Exporting U.S. Antitrust Law: Are We Really Ready for NOPEC?

The year is 1979. Inflation and lines at the gas pumps caused by a revolution in Iran have stunned Americans. Driven to action, the International Association of Machinists (IAM) files suit in the Central District of California against OPEC and its 14 member countries for participating in a cartel that controls the worldwide price of oil. None of the defendants made any kind of appearance before the court. Nonetheless, the union lost, and its case was dismissed.

Under the Constitution, federal courts are courts of limited jurisdiction. A district court has no power to decide a case over which it has no subject matter jurisdiction. The requirement cannot be waived or avoided; a court that lacks subject matter jurisdiction has no legal authority to entertain the matter. A federal statute known as the Foreign Sovereign Immunity Act of 1976 (FSIA) limits the court’s jurisdiction in cases involving foreign sovereigns and, subject to a few specific exceptions, grants foreign states immunity from the jurisdiction of U.S. courts. The court in IAM v. OPEC raised the FSIA on its own (there being no defendants present) and, finding the OPEC states immune (OPEC itself could not be served), dismissed the case. Thusly did the IAM lose its antitrust case against defendants who never even showed up in court.

The judiciary has resisted the innumerable attempts since 1979 to hold the OPEC cartel accountable for violating U.S. antitrust laws, even though the court’s IAM decision has proven erroneous. Acts by a sovereign “based upon a commercial activity” in the U.S., or affecting U.S. commerce, do not enjoy immunity under FSIA. Although the district court in IAM didn’t think so, the Ninth Circuit on appeal made clear that pricing of oil on world markets is indeed commercial activity that affects the U.S. economy and, therefore, not entitled to sovereign immunity. But the Appeals Court nonetheless sidestepped the case, taking refuge in the judge-made Act-of-State doctrine. The doctrine is prudential, as opposed to jurisdictional, and amounts to a voluntary renunciation of jurisdiction by a court when its decision could interfere with the conduct of foreign policy by the executive branch. Indeed, it is easy to see how a suit against the members of OPEC for price fixing might intrude into a sensitive foreign policy area.

In the four decades since IAM, these considerations have obstructed U.S. courts from holding OPEC accountable for a cartel formed for the purpose of and with the effect of stabilizing the price of a commodity in interstate or foreign commerce, which is illegal per se. As recently as 2010, the Obama administration urged the Fifth Circuit to dismiss an antitrust suit brought by private plaintiffs on Act-of-State grounds, it being up to the executive branch and not the courts to conduct foreign policy and protect national security interests.

Since 2000, when the first No Oil Producing and Exporting Cartels (NOPEC) Act was introduced in the House, the same legislation has been introduced no less than four times. NOPEC came closest to passage in 2007, when different versions of the bill passed the House and the Senate but were not reconciled. The House and Senate judiciary committees have now both approved the bill, and the latest version is on the Senate’s legislative calendar. Congress could act quickly if there is bipartisan support, otherwise it will take several months and require reintroduction in 2023.

NOPEC consists of three operative parts.

  • First, it would amend the Sherman Antitrust Act by adding a new Section 7(a) that explicitly makes it illegal for any foreign state to act collectively with others to limit production, fix prices, or otherwise restrain trade with respect to oil, natural gas, or other petroleum products. Judicial enforcement and a remedy would be available only to the Department of Justice, so the bill does not create a private right of action.

  • Second, it would amend FSIA to explicitly grant jurisdiction to U.S. court against foreign sovereigns to the extent they are engaged in a violation of the new Section 7(a).

  • Third, the legislation clarifies that the Act-of-State doctrine does not prevent U.S. courts from deciding antitrust cases against sovereigns alleged to have violated the new Section 7(a).

Calls for taking a harder line against OPEC are growing stronger in light of recent actions taken by the cartel. In May, for example, Saudi Arabia and 10 other OPEC members voted to slash oil production – resulting in high gas prices – as the U.S. and other nations imposed embargoes on Russian oil. OPEC’s production cuts provided Russia with a substantial lifeline in its increasingly difficult, costly, and prolonged invasion of Ukraine.

The Senate bill is sponsored by ​​Senate Judiciary Committee Ranking Member Chuck Grassley and cosponsors Sens. Amy Klobuchar (D-MN) Mike Lee (R-UT), and Patrick Leahy (D-VT), who argue that OPEC’s price-fixing goes directly against the idea of fair and open markets, with current laws leaving the U.S. government “powerless” over OPEC. But are we really ready for NOPEC?

The concern over interference with foreign policy is far from trivial.

