{"id":1676,"date":"2006-11-10T00:00:00","date_gmt":"2006-11-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/10\/russia-moves-for-tougher-ip-protections\/"},"modified":"2021-12-30T11:39:47","modified_gmt":"2021-12-30T11:39:47","slug":"russia-moves-for-tougher-ip-protections","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/10\/russia-moves-for-tougher-ip-protections\/","title":{"rendered":"Russia Moves for Tougher IP Protections"},"content":{"rendered":"<p>The United States and Russia expect to sign a bilateral trade agreement next week that includes setting benchmarks and enacting new laws for the protection of intellectual property.  Russia, along with China, topped the Congressional International Anti-Piracy Caucus&#8217; 2006 International Piracy Watch List.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The office of the United States Trade Representative (USTR) has frequently criticized Russia for not effectively protecting or enforcing intellectual property rights (IPR).<\/p>\n<p>&#8220;We have an agreement in principle and are finalizing the details,&#8221; U.S. Trade Representative Susan Schwab said in a statement.<\/p>\n<p>The agreement calls for Russia to take specific actions and to enact laws by specific dates to combat Internet piracy and optical disk piracy.  Under the terms of the agreement, Russia will permit a one-time notification for multiple products and set specific ground rules for granting licenses for products that require an import license.<\/p>\n<p>The bilateral deal is critical to Russia&#8217;s admission to the World Trade Organization (WTO).<\/p>\n<p>According to the USTR, the Bush administration has consulted closely with Congress, particularly with members and staff of the House Ways and Means Committee, the Senate Finance Committee and the House and Senate Agriculture Committees and the IPR Caucus.<\/p>\n<p>http:\/\/www.internetnews.com\/bus-news\/article.php\/3643351<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1676","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1676"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1676\/revisions"}],"predecessor-version":[{"id":4163,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1676\/revisions\/4163"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}