Guess What?

The Court of appeal of Milan rendered a new decision in the dispute between Gucci and Guess on the alleged imitation of some of Gucci’s iconic design elements in its products, such as the large block letter “G” and red and green stripes.

In their defense, Guess slammed down the allegations and refuted by saying that the patterns and designs are in fact common in the world of fashion and it’s not particular to Gucci.

In a ruling rendered on September 15, 2014, no. 3308, the Court of Appeal of Milan has partially upheld the appeal filed by Guccio Gucci S.p.A. against the American brand GUESS reforming in part the judgment of first instance no. 6095 of 2013, which decided on the request by Gucci to declare the counterfeiting of numerous national brands and Community ownership of the actress, as well as unfair competition pursuant to art. 2598, n. 1 and 2 and 3, cod. civ., also in terms of parasitic competition especially with respect to the

This ruling seems to put an end to a battle which began in 2009 in front of the New York Federal Court.

The Protection of Trade Secrets Under Italian Law






This article by Gianpaolo Todisco was published in the September 2014 issue of the IBA  Intellectual Property and Entertainment Law Newsletter of the International Bar Association Legal Practice Division.


Background

In order to ensure that information controlled by a company is protected, it is necessary that this is economically exploitable and secret, meaning it is hardly accessible as well as adequately protected by whoever is the rightful owner.
In Italy, in order to claim adequate protection of a trade secret, the owner must demonstrate the existence of a documented and stringent protection policy and to have arranged appropriate measures like internal rules, specifications, safety procedures, confidentiality clauses etc.

The Legal Frame

Under Italian Law, the protection of trade secrets is granted under Intellectual Property and Unfair Competition Law as well as under the Criminal Code.
Before the reform of 1995 which acknowledged TRIPS Agreements, a specific and autonomous legal qualification for the protection of trade secrets could not be found in the Italian system. Until then, protection could have been found under the general principles of contract law and unfair competition law. However, the 1995 reform finally introduced a separate article (article 6-bis) in the 1939 Italian Patent Act[i] which protected general corporate information from misappropriation.
In 2005, the protection of corporate information under article 6 bis of the Patent Act was transferred and expanded in articles 98 and 99 of the Intellectual Property Code (hereinafter the IP Code).

Articles 98 of the IP Code
Article 98 defines the perimeter of what is considered secret information under the IP Code. According to such article:
1.     Corporate information, and technical-industrial experiences, which are under the legitimate control of its holder are protected, if such data:
a)     are secret in the sense that they, as a whole or in the combination of their single components, are not known among (or readily accessible to) experts and professionals;
b)     have economic value due to their secrecy;
c)      are subject to adequate secrecy measures by persons who lawfully control such data .

2.     Evidence and data which involve a considerable effort for the grant of authorization of chemical, pharmaceutical or agricultural products involving the use of new chemical substances are also protected”.
It must be underlined that art. 98 of the IP Code does not only protect general corporate information, (as it happened under art. 6 bis of the former Italian Patent Act) but also more general technical – industrial experiences as commercial information.
With the introduction in 2005 of articles 98 and 99, the IP Code finally protects:
a)     technical information related to procedures and products which are patentable or not[ii];
b)    trade information related to the implementation of commercial functions;
c)     administrative information[iii].
With respect to trade information, before the introduction of articles n. 98 and 99 of the IP Code, Courts stated that client lists and more general information as well as economic conditions applied to clients were treated as confidential information, even in cases when such data was accessible to only certain employees or known within the company[iv]. After articles n. 98 and 99 were introduced, Courts have abandoned the concept of per se confidential information, stating that client lists and more general trade information are granted protection only if the company has adopted secrecy measures aimed in protecting such data and that such information has an economic value.
In order to seek for the protection under article 98 of IP Code, all the following requirements have to be met:
a)     the information must be novel, meaning that it is not known or not easily accessible by operators of the same territorial and economic sector[v];
b)    the data must have an economic value, meaning that the company in possession of trade secrets is in an economically advantageous position with respect to its competitors which do not hold such data;
c)     the company must have adopted secrecy measures in order to protect such information from disclosure, meaning that it must have adopted specific measures in filing and classifying documents as well as in imparting rules to employees as to avoid disclosure.

Article 99 of IP Code
The other article contained in the IP Code governing the protection of trade secrets is art. 99, which states that:
“Notwithstanding the principles of unfair competition, the legitimate holder of the information and data referred to under Article 98, is entitled to prevent non authorized third parties, to acquire, use or disclose such information and data, except for the case in which they have been independently acquired”.
This article provides trade secrets’ holders with remedies that apply notwithstanding to the more general unfair competition discipline of article 2598, n. 3 of Civil Code, which applies only to the wrongful acts of competitors.

