activities. Such criminal procedures and penalties shall include the<br \/>\napplication to such activities of the remedies and authorities listed in<br \/>\nsubparagraphs (a), (b), and (f) of Article [15.5] as applicable to infringements,<br \/>\nmutatis mutandis. 12<\/p>\n<p>(b) In implementing subparagraph (a), no Party shall be obligated to require that the<br \/>\ndesign of, or the design and selection of parts and components for, a consumer<br \/>\n12 For purposes of greater certainty, no Party is required to impose liability under Articles 9 and\u00a010 for actions taken by a Party or a third party acting with the authorization or consent of a Party.<br \/>\n14<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>electronics, telecommunications, or computing product provide for a response to<br \/>\nany particular technological measure, so long as the product does not otherwise<br \/>\nviolate any measures implementing subparagraph (a).<\/p>\n<p>(c) Each Party shall provide that a violation of a measure implementing this<br \/>\nparagraph is a separate cause of action, independent of any infringement that<br \/>\nmight occur under the Party\u2019s law on copyright and related rights.<\/p>\n<p>(d) Each Party shall confine exceptions and limitations to measures implementing<br \/>\nsubparagraph (a) to the following activities, which shall be applied to relevant<br \/>\nmeasures in accordance with subparagraph (e):<\/p>\n<p>(i) noninfringing reverse engineering activities with regard to a lawfully<br \/>\nobtained copy of a computer program, carried out in good faith with<br \/>\nrespect to particular elements of that computer program that have not been<br \/>\nreadily available to the person engaged in those activities, for the sole<br \/>\npurpose of achieving interoperability of an independently created<br \/>\ncomputer program with other programs;<br \/>\n(ii) noninfringing good faith activities, carried out by an appropriately<br \/>\nqualified researcher who has lawfully obtained a copy, unfixed<br \/>\nperformance, or display of a work, performance, or phonogram and who<br \/>\nhas made a good faith effort to obtain authorization for such activities, to<br \/>\nthe extent necessary for the sole purpose of research consisting of<br \/>\nidentifying and analyzing flaws and vulnerabilities of technologies for<br \/>\nscrambling and descrambling of information;<br \/>\n(iii) the inclusion of a component or part for the sole purpose of preventing the<br \/>\naccess of minors to inappropriate online content in a technology, product,<br \/>\nservice, or device that itself is not prohibited under the measures<br \/>\nimplementing subparagraph (a)(ii);<br \/>\n(iv) noninfringing good faith activities that are authorized by the owner of a<br \/>\ncomputer, computer system, or computer network for the sole purpose of<br \/>\ntesting, investigating, or correcting the security of that computer, computer<br \/>\nsystem, or computer network;<br \/>\n(v) noninfringing activities for the sole purpose of identifying and disabling a<br \/>\ncapability to carry out undisclosed collection or dissemination of<br \/>\npersonally identifying information reflecting the online activities of a<br \/>\nnatural person in a way that has no other effect on the ability of any person<br \/>\nto gain access to any work;<br \/>\n15<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(vi) lawfully authorized activities carried out by government employees,<br \/>\nagents, or contractors for the purpose of law enforcement, intelligence,<br \/>\nessential security, or similar governmental purposes;<br \/>\n(vii) access by a nonprofit library, archive, or educational institution to a work,<br \/>\nperformance, or phonogram not otherwise available to it, for the sole<br \/>\npurpose of making acquisition decisions; and<br \/>\n(viii) noninfringing uses of a work, performance, or phonogram in a particular<br \/>\nclass of works, performances, or phonograms when an actual or likely<br \/>\nadverse impact on those noninfringing uses is demonstrated in a legislative<br \/>\nor administrative proceeding by substantial evidence; provided that any<br \/>\nlimitation or exception adopted in reliance upon this clause shall have<br \/>\neffect for a renewable period of not more than three years from the date of<br \/>\nconclusion of such proceeding.<\/p>\n<p>(e) The exceptions and limitations to measures implementing subparagraph (a) for the<br \/>\nactivities set forth in subparagraph [4.9(d)] may only be applied as follows, and<br \/>\nonly to the extent that they do not impair the adequacy of legal protection or the<br \/>\neffectiveness of legal remedies against the circumvention of effective<br \/>\ntechnological measures:<\/p>\n<p>(i) Measures implementing subparagraph (a)(i) may be subject to exceptions<br \/>\nand limitations with respect to each activity set forth in subparagraph (d).<br \/>\n(ii) Measures implementing subparagraph (a)(ii), as they apply to effective<br \/>\ntechnological measures that control access to a work, performance, or<br \/>\nphonogram, may be subject to exceptions and limitations with respect to<br \/>\nactivities set forth in subparagraph (d)(i), (ii), (iii), (iv), and (vi).<br \/>\n(iii) Measures implementing subparagraph (a)(ii), as they apply to effective<br \/>\ntechnological measures that protect any copyright or any rights related to<br \/>\ncopyright, may be subject to exceptions and limitations with respect to<br \/>\nactivities set forth in subparagraph (d)(i) and (vi).<\/p>\n<p>(f) Effective technological measure means any technology, device, or component<br \/>\nthat, in the normal course of its operation, controls access to a protected work,<br \/>\nperformance, phonogram, or other protected subject matter, or protects any<br \/>\ncopyright or any rights related to copyright.<\/p>\n<p>Rights Management Information<br \/>\n10. In order to provide adequate and effective legal remedies to protect rights management\u00a0information:<\/p>\n<p>16<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(a) each Party shall provide that any person who without authority, and knowing, or,<br \/>\nwith respect to civil remedies, having reasonable grounds to know, that it would<br \/>\ninduce, enable, facilitate, or conceal an infringement of any copyright or related<br \/>\nright,<\/p>\n<p>(i) knowingly removes or alters any rights management information;<br \/>\n(ii) distributes or imports for distribution rights management information<br \/>\nknowing that the rights management information has been removed or<br \/>\naltered without authority; or<br \/>\n(iii) distributes, imports for distribution, broadcasts, communicates or makes<br \/>\navailable to the public copies of works, performances, or phonograms,<br \/>\nknowing that rights management information has been removed or altered<br \/>\nwithout authority,\u00a0shall be liable and subject to the remedies set out in Article [12.12 Each Party\u00a0shall provide for criminal procedures and penalties to be applied when any<br \/>\nperson, other than a nonprofit library, archive, educational institution, or public<br \/>\nnoncommercial broadcasting entity, is found to have engaged willfully and for<br \/>\npurposes of commercial advantage or private financial gain in any of the<br \/>\nforegoing activities. Such criminal procedures and penalties shall include the<br \/>\napplication to such activities of the remedies and authorities listed in<br \/>\nsubparagraphs (a), (b) and (f) of Article [15.5] as applicable to infringements,<br \/>\nmutatis mutandis.<\/p>\n<p>(b) each Party shall confine exceptions and limitations to measures implementing<br \/>\nsubparagraph (a) to lawfully authorized activities carried out by government<br \/>\nemployees, agents, or contractors for the purpose of law enforcement,<br \/>\nintelligence, essential security, or similar governmental purposes.<\/p>\n<p>(c) Rights management information means:<\/p>\n<p>(i) information that identifies a work, performance, or phonogram; the author<br \/>\nof the work, the performer of the performance, or the producer of the<br \/>\nphonogram; or the owner of any right in the work, performance, or<br \/>\nphonogram;<br \/>\n(ii) information about the terms and conditions of the use of the work,<br \/>\nperformance, or phonogram; or<br \/>\n(iii) any numbers or codes that represent such information,<br \/>\nwhen any of these items is attached to a copy of the work, performance, or<br \/>\nphonogram or appears in connection with the communication or making available<br \/>\nof a work, performance or phonogram, to the public.