7. (a) In order to provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that authors, performers, and producers of phonograms use in connection with the exercise of their rights and that restrict unauthorized acts in respect of their works, performances, and phonograms, each Party shall provide that any person who:
(i) circumvents without authority any effective technological measure that controls access to a protected work, performance, phonogram, or other subject matter; or
(ii) manufactures, imports, distributes, offers to the public, provides, or otherwise traffics in devices, products, or components, or offers to the public or provides services, that:
(A) are promoted, advertised, or marketed for the purpose of circumvention of any effective technological measure; or
(B) have only a limited commercially significant purpose or use other than to circumvent any effective technological measure; or
(C) are primarily designed, produced, or performed for the purpose of enabling or facilitating the circumvention of any effective technological measure,
shall be liable and subject to the remedies provided for in Article 15.11.14. Each Party shall provide for criminal procedures and penalties to be applied when any person, other than a nonprofit library, archive, educational institution, or public non-commercial broadcasting entity, is found to have engaged willfully and for purposes of commercial advantage or private financial gain in any of the foregoing activities.
(b) In implementing subparagraph (a), no Party shall be obligated to require that the design of, or the design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as the product does not otherwise violate any measures implementing subparagraph (a).
(c) Each Party shall provide that a violation of a measure implementing this paragraph is a separate civil cause of action or criminal offense, independent of any infringement that might occur under the Party's law on copyright and related rights.
(d) Each Party shall confine exceptions to any measures implementing the prohibition in subparagraph (a)(ii) on technology, products, services, or devices that circumvent effective technological measures that control access to, and, in the case of clause (i), that protect any of the exclusive rights of copyright or related rights in, a protected work, performance, or phonogram referred to in subparagraph (a)(ii), to the following activities, provided that they do not impair the adequacy of legal protection or the effectiveness of legal remedies against the circumvention of effective technological measures:
(i) noninfringing reverse engineering activities with regard to a lawfully obtained copy of a computer program, carried out in good faith with respect to particular elements of that computer program that have not been readily available to the person engaged in those activities, for the sole purpose of achieving interoperability of an independently created computer program with other programs;
(ii) noninfringing good faith activities, carried out by an appropriately qualified researcher who has lawfully obtained a copy, unfixed performance or display of a work, performance, or phonogram, and who has made a good faith effort to obtain authorization for such activities, to the extent necessary for the sole purpose of identifying and analyzing flaws and vulnerabilities of technologies for scrambling and descrambling of information;
(iii) the inclusion of a component or part for the sole purpose of preventing the access of minors to inappropriate on-line content in a technology, product, service, or device that itself is not prohibited under the measures implementing subparagraph (a)(ii); and
(iv) noninfringing good faith activities that are authorized by the owner of a computer, computer system, or computer network for the sole purpose of testing, investigating, or correcting the security of that computer, computer system, or computer network.
(c) Each Party shall confine exceptions to any measures implementing the prohibition referred to in subparagraph (a)(i) to the activities listed in subparagraph (d) and the following activities, provided that they do not impair the adequacy of legal protection or the effectiveness of legal remedies against the circumvention of effective technological measures:
(i) access by a nonprofit library, archive, or educational institution to a work, performance, or phonogram, not otherwise available to it, for the sole purpose of making acquisition decisions;
(ii) noninfringing activities for the sole purpose of identifying and disabling a capability to carry out undisclosed collection or dissemination of personally identifying information reflecting the on-line activities of a natural person in a way that has no other effect on the ability of any person to gain access to any work; and
(iii) noninfringing uses of a work, performance, or phonogram, in a particular class of works, performances, or phonograms, when an actual or likely adverse impact on those noninfringing uses is demonstrated in a legislative or administrative proceeding by substantial evidence; provided that in order for any such exception to remain in effect for more than four years, a Party must conduct a review before the expiration of the four-year period and at intervals of at least every four years thereafter, pursuant to which it is demonstrated in such a proceeding by substantial evidence that there is a continuing actual or likely adverse impact on the particular noninfringing use.
(f) Each Party may provide exceptions to any measures implementing the prohibitions referred to in subparagraph (a) for lawfully authorized activities carried out by government employees, agents, or contractors for law enforcement, intelligence, essential security, or similar governmental purposes.