The American Petroleum Institute (API) recently sent a letter to Congress opposing the NOPEC bill, stating it would harm U.S. military, diplomatic, and business relations. API President and CEO Mike Sommers warned that while NOPEC is a noble endeavor designed to protect consumers, it would open the U.S. up to reciprocal lawsuits by foreign entities, writing that this could devastate certain political relations and trigger retaliation from OPEC countries. Other NOPEC critics say OPEC countries may limit other business dealings with the U.S., including lucrative arms deals or by pulling in their investments, as Saudi Arabia threatened to do in 2007, when the Deputy Saudi Oil Minister said the country would pull out of a multi-billion Texas oil refinery project unless the DOJ filed a statement of interest urging dismissal of an antitrust case then pending in the U.S. courts. In 2019, Saudi Arabia and OPEC threatened to start selling their oil in currencies other than the dollar, which would weaken the dollar’s position as the global vehicle currency.

For these reasons, it’s not clear what the White House would do if NOPEC passes. The Biden administration’s view of the measure seems to have shifted a bit, but it hasn’t come out strongly one way or the other. This is hardly surprising given the delicate and complex nature of the issue, the ongoing impact of Russia’s war on Ukraine, and the great importance voters place on the price of gas. Then-Press Secretary Jen Psaki said on May 5, 2022, that the “potential implications and unintended consequences of this legislation require further study and deliberation.” More recently, National Security Advisor Jake Sullivan and Brian Deese, President Biden’s Director of the National Economic Council, said that nothing is off of the table – that the administration is assessing the situation and inviting recommendations. On Oct. 5 the Department of Energy said it would release another 10 million barrels of oil from the Strategic Petroleum Reserve. In making that announcement, Sullivan and Deese said the administration will consult with Congress on “additional tools and authorities to reduce OPEC’s control over energy prices.” They also reiterated the importance of investing in clean American-made energy to reduce reliance on foreign fossil fuels.

OPEC has such tremendous sway over U.S. gas prices and national security it is no wonder Congress continues to try to do something to free U.S. from OPEC’s whims and hold it accountable for going against the ideals of free markets. But whether NOPEC is the right approach remains an open question.

The antitrust laws represent a national ideological perspective on the most beneficial way to organize an economy. Policy differences between nations are supposed to occur in the diplomatic arena, not in the courts of one country or another. And if OPEC or its members lose an antitrust case in a U.S. court, how will the court enforce its judgment?

© MoginRubin LLP

Mexico’s Minimum Wage Set to Increase on January 1, 2023

On December 1, 2022, Mexican President Andrés Manuel Lopez Obrador announced that, unanimously, the business and labor sectors, as well as the government, had agreed to increase the minimum wage by 20 percent for 2023, which will be applicable in the Free Zone of the Northern Border (Zona Libre de la Frontera Norte or ZLFN), as well as the wage applicable in the rest of the country. The increase will become official when it is published in the Official Gazette of the Federation (Diario Oficial de la Federación).

Before the increase was determined, the Mexican National Commission on Minimum Wages (Comisión Nacional de los Salarios Mínimos, or CONASAMI) applied an independent recovery amount (Monto Independiente de Recuperación or MIR) in accordance with the following:

  • MIR for the ZLFN: MXN $23.68
  • MIR for the rest of the country: MXN $15.72

On top of the MIR, the CONASAMI approved a 10 percent increase from the 2022 rate to the daily minimum wage applicable to the ZLFN and the rest of the country, resulting in MXN $312.41 (approximately USD $16.11) for the ZLFN and MXN $207.44 (approximately USD $10.69) for the rest of the country. The new rates would be effective as of January 1, 2023.

The MIR and the 10 percent increase—combined—would represent a 20 percent increase in the daily minimum wage rate which translates to more than MXN $30 per day.

Finally, Secretary of Labor Luisa Maria Alcalde stated that the above increases would directly benefit 6.4 million workers in Mexico.

© 2022, Ogletree, Deakins, Nash, Smoak & Stewart, P.C., All Rights Reserved.

NetEase Wins 50 Million RMB & Injunction on Appeal in Minecraft Infringement Litigation at the Guangdong Higher People’s Court

On November 30, 2022, the Guangdong Higher People’s Court announced that NetEase was awarded 50 million RMB (over $7 million USD) and an injunction in an unfair competition case against Shenzhen Mini Play Company (深圳迷你玩公司) involving Minecraft and Mini Play’s similar sandbox game Mini World (迷你世界).  NetEase has the exclusive right to operate Minecraft in China since 2016.  This is believed to be the highest damages award in China for game infringement.

 

 

 

 

Minecraft on left versus Mini World on right.