The relationship between know-how and trade secrets protected under article 98-99 of the IP Code.
Generally speaking, Italian Courts and Italian authors have defined know-how accordingly to the CE 04/772, CE 00/2659 and to CE 10/330, in which an explicit reference is made to such IP asset.
Here Know-how defined as “an asset of non-patented practical knowledge deriving from experience and evidence which is: (i) secret, or in other words not generally known or easily accessible, (ii) substantial, i.e. significant and useful for the production of contractual products, (iii) identified or described in a sufficient manner as to allow the compliance with the criteria of secrecy and substance”.
Consequently, know-how appears to overlap only partially with the definition of secret information under article 98 of the IP Code, as the only common requirement for the protection seems to be the economic value of the information. Indeed, such partial overlap derives from the different nature of the two assets where know-how is generally protected and determined in order to be licensed, while trade secrets are not meant to circulate among third parties. Therefore, in case of violation of know-how by third parties, Courts have generally applied the principles of unfair competition under article 2598, § 3, rather than articles 98 and 99 of IP Code.

The unfair competition rules contained in the Civil Code
Art. 2598 § 3 of the Italian civil code article states that “... anyone that uses directly or indirectly any mean which does not comply with the principles of fair professional conduct and which is capable of harming other companies performs acts of unfair competition”.
It must be noted that such rule is applicable only between competing entrepreneurs so that, for example, if a consultant steals a trade secret in the furtherance of a contractual relationship,  protection under such article could not be claimed.
The rule under art. 2598 § 3 protects information which is not per se confidential, but only in the presence of behavior that is deemed unfair and when the parties are competitors. This of course means that when the unfair act is carried out by the employee, the claimant cannot seek protection under this article unless the ultimate beneficiary is competitor. This occurs for example, when the employee steals trade secrets for the benefit of a competitor, unless defendant proves otherwise[vi].
More specifically Courts have also considered the theft of trade secrets through espionage as an unfair conduct[vii] as well as the appropriation of confidential information, illegally stolen, when the ultimate effect is the subtraction of commercial and industrial secrets that the company does not want to put in the hands of third party competitors[viii].
Also the theft of secrets through the hiring of a competitors’ employees constitutes an unfair competition act when the ultimate purpose is to obtain their technical knowledge in order to enter the market sooner than it would be possible on the basis of their studies and research[ix].
Again Courts have stated that the termination of an employment relationship does not prevent competitors from passing off actions for the misappropriation of trade secrets by the ex-employee when he continues to contact the competitor’s regular customers by offering the same products and omitting any communication regarding termination of employment[x].
We should also briefly mention that the misappropriation of trade secretes is recognized as an unfair completion conduct by art. 2105 n. 6 of the civil code which regulates the duty of loyalty of the employee that should refrain from any behavior that may affect the interests of the company while benefitting a competitor. Indeed, the employee has a legal obligation to secrecy for the entire duration of the employment relationship, which may be extended also after the termination by signing a non-competition agreement.

The protection granted by Criminal Law.
Apart from the rules stated in the IP and Civil Code an effective degree of protection can be found in the Criminal code under articles 621 and 623.
These articles censor the revelation of the contents of secret documents and of trade secrets with the possible punishment of imprisonment.
More specifically the Italian criminal code protects the content of secret documents and records, whether public or private against unpermitted disclosure with imprisonment up to three years or a fine. For the purposes of protecting new supports also computer devices containing data, information or programs fall within the definition of “documents”.
Protection is also granted in case a secret is revealed for the profit of third parties by reason of their status or office, or profession and without just cause with imprisonment or a fine.
The penalty is increased if the offense is committed by directors, general managers, managers responsible for preparing corporate accounting documents, auditors or liquidators, or if it is committed by those who carry out the audit of the company.
In light of the system described above, data and trade secrets holders can seek for an effective protection under Italian Law and can find an adequate response to their needs in the Courts rulings that continuously evolve in order to



[i] R.D. 29 of June 1939, n. 1127
[ii] According to the Court of Rome executive designs related to the construction of plants for the production of fibers are protected as secret information (Court of Rome decision of March 31, 2004 in Giurisprudenza Annotata di Diritto Industriale, 04, p. 997.
[iii] With respect to administrative information, Courts have stated that documentation related to the UNI, EN, ISO 9001 quality certification is protected as trade secret (Court of Mantova, 12th of July, 2002).
[iv] Court of Verona, May 4th, 1996; Court of Appeal of Florence, 24th April, 1976; Court of Milan, 24th May, 1973;
[v] Italian Courts have excluded protection for lack of novelty in cases of reverse engineering, Milan Court of Appeal, 25th of January 1972 and Court of Rome, 1st of July 1985.
[vi] Court of Appeal of Bologna, June 19, 1995.
[vii] Court of Modena, July 15, 1996.
[viii] Supreme Court, 1983 n.1413
[ix] Court of Orvieto, July 4, 1996.
[x] Court of Verona, April 30, 1996.