(g) Effective technological measure means any technology, device, or component that, in the normal course of its operation, controls access to a protected work, performance, phonogram, or other protected subject matter, or protects any copyright or any rights related to copyright.
8. In order to provide adequate legal protection and effective legal remedies to protect rights management information:
(a) Each Party shall provide that any person who, without authority, and knowing, or, with respect to civil remedies, having reasonable grounds to know, that it would induce, enable, facilitate, or conceal an infringement of any copyright or related right,
(i) knowingly removes or alters any rights management information;
(ii) distributes or imports for distribution rights management information knowing that the rights management information has been removed or altered without authority; or
(iii) distributes, imports for distribution, broadcasts, communicates or makes available to the public copies of works, performances, or phonograms, knowing that rights management information has been removed or altered without authority,
shall be liable and subject to the remedies provided for in Article 15.11.14. Each Party shall provide for criminal procedures and penalties to be applied when any person, other than a nonprofit library, archive, educational institution, or public non-commercial broadcasting entity, is found to have engaged willfully and for purposes of commercial advantage or private financial gain in any of the foregoing activities.
(b) Each Party shall confine exceptions to measures implementing subparagraph (a) to lawfully authorized activities carried out by government employees, agents, or contractors for law enforcement, intelligence, national defense, essential security, or similar governmental purposes.
(c) Rights management information means:
(i) information that identifies a work, performance, or phonogram, the author of the work, the performer of the performance, or the producer of the phonogram, or the owner of any right in the work, performance, or phonogram; or
(ii) information about the terms and conditions of the use of the work, performance, or phonogram; or
(iii) any numbers or codes that represent such information,
when any of these items is attached to a copy of the work, performance, or phonogram or appears in connection with the communication or making available of a work, performance, or phonogram to the public. Nothing in this paragraph shall obligate a Party to require the owner of any right in the work, performance, or phonogram to attach rights management information to copies of the work, performance, or phonogram, or to cause rights management information to appear in connection with a communication of the work, performance, or phonogram to the public.
9. In order to confirm that all agencies at the central level of government use computer software only as authorized, each Party shall issue appropriate laws, orders, regulations, or decrees to actively regulate the acquisition and management of software for such use. These measures may take the form of procedures such as preparing and maintaining inventories of software on agency computers and inventories of software licenses.
10. (a) With respect to Articles 15.5, 15.6, and 15.7, each Party shall confine limitations or exceptions to exclusive rights to certain special cases that do not conflict with a normal exploitation of the work, performance, or phonogram, and do not unreasonably prejudice the legitimate interests of the right holder.
(b) Notwithstanding subparagraph (a) and Article 15.7.3(b), no Party may permit the retransmission of television signals (whether terrestrial, cable, or satellite) on the Internet without the authorization of the right holder or right holders of the content of the signal and, if any, of the signal.
Article 15.6. Obligations Pertaining Specifically to Copyright
Without prejudice to Articles 11(1)(ii), 11bis(1)G) and Gi), 11ter(1)Gi), 14(1) (ii), and 14bis(1) of the Berne Convention, each Party shall provide to authors the exclusive right to authorize or prohibit the communication to the public of their works, directly or indirectly, by wire or wireless means, including the making available to the public of their works in such a way that members of the public may access these works from a place and at a time individually chosen by them.
Article 15.7. Obligations Pertaining Specifically to Related Rights
1. Each Party shall accord the rights provided for in this Chapter with respect to performers and producers of phonograms to the performers and producers of phonograms who are nationals of another Party and to performances or phonograms first published or fixed in the territory of a Party. A performance or phonogram shall be considered first published in the territory of a Party in which it is published within 30 days of its original publication. (14)
2. Each Party shall provide to performers the right to authorize or prohibit:
(a) the broadcasting and communication to the public of their unfixed performances except where the performance is already a broadcast performance; and
(b) the fixation of their unfixed performances.
3. (a) Each Party shall provide to performers and producers of phonograms the right to authorize or prohibit the broadcasting or any communication to the public of their performances or phonograms, by wire or wireless means, including the making available to the public of those performances and phonograms in such a way that members of the public may access them from a place and at a time individually chosen by them.
(b) Notwithstanding subparagraph (a) and Article 15.5.10, the application of this right to traditional free over-the-air noninteractive broadcasting, and exceptions or limitations to this right for such broadcasting, shall be a matter of domestic law.