Minecraft (我的世界) is a sandbox game developed by the Swedish company Mojang Studios in 2009. In May 2016, NetEase announced that it had obtained the exclusive right to operate the game in China, and had the right to enforce any intellectual property infringement and unfair competition claims. In the same month, Shenzhen Mini Play Company launched “Mini World” on Android , and then launched the iOS version and the computer version successively. In 2019, NetEase filed a lawsuit with the Shenzhen Intermediate People’s Court, accusing multiple core elements of the game Mini World of plagiarizing Minecraft. Specifically, NetEase alleged that the overall screens of the two games are highly similar, which constitutes copyright infringement and unfair competition. The court ordered Mini Play to stop the unfair competition, eliminate the impact, and pay 50 million RMB in compensation. The Shenzhen Intermediate People’s Court also determined that “Mini World” was infringing the copyright in Minecraft, and ordered Mini Play to delete the infringing game elements and compensate NetEase more than 21.13 million RMB. Subsequently, both parties appealed to the Guangdong High Court.

The Guangdong Higher Court found that the two games involved in the case are sandbox games, which only set basic game goals and rules, and provided players with basic game resources or elements such as wood, food, creatures, etc. Players freely explore and interact in the virtual world. Players can use the basic game resources preset in the game to create virtual objects, buildings, landscapes, and even game worlds by destroying, synthesizing and building using the basic game resources. Minecraft mainly makes profits through user charges with the cumulative number of downloads from various channels exceeding 3.36 billion with more than 400 million registered users since its launch.

The Guangdong High Court held that the overall screens of the two games constitute electronic works, that is, “audio-visual works” under the newly amended copyright law, but the similarity between the two lies in the design of the game elements rather than the screens of the games. Therefore, it rejected NetEase’s claim of copyright infringement. At the same time, the court held that Mini World and Minecraft are highly similar in terms of gameplay rules, and there are many overlaps in the details of game elements that have exceeded the limit of reasonable reference. By plagiarizing the design of game elements, Mini Play directly seized the key and core personalized commercial value of other people’s intellectual achievements, and seized business opportunities by improperly obtaining other people’s business benefits, which constituted unfair competition.

In determining the amount of compensation, the court held that Mini Play, as the infringing party, should have on hand relevant data of its business income, but refused to provide it to the court without justified reasons, and should bear the legal consequences of adverse presumption.  According to evidence from a third-party platform, the profits of infringement by Mini Play far exceeded the amount of compensation requested by NetEase and therefore the upheld the award of 50 million RMB in compensation for unfair competition.  The Court further ordered Mini Play to delete 230 game elements from Mini World that infringed.

The original announcement from the Guangdong Higher People’s Court can be found here (Chinese only).

© 2022 Schwegman, Lundberg & Woessner, P.A. All Rights Reserved.

The Do’s and Don’ts of Data Cleaning – Don’t Drown in Bad Data

Bad CRM data can compound exponentially, impacting marketing and business development. It’s essential to understand the scope of  your data problems and follow a plan for regular data cleaning.  

Have you ever heard the saying, “No man ever steps into the same river twice”? Because a river’s water is constantly flowing and changing, the water you step in today will be different from yesterday. The same is true for the data in your CRM system: people are constantly changing roles, relocating, retiring; companies are opening, closing, moving and merging.

On top of that, new data isn’t always entered correctly. As a result, a database with clean, correct information today will not necessarily be accurate tomorrow. Over time, this bad data can compound exponentially, resulting in ineffective marketing, events and communication campaigns because as your data degrades, you reach fewer members of your target audience.

For professional services firms, poor data quality in your CRM system can also translate into a decline in system adoption. Once your professionals see bad data, they won’t trust the system as a whole and ultimately may outright refuse to use it. This is why we stress the importance of ongoing data cleaning.

Data Cleaning Do’s and Don’ts

Simply put, data cleaning involves identifying incorrect, incomplete and/or dated data in your systems and correcting and enhancing it. If you have a large database with thousands, or hundreds of thousands, of records, the data quality process can seem daunting and overwhelming.

While there’s no magic bullet or quick fix for poor data quality, ignoring data problems until there’s a crisis is not a strategy. Good data quality requires ongoing effort that never ends. The good news is that this means you have forever to get better at it. So, start now. Begin by assessing the scope of your data quality issues. Then, because it’s not always cost-effective or even possible to clean all your data, start by focusing on the highest priority projects.

Identify and Prioritize Your Most Important Data

All contact records are not created equal. For instance, client data is typically more important than non-client data. Additionally, individuals who have recently subscribed to your communications or attended an event are more important than those who last interacted with your firm years ago. Whatever segmenting scenario you select, it’s important to find ways to divide your contact data into manageable pieces because it makes the process more manageable and allows you to better measure progress.