Are decisions rendered by the UIBM subject to Res Judicata?

Following the introduction of administrative oppositions in front of the UIBM in 2009, the Italian doctrine has discussed on the possible preclusive effect of decisions rendered by the Italian trademark office.

The decision rendered by the Case T-11/13 (MEGO / TEGO) at the end of September, confirms what we knew: the decisions of opposition and nullity trademarks in front of the OHIM (but the same goes for the UIBM) do not have the effect of res judicata. This means that if an opposition has been rejected, the same party can bring another action for invalidity for the same reasons and under the same earlier grounds on which the Office has already taken a decision.

Of course the same applies when an action is introduced in front of a specialized court for nullity, revocation or infringement, when the UIBM has already rendered a judgment for the same trademarks.

A not so kind… Kinder

The Italian Trademark Office recently rejected an opposition filed by Ferrero, owner of the  world know Kinder trademark against an individual who registered the trademark “Kind Milk” in class 29 (milk and it’s derivatives).

Ferrero immediately filed an opposition in front of the UIBM claiming risk of confusion with several registered trademarks owned by the Italian food company, namely “Kinder”, “Kinder Milkosa” and “Kinder Milk Snack Point” as these trademarks are registered in classes 30 and 29 claiming a likeliness of confusion under art. 12 of the Italian Intellectual Property code (CPI).

According to the trademark office the goods covered by the conflicting signs were considered to be identical solely on the basis of what is specified in their applications for registration in the "milk and milk products" and for goods in Class 30 (pastry, confectionery and ice cream) but an alleged similarities between the signs do not exist and there is no risk of confusion among consumers and that the opposition should be rejected totally. 

Consequently, the application for registration of the mark was upheld.

Creative Commons : Ideas Worth Spreading.

An inflexible copyright policy that prevents any type of disclosure could be anachronistic in the digital era. To realize the full potential of the Internet, encouraging a spreading creativity, many possibilities have been thought. Many of them have been just utopian, but one of these showed a revolutionary potential.

That’s the so called “Creative Commons”.

Launched in 2001 by Lawrence Lessig, Professor of Law at Harvard Law School and one of the leading experts of Copyright Law, this project achieved a large success and a wide application in the recent years.

Creative Commons licenses are not against copyright, instead they depend on the existence of copyright. These licenses are legal tools that creators and other rights holders can choose to offer certain usage rights to the public, while reserving some other rights.

Those who want to make their work available to the public for limited uses while preserving their copyright may want to consider using CC licenses. Others who want to reserve all of their rights under copyright law wouldn’t choose to use it. Creative Commons licenses offer creators a wide spectrum of choices between keeping all rights and renouncing all rights (public domain), an approach that we call "Some Rights Reserved."

Creators can choose among different protection regimes. While some of them refrain commercial uses or the sharing of adaptations, others grant just a minimum protection consisting in the paternity right.  The author doesn’t need any authorization or permission before licensing his work under CC, he just has to decide which conditions he wants to apply to his work. Accordingly, each work will be shared with a different disclaimer, an user friendly detailed tag.

Creative Commons is not an alternative to collecting societies, but a no-profit organization. Therefore all licenses can be use for free with any authorization requirements.

In Italy  Creative Commons could be perceived as an obstacle as it could be interpreted as incompatible with the authority granted by the Italian Copyright Law of 1942 to SIAE, the legal monopolistic society for the management of copyright in Italy.

The recent Directive 2014/26/EU states, however, the principle that rights holders should be able to freely choose to entrust the protection of their works to the collective management bodies they consider most appropriate, also to independent management entities, regardless of the state of nationality. The Directive also grants the authors the right to divide the protection of their works between different collecting societies.

The new standards should promote the coexistence of the CC licenses with the traditional collecting societies, to create a more flexible and efficient system of protection.

This system thought by Lessig affirms a belief in copyright, because it is in essence a copyright license, but it also affirms the innate value of those digital environments where the rules of exchange are not necessarily defined by economic criteria.