(c) Each Party may adopt limitations to this right in respect of other noninteractive transmissions in accordance with Article 15.5.10, provided that the limitations do not prejudice the right of the performer or producer of phonograms to obtain equitable remuneration.
4. No Party may subject the enjoyment and exercise of the rights of performers and producers of phonograms provided for in this Chapter to any formality.
5. For purposes of this Article and Article 15.5, the following definitions apply with respect to performers and producers of phonograms:
(a) performers means actors, singers, musicians, dancers, and other persons who act, sing, deliver, declaim, play in, interpret, or otherwise perform literary or artistic works or expressions of folklore;
(b) phonogram means the fixation of the sounds of a performance or of other sounds, or of a representation of sounds, other than in the form of a fixation incorporated in a cinematographic or other audiovisual work;
(c) fixation means the embodiment of sounds, or of the representations thereof, from which they can be perceived, reproduced, or communicated through a device;
(d) producer of a phonogram means the person, or the legal entity, who or which takes the initiative and has the responsibility for the first fixation of the sounds of a performance or other sounds, or the representations of sounds;
(e) publication of a performance or a phonogram means the offering of copies of the fixed performance or the phonogram to the public, with the consent of the right holder, and provided that copies are offered to the public in reasonable quantity;
(f) broadcasting means the transmission by wireless means or satellite to the public of sounds or sounds and images, or of the representations thereof, including wireless transmission of encrypted signals where the means for decrypting are provided to the public by the broadcasting organization or with its consent; and
(g) communication to the public of a performance or a phonogram means the transmission to the public by any medium, otherwise than by broadcasting, of sounds of a performance or the sounds or the representations of sounds fixed in a phonogram. For purposes of paragraph 3, "communication to the public" includes making the sounds or representations of sounds fixed in a phonogram audible to the public.
Article 15.8. Protection of Encrypted Program-Carrying Satellite Signals
1. Each Party shall make it a criminal offense:
(a) to manufacture, assemble, modify, import, export, sell, lease, or otherwise distribute a tangible or intangible device or system, knowing or having reason to know that the device or system is primarily of assistance in decoding an encrypted program-carrying satellite signal without the authorization of the lawful distributor of such signal; and
(b) willfully to receive and further distribute a program-carrying signal that originated as an encrypted satellite signal knowing that it has been decoded without the authorization of the lawful distributor of the signal.
2. Each Party shall provide for civil remedies, including compensatory damages, for any person injured by any activity described in paragraph 1, including any person that holds an interest in the encrypted programming signal or its content.
Article 15.9. Patents
1. Each Party shall make patents available for any invention, whether a product or a process, in all fields of technology, provided that the invention is new, involves an inventive step, and is capable of industrial application. For purposes of this Article, a Party may treat the terms "inventive step" and "capable of industrial application" as being synonymous with the terms "non-obvious" and "useful", respectively.
2. Nothing in this Chapter shall be construed to prevent a Party from excluding inventions from patentability as set out in Articles 27.2 and 27.3 of the TRIPS Agreement. Notwithstanding the foregoing, any Party that does not provide patent protection for plants by the date of entry into force of this Agreement shall undertake all reasonable efforts to make such patent protection available. Any Party that provides patent protection for plants or animals on or after the date of entry into force of this Agreement shall maintain such protection.
3. A Party may provide limited exceptions to the exclusive rights conferred by a patent, provided that such exceptions do not unreasonably conflict with a normal exploitation of the patent and do not unreasonably prejudice the legitimate interests of the patent owner, taking account of the legitimate interests of third parties.
4. Without prejudice to Article 5.A(3) of the Paris Convention, each Party shall provide that a patent may be revoked or cancelled only on grounds that would have justified a refusal to grant the patent. However, a Party may also provide that fraud, misrepresentation, or inequitable conduct may be the basis for revoking, canceling, or holding a patent unenforceable.
5. Consistent with paragraph 3, if a Party permits a third person to use the subject matter of a subsisting patent to generate information necessary to support an application for marketing approval of a pharmaceutical or agricultural chemical product, that Party shall provide that any product produced under such authority shall not be made, used, or sold in the territory of that Party other than for purposes related to generating information to meet requirements for approval to market the product once the patent expires, and if the Party permits exportation, the product shall only be exported outside the territory of that Party for purposes of meeting marketing approval requirements of that Party.