Eliminate Stagnant Records

Related to prioritizing your data, don’t be hesitant about removing records that have been inactive for an extended period. Search your system for contacts that have not been updated for a few years, are not related to or known by any of your professionals, are not clients or alumni, and have not opened a communication or invitation in two to three years. Chances are good these records are not only outdated but also may not be worth the resources it would take to update them. Identify these records and consider removing them from the system. Less mess in your database makes cleanup a bit more manageable.

Your Plan Is Your Life Preserver

Once you’ve prioritized subsets or segments of contacts, identifying and prioritizing your most common data errors can help you decide on the best way to tackle ongoing data cleaning. For example, if you have an important email that needs to be sent to clients, you need to focus on email addresses. Identify records that don’t have an email address, have incorrectly formatted email addresses or have bounced recently.

In addition, if there are contacts you haven’t sent a communication or invitation to for an extended period of time, it’s entirely likely that their email may no longer be valid. It’s important to regularly test emails on your lists because not doing so can cause you to be blacklisted by anti-spam entities or have your account blocked by your eMarketing provider.

Initial Cleaning Cycle

The best place to start your data cleaning cycle is with a contact and list verification and cleansing service such as TrueDQ. This service will evaluate your list data, identify potentially harmful “honeypot” email addresses and even automatically update many of your contacts with current, complete contact information. The data can then also be enhanced with additional missing information, such as industries and locations, to help with targeting and segmenting.

Rinse and Repeat

When one segment or list has been cleaned, move on to the next one – bearing in mind that what’s important on the next list may be different from the last one. For example, maybe you need to send a hard copy postal mailing, so it will be important to ensure the accuracy of physical mailing addresses rather than email addresses.

Bounces and Returns

One of the most common data quality failures at law and other professional services firms is ignoring bounced emails and returned hard copy mailings. Bounces and returns are real-time indicators that can help you keep on top of your data quality. Researching and correcting them is important because sometimes they involve important former clients who could potentially hire the firm again at their new company.

Returned hard mail will often include the forwarding address of the recipient, which should be corrected in your CRM. For emails, use a central email address to collect automatic email replies, since these frequently tell you when a recipient no longer works at an organization.

Ideally, data stewards should regularly review all bounces to take the onus off the professionals. However, it can also be helpful to generate reports on bounced communications and circulate them to professionals or their assistants who may be able to provide updated information – or will at least appreciate knowing which of their contacts have moved on or changed roles.

Finally, if your eMarketing and/or CRM system has a process for automatically isolating bounced records, be sure you have a reciprocal process that automatically reinstates bounced records when the email field is updated.

Prevent Invalid Data

There are multiple ways to encourage good data habits, depending on your system and method of contact entry. If your firm relies on manual data entry, implement a firmwide Data Standards Guide to inform users how data should be entered (e.g., does your firm spell out or abbreviate job titles?). It can also be helpful to use system validation rules wherever possible to require certain information in new records such as last name, city and email address to ensure your contacts are relevant.

Finally, regularly review newly added records for consistency and completeness. This process can reveal issues such as users who may require additional training on contact input best practices. It can also help to catch spam or other potentially dangerous entries that can sometimes flow into your database from online forms that are filled out by bots.

Never, Ever Stop

Just as rivers keep flowing, so does the data in your CRM system – and the data will always need cleaning to ensure that it is fresh. While this may feel like a relentless and burdensome task, never stop – just go with the flow –  because when you’re not regularly cleaning the data, your CRM “river” can become stagnant, and the more polluted it becomes, the longer the eventual cleanup will take.

© Copyright 2022 CLIENTSFirst Consulting

Ankura Cyber Threat Intelligence Bulletin: August – September 2022

Over the past sixty days, Ankura’s Cyber Threat Investigations & Expert Services (CTIX) Team of analysts has compiled key learnings about the latest global threats and current cyber trends into an in-depth report: The Cyber Threat Intelligence Bulletin. This report provides high-level executives, technical analysts, and everyday readers with the latest intel and insights from our expert analysts.

Download the report for an in-depth look at the key cyber trends to watch and help safeguard your organization from constantly evolving cyber threats with the latest cyber intelligence, ransomware, and threat insights.

 Our latest report explains the following observations in detail:

Law Enforcement Works with Threat Intelligence to Prosecute Human Traffickers

In the age of high-speed internet and social media, criminals have evolved to use information technology to bolster their criminal enterprises and human traffickers are no different. Whether it be through the clearnet or dark web, human traffickers have leveraged the internet to scale their operations, forcing law enforcement to reevaluate how to best combat this problem. In response to the changes in trafficker tactics, techniques, and procedures (TTPs), governments across the world have responded with legislation and policies in an attempt to better thwart the efforts of these criminals. Researchers from Recorded Future’s Insikt Group have published compelling reports as a proof-of-concept (PoC) for a methodology on how law enforcement agencies and investigators can utilize real-time threat intelligence to leverage sources of data in order to aid in tracking, mitigating, and potentially prosecuting human sex traffickers. Download the full report for additional details on law enforcement efforts to prosecute human traffickers and more on the Insikt Group’s findings.