<\/p>\n<p>17<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(d) For greater certainty, nothing in this paragraph shall obligate a Party to require the<br \/>\nowner of any right in the work, performance, or phonogram to attach rights<br \/>\nmanagement information to copies of the work, performance, or phonogram, or to<br \/>\ncause rights management information to appear in connection with a<br \/>\ncommunication of the work, performance, or phonogram to the public.<br \/>\nARTICLE 5: COPYRIGHT<\/p>\n<p>Without prejudice to Articles 11(1)(ii), 11bis(1)(i) and (ii), 11ter(1)(ii), 14(1)(ii), and<br \/>\n14bis(1) of the Berne Convention, each Party shall provide to authors the exclusive<br \/>\nright to authorize or prohibit the communication to the public of their works, by wire<br \/>\nor wireless means, including the making available to the public of their works in such<br \/>\na way that members of the public may access these works from a place and at a time<br \/>\nindividually chosen by them.<\/p>\n<p>ARTICLE 6: RELATED RIGHTS<\/p>\n<p>1. Each Party shall accord the rights provided for in this Chapter with respect to performers\u00a0and producers of phonograms to the performers and producers of phonograms who are nationals\u00a0of another Party and to performances or phonograms first published or first fixed in the territory\u00a0of another Party. A performance or phonogram shall be considered first published in the territory\u00a0of a Party in which it is published within 30 days of its original publication.13<\/p>\n<p>2. Each Party shall provide to performers the right to authorize or prohibit:<\/p>\n<p>(a) broadcasting and communication to the public of their unfixed performances,<br \/>\nexcept where the performance is already a broadcast performance; and<br \/>\n(b) fixation of their unfixed performances.<\/p>\n<p>3. (a) Each Party shall provide to performers and producers of phonograms the right to<br \/>\nauthorize or prohibit the broadcasting and any communication to the public of<br \/>\ntheir performances or phonograms, by wire or wireless means, including the<br \/>\nmaking available to the public of those performances and phonograms in such a<br \/>\nway that members of the public may access them from a place and at a time<br \/>\nindividually chosen by them.<br \/>\n(b) Notwithstanding subparagraph (a) and Article [4.8][exceptions and limitations],<br \/>\nthe application of this right to analog transmissions and non-interactive, free overthe-<br \/>\nair broadcasts, and exceptions or limitations to this right for such activity,<br \/>\nshall be a matter of each Party\u2019s law.<\/p>\n<p>13 For purposes of this Article, fixation includes the finalization of the master tape or its<br \/>\nequivalent.<br \/>\n18<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(c) Each Party may adopt limitations to this right in respect of other noninteractive<br \/>\ntransmissions in accordance with Article [4.8] [exceptions and limitations],<br \/>\nprovided that the limitations do not prejudice the right of the performer or<br \/>\nproducer of phonograms to obtain equitable remuneration.<\/p>\n<p>4. No Party may subject the enjoyment and exercise of the rights of performers and<br \/>\nproducers of phonograms provided for in this Chapter to any formality.<\/p>\n<p>5. For purposes of this Article and Article 4, the following definitions apply with respect to<br \/>\nperformers and producers of phonograms:<\/p>\n<p>(a) broadcasting means the transmission to the public by wireless means or satellite<br \/>\nof sounds or sounds and images, or representations thereof, including wireless<br \/>\ntransmission of encrypted signals where the means for decrypting are provided to<br \/>\nthe public by the broadcasting organization or with its consent; \u201cbroadcasting\u201d<br \/>\ndoes not include transmissions over computer networks or any transmissions<br \/>\nwhere the time and place of reception may be individually chosen by members of<br \/>\nthe public;<br \/>\n(b) communication to the public of a performance or a phonogram means the<br \/>\ntransmission to the public by any medium, other than by broadcasting, of sounds<br \/>\nof a performance or the sounds or the representations of sounds fixed in a<br \/>\nphonogram. For purposes of paragraph [3], \u201ccommunication to the public\u201d<br \/>\nincludes making the sounds or representations of sounds fixed in a phonogram<br \/>\naudible to the public;<br \/>\n(c) fixation means the embodiment of sounds, or of the representations thereof, from<br \/>\nwhich they can be perceived, reproduced, or communicated through a device;<br \/>\n(d) performers means actors, singers, musicians, dancers, and other persons who act,<br \/>\nsing, deliver, declaim, play in, interpret, or otherwise perform literary or artistic<br \/>\nworks or expressions of folklore;<br \/>\n(e) phonogram means the fixation of the sounds of a performance or of other sounds,<br \/>\nor of a representation of sounds, other than in the form of a fixation incorporated<br \/>\nin a cinematographic or other audiovisual work;<br \/>\n(f) producer of a phonogram means the person who, or the legal entity which, takes<br \/>\nthe initiative and has the responsibility for the first fixation of the sounds of a<br \/>\nperformance or other sounds, or the representations of sounds; and<br \/>\n(g) publication of a performance or a phonogram means the offering of copies of<br \/>\nthe performance or the phonogram to the public, with the consent of the<br \/>\nrightholder, and provided that copies are offered to the public in reasonable<br \/>\nquantity.<\/p>\n<p>19<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>ARTICLE 7: PROTECTION OF ENCRYPTED PROGRAM-CARRYING SATELLITE AND CABLE SIGNALS<\/p>\n<p>1. Each Party shall make it a criminal offense to:<\/p>\n<p>(a) manufacture, assemble, modify, import, export, sell, lease, or otherwise distribute<br \/>\na tangible or intangible device or system, knowing or having reason to know that<br \/>\nthe device or system is primarily of assistance in decoding an encrypted programcarrying<br \/>\nsatellite or cable signal without the authorization of the lawful distributor<br \/>\nof such signal; and<br \/>\n(b) willfully receive and make use of,14 or willfully further distribute a programcarrying<br \/>\nsignal that originated as an encrypted satellite or cable signal knowing<br \/>\nthat it has been decoded without the authorization of the lawful distributor of the<br \/>\nsignal, or if the signal has been decoded with the authorization of the lawful<br \/>\ndistributor of the signal, willfully to further distribute the signal for purposes of<br \/>\ncommercial advantage knowing that the signal originated as an encrypted<br \/>\nprogram-carrying signal and that such further distribution is without the<br \/>\nauthorization of the lawful signal distributor.<\/p>\n<p>2. Each Party shall provide for civil remedies, including compensatory damages, for any<br \/>\nperson injured by any activity described in paragraph [1], including any person that holds an\u00a0interest in the encrypted programming signal or its content.<\/p>\n<p>ARTICLE 8: PATENTS<\/p>\n<p>1. Each Party shall make patents available for any invention, whether a product or process,<br \/>\nin all fields of technology, provided that the invention is new, involves an inventive step, and is\u00a0capable of industrial application.15 In addition, the Parties confirm that: patents shall be available\u00a0for any new forms, uses, or methods of using a known product; and a new form, use, or method\u00a0of using a known product may satisfy the criteria for patentability, even if such invention does\u00a0not result in the enhancement of the known efficacy of that product.<br \/>\n2. Each Party shall make patents available for inventions for the following:<\/p>\n<p>(a) plants and animals, and<br \/>\n(b) diagnostic, therapeutic, and surgical methods for the treatment of humans or<br \/>\nanimals.<\/p>\n<p>14 For greater certainty, \u201cmake use of\u201d includes viewing of the signal, whether private or<br \/>\ncommercial.<\/p>\n<p>15 For the purposes of this Article, a Party may treat the terms \u201cinventive step\u201d and \u201ccapable of\u00a0industrial application\u201d as being synonymous with the terms \u201cnon-obvious\u201d and \u201cuseful,\u201d\u00a0respectively. In determinations regarding inventive step (or non-obviousness), each Party shall\u00a0consider whether the claimed invention would have been obvious to a skilled artisan (or a person\u00a0having ordinary skill in the art) at the priority date of the claimed invention.