Switzerland: Absinthe denied geographical indication

The Swiss Federal Administrative Court (FAC) has ruled that the terms ‘absinthe’, ‘fée verte’ (green fairy) and ‘la bleue’ are generic terms, and cannot be used only by Switzerland-based producers of the spirit.

In its August 8 decision, the court overturned a 2013 decision by the Federal Office for Agriculture (FOAG) that confirmed registration for the denominations as protected geographical indications.

The Association interprofessionnelle de l’absinthe’s request for geographical indications was allowed by the FOAG in 2010. There were 42 objections to its decision, and 21 appeals filed at the FAC. In the August 8 ruling, 11 of these appeals were upheld.

The court found that a 2007 survey on which the Association interprofessionnelle de l’absinthe had based its arguments was flawed in “several respects”, as it showed that only a small proportion of people in Switzerland associated the three terms with the Swiss region of Val-de-Travers.

Citing dictionary definitions and usage of the term in legislation, the court said that it considers the denomination ‘absinthe’ to be a generic name.

“The FAC feels that this denomination refers to a type of good, regardless of its origin, and not to a product originating specifically from Val-de-Travers,” it said in a statement on the court’s website.

It also ruled that the Association interprofessionnelle de l’absinthe failed to “adequately demonstrate” that ‘fée verte’ and ‘la bleue’ are not generic names.

“According to the FAC, there is no reason to justify reserving the denominations ‘absinthe’, ‘fée verte’ and ‘la bleue’ solely for producers in Val-de-Travers and therefore the FOAG’s decision of  August 14, 2012 confirming registration of these denominations as PGI [protected geographical indications] must be annulled,” the statement continued.

The judgment is subject to appeal before the Federal Supreme Court.

Sergey Nivens / Shutterstock.com

What is Digital Watermarking and How it Works.

Digital Watermarking is defined as non detectable marking on images, videos, 3D data, audio or text. They can be read by computer assisted methods. Digital Watermarking may contain several different watermarks simultaneously.

Digital Watermarking is used for different purposes. Digital Watermarking helps in the prosecution of copyright infringement. Unlike metadata, Digital Watermarking directly interwoven with the content to be marked, with steganographic methods. In the case of the robust watermark this integration ensures that the elimination of the watermark makes it unusable.

In various research and development projects that focused initially on the area that processes have been developed mainly for commercially relevant content such as audio and video data and 3D models. There are also Digital Watermarking methods such as for marking databases, musical notes, still images and text.

Occasionally, semi-transparent overlays in images or videos, for example, logos or copyright information, mistakenly referred to as digital watermarking. The usage is misleading, as that neither the carrier (image or video) might not necessarily be available in digital form, the Digital Watermarking is read out digitally. A superimposed semitransparent photo lettering is clearly traceable to the origin, without any need of digital technology.

Digital Watermarking has different characteristics; perceptibility denotes the influencing of the quality of the labeled content, robustness, detectability are other points.

The nature of the embedded message is determined by the application. This can be, for example, in the case of the proof of authorship, information regarding the copyright owner. In the general case metadata is embedded; Unique identification number of the contents similar to the ISBN is used in those cases.

Both classes of methods – digital watermarking and digital fingerprinting – belong to the class of passive protection mechanisms. In contrast to active defense mechanisms, such as encryption which is used to prevent unauthorized access to the content.

A special class of Digital Watermarking are reversible Digital Watermarking techniques. Here, the embedded Digital Watermarking can be removed and the original message can be recovered. This brings you the recovery information in addition to the newly introduced. Applications of this reversible Digital Watermarking technique is used in medical image processing.

Internet Copyright Infringement: 5 Myths vs. Facts

If you Run a Website or post to social media you are probably breaching copyright and you don’t even know it!

Myth 1. Once a ‘Work’ is posted online it loses copyright protection. Wrong!

Fact: You cannot use, copy or post someone else’s photo’s, images, songs or articles without their permission. The person who created them owns these ‘works’ and they have copyright protection form the moment the ‘works’ were created and they loose this ownership protection according to their national laws (usually 50 or 70 years after their death).

Myth 2. I can copy a ’work’ online provided I give the owner credit or a link back.

Fact: You cannot use other people’s ‘work’ unless they first give you permission. Some websites

say you can use any material from their site provided you link back and give them permission unless it’s specifically granted on the ‘work’.

Myth 3. If I alter the ‘work’ or inly use part of it, I am not breaching copyright.

Fact: Derivative works are still covered by Copyright. The only exception is if you are writing a critique and you are referring to the ‘work’. This is considered fair use.