Emerging Threat Organization “MONTI”: Sister Organization or Imposter Threat Group?

Over the past several weeks a new, potentially imposter, threat organization has mimicked the tactics, techniques, procedures (TTPs), and infrastructure of the Conti Ransomware Group. Tracked as MONTI, this doppelganger organization emerged in the threat landscape in July 2022 after compromising a company and encrypting approximately twenty (20) hosting devices and a multi-host VMWare ESXi instance tied to over twenty (20) additional servers. While the July attack pushed the group into the limelight, analysts believe that attacks from the doppelganger organization go back even further into the early summer of 2022. Similarities discovered between Conti Ransomware and the alleged spinoff Monti Ransomware include attack TTPs alongside the reuse of Conti-attributed malicious payloads, deployed tools, and ransom notes. Additionally, the encrypted files exfiltrated by Monti contain nearly identical encryption, which could indicate code re-usage. Read the full report to find out what CTIX analysts expect to see from this group in the future.

Figure 1: Conti Ransom Note

Figure 2: Monti Ransom Note

Iranian State-Sponsored Threat Organization’s Attack Timeline Targeting the Albanian Government

In July 2022, nation-state Iranian threat actors, identified by the FBI as “Homeland Justice”, launched a “destructive cyber-attack” against the Government of NATO-member Albania in which the group acquired initial access to the victim network approximately fourteen (14) months before (May of 2021). During this period, the threat actors continuously accessed and exfiltrated email content. The peak activity was observed between May and June of 2022, where actors conducted lateral movements, network reconnaissance, and credential harvesting.

This attack and eventual data dumps were targeted against the Albania-based Iranian dissident group Mujahideen E-Khalq (MEK), otherwise known as the People’s Mojahedin Organization of Iran. MEK is a “controversial Iranian resistance group” that was exiled to Albania and once listed by the United States as a Foreign Terrorist Organization for activity in the 1970s but was later removed in late 2012. Albania eventually severed diplomatic ties with Iran on September 7, 2022, and is suspected to be the first country to ever have done so due to cyber-related attacks. For a more detailed analysis of this attack and its ramifications, download our full report.

 Figure: Homeland Justice Ransom Note Image

Banning Ransomware Payments Becomes Hot-Button Issue in State Legislature

There is a debate occurring in courtrooms across the United States regarding the ethics and impacts of allowing businesses to make ransomware payments. North Carolina and Florida have broken new ground earlier this year passing laws that prohibit state agencies from paying cyber extortion ransom demands. While these two (2) states have been leading the way in ransomware laws, at least twelve (12) other states have addressed ransomware in some way, adding criminal penalties for those involved and requiring public entities to report ransomware incidents. Download the full report to discover what experts think of government ransomware payment bans and the potential effects they could have on ransomware incidents.

Threat Actor of the Month: Worok

ESET researchers discovered a new cluster of the long-active TA428 identified as “Worok.” TA428 is a Chinese advanced persistence threat (APT) group first identified by Proofpoint researchers in July 2019 during “Operation LagTime IT”, a malicious attack campaign targeted against government IT agencies in East Asia. Download the full report for an in-depth look at Worok’s tactics and objectives, and insights from our analysts about the anticipated future impact of this group.

New List of Trending Indicators of Compromise (IOCs)

IOCs can be utilized by organizations to detect security incidents more quickly as indicators may not have otherwise been flagged as suspicious or malicious. Explore our latest list of technical indicators of compromise within the past sixty (60) days that are associated with monitored threat groups and/or campaigns of interest.

Copyright © 2022 Ankura Consulting Group, LLC. All rights reserved.

USTR Seeks Comments on Section 301 Tariffs on Chinese Goods; Portal Opens Nov. 15

The Office of the U.S. Trade Representative (USTR) announced Oct. 17 that starting Nov. 15, it will begin soliciting comments on the effectiveness of Section 301 tariffs the Trump administration placed on Chinese goods. The notice and request for comments relate to USTR’s ongoing four-year statutory review of the Section 301 investigation of China’s Acts, Policies, and Practices Related to Technology Transfer, Intellectual Property, and Innovation.

In the Federal Registrar Notice, USTR said it is seeking “public comments on the effectiveness of the actions in achieving the objectives of the investigation, other actions that could be taken, and the effects of such actions on the United States economy, including consumers.”