<br \/>\n20<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>3. Each Party may only exclude from patentability inventions, the prevention within its<br \/>\nterritory of the commercial exploitation of which is necessary to protect ordre public or morality,\u00a0including to protect human, animal, or plant life or health or to avoid serious prejudice to the\u00a0environment, provided that such exclusion is not made merely because the exploitation is\u00a0prohibited by law.<\/p>\n<p>4. Each Party may provide limited exceptions to the exclusive rights conferred by a patent,<br \/>\nprovided that such exceptions do not unreasonably conflict with a normal exploitation of the\u00a0patent and do not unreasonably prejudice the legitimate interests of the patent owner, taking\u00a0account of the legitimate interests of third parties.<\/p>\n<p>5. [Placeholder for \u201cBolar\u201d provision]<\/p>\n<p>6. [Placeholder for provisions concerning patent term restoration\/adjustment]<\/p>\n<p>7. Each Party shall provide that a patent may be revoked only on grounds that would have<br \/>\njustified a refusal to grant the patent. A Party may also provide that fraud, misrepresentation or\u00a0inequitable conduct may be the basis for revoking a patent or holding a patent unenforceable.\u00a0Where a Party provides proceedings that permit a third party to oppose the grant of a patent, a\u00a0Party shall not make such proceedings available before the grant of the patent.<\/p>\n<p>8. Each Party shall disregard information contained in public disclosures used to determine<br \/>\nif an invention is novel or has an inventive step if the public disclosure:<\/p>\n<p>(a) was made or authorized by, or derived from, the patent applicant; and<br \/>\n(b) occurred within 12 months prior to the date of filing of the application in the<br \/>\nterritory of the Party.<\/p>\n<p>9. Each Party shall provide patent applicants with at least one opportunity to make<br \/>\namendments, corrections, and observations in connection with their applications. Each Party\u00a0shall permit applicants to make amendments to their patent claims prior to receipt of a first patent\u00a0office action or communication on the merits.<\/p>\n<p>10. Each Party shall provide that a disclosure of a claimed invention shall be considered to be\u00a0sufficiently clear and complete if it provides information that allows the invention to be made\u00a0and used by a person skilled in the art, without undue experimentation, as of the filing date.<\/p>\n<p>11. Each Party shall provide that a claimed invention is sufficiently supported by its<br \/>\ndisclosure if the disclosure reasonably conveys to a person skilled in the art that the applicant\u00a0was in possession of the claimed invention as of the filing date.<\/p>\n<p>12. Each Party shall provide that a claimed invention is industrially applicable if it has a<br \/>\nspecific, substantial, and credible utility.<\/p>\n<p>21<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>13. For published patent applications and issued patents, each Party shall make available to\u00a0the public the following information connected to the patent prosecution of such patent<br \/>\napplications and patents:<\/p>\n<p>(a) search and examination results, including any relevant prior art search histories;<br \/>\n(b) communications from applicants; and<br \/>\n(c) patent and non-patent related literature citations submitted by applicants, other<br \/>\npatent offices, and relevant third parties.<br \/>\nARTICLE 9: MEASURES RELATED TO CERTAIN REGULATED PRODUCTS<br \/>\nAgricultural Chemical Products<br \/>\n1. (a) If a Party requires or permits, as a condition of granting marketing approval for a<br \/>\nnew agricultural chemical product, the submission of information<br \/>\nconcerning safety or efficacy of the product, the Party shall not, without the<br \/>\nconsent of a person that previously submitted such safety or efficacy<br \/>\ninformation to obtain marketing approval in the Party, authorize another to market<br \/>\na same or a similar product based on:<\/p>\n<p>(i) the safety or efficacy information submitted in support of the marketing<br \/>\napproval; or<br \/>\n(ii) evidence of the marketing approval,<br \/>\nfor at least ten years from the date of marketing approval in the territory of<br \/>\nthe Party.<\/p>\n<p>(b) If a Party requires or permits, in connection with granting marketing approval for<br \/>\na new agricultural chemical product, the submission of evidence concerning the<br \/>\nsafety or efficacy of a product that was previously approved in another territory,<br \/>\nsuch as evidence of prior marketing approval in the other territory, the Party shall<br \/>\nnot, without the consent of a person that previously submitted the safety or<br \/>\nefficacy information to obtain marketing approval in another territory, authorize<br \/>\nanother to market a same or a similar product based on:<\/p>\n<p>(i) the safety or efficacy information submitted in support of the prior<br \/>\nmarketing approval in the other territory; or<br \/>\n(ii) evidence of prior marketing approval in the other territory,<br \/>\nfor at least ten years from the date of marketing approval of the new product in<br \/>\nthe territory of the Party.<\/p>\n<p>22<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>Pharmaceutical Products<\/p>\n<p>2. [Placeholder for provisions related to data protection for pharmaceutical products]<\/p>\n<p>3. [Placeholder for provisions related to patent linkage]<\/p>\n<p>General Provisions<\/p>\n<p>4. [Placeholder for provisions related to patent term\/data protection relationship]<\/p>\n<p>5. [Placeholder for definitions of \u201cnew pharmaceutical product\u201d and \u201cnew agricultural<br \/>\nproduct\u201d]<\/p>\n<p>ARTICLE 10: GENERAL OBLIGATIONS RELATING TO THE ENFORCEMENT OF INTELLECTUAL<br \/>\nPROPERTY RIGHTS<\/p>\n<p>1. The Parties understand that a decision that a Party makes on the distribution of<br \/>\nenforcement resources shall not excuse that Party from complying with this Chapter.<\/p>\n<p>2. In civil, administrative, and criminal proceedings involving copyright or related rights,<br \/>\neach Party shall provide for a presumption that, in the absence of proof to the contrary, the<br \/>\nperson whose name is indicated in the usual manner as the author, producer, performer, or<br \/>\npublisher of the work, performance, or phonogram is the designated right holder in such work,\u00a0performance, or phonogram. Each Party shall also provide for a presumption that, in the absence\u00a0of proof to the contrary, the copyright or related right subsists in such subject matter. In civil,\u00a0administrative, and criminal proceedings involving trademarks, each Party shall provide for a\u00a0rebuttable presumption that a registered trademark is valid. In civil and administrative\u00a0proceedings involving patents, each Party shall provide for a rebuttable presumption that a patent\u00a0is valid, and shall provide that each claim of a patent is presumed valid independently of the\u00a0validity of the other claims.<\/p>\n<p>ARTICLE 11: ENFORCEMENT PRACTICES WITH RESPECT TO INTELLECTUAL PROPERTY\u00a0RIGHTS<\/p>\n<p>1. Each Party shall provide that final judicial decisions and administrative rulings of general<br \/>\napplication pertaining to the enforcement of intellectual property rights shall be in writing and\u00a0shall state any relevant findings of fact and the reasoning or the legal basis on which the\u00a0decisions and rulings are based. Each Party shall also provide that such decisions and rulings\u00a0shall be published16 or, where publication is not practicable, otherwise made available to the\u00a0public, in its national language in such a manner as to enable governments and right holders to\u00a0become acquainted with them.<\/p>\n<p>16 A Party may satisfy the requirement for publication by making the decision or ruling<br \/>\navailable to the public on the Internet.<\/p>\n<p>23<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>2. Each Party shall promote the collection and analysis of statistical data and other relevant<br \/>\ninformation concerning intellectual property rights infringements as well as the collection of<br \/>\ninformation on best practices to prevent and combat infringements.<\/p>\n<p>3. Each Party shall publicize information on its efforts to provide effective enforcement of<br \/>\nintellectual property rights in its civil, administrative and criminal systems, including statistical\u00a0information that the Party collects for such purposes.