Myth 4. If there is no copyright symbol or notice the ‘work’ can be freely used.

Fact: there is no requirement to display a Copyright symbol or register any work to have copyright protection. A work is protected from the moment it is created and the owner does not lose their copyright if they don’t use the Copyright symbol.

Myth 5 I can use another person’s ‘work’ as long as I don’t’ profit financially from it.

Fact: you are breaching copyright whether you make money or not. The argument that you are giving the owner free advertising does not count. Any money you make would be taken into account by a court decision against you.

Can a terrorist apply for the Right to be Forgotten?

The right to be informed vs. the right to be forgotten. The latest controversial debate is between those who want to see their name deleted from search engines and those who would like to be informed on biographies of known persons or characters which could be found on web sites like Wikipedia.

Lately Wikimedia Foundation reported a certain number of notifications with which Google informed surfers to have deleted some links to Wikipedia following the exercise of the right to be deleted by certain consumers.

Without revealing the name of the applicants, Google explained how to respect the judgment of the European Court of Justice, which guarantees the right to be forgotten (as a result of which Google has received over 90 thousand applications for removal of applicants requesting the right to be forgotten), at least fifty pages of internet encyclopedias have already undergone this procedure. Forty-six pages belong to Wikipedia: among them appears several times the name of the chess player Guido den Broeder and one concerns Gerry Hutch, an Irish imprisoned in the 80s.

One of these requests came from Renato Vallanzasca a notorious Italian mobster who was a powerful figure in the Milanese underworld during the 1970s. Following numerous robberies, kidnappings, murders, and many years as a fugitive, he is currently serving 4 consecutive life sentences with an additional 290 years in prison

Wikimedia Foundation launched an alarm for the defense of freedom of information. " Accurate search results are disappearing from Europe - said Lila Tretikov, executive director of the

Wikimedia Foundation - without any public explanation, no real evidence, no judicial review and no appeal procedure. The result is that unwanted information simply disappears.

Even Google had shown his opposition to the decision of the European Court by the mouth of David Drummond, chief legal officer of the Californian company: "We do not agree with the judgment, it is a bit like saying that a book can be in a library, but can not be included in its catalog. Obviously, however, we respect the authority of the Court and we do our best to adhere to its decisions. "

Why should you protect your IP?

Protecting IP is becoming increasingly difficult, particularly with the proliferation of online sales. The Internet has created an ideal and, often, an almost anonymous selling place for sophisticated counterfeiters of products.

Why should you protect your IP? According to a 2013 report by PricewaterhouseCoopers, the value of the global impact of counterfeit goods and illicit trade is estimated to be US$650 billion per year. That is US$650 billion of lost revenue for brand owners, authorized manufacturers, distributors and retailers of genuine goods.

Ignoring the infringement of IP rights when it arises can dilute the strength of the right itself, undermining distinctiveness (in the case of a trade mark) and the ability to stop future infringement. This has a knock-on impact on the value of goodwill of a business.

The cure? Many businesses elect to protect their IP by registering trade marks, design rights, and patents with the relevant authority (whether that is a national authority, such as the Office for Harmonization of the Internal Market (“OHIM”) or the World Intellectual Property Organization (“WIPO”).

My suggestions of ways in which a brand can strengthen its position vis-à-vis counterfeiters include the following:

  • Create a strong brand identity, using the same logos, designs, packaging etc., consistently across product lines.
  • Use security features, such as stickers, serial numbers, holograms or mylar/security strips in products to help aid detection of counterfeit goods. These details will also assist in monitoring the security of your manufacturing, distribution and retail processes.
  • Create an authorized manufacturing, distribution and retail network for products.
  • Make each entity in your manufacturing, distribution and sales chain subject to contractual obligations to protect your IP and report to you any instances where it has become aware of possible infringement, either by itself or a third party.
  • Register your IP with relevant national customs authorities to enable them to detect and detain counterfeit goods that are imported and exported, allowing you to take action, where appropriate.
  • Periodically collect and review information about any counterfeit goods that are discovered. You may choose to employ a ‘watching’ service to assist with this monitoring. This information will help you identify jurisdictions and territories where counterfeit goods are being produced as well as any weak links in your manufacturing, distribution and sales chain and the common distinguishing features of counterfeit goods.
  • Clearly allocate responsibility within an organization for dealing with infringements and maintain a portfolio of relevant information so that documents such as registration certificates, precedent letters of complaint and text for witness statements are easily accessible.

For any questions on how to protect you IP, feel free to contact: Gianpaolo Todisco at gianpaolo.todisco@tsclex.com