The USTR is specifically interested in comments on the following:

  • The effectiveness of the actions in obtaining the elimination of China’s acts, policies, and practices related to technology transfer, intellectual property, and innovation.
  • The effectiveness of the actions in counteracting China’s acts, policies, and practices related to technology transfer, intellectual property, and innovation.
  • Other actions or modifications that would be more effective in obtaining the elimination of or in counteracting China’s acts, policies, and practices related to technology transfer, intellectual property, and innovation.
  • The effects of the actions on the U.S. economy, including on U.S. consumers.
  • The effects of the actions on domestic manufacturing, including in terms of capital investments, domestic capacity and production levels, industry concentrations, and profits.
  • The effects of the actions on U.S. technology, including in terms of U.S. technological leadership and U.S. technological development.
  • The effects of the actions on U.S. workers, including with respect to employment and wages.
  • The effects of the actions on U.S. small businesses.
  • The effects of the actions on U.S. supply chain resilience.
  • The effects of the actions on the goals of U.S. critical supply chains.
  • Whether the actions have resulted in higher additional duties on inputs used for additional manufacturing in the United States than the additional duties on particular downstream product(s) or finished good(s) incorporating those inputs.

The continuing assessment of these additional duties has been criticized by some business groups and lawmakers who believe they have hurt both U.S. businesses and U.S. consumers but have not checked China’s behavior. They also have called for the reinstatement of previously issued exclusions and for a new, robust tariff exclusion process. Some labor and civil society groups, however, want the tariffs to remain in place. The fate of these tariffs is closely tied to the Biden administration’s ongoing review and the overall U.S.–China trade relationship. The controversial tariff program that covers upwards of $300 billion worth of imports from China has sparked lawsuits from more than 3,500 importers.

The comment period begins on Nov. 15 and extends until Jan. 17. USTR said it will post specific questions on its website Nov. 1 before the portal opens.

©2022 Greenberg Traurig, LLP. All rights reserved.

Legal Standing in Trademark Non-Use Cancellation Actions

In recent years the Mexican Patent and Trademark Office (IMPI) allowed the possibility that complainants credit their legal standing on trademark non-use cancellation proceedings through the existence of a trademark application without the need of initially demonstrating that such application was blocked to registration in view of the prior existence of third parties’ confusingly similar registered marks, as long as the official action citing the conflicting registration as pertinent barrier was submitted as subsequent evidence in the proceeding.

Accordingly, it started to be a common practice to file non-use cancellation actions submitting as evidence a certified copy of the trademark application serving as a basis to attack the registration not being used accompanied with the results of an availability search showing the existence of the registration subject to the proceeding.

Nonetheless, such criteria adopted by IMPI was revoked by the Federal Court of Administrative Affairs and by Federal Circuit Courts sustaining that legal standing must be credited initially along with the complaint without being possible to do it at a later stage by submitting the evidence attesting that IMPI objected the registration of complainant’s trademark application on grounds of likelihood of confusion because of the existence of defendant’s registration.

The Court’s reasonings behind the revocation of such criteria were mainly based on legal certainty arguments stating that legal standing can only born when a formal objection is raised by IMPI communicating to the applicant the existence of a citation based on likelihood of confusion.

Therefore, IMPI is now starting to analyze and solve non-use cancellation actions following the Court’s legal reasonings stating that legal standing must be credited initially along with the complaint, without enabling complainants to credit such standing subsequently.

Consequently, it is advisable that titleholders file non-use cancellation actions only after being served with the official actions communicating the existence of pertinent barriers blocking the registration.

© 2005-2022 OLIVARES Y COMPAÑIA S.C.

Hackers Caused a Traffic Jam in Moscow

Hackers caused a massive traffic jam in Moscow by exploiting the ride-sharing app Yandex Taxi and using it to summon dozens of taxis to a single location. While Yandex has not confirmed the attacker’s identity, the hacktivist group Anonymous claimed responsibility on Twitter. The group has been actively taking aim at Russian targets in response to the Russian Federation’s ongoing invasion of Ukraine.

Yandex claims that it has implemented new algorithms to detect this type of attack in the future and will compensate the affected drivers.

This traffic jam is a new application of an old hacktivist tactic: flood the system to make it unusable. Other techniques in this vein include blackouts (which target fax machines) and distributed denial of service (which targets websites and networks). No word yet on whether this new rideshare jam exploit will merit a snappy title.

Blair Robinson contributed to this article. 

For more Global Law news, click here to visit the National Law Review.

Copyright © 2022 Robinson & Cole LLP. All rights reserved.