6. (a) Each Party, at the request of the patent owner, shall adjust the term of a patent to compensate for unreasonable delays that occur in granting the patent. For purposes of this paragraph, an unreasonable delay shall at least include a delay in the issuance of the patent of more than five years from the date of filing of the application in the territory of the Party, or three years after a request for examination of the application has been made, whichever is later, provided that periods attributable to actions of the patent applicant need not be included in the determination of such delays.
(b) With respect to any pharmaceutical product that is covered by a patent, each Party shall make available a restoration of the patent term to compensate the patent owner for unreasonable curtailment of the effective patent term resulting from the marketing approval process related to the first commercial marketing of the product in that Party.
7. Each Party shall disregard information contained in public disclosures used to determine if an invention is novel or has an inventive step if the public disclosure (a) was made or authorized by, or derived from, the patent applicant, and (b) occurred within 12 months prior to the date of filing of the application in the territory of the Party.
8. Each Party shall provide patent applicants with at least one opportunity to submit amendments, corrections, and observations in connection with their applications.
9. Each Party shall provide that a disclosure of a claimed invention shall be considered to be sufficiently clear and complete if it provides information that allows the invention to be made and used by a person skilled in the art, without undue experimentation, as of the filing date.
10. Each Party shall provide that a claimed invention is sufficiently supported by its disclosure if the disclosure reasonably conveys to a person skilled in the art that the applicant was in possession of the claimed invention as of the filing date.
11. Each Party shall provide that a claimed invention is industrially applicable if it has a specific, substantial, and credible utility.
Article 15.10. Measures Related to Certain Regulated Products
1. (a) If a Party requires, as a condition of approving the marketing of a new pharmaceutical or agricultural chemical product, the submission of undisclosed data concerning safety or efficacy, the Party shall not permit third persons, without the consent of the person who provided the information, to market a product on the basis of (1) the information, or (2) the approval granted to the person who submitted the information for at least five years for pharmaceutical products and ten years for agricultural chemical products from the date of approval in the Party. (15)
(b) If a Party permits, as a condition of approving the marketing of a new pharmaceutical or agricultural chemical product, third persons to submit evidence concerning the safety or efficacy of a product that was previously approved in another territory, such as evidence of prior marketing approval, the Party shall not permit third persons, without the consent of the person who previously obtained such approval in the other territory, to obtain authorization or to market a product on the basis of (1) evidence of prior marketing approval in the other territory, or (2) information concerning safety or efficacy that was previously submitted to obtain marketing approval in the other territory, for at least five years for pharmaceutical products and ten years for agricultural chemical products from the date approval was granted in the Party's territory to the person who received approval in the other territory. In order to receive protection under this subparagraph, a Party may require that the person providing the information in the other territory seek approval in the territory of the Party within five years after obtaining marketing approval in the other territory.
(c) For purposes of this paragraph, a new product is one that does not contain a chemical entity that has been previously approved in the territory of the Party.
(d) For purposes of this paragraph, each Party shall protect such undisclosed information against disclosure except where necessary to protect the public, and no Party may consider information accessible within the public domain as undisclosed data. Notwithstanding the foregoing, if any undisclosed information concerning safety and efficacy submitted to a Party, or an entity acting on behalf of a Party, for purposes of obtaining marketing approval is disclosed by such entity, the Party is still required to protect such information from unfair commercial use in the manner set forth in this Article.
2. Where a Party permits, as a condition of approving the marketing of a pharmaceutical product, persons, other than the person originally submitting safety or efficacy information, to rely on evidence or information concerning the safety and efficacy of a product that was previously approved, such as evidence of prior marketing approval in the territory of a Party or in another country, that Party:
(a) shall implement measures in its marketing approval process to prevent such other persons from marketing a product covered by a patent claiming the previously approved product or its approved use during the term of that patent, unless by consent or acquiescence of the patent owner; and
(b) shall provide that the patent owner shall be informed of the request and the identity of any such other person who requests approval to enter the market during the term of a patent identified as claiming the approved product or its approved use.