<\/p>\n<p>4. Nothing in this Chapter shall require a Party to disclose confidential information the<br \/>\ndisclosure of which would impede law enforcement or otherwise be contrary to the public<br \/>\ninterest or would prejudice the legitimate commercial interests of particular enterprises, public or\u00a0private.<br \/>\nARTICLE 12: CIVIL AND ADMINISTRATIVE PROCEDURES AND REMEDIES<\/p>\n<p>1. Each Party shall make available to right holders17 civil judicial procedures concerning the\u00a0enforcement of any intellectual property right.<\/p>\n<p>2. Each Party shall provide for injunctive relief consistent with Article 44 of the TRIPS<br \/>\nAgreement, and shall also make injunctions available to prevent the exportation of infringing\u00a0goods.<br \/>\n3. Each Party shall provide that:<\/p>\n<p>(a) in civil judicial proceedings, its judicial authorities shall have the authority to<br \/>\norder the infringer to pay the right holder:<\/p>\n<p>(i) damages adequate to compensate for the injury the right holder has<br \/>\nsuffered as a result of the infringement,18 and<br \/>\n(ii) at least in the case of copyright or related rights infringement and<br \/>\ntrademark counterfeiting, the profits of the infringer that are attributable to<br \/>\nthe infringement and that are not taken into account in computing the<br \/>\namount of the damages referred to in clause (i).<\/p>\n<p>(b) in determining damages for infringement of intellectual property rights, its<br \/>\njudicial authorities shall consider, inter alia, the value of the infringed good or<\/p>\n<p>17 For the purposes of this Article, the term \u201cright holder\u201d shall include exclusive licensees as well as federations\u00a0and associations having the legal standing and authority to assert such rights; the term \u201cexclusive licensee\u201d shall\u00a0include the exclusive licensee of any one or more of the exclusive intellectual property rights encompassed in a<br \/>\ngiven intellectual property.<\/p>\n<p>18 In the case of patent infringement, damages adequate to compensate for the infringement\u00a0shall not be less than a reasonable royalty.<\/p>\n<p>24<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>service, measured by the suggested retail price or other legitimate measure of<br \/>\nvalue submitted by the right holder.<\/p>\n<p>4. In civil judicial proceedings, each Party shall, at least with respect to works, phonograms,<br \/>\nand performances protected by copyright or related rights, and in cases of trademark<br \/>\ncounterfeiting, establish or maintain a system that provides for pre-established damages, which\u00a0shall be available upon the election of the right holder. Pre-established damages shall be in an\u00a0amount sufficiently high to constitute a deterrent to future infringements and to compensate fully\u00a0the right holder for the harm caused by the infringement. In civil judicial proceedings\u00a0concerning patent infringement, each Party shall provide that its judicial authorities shall have\u00a0the authority to increase damages to an amount that is up to three times the amount of the injury\u00a0found or assessed.19<\/p>\n<p>5. Each Party shall provide that its judicial authorities, except in exceptional circumstances,<br \/>\nhave the authority to order, at the conclusion of civil judicial proceedings concerning copyright\u00a0or related rights infringement, trademark infringement, or patent infringement, that the prevailing\u00a0party shall be awarded payment by the losing party of court costs or fees and, at least in\u00a0proceedings concerning copyright or related rights infringement or willful trademark\u00a0counterfeiting, reasonable attorney\u2019s fees. Further, each Party shall provide that its judicial\u00a0authorities, at least in exceptional circumstances, shall have the authority to order, at the\u00a0conclusion of civil judicial proceedings concerning patent infringement, that the prevailing party\u00a0shall be awarded payment by the losing party of reasonable attorneys\u2019 fees.<br \/>\n6. In civil judicial proceedings concerning copyright or related rights infringement and<br \/>\ntrademark counterfeiting, each Party shall provide that its judicial authorities shall have the\u00a0authority to order the seizure of allegedly infringing goods, materials and implements relevant to\u00a0the infringement, and, at least for trademark counterfeiting, documentary evidence relevant to the\u00a0infringement.<\/p>\n<p>7. Each Party shall provide that in civil judicial proceedings:<\/p>\n<p>(a) at the right holder\u2019s request, goods that have been found to be pirated or counterfeit shall\u00a0be destroyed, except in exceptional circumstances;<br \/>\n(b) its judicial authorities shall have the authority to order that materials and<br \/>\nimplements that have been used in the manufacture or creation of such pirated or<br \/>\ncounterfeit goods be, without compensation of any sort, promptly destroyed or, in<br \/>\nexceptional circumstances, without compensation of any sort, disposed of outside<br \/>\nthe channels of commerce in such a manner as to minimize the risks of further<br \/>\ninfringements; and<\/p>\n<p>19 No Party shall be required to apply this paragraph to actions for infringement against a Party or a third party\u00a0acting with the authorization or consent of a Party.<br \/>\n25<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(c) in regard to counterfeit trademarked goods, the simple removal of the trademark<br \/>\nunlawfully affixed shall not be sufficient to permit the release of goods into the<br \/>\nchannels of commerce.<\/p>\n<p>8. Each Party shall provide that in civil judicial proceedings concerning the enforcement of<br \/>\nintellectual property rights, its judicial authorities shall have the authority to order the infringer\u00a0to provide any information that the infringer possesses or controls regarding any persons or\u00a0entities involved in any aspect of the infringement and regarding the means of production or\u00a0distribution channel of such goods or services, including the identification of third persons\u00a0involved in the production and distribution of the infringing goods or services or in their\u00a0channels of distribution, and to provide this information to the right holder.<br \/>\n9. Each Party shall provide that its judicial authorities have the authority to:<\/p>\n<p>(a) fine or imprison, in appropriate cases, a party to a civil judicial proceeding who<br \/>\nfails to abide by valid orders issued by such authorities; and<br \/>\n(b) impose sanctions on parties to a civil judicial proceeding their counsel, experts, or<br \/>\nother persons subject to the court\u2019s jurisdiction, for violation of judicial orders<br \/>\nregarding the protection of confidential information produced or exchanged in a<br \/>\nproceeding.<\/p>\n<p>10. To the extent that any civil remedy can be ordered as a result of administrative procedures\u00a0on the merits of a case, each Party shall provide that such procedures conform to principles\u00a0equivalent in substance to those set out in this Chapter.<\/p>\n<p>11. In the event that a Party\u2019s judicial or other authorities appoint technical or other experts in\u00a0civil proceedings concerning the enforcement of intellectual property rights and require that the\u00a0parties to the litigation bear the costs of such experts, that Party should seek to ensure that such\u00a0costs are closely related, inter alia, to the quantity and nature of work to be performed and do not\u00a0unreasonably deter recourse to such proceedings.<\/p>\n<p>12. In civil judicial proceedings concerning the acts described in Article 4.[9] (TPMs) and<br \/>\nArticle 4.[10] (RMI), each Party shall provide that its judicial authorities shall, at the least, have\u00a0the authority to:<\/p>\n<p>(a) impose provisional measures, including seizure of devices and products suspected<br \/>\nof being involved in the prohibited activity;<br \/>\n(b) provide an opportunity for the right holder to elect between actual damages it<br \/>\nsuffered (plus any profits attributable to the prohibited activity not taken into<br \/>\naccount in computing those damages) or pre-established damages;<br \/>\n(c) order payment to the prevailing right holder at the conclusion of civil judicial<br \/>\nproceedings of court costs and fees, and reasonable attorney\u2019s fees, by the party<br \/>\nengaged in the prohibited conduct; and<\/p>\n<p>26<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(d) order the destruction of devices and products found to be involved in the<br \/>\nprohibited activity.