Sublinierile cu roşu îmi aparţin.

CHAPTER II
LEGAL FRAMEWORK FOR ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS

Section 5: Enforcement of Intellectual Property Rights in the Digital Environment

ARTICLE 27: ENFORCEMENT IN THE DIGITAL ENVIRONMENT
1. Each Party shall ensure that enforcement procedures, to the extent set forth in Sections 2 (Civil Enforcement) and 4 (Criminal Enforcement), are available under its law so as to permit effective action against an act of infringement of intellectual property rights which takes place in the digital environment, including expeditious remedies to prevent infringement and remedies which constitute a deterrent to further infringements.

2. Further to paragraph 1, each Party’s enforcement procedures shall apply to infringement of copyright or related rights over digital networks, which may include the unlawful use of means of widespread distribution for infringing purposes. These procedures shall be implemented in a manner that avoids the creation of barriers to legitimate activity, including electronic commerce, and, consistent with that Party’s law, preserves fundamental principles such as freedom of expression, fair process, and privacy.13

13 For instance, without prejudice to a Party’s law, adopting or maintaining a regime providing for limitations on the liability of, or on the remedies available against, online service providers while preserving the legitimate interests of right holder.

4. A Party may provide, in accordance with its laws and regulations, its competent authorities with the authority to order an online service provider to disclose expeditiously to a right holder information sufficient to identify a subscriber whose account was allegedly used for infringement, where that right holder has filed a legally sufficient claim of trademark or copyright or related rights infringement, and where such information is being sought for the purpose of protecting or enforcing those rights. These procedures shall be implemented in a manner that avoids the creation of barriers to legitimate activity, including electronic commerce, and, consistent with that Party’s law, preserves fundamental principles such as freedom of expression, fair process, and privacy.

5. Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures14 that are used by authors, performers or producers of phonograms in connection with the exercise of their rights in,  and that restrict acts in respect of, their works, performances, and phonograms, which are not authorized by the authors, the performers or the producers of phonograms concerned or permitted by law.

14 For the purposes of this Article, technological measures means any technology, device, or component that, in the normal course of its operation, is designed to prevent or restrict acts, in respect of works, performances, or phonograms, which are not authorized by authors, performers or producers of phonograms, as provided for by a Party’s law. Without prejudice to the scope of copyright or related rights contained in a Party’s law, technological measures shall be deemed effective where the use of protected works, performances, or phonograms is controlled by authors, performers or producers of phonograms through the application of a relevant access control or protection process, such as encryption or scrambling, or a copy control mechanism, which achieves the objective of protection.

6. In order to provide the adequate legal protection and effective legal remedies referred to in paragraph 5, each Party shall provide protection at least against:

(a) to the extent provided by its law:
(i) the unauthorized circumvention of an effective technological measure carried out knowingly or with reasonable grounds to know; and
(ii) the offering to the public by marketing of a device or product, including computer programs, or a service, as a means of circumventing an effective technological measure; and

(b) the manufacture, importation, or distribution of a device or product, including computer programs, or provision of a service that:
(i) is primarily designed or produced for the purpose of circumventing an effective technological measure; or
(ii) has only a limited commercially significant purpose other than circumventing an effective technological measure.

7. To protect electronic rights management information16, each Party shall provide adequate legal protection and effective legal remedies against any person knowingly performing without authority any of the following acts knowing, or with respect to civil remedies, having reasonable grounds to know, that it will induce, enable, facilitate, or conceal an infringement of any copyright or related rights:

(a) to remove or alter any electronic rights management information;
(b) to distribute, import for distribution, broadcast, communicate, or make available to the public copies of works, performances, or phonograms, knowing that electronic rights management information has been removed or altered without authority.

16 For the purposes of this Article, rights management information means:

(a) information that identifies the work, the performance, or the phonogram; the author of the work,
the performer of the performance, or the producer of the phonogram; or the owner of any right in
the work, performance, or phonogram;
(b) information about the terms and conditions of use of the work, performance, or phonogram; or
(c) any numbers or codes that represent the information described in (a) and (b) above;
when any of these items of information is attached to a copy of a work, performance, or phonogram, or appears in connection with the communication or making available of a work, performance, or phonogram to the public.

TEXTUL INTEGRAL

Ha ha, am copiat textul ACTA fără acordul părţilor!

Reclame