Article 15.11. Enforcement of Intellectual Property Rights
General Obligations
1. Each Party understands that procedures and remedies required under this Article for enforcement of intellectual property rights are established in accordance with:
(a) the principles of due process that each Party recognizes; and
(b) the foundations of its own legal system.
2. This Article does not create any obligation:
(a) to put in place a judicial system for the enforcement of intellectual property rights distinct from that for the enforcement of law in general; or
(b) with respect to the distribution of resources for the enforcement of intellectual property rights and the enforcement of law in general.
The Parties understand that the decisions that a Party makes on the distribution of enforcement resources shall not excuse that Party from complying with this Chapter.
3. Each Party shall provide that final judicial decisions or administrative rulings of general applicability pertaining to the enforcement of intellectual property rights shall be in writing and shall state any relevant findings of fact and the reasoning or the legal basis on which the decisions and rulings are based. Each Party shall provide that such decisions or rulings shall be published, (16) or where such publication is not practicable, otherwise made publicly available, in a national language in such a manner as to enable governments and right holders to become acquainted with them.
4. Each Party shall publicize information that it may collect on its efforts to provide effective enforcement of intellectual property rights in its civil, administrative, and criminal system, including any statistical information.
5. In civil, administrative, and criminal proceedings involving copyright or related rights, each Party shall provide that:
(a) the person whose name is indicated as the author, producer, performer, or publisher of the work, performance, or phonogram in the usual manner, shall, in the absence of proof to the contrary, be presumed to be the designated right holder in such work, performance, or phonogram; and
(b) it shall be presumed, in the absence of proof to the contrary, that the copyright or related right subsists in such subject matter.
Civil and Administrative Procedures and Remedies
6. Each Party shall make available to right holders (17) civil judicial procedures concerning the enforcement of any intellectual property right.
7. Each Party shall provide that:
(a) in civil judicial proceedings concerning the enforcement of intellectual property rights, its judicial authorities shall have the authority to order the infringer to pay the right holder:
(i) damages adequate to compensate for the injury the right holder has suffered as a result of the infringement; and
(ii) at least in the case of copyright or related rights infringement and trademark counterfeiting, the profits of the infringer that are attributable to the infringement and are not taken into account in computing the amount of the damages referred to in clause (i); and
(b) in determining damages for infringement of intellectual property rights, its judicial authorities shall consider, inter alia, the value of the infringed-upon good or service based on the suggested retail price or other legitimate measure of value that the right holder presents.
8. In civil judicial proceedings, each Party shall, at least with respect to civil judicial proceedings concerning copyright or related rights infringement and trademark counterfeiting, establish or maintain pre-established damages as an alternative to actual damages. Such pre-established damages shall be set out in domestic law and determined by the judicial authorities in an amount sufficient to compensate the right holder for the harm caused by the infringement and constitute a deterrent to future infringements.
9. Each Party shall provide that its judicial authorities, except in exceptional circumstances, shall have the authority to order, at the conclusion of civil judicial proceedings concerning copyright or related rights infringement and trademark counterfeiting, that the prevailing party shall be awarded payment of court costs or fees and reasonable attorney's fees by the losing party. Further, each Party shall provide that its judicial authorities, at least in exceptional circumstances, shall have the authority to order, at the conclusion of civil judicial proceedings concerning patent infringement, that the prevailing party be awarded payment of reasonable attorney's fees by the losing party.
10. In civil judicial proceedings concerning copyright or related right infringement and trademark counterfeiting, each Party shall provide that its judicial authorities shall have the authority to order the seizure of suspected infringing goods, any related materials and implements, and, at least for trademark counterfeiting, documentary evidence relevant to the infringement.
11. Each Party shall provide that:
(a) its judicial authorities shall have the authority to order, at their discretion, the destruction of the goods that have been found to be pirated or counterfeit;
(b) its judicial authorities shall have the authority to order that materials and implements that have been used in the manufacture or creation of such pirated or counterfeit goods be, without compensation of any sort, promptly destroyed or, in exceptional circumstances, without compensation of any sort, disposed of outside the channels of commerce in such a manner as to minimize the risks of further infringements. In considering requests for such destruction, the Party's judicial authorities may take into account, inter alia, the gravity of the infringement, as well as the interests of third parties holding ownership, possessory, contractual, or secured interests;
(c) the charitable donation of counterfeit trademark goods and goods that infringe copyright and related rights shall not be ordered by the judicial authorities without the authorization of the right holder, except that counterfeit trademark goods may in appropriate cases be donated to charity for use outside the channels of commerce when the removal of the trademark eliminates the infringing characteristic of the good and the good is no longer identifiable with the removed trademark. In no case shall the simple removal of the trademark unlawfully affixed be sufficient to permit the release of goods into the channels of commerce.