\u00a0No Party shall make damages available under this paragraph against a nonprofit library, archives,\u00a0educational institution, or public noncommercial broadcasting entity that sustains the burden of\u00a0proving that such entity was not aware and had no reason to believe that its acts constituted a\u00a0prohibited activity.<br \/>\nARTICLE 13: PROVISIONAL MEASURES<\/p>\n<p>1. Each Party shall act on requests for provisional relief inaudita altera parte expeditiously,<br \/>\nand shall, except in exceptional cases, generally execute such requests within ten days.<\/p>\n<p>2. Each Party shall provide that its judicial authorities have the authority to require the<br \/>\napplicant, with respect to provisional measures, to provide any reasonably available evidence in\u00a0order to satisfy themselves with a sufficient degree of certainty that the applicant\u2019s right is being\u00a0infringed or that such infringement is imminent, and to order the applicant to provide a\u00a0reasonable security or equivalent assurance set at a level sufficient to protect the defendant and to\u00a0prevent abuse, and so as not to unreasonably deter recourse to such procedures.<br \/>\nARTICLE 14: SPECIAL REQUIREMENTS RELATED TO BORDER ENFORCEMENT<\/p>\n<p>1. Each Party shall provide that any right holder initiating procedures for its competent<br \/>\nauthorities to suspend release of suspected counterfeit or confusingly similar trademark goods, or\u00a0pirated copyright goods20 into free circulation is required to provide adequate evidence to satisfy\u00a0the competent authorities that, under the laws of the country of importation, there is prima facie\u00a0an infringement of the right holder&#8217;s intellectual property right and to supply sufficient\u00a0information that may reasonably be expected to be within the right holder\u2019s knowledge to make\u00a0the suspected goods reasonably recognizable by its competent authorities. The requirement to\u00a0provide sufficient information shall not unreasonably deter recourse to these procedures. Each\u00a0Party shall provide that the application to suspend the release of goods apply to all points of\u00a0entry to its territory and remain in force for a period of not less than one year from the date of<\/p>\n<p>20 For purposes of Article 14:<\/p>\n<p>(a) counterfeit trademark goods means any goods, including packaging, bearing without authorization a\u00a0trademark that is identical to the trademark validly registered in respect of such goods, or that cannot be\u00a0distinguished in its essential aspects from such a trademark, and that thereby infringes the rights of the owner of the\u00a0trademark in question under the law of the country of importation; and<br \/>\n(b) pirated copyright goods means any goods that are copies made without the consent of the right holder\u00a0or person duly authorized by the right holder in the country of production and that are made directly or indirectly\u00a0from an article where the making of that copy would have constituted an infringement of a copyright or a related\u00a0right under the law of the country of importation.<\/p>\n<p>27<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>application, or the period that the good is protected by copyright or the relevant trademark\u00a0registration is valid, whichever is shorter.<br \/>\n2. Each Party shall provide that its competent authorities shall have the authority to require a\u00a0right holder initiating procedures to suspend the release of suspected counterfeit or confusingly\u00a0similar trademark goods, or pirated copyright goods, to provide a reasonable security or\u00a0equivalent assurance sufficient to protect the defendant and the competent authorities and to\u00a0prevent abuse. Each Party shall provide that such security or equivalent assurance shall not\u00a0unreasonably deter recourse to these procedures. A Party may provide that such security may be\u00a0in the form of a bond conditioned to hold the importer or owner of the imported merchandise\u00a0harmless from any loss or damage resulting from any suspension of the release of goods in the\u00a0event the competent authorities determine that the article is not an infringing good.<br \/>\n3. Where its competent authorities have seized goods that are counterfeit or pirated, a Party\u00a0shall provide that its competent authorities have the authority to inform the right holder within\u00a030-days21 of the seizure of the names and addresses of the consignor, exporter, consignee, or\u00a0importer, a description of the merchandise, quantity of the merchandise, and, if known, the\u00a0country of origin of the merchandise.<br \/>\n4. Each Party shall provide that its competent authorities may initiate border measures ex<br \/>\nofficio22 with respect to imported, exported, or in-transit merchandise,23 or merchandise in free\u00a0trade zones, that is suspected of being counterfeit or confusingly similar trademark goods, or\u00a0pirated copyright goods.<br \/>\n5. Each Party shall adopt or maintain a procedure by which its competent authorities shall<br \/>\ndetermine, within a reasonable period of time after the initiation of the procedures described\u00a0under Article 14.1 whether the suspect goods infringe an intellectual property right. Where a\u00a0Party provides administrative procedures for the determination of an infringement, it shall also\u00a0provide its authorities with the authority to impose administrative penalties following a\u00a0determination that the goods are infringing.<br \/>\n6. Each Party shall provide that goods that have been determined by its competent<br \/>\nauthorities to be pirated or counterfeit shall be destroyed, except in exceptional circumstances.\u00a0In regard to counterfeit trademark goods, the simple removal of the trademark unlawfully affixed\u00a0shall not be sufficient to permit the release of the goods into the channels of commerce. In no\u00a0event shall the competent authorities be authorized, except in exceptional circumstances, to\u00a021 For purposes of this Article, \u201cdays\u201d shall mean \u201cbusiness days\u201d.<\/p>\n<p>22 For greater certainty, the parties understand that ex officio action does not require a formal\u00a0complaint from a private party or right holder.<\/p>\n<p>23 For purposes of Article 14.4, in-transit merchandise means goods under \u201cCustoms transit\u201d\u00a0and goods \u201ctranshipped,\u201d as defined in the International Convention on the Simplification and\u00a0Harmonization of Customs Procedures (Kyoto Convention).<\/p>\n<p>28<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>permit the exportation of counterfeit or pirated goods or to permit such goods to be subject to\u00a0other customs procedures.<\/p>\n<p>7. Where an application fee, merchandise storage fee, or destruction fee is assessed in<br \/>\nconnection with border measures to enforce an intellectual property right, each Party shall<br \/>\nprovide that such fee shall not be set at an amount that unreasonably deters recourse to these\u00a0measures.<\/p>\n<p>8. A Party may exclude from the application of this Article (border measures), small\u00a0quantities of goods of a non-commercial nature contained in traveler\u2019s personal luggage.<\/p>\n<p>ARTICLE 15: CRIMINAL ENFORCEMENT<\/p>\n<p>1. Each Party shall provide for criminal procedures and penalties to be applied at least in<br \/>\ncases of willful trademark counterfeiting or copyright or related rights piracy on a commercial\u00a0scale. Willful copyright or related rights piracy on a commercial scale includes:<br \/>\n(a) significant willful copyright or related rights infringements that have no direct or<br \/>\nindirect motivation of financial gain; and<br \/>\n(b) willful infringements for purposes of commercial advantage or private financial<br \/>\ngain.24\u00a0Each Party shall treat willful importation or exportation of counterfeit or pirated goods as\u00a0unlawful activities subject to criminal penalties.<\/p>\n<p>25<\/p>\n<p>2. Each Party shall also provide for criminal procedures and penalties to be applied, even<br \/>\nabsent willful trademark counterfeiting or copyright or related rights piracy, at least in cases of\u00a0knowing trafficking in:<\/p>\n<p>(a) labels or packaging, of any type or nature, to which a counterfeit trademark26 has<br \/>\nbeen applied, the use of which is likely to cause confusion, to cause mistake, or to<br \/>\ndeceive; and<br \/>\n(b) counterfeit or illicit labels27 affixed to, enclosing, or accompanying, or designed to<br \/>\nbe affixed to, enclose, or accompany the following:<\/p>\n<p>24 For greater certainty, \u201cfinancial gain\u201d for purposes of this Article includes the receipt or<br \/>\nexpectation of anything of value.