OFAC Offers Guidance in the Wake of Tornado Cash Sanctions

The U.S. Treasury Department’s Office of Foreign Asset Control (OFAC) updated its “frequently asked questions” (FAQs) Tuesday, providing guidance relating to the sanctions against Tornado Cash, the Ethereum “mixer” it blacklisted in August, following allegations that North Korea used Tornado Cash to launder stolen digital assets. The updated information from OFAC comes as a welcome snippet of communication, allowing for clarity on the scope of the action taken against Tornado Cash, as well as providing guidance for U.S. persons affected by the blacklisting who, through no fault of their own, were caught up in federal action.

The updated FAQs provide guidance on four points: (1) the ability to withdraw funds from wallets associated with the Tornado Cash blacklist; (2) whether the OFAC reporting obligations apply to “dusting” transactions; (3) whether U.S. persons can engage in transactions involving addresses implicated in the blacklist without a license; and (4) what, more generally, is prohibited in the wake of the OFAC blacklisting of Tornado Cash.

(1)        Withdrawing Funds

If a U.S. person sent virtual currency to Tornado Cash, but did not complete the mixing transaction or otherwise withdraw such virtual currency prior to August 8, 2022 (the effective date of the OFAC blacklist), such person can request a specific license from OFAC to engage in transactions involving that virtual currency (assuming such person conducts the contemplated transactions within U.S. jurisdiction).

In order to obtain this license, such persons will need to provide, “at a minimum, all relevant information regarding these transactions with Tornado Cash, including the wallet addresses for the remitter and beneficiary, transaction hashes, the date and time of the transaction(s), as well as the amount(s) of virtual currency.”

OFAC indicates that they will embrace a favorable licensing policy towards such applications, so long as the contemplated transactions did not involve conduct that it deems to be otherwise sanctionable, and that licensing requests can be submitted by visiting the following link: https://home.treasury.gov/policy-issues/financial-sanctions/ofac-license-application-page.

(2)        “Dusting” Transactions

Dusting is the act of sending unsolicited and nominal amounts of virtual currency or other digital assets to third parties. This can be done in order to cause consternation on the part of the recipient, particularly in a situation where there is confusion as to the legality of receiving such funds or actions.

OFAC indicates that it has been made aware of Dusting involving virtual currency or other virtual assets from Tornado Cash, and indicates that while, technically, OFAC’s regulations would apply to these transactions, to the extent that these Dusting transactions have no other sanctions associated with them other than Tornado Cash, “OFAC will not prioritize enforcement against the delayed receipt of initial blocking reports and subsequent annual reports of blocked property from such U.S. persons.”

In short, while not a desirable transaction to take place, OFAC does not intend to pursue action against persons simply because they are the target of Dusting.

(3)        Engaging in Transactions With Tornado Cash

OFAC clarified that, without explicit license from OFAC, U.S. persons are prohibited from engaging in any transaction involving Tornado Cash, including any transaction done via currency wallet addresses OFAC has identified as part of the blacklist.

Specifically, “[i]f U.S. persons were to initiate or otherwise engage in a transaction with Tornado Cash, including or through one of its wallet addresses, such a transaction would violate U.S. sanctions prohibitions, unless exempt or authorized by OFAC.”

(4)        Further Tornado Cash Guidance

Referencing FAQs 561 and 562, OFAC reemphasized their authority to include as identifiers on the Specially Designated Nationals and Blocked Persons List (SDN List) specific virtual currency wallet addresses associated with blocked persons, and that such SDN List entry for Tornado Cash included as identifiers certain virtual currency wallet addresses associated with Tornado Cash, as well as the URL address for Tornado Cash’s website.

While the Tornado Cash website has been deleted, it remains available through certain Internet archives, and accordingly OFAC emphasized that engaging in any transaction with Tornado Cash or its blocked property or interests in property is prohibited for U.S. persons.

Interacting with open-source code itself, in a way that does not involve a prohibited transaction with Tornado Cash, is not prohibited. By way of example, “U.S. persons would not be prohibited by U.S. sanctions regulations from copying the open-source code and making it available online for others to view, as well as discussing, teaching about, or including open-source code in written publications, such as textbooks, absent additional facts.  Similarly, U.S. persons would not be prohibited by U.S. sanctions regulations from visiting the Internet archives for the Tornado Cash historical website, nor would they be prohibited from visiting the Tornado Cash website if it again becomes active on the Internet.”

While this update to FAQs come as a welcome bit of clarity, Web3 investors, entrepreneurs, and users should continue to tread carefully when engaging with opportunities and technologies on the periphery of Tornado Cash and the accompanying OFAC action. When questions arise, it is important to seek out informed counsel, to discuss the risks of proposed actions and how best to mitigate that risk while working to pioneer new and emerging technologies.

© 2022 Dinsmore & Shohl LLP. All rights reserved.