12. Each Party shall provide that in civil judicial proceedings concerning the enforcement of intellectual property rights, its judicial authorities shall have the authority to order the infringer to provide any information that the infringer possesses regarding any person involved in any aspect of the infringement and regarding the means of production or distribution channel for the infringing goods or services, including the identification of third persons that are involved in their production and distribution and their distribution channels, and to provide this information to the right holder. Each Party shall provide that its judicial authorities shall have the authority to impose sanctions, in appropriate cases, on a party to a proceeding that fails to abide by valid orders issued by such authorities.
13. To the extent that any civil remedy can be ordered as a result of administrative procedures on the merits of a case, each Party shall provide that such procedures conform to principles equivalent in substance to those provided for in this Chapter.
14. Each Party shall provide for civil remedies against the acts described in Article 15.5.7 and 15.5.8. Available civil remedies shall include at least:
(a) provisional measures, including seizure of devices and products suspected of being involved in the prohibited activity;
(b) actual damages (plus any profits attributable to the prohibited activity not taken into account in computing the actual damages) or pre-established damages as provided in paragraph 8;
(c) payment to the prevailing right holder, at the conclusion of civil judicial proceedings, of court costs and fees and reasonable attorneyâs fees by the party engaged in the prohibited conduct; and
(d) destruction of devices and products found to be involved in the prohibited activity, at the discretion of the judicial authorities, as provided in subparagraphs (a) and (b) of paragraph 11.
No Party may make damages available against a nonprofit library, archives, educational institution, or public broadcasting entity that sustains the burden of proving that it was not aware and had no reason to believe that its acts constituted a prohibited activity.
15. In civil judicial proceedings concerning the enforcement of intellectual property rights, each Party shall provide that its judicial authorities shall have the authority to order a party to desist from an infringement, inter alia, to prevent the entry into the channels of commerce in their jurisdiction of imported goods that involve the infringement of an intellectual property right, immediately after customs clearance of such goods or to prevent their exportation.
16. In the event that a Party's judicial or other authorities appoint technical or other experts in civil proceedings concerning the enforcement of intellectual property rights and require that the parties bear the costs of such experts, the Party should seek to ensure that such costs are closely related, inter alia, to the quantity and nature of work to be performed and do not unreasonably deter recourse to such proceedings.
Provisional Measures
17. Each Party shall act on requests for relief inaudita altera parte and execute such requests expeditiously, in accordance with its rules of judicial procedure.
18. Each Party shall provide that its judicial authorities shall have the authority to require the plaintiff to provide any reasonably available evidence in order to satisfy themselves with a sufficient degree of certainty that the plaintiff's right is being infringed or that such infringement is imminent, and to order the plaintiff to provide a reasonable security or equivalent assurance set at a level sufficient to protect the defendant and to prevent abuse, and so as not to unreasonably deter recourse to such procedures.
19. In proceedings concerning the grant of provisional measures in relation to enforcement of a patent, each Party shall provide for a rebuttable presumption that the patent is valid.
Special Requirements Related to Border Measures
20. Each Party shall provide that any right holder initiating procedures for its competent authorities to suspend the release of suspected counterfeit or confusingly similar trademark goods, or pirated copyright goods (18) into free circulation is required to provide adequate evidence to satisfy the competent authorities that, under the laws of the country of importation, there is prima facie an infringement of the right holder's intellectual property right and to supply sufficient information that may reasonably be expected to be within the right holder's knowledge to make the suspected goods reasonably recognizable by the competent authorities. The requirement to provide sufficient information shall not unreasonably deter recourse to these procedures.
21. Each Party shall provide that its competent authorities shall have the authority to require a right holder initiating procedures for suspension to provide a reasonable security or equivalent assurance sufficient to protect the defendant and the competent authorities and to prevent abuse. Such security or equivalent assurance shall not unreasonably deter recourse to these procedures. Each Party shall provide that such security may take a form of an instrument issued by a financial services provider to hold the importer or owner of the imported merchandise harmless from any loss or damage resulting from any suspension of the release of goods in the event the competent authorities determine that the article is not an infringing good.