<\/p>\n<p>25 A Party may comply with this obligation in relation to exportation of pirated goods through\u00a0its measures concerning distribution.<\/p>\n<p>26 Negotiator\u2019s Note: For greater certainty, the definition of \u201ccounterfeit trademark goods\u201d in\u00a0footnote [12] shall be used as context for this Article.<\/p>\n<p>29<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(i) a phonogram,<br \/>\n(ii) a copy of a computer program or a literary work,<br \/>\n(iii) a copy of a motion picture or other audiovisual work,<br \/>\n(iv) documentation or packaging for such items; and\u00a0(c) counterfeit documentation or packaging for items of the type described in\u00a0subparagraph (b).<\/p>\n<p>3. Each Party shall also provide for criminal procedures and penalties to be applied against<br \/>\nany person who, without authorization of the holder of copyright or related rights in a motion\u00a0picture or other audiovisual work, knowingly uses or attempts to use an audiovisual recording\u00a0device to transmit or make a copy of a motion picture or other audiovisual work, or any part\u00a0thereof, from a performance of such work in a public motion picture exhibition facility.<\/p>\n<p>4. With respect to the offenses for which this Article requires the Parties to provide for<br \/>\ncriminal procedures and penalties, Parties shall ensure that criminal liability for aiding and<br \/>\nabetting is available under its law.\u00a05. With respect to the offences described in Article 15.[1]-[4] above, each Party shall\u00a0provide:<\/p>\n<p>(a) penalties that include sentences of imprisonment as well as monetary fines<br \/>\nsufficiently high to provide a deterrent to future infringements, consistent with a<br \/>\npolicy of removing the infringer\u2019s monetary incentive. Each Party shall further<br \/>\nestablish policies or guidelines that encourage judicial authorities to impose those<br \/>\npenalties at levels sufficient to provide a deterrent to future infringements,<\/p>\n<p>27 For purposes of this Article, \u201cillicit label\u201d means a genuine certificate, licensing document,\u00a0registration card, or similar labeling component:<\/p>\n<p>(A) that is used by the copyright owner to verify that a phonogram, a copy of a computer<br \/>\nprogram or literary work, a copy of a motion picture or other audiovisual work, or<br \/>\ndocumentation or packaging for such phonogram or copies is not counterfeit or infringing<br \/>\nof any copyright; and<br \/>\n(B) that is, without the authorization of the copyright owner\u2014<\/p>\n<p>(i) distributed or intended for distribution not in connection with the phonogram<br \/>\nor copies to which such labeling component was intended to be affixed by the<br \/>\nrespective copyright owner; or<br \/>\n(ii) in connection with a genuine certificate or licensing document, knowingly<br \/>\nfalsified in order to designate a higher number of licensed users or copies than<br \/>\nauthorized by the copyright owner, unless that certificate or document is used by<br \/>\nthe copyright owner solely for the purpose of monitoring or tracking the copyright<br \/>\nowner\u2019s distribution channel and not for the purpose of verifying that a copy or<br \/>\nphonogram is noninfringing.<\/p>\n<p>30<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>including the imposition of actual terms of imprisonment when criminal<br \/>\ninfringement is undertaken for commercial advantage or private financial gain;(b) that its judicial authorities shall have the authority to order the seizure of\u00a0suspected counterfeit or pirated goods, any related materials and implements used\u00a0in the commission of the offense, any assets traceable to the infringing activity,\u00a0and any documentary evidence relevant to the offense. Each Party shall provide\u00a0that items that are subject to seizure pursuant to any such judicial order need not\u00a0be individually identified so long as they fall within general categories specified\u00a0in the order;<\/p>\n<p>(c) that its judicial authorities shall have the authority to order, among other<br \/>\nmeasures, the forfeiture of any assets traceable to the infringing activity, and shall<br \/>\norder such forfeiture at least in cases of trademark counterfeiting;<br \/>\n(d) that its judicial authorities shall, except in exceptional cases, order<\/p>\n<p>(i) the forfeiture and destruction of all counterfeit or pirated goods, and any<br \/>\narticles consisting of a counterfeit mark; and<br \/>\n(ii) the forfeiture or destruction of materials and implements that have been<br \/>\nused in the creation of pirated or counterfeit goods.<br \/>\nEach Party shall further provide that forfeiture and destruction under this<br \/>\nsubparagraph and subparagraph (c) shall occur without compensation of any kind<br \/>\nto the defendant;<\/p>\n<p>(e) that its judicial authorities have the authority to order the seizure or forfeiture of<br \/>\nassets the value of which corresponds to that of the assets derived from, or<br \/>\nobtained directly or indirectly through, the infringing activity.<br \/>\n(f) that, in criminal cases, its judicial or other competent authorities shall keep an<br \/>\ninventory of goods and other material proposed to be destroyed, and shall have<br \/>\nthe authority temporarily to exempt such materials from the destruction order to<br \/>\nfacilitate the preservation of evidence upon notice by the right holder that it<br \/>\nwishes to bring a civil or administrative case for damages28; and<br \/>\n(g) that its authorities may initiate legal action ex officio with respect to the offenses<br \/>\ndescribed in this Chapter, without the need for a formal complaint by a private<br \/>\nparty or right holder.<\/p>\n<p>28 For greater certainty, a notice from the right holder that it wishes to bring a civil or<br \/>\nadministrative case for damages is not the sole basis for the authority to exempt materials from\u00a0the destruction order.<\/p>\n<p>31<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>ARTICLE 16: SPECIAL MEASURES RELATING TO ENFORCEMENT IN THE DIGITAL<br \/>\nENVIRONMENT<\/p>\n<p>1. Each Party shall ensure that enforcement procedures, to the extent set forth in the civil<br \/>\nand criminal enforcement sections of this Chapter, are available under its law so as to permit\u00a0effective action against an act of trademark, copyright or related rights infringement which takes\u00a0place in the digital environment, including expeditious remedies to prevent infringement and\u00a0remedies which constitute a deterrent to further infringement.<\/p>\n<p>2. Each Party shall provide appropriate laws, orders, regulations, government-issued<br \/>\nguidelines, or administrative or executive decrees providing that its central government agencies\u00a0not use infringing computer software and other materials protected by copyright or related rights\u00a0and only use computer software and other materials protected by copyright or related rights as\u00a0authorized by the relevant license. These measures shall provide for the regulation of the\u00a0acquisition and management of software and other materials for government use that are\u00a0protected by copyright or related rights.<\/p>\n<p>3. For the purpose of providing enforcement procedures that permit effective action against\u00a0any act of copyright infringement covered by this Chapter, including expeditious remedies to\u00a0prevent infringements and criminal and civil remedies that constitute a deterrent to further\u00a0infringements, each Party shall provide, consistent with the framework set out in this Article:<\/p>\n<p>(a) legal incentives for service providers to cooperate with copyright29 owners in\u00a0deterring the unauthorized storage and transmission of copyrighted materials; and<br \/>\n(b) limitations in its law regarding the scope of remedies available against serviceproviders for copyright infringements that they do not control, initiate or direct,\u00a0and that take place through systems or networks controlled or operated by them or\u00a0on their behalf, as set forth in this subparagraph (b).30<\/p>\n<p>(i) These limitations shall preclude monetary relief and provide reasonable<br \/>\nrestrictions on court-ordered relief to compel or restrain certain actions for<br \/>\nthe following functions, and shall be confined to those functions:<br \/>\n(A) transmitting, routing, or providing connections for material without<br \/>\nmodification of its content, or the intermediate and transient<br \/>\nstorage of such material in the course thereof;<br \/>\n(B) caching carried out through an automatic process;<\/p>\n<p>29 For purposes of this paragraph, \u201ccopyright\u201d includes related rights.