Current location - Trademark Inquiry Complete Network - Trademark inquiry - What are the ways of network infringement?
What are the ways of network infringement?
copyright infringement is the main form of internet infringement

According to Articles 46 and 47 of the Copyright Law of the People's Republic of China, any unauthorized use of a work protected by the copyright law without the permission of the copyright owner is an act of copyright infringement. There are three common forms of copyright infringement in the network:

First, copying the contents of other unauthorized webpages in part or in full into one's own name, which is extremely common in the network, but unconsciously constitutes infringement, but most of the copied websites belong to small stations, and the infringed people have not found or have no strong awareness and necessity of rights protection, and let them exist wantonly.

Secondly, after copying other people's webpage content and modifying it, its behavior still forms plagiarism, which may damage the good image of the infringed party. Of course, the premise is that the other party has a certain popularity and positive image. Usually, copying, plagiarism and modification have not reached such a level, so the phenomenon of copying and plagiarism will be so rampant. Organizations with awareness of intellectual property protection and a certain reputation will pursue the legal responsibility of the infringer and ask him to stop the infringement and compensate for the losses.

thirdly, the infringer steals other people's website data through network technology, takes it for himself, and then makes the same website for profit without permission, which seriously infringes the rights and interests of the stolen person. This kind of behavior may involve hacking into other people's servers, and in serious cases, criminal responsibility may be investigated according to law. Trademark infringement is the main way of network infringement

In recent 3 years, with the rapid development of network information technology, internet trade has become increasingly prosperous, occupying a higher and higher proportion of the national economy. Due to the characteristics of the network, information can only be obtained by browsing the web, clicking on pictures, watching videos and listening to audio before the transaction. Commercial propaganda information is presented to consumers in these media. Consumers have limited channels to understand the goods, so they can only passively accept the information presented by the merchants, sell the trademarks under the condition that the known trademarks are counterfeit for the benefit, or directly and intentionally use the well-known trademarks to package and advertise their own goods. This behavior aims to expand their sales by borrowing other people's trademarks and brand awareness. This kind of infringement of trademark rights is very typical. Due to the high penetration rate of online shopping at present, the number and amount of such transactions are rising, and at the same time, infringements are also emerging one after another. Some acts are even outrageous, not only illegal, but even suspected of committing crimes.

Another main way is patent infringement

In detail, there are several kinds of patent infringement behaviors that exist on the Internet:

1. Without the permission of the right holder, use the patent numbers of other right holders in the goods manufactured or sold by oneself, the packaging of goods and other UI interfaces, and use them as publicity for profit.

2. Without the permission of the obligee, the patent number of others is used in his online advertisements, including text advertisements, picture advertisements, animation advertisements, patch advertisements, video advertisements and audio advertisements, which leads consumers to mistakenly think that the infringer owns the patent right when purchasing, resulting in consumption and damage to the rights and interests of the obligee.

3. when signing a contract, agreement or other legally binding contract document with a business partner without the permission of the obligee, the business partner uses an unauthorized patent number, which makes the business partner mistakenly think that the infringer owns a patent. 4. Forging or altering other people's patent certificates, patent documents or patent application documents for their own use, making others mistakenly think that the infringer owns the patent or is applying for the patent.

There is another kind of infringement that is different from the above-cybersquatting infringement

The so-called cybersquatting infringement refers to that the non-right holder deliberately takes advantage of the loopholes of well-known trademarks and unregistered domain names of well-known trademarks to cybersquat their trademark names, company names and homophones, synonyms and digital homophones for sale. Or build a website competitive sales or non-competitive goods after preempting, so that consumers can think of a brand, which constitutes infringement on the brand. Or it is not used for profit after cybersquatting, but only to maliciously prevent the infringed from registering, which also constitutes a violation of the anti-unfair competition law. Infringement of registered domain names generally occurs in well-known and well-known trademarks, and there is a deliberate intention to make profits from it, or to attack and hurt the infringed. According to the principle of trademark anti-dilution, its behavior constitutes dilution of well-known trademarks and trade names, which is also illegal and should be investigated for legal responsibility. Internet domain names (Internet address resources) include English domain names, Chinese domain names, universal web addresses, wireless web addresses, etc.