22. Where its competent authorities have made a determination that goods are counterfeit or pirated, a Party shall grant its competent authorities the authority to inform the right holder of the names and addresses of the consignor, the importer, and the consignee, and of the quantity of the goods in question.
23. Each Party shall provide that its competent authorities may initiate border measures ex officio, with respect to imported, exported, or in-transit merchandise suspected of infringing an intellectual property right, without the need for a formal complaint from a private party or right holder.
24. Each Party shall provide that goods that have been determined to be pirated or counterfeit by its competent authorities shall be destroyed, pursuant as appropriate to judicial order, unless the right holder consents to an alternate disposition, except that counterfeit trademark goods may in appropriate cases be donated to charity for use outside the channels of commerce, when the removal of the trademark eliminates the infringing characteristic of the good and the good is no longer identifiable with the removed trademark. In regard to counterfeit trademark goods, the simple removal of the trademark unlawfully affixed shall not be sufficient to permit the release of the goods into the channels of commerce. In no event shall the competent authorities be authorized to permit the exportation of counterfeit or pirated goods or to permit such goods to be subject to other customs procedures, except in exceptional circumstances.
25. Each Party shall provide that where an application fee or merchandise storage fee is assessed in connection with border measures to enforce an intellectual property right, the fee shall not be set at an amount that unreasonably deters recourse to such measures.
Criminal Procedures and Remedies
26. (a) Each Party shall provide for criminal procedures and penalties to be applied at least in cases of willful trademark counterfeiting or copyright or related rights piracy on a commercial scale. Willful copyright or related rights piracy on a commercial scale includes significant willful infringements of copyright or related rights, for purposes of commercial advantage or private financial gain, as well as willful infringements that have no direct or indirect motivation of financial gain, provided that there is more than a de minimis financial harm. Each Party shall treat willful importation or exportation of counterfeit or pirated goods as unlawful activities and provide for criminal penalties to the same extent as the trafficking or distribution of such goods in domestic commerce. (19)
(b) Specifically, each Party shall provide:
(i) remedies that include sentences of imprisonment or monetary fines, or both, sufficient to provide a deterrent to future acts of infringement. Each Party shall establish policies or guidelines that encourage penalties to be imposed by judicial authorities at levels sufficient to provide a deterrent to future infringements;
(ii) that its judicial authorities shall have the authority to order the seizure of suspected counterfeit or pirated goods, any related materials and implements that have been used in the commission of the offense, any assets traceable to the infringing activity, and any documentary evidence relevant to the offense. Each Party shall provide that items that are subject to seizure pursuant to any such judicial order need not be individually identified so long as they fall within general categories specified in the order;
(ii) that its judicial authorities shall have the authority to order, among other measures, (1) the forfeiture of any assets traceable to the infringing activity, (2) the forfeiture and destruction of all counterfeit or pirated goods, without compensation of any kind to the defendant, in order to prevent the re-entry of counterfeit and pirated goods into channels of commerce, and (3) with respect to willful copyright or related rights piracy, the forfeiture and destruction of materials and implements that have been used in the creation of the infringing goods; and
(iv) that its authorities may, at least in cases of suspected trademark counterfeiting or copyright piracy, conduct investigations or exercise other enforcement measures ex officio, without the need for a formal complaint by a private party or right holder, at least for the purpose of preserving evidence or preventing the continuation of the infringing activity.
Limitations on Liability for Service Providers
27. For the purpose of providing enforcement procedures that permit effective action against any act of infringement of copyright (20) covered under this Chapter, including expeditious remedies to prevent infringements, and criminal and civil remedies that constitute a deterrent to further infringements, each Party shall provide, consistent with the framework set out in this Article:
(a) legal incentives for service providers to cooperate with copyright owners in deterring the unauthorized storage and transmission of copyrighted materials; and
(b) limitations in its law regarding the scope of remedies available against service providers for copyright infringements that they do not control, initiate or direct, and that take place through systems or networks controlled or operated by them or on their behalf, as set out in this subparagraph. (21)