<\/p>\n<p>30 This subparagraph is without prejudice to the availability of defenses to copyright<br \/>\ninfringement that are of general applicability.<\/p>\n<p>32<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(C) storage, at the direction of a user, of material residing on a system<br \/>\nor network controlled or operated by or for the service provider;<br \/>\nand<br \/>\n(D) referring or linking users to an online location by using<br \/>\ninformation location tools, including hyperlinks and directories.<\/p>\n<p>(ii) These limitations shall apply only where the service provider does not<br \/>\ninitiate the chain of transmission of the material, and does not select the<br \/>\nmaterial or its recipients (except to the extent that a function described in<br \/>\nclause (i)(D) in itself entails some form of selection).<br \/>\n(iii) Qualification by a service provider for the limitations as to each function<br \/>\nin clauses (i)(A) through (D) shall be considered separately from<br \/>\nqualification for the limitations as to each other function, in accordance<br \/>\nwith the conditions for qualification set forth in clauses (iv) through (vii).<br \/>\n(iv) With respect to functions referred to in clause (i)(B), the limitations shall<br \/>\nbe conditioned on the service provider:<\/p>\n<p>(A) permitting access to cached material in significant part only to\u00a0users of its system or network who have met conditions on user<br \/>\naccess to that material;<br \/>\n(B) complying with rules concerning the refreshing, reloading, or other<br \/>\nupdating of the cached material when specified by the person<br \/>\nmaking the material available online in accordance with a<br \/>\ngenerally accepted industry standard data communications protocol<br \/>\nfor the system or network through which that person makes the<br \/>\nmaterial available;<br \/>\n(C) not interfering with technology consistent with industry standards<br \/>\naccepted in the Party\u2019s territory used at the originating site to<br \/>\nobtain information about the use of the material, and not modifying<br \/>\nits content in transmission to subsequent users; and<br \/>\n(D) expeditiously removing or disabling access, on receipt of an<br \/>\neffective notification of claimed infringement, to cached material<br \/>\nthat has been removed or access to which has been disabled at the<br \/>\noriginating site.\u00a0(v) With respect to functions referred to in clauses (i)(C) and (D), the<br \/>\nlimitations shall be conditioned on the service provider:<br \/>\n(A) not receiving a financial benefit directly attributable to the<br \/>\ninfringing activity, in circumstances where it has the right and<br \/>\nability to control such activity;<br \/>\n(B) expeditiously removing or disabling access to the material residing<br \/>\non its system or network on obtaining actual knowledge of the<br \/>\ninfringement or becoming aware of facts or circumstances from<br \/>\nwhich the infringement was apparent, such as through effective<\/p>\n<p>33<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>notifications of claimed infringement in accordance with clause\u00a0(ix); and<br \/>\n(C) publicly designating a representative to receive such notifications.<br \/>\n(vi) Eligibility for the limitations in this subparagraph shall be conditioned on<br \/>\nthe service provider:<br \/>\n(A) adopting and reasonably implementing a policy that provides for<br \/>\ntermination in appropriate circumstances of the accounts of repeat<br \/>\ninfringers; and<br \/>\n(B) accommodating and not interfering with standard technical<br \/>\nmeasures accepted in the Party\u2019s territory that protect and identify<br \/>\ncopyrighted material, that are developed through an open,<br \/>\nvoluntary process by a broad consensus of copyright owners and<br \/>\nservice providers, that are available on reasonable and<br \/>\nnondiscriminatory terms, and that do not impose substantial costs<br \/>\non service providers or substantial burdens on their systems or<br \/>\nnetworks.<br \/>\n(vii) Eligibility for the limitations in this subparagraph may not be conditioned<br \/>\non the service provider monitoring its service, or affirmatively seeking<br \/>\nfacts indicating infringing activity, except to the extent consistent with<br \/>\nsuch technical measures.<br \/>\n(viii) If the service provider qualifies for the limitations with respect to the<br \/>\nfunction referred to in clause (i)(A), court-ordered relief to compel or<br \/>\nrestrain certain actions shall be limited to terminating specified accounts,<br \/>\nor to taking reasonable steps to block access to a specific, non-domestic<br \/>\nonline location. If the service provider qualifies for the limitations with<br \/>\nrespect to any other function in clause (i), court-ordered relief to compel<br \/>\nor restrain certain actions shall be limited to removing or disabling access<br \/>\nto the infringing material, terminating specified accounts, and other<br \/>\nremedies that a court may find necessary, provided that such other<br \/>\nremedies are the least burdensome to the service provider among<br \/>\ncomparably effective forms of relief. Each Party shall provide that any<br \/>\nsuch relief shall be issued with due regard for the relative burden to the<br \/>\nservice provider and harm to the copyright owner, the technical feasibility<br \/>\nand effectiveness of the remedy and whether less burdensome, comparably<br \/>\neffective enforcement methods are available. Except for orders ensuring<br \/>\nthe preservation of evidence, or other orders having no material adverse<br \/>\neffect on the operation of the service provider\u2019s communications network,<br \/>\neach Party shall provide that such relief shall be available only where the<br \/>\nservice provider has received notice of the court order proceedings<br \/>\nreferred to in this subparagraph and an opportunity to appear before the<br \/>\njudicial authority.<\/p>\n<p>34<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>(ix) For purposes of the notice and take down process for the functions<br \/>\nreferred to in clauses (i)(C) and (D), each Party shall establish appropriate<br \/>\nprocedures in its law or in regulations for effective notifications of claimed<br \/>\ninfringement, and effective counter-notifications by those whose material<br \/>\nis removed or disabled through mistake or misidentification. Each Party<br \/>\nshall also provide for monetary remedies against any person who makes a<br \/>\nknowing material misrepresentation in a notification or counternotification<br \/>\nthat causes injury to any interested party as a result of a\u00a0service provider relying on the misrepresentation.<br \/>\n(x) If the service provider removes or disables access to material in good faith<br \/>\nbased on claimed or apparent infringement, each Party shall provide that<br \/>\nthe service provider shall be exempted from liability for any resulting<br \/>\nclaims, provided that, in the case of material residing on its system or<br \/>\nnetwork, it takes reasonable steps promptly to notify the person making<br \/>\nthe material available on its system or network that it has done so and, if<br \/>\nsuch person makes an effective counter-notification and is subject to<br \/>\njurisdiction in an infringement suit, to restore the material online unless<br \/>\nthe person giving the original effective notification seeks judicial relief<br \/>\nwithin a reasonable time.<br \/>\n(xi) Each Party shall establish an administrative or judicial procedure enabling<br \/>\ncopyright owners who have given effective notification of claimed<br \/>\ninfringement to obtain expeditiously from a service provider information<br \/>\nin its possession identifying the alleged infringer.<br \/>\n(xii) For purposes of the function referred to in clause (i)(A), service provider<br \/>\nmeans a provider of transmission, routing, or connections for digital online<br \/>\ncommunications without modification of their content between or among<br \/>\npoints specified by the user of material of the user\u2019s choosing, and for<br \/>\npurposes of the functions referred to in clauses (i)(B) through (D) service<br \/>\nprovider means a provider or operator of facilities for online services or<br \/>\nnetwork access.