Supreme People’s Court Upholds China’s First Patent Linkage Ruling – Decision Released

On August 28, 2022, 知识产权那点事 published the first patent linkage decision from the Supreme People’s Court (SPC). The SPC upheld the Beijing IP Court ruling that Wenzhou Haihe Pharmaceutical Co., Ltd.’s application for marketing authorization for a generic form of “Aidecalcidol Soft Capsule” did not fall within scope of protection of the relevant patent. China’s patent linkage system prevents marketing authorization for a generic prior to the expiration of the patent term on the branded equivalent unless the Beijing IP Court or the China National Intellectual Property Administration (CNIPA) rules that the generic does not fall within the scope of the relevant patent rights or is invalid.

On November 10, 2021, the Beijing IP Court announced that the plaintiff of the case, Chugai Pharmaceutical Co., Ltd., a subsidiary of Roche, claimed that it was the patentee as well as the holder of the marketing license for the patented drug “Aidecalcidol Soft Capsule”, and the patent involved in the drug was CN 2005800098777.6 entitled “ED-71 preparation.” The plaintiff discovered that the defendant Wenzhou Haihe Pharmaceutical Co., Ltd. had applied to the National Medical Products Administration (NMPA) for a generic drug marketing license application named “Aidecalcidol Soft Capsule”. The public information on the Chinese listed drug patent information registration platform showed that the defendant had made a 4.2 category statement regarding the generic drug (the generic drugs do not fall into the scope of protection of the related patents). Therefore, the plaintiff filed a drug patent linkage lawsuit with the Beijing Intellectual Property Court in accordance with the provisions of Article 76 of the Amended Patent Law, requesting the court to confirm that the generic drug “Aidecalcidol Soft Capsule” that the defendant applied for registration fell into the scope the rights of Patent No. 2005800098777.6 enjoyed by the plaintiff.

 

The Beijing IP Court held:

The technical solution used by the generic drug involved is neither the same nor equivalent to the technical solution of claim 1 of the involved patent, so the technical solution does not fall within the protection scope of claim 1 of the involved patent. Since claims 2-6 are dependent claims of claim 1, if the technical solution of the generic drug involved does not fall within the protection scope of claim 1, it also does not fall within the protection scope of claims 2-6. Accordingly, the plaintiff’s claim that the involved generic drug falls within the protection scope of claims 1-6 of the involved patent cannot be established, and the court will not support it.

In the decision, the Supreme People’s Court stated there were two key points:

1. In the process of drug marketing review and approval, disputes arising from the patent rights related to the drug to be registered between the drug marketing license applicant and the relevant patentee or interested parties are only one type of the related patent rights between the two parties – often referred to as drug patent link disputes. For chemical generic drugs, the drug regulatory department of the State Council conducts drug marketing review and approval based on the application materials of the generic drug applicant, and decides whether to suspend the approval of the relevant drugs according to the effective judgment made by the people’s court [or the China National Intellectual Property Administration] on such disputes within the prescribed time limit. Therefore, when judging whether the technical solution of a generic drug falls within the scope of patent protection, in principle, it should be compared and judged on the basis of the application materials of the generic drug applicant. If the technical solution actually implemented by the generic drug applicant is inconsistent with the declared technical solution, it shall bear legal responsibility in accordance with the relevant laws and regulations on drug supervision and administration; if the patentee or interested party believes that the technical solution actually implemented by the generic drug applicant constitutes infringement, a separate lawsuit for patent infringement may also be filed. Therefore, whether the technical solution actually implemented by a generic drug applicant is the same as the application materials is generally not within the scope of examination to confirm that the dispute falls within the scope of patent protection.

2. The court of second instance held that both the donation [to the public] rule and the estoppel rule can constitute a restriction on the application of the principle of equivalence, both of which aim to achieve a reasonable balance between equitably protecting the interests of the patentee and safeguarding the interests of the public. If the conditions for limiting the application of the principle of equivalence are met, there is usually no need to judge whether the two features constitute similar means, functions, and effects, and whether those skilled in the art can conceptualize them without creative work. In this case, since Haihe Company claimed the application of the estoppel rule by virtue of the amendment of the claims by Chugai Pharmaceutical Co., Ltd., and claimed the application of the donation rule by the patent text as the result of the amendment, the court of second instance first rendered a judgment on whether the rules on estoppel should be applied on the basis of the amendment of the claims by the patentee.

The case numbers are:

北京知识产权法院(2021)京73民初1438号民事判决书

最高人民法院(2022)最高法知民终905号民事判决书

The full text of the decision courtesy of 知识产权那点事 is available here (Chinese only).

© 2022 Schwegman, Lundberg & Woessner, P.A. All Rights Reserved.