<\/p>\n<p>[Placeholder for additional provisions on enforcement measures, including optical disk<br \/>\nproduction]<\/p>\n<p>[Placeholder for provision on understanding regarding certain public health measures]<\/p>\n<p>Side Letter 1\u00a0In connection with the signing on this date of the Trans-Pacific Partnership Agreement\u00a0(the \u201cAgreement\u201d), I have the honor to confirm the following understandings reached between<\/p>\n<p>35<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>the [Parties] and [Party] during the course of the negotiations of Chapter ## (Intellectual Property\u00a0Rights) of the Agreement:<br \/>\nIn meeting the obligations of Article 16.3(ix), the United States shall apply the pertinent<br \/>\nprovisions of its law31 and [x Party] shall adopt requirements for:<br \/>\n(a) effective written notice to\u00a0service providers with respect to materials that are claimed to be infringing, and (b) effective\u00a0written counter-notification by those whose material is removed or disabled and who claim that it\u00a0was disabled through mistake or misidentification, as set forth in this letter. Effective written\u00a0notice means notice that substantially complies with the elements listed in section (a) of this\u00a0letter, and effective written counter-notification means counter-notification that substantially\u00a0complies with the elements listed in section (b) of this letter.<br \/>\n(a) Effective Written Notice, by a Copyright32 Owner or Person Authorized to Act on Behalf\u00a0of an Owner of an Exclusive Right, to a Service Provider\u2019s Publicly Designated<br \/>\nRepresentative33\u00a0In order for a notice to a service provider to comply with the relevant requirements set out\u00a0in Article 16.3(ix), that notice must be a written communication, which may be provided\u00a0electronically, that includes substantially the following:<\/p>\n<p>1. the identity, address, telephone number, and electronic mail address of the<br \/>\ncomplaining party (or its authorized agent);<br \/>\n2. information reasonably sufficient to enable the service provider to identify the<br \/>\ncopyrighted work(s)34 claimed to have been infringed;<br \/>\n3. information reasonably sufficient to permit the service provider to identify and<br \/>\nlocate the material residing on a system or network controlled or operated by it or for it<br \/>\nthat is claimed to be infringing, or to be the subject of infringing activity, and that is to be<br \/>\nremoved, or access to which is to be disabled;35\u00a031 17 U.S.C. Sections 512(C)(3)(A) and 512(g)(3).<\/p>\n<p>32 All references to copyright in this letter are understood to include related rights, and all references to works are\u00a0understood to include the subject matter of related rights.<\/p>\n<p>33 The Parties understand that a representative is publicly designated to receive notification on behalf of a service\u00a0provider if the representative\u2019s name, physical and electronic address, and telephone number are posted on a\u00a0publicly accessible portion of the service provider\u2019s website, and also in a register accessible to the public throughthe Internet, or designated in another form or manner appropriate for [insert Party name].<\/p>\n<p>34 If multiple copyrighted works at, or linked to from, a single online site on a system or network controlled or\u00a0operated by or for the service provider are covered by a single notification, a representative list of such works at, or\u00a0linked to from, that site may be provided.<\/p>\n<p>36<br \/>\nThis Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>4. a statement that the complaining party has a good faith belief that use of the material in the\u00a0manner complained of is not authorized by the copyright owner, its agent, or the law;<\/p>\n<p>5. a statement that the information in the notice is accurate;<\/p>\n<p>6. a statement with sufficient indicia of reliability (such as a statement under penalty of\u00a0perjury or\u00a0equivalent legal sanctions) that the complaining party is the holder of an exclusive right that is allegedly\u00a0infringed, or is authorized to act on the owner\u2019s behalf; and<\/p>\n<p>7. the signature of the person giving notice.36<\/p>\n<p>(b) Effective Written Counter-Notification by a Subscriber37 Whose Material Was Removed<br \/>\nor Disabled as a Result of Mistake or Misidentification of Material<br \/>\nIn order for a counter-notification to a service provider to comply with the relevant<br \/>\nrequirements set out in Article 16.3(ix), that counter-notification must be a written<br \/>\ncommunication, which may be provided electronically, that includes substantially the following:<\/p>\n<p>1. the identity, address, and telephone number of the subscriber;<br \/>\n2. the identity of the material that has been removed or to which access has been<br \/>\ndisabled;<br \/>\n3. the location at which the material appeared before it was removed or access to it<br \/>\nwas disabled;<br \/>\n4. a statement with sufficient indicia of reliability (such as a statement under penalty<br \/>\nof perjury or equivalent legal sanctions) that the subscriber has a good faith belief that the<br \/>\nmaterial was removed or disabled as a result of mistake or misidentification of the<br \/>\nmaterial;<br \/>\n5. a statement that the subscriber agrees to be subject to orders of any court that has<br \/>\njurisdiction over the place where the subscriber\u2019s address is located, or, if that address is<br \/>\nlocated outside the Party\u2019s territory, any other court with jurisdiction over any place in<\/p>\n<p>35 In the case of notices regarding an information location tool pursuant to paragraph (b)(i)(D) of Article 16.3, the\u00a0information provided must be reasonably sufficient to permit the service provider to locate the reference or link\u00a0residing on a system or network controlled or operated by or for it, except that in the case of a notice regarding a\u00a0substantial number of references or links at a single online site residing on a system or network controlled or<br \/>\noperated by or for the service provider, a representative list of such references or links at the site may be provided, if\u00a0accompanied by information sufficient to permit the service provider to locate the references or links.<\/p>\n<p>36 A signature transmitted as part of an electronic communication satisfies this requirement.<\/p>\n<p>37 All references to \u201csubscriber\u201d in this letter refer to the person whose material has been removed or disabled by a\u00a0service provider as a result of an effective notice described in part (a) of this letter.<\/p>\n<p>37<\/p>\n<p>This Document Contains TPP CONFIDENTIAL Information<br \/>\nMODIFIED HANDLING AUTHORIZED*<\/p>\n<p>the Party\u2019s territory where the service provider may be found, and in which a copyright<br \/>\ninfringement suit could be brought with respect to the alleged infringement;<\/p>\n<p>6. a statement that the subscriber will accept service of process in any such suit; and<\/p>\n<p>7. the signature of the subscriber.38<br \/>\nI have the honor to propose that this letter and your letter in reply confirming that your<br \/>\nGovernment shares this understanding shall constitute an integral part of the Agreement.<br \/>\n38 A signature transmitted as part of an electronic communication satisfies this requirement.<\/p>\n<p>38<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>TPP \u00a0&#8211;\u00a0Trans-Pacific Strategic Economic Partnership also known as TPPA &#8211;\u00a0Trans-Pacific Partnership Agreement Intellectual Property Chapter This Document Contains TPP CONFIDENTIAL Information MODIFIED HANDLING AUTHORIZED* COVER PAGE TRANS-PACIFIC PARTNERSHIP INTELLECTUAL PROPERTY RIGHTS CHAPTER DRAFT \u2013 FEBRUARY 10, 2011 Derived From: Classification Guidance dated March 4, 2010 Reason: 1.4(b) Declassify on: Four years from entry into force [&hellip;]<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":607,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1075","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P29Kla-hl","_links":{"self":[{"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/pages\/1075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/comments?post=1075"}],"version-history":[{"count":5,"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/pages\/1075\/revisions"}],"predecessor-version":[{"id":1083,"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/pages\/1075\/revisions\/1083"}],"up":[{"embeddable":true,"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/pages\/607"}],"wp:attachment":[{"href":"https:\/\/www.hephaestusproject.com\/blog\/wp-json\/wp\/v2\/media?parent=1075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}