In a world increasingly focused on the use of Information Technology and Communication, economic actors and "ICT players" have a closer relationship with the technological infrastructure able to meet their professional and domestic . As each "layer ICT users' research infrastructure and tools that can best perform their duties in a transparent and timely. Such service offerings require a sophistication and a lot of material, financial and human only large industrial firms have registered. This is no doubt explains the functional quality and life of their produce, especially highly valued "players" ICT and economic actors across the world and justify their commercial success. And it is also one of the reasons that grows a fringe of "actors" ICT, economic actors to copy the products most commonly used brands.
As you can see our response shall be limited to the interaction between ICT and counterfeiting, and governance of private enterprise that creates productive resources in a local approach to global scope. We are among those who strive to see every action in the scope of which is negative at first sight, as the practice of counterfeiting, a premise for the emergence of positive initiatives carriers of economic and industrial creativity.
Implementation does highlight the problem here is that of the social and economic development of all shares that may give rise to compensation such as counterfeiting. Hence the search for methods of strategic fight against counterfeiting can empower themselves forward. Which requires the movement of a carrier of creative social and economic dynamics. So the central question around our intervention can be formulated as follows:
How to implement an effective strategy to fight against counterfeiting, which can partly be empowering?
Above all, it should agree on what is meant by counterfeiting. If one looks at the National Institute of Industrial Property (INPI) French, "counterfeiting is specifically intellectual property.
It consists of an infringement of any intellectual property rights and, in the case of industrial property, a title into force
It is the act itself, which is considered a foul, regardless of any intent to harm ".
The origin of counterfeiting goes back to the appearance of the business of manufactured goods, processed. But how to construct infringement actions using information technology and communication to added value?
One of the most effective strategies in the long run seems to be far in the Ivorian situation, those centered on the fight for prevention as part of a process control offensive against counterfeiting. It must take into account the different stages of progress of the action for infringement in his party as well as judicial reprehensive as formulated by the INPI:
1. constitute informal proofs
2. Evaluate the case and the chances of success
3. Define the strategy
4. Teach the Pre litigation
5. Constitute official evidence
6. Sue
7. Simulate possible outcomes
8. Projecting suites.
The pursuit of advocacy and public control must be preceded by the development by the administration of legislation and the creation of specialized services for dismantling the actions of counterfeiters and local area UEMOA.
The texts of laws should take into account the legal aspects of the eight points listed above, if not already done so, with the participation of all economic agents involved.
We will, given the complexity and legal implications contained in any action for infringement, limit ourselves to the implementation of concurrent actions in IT added value inherent in the first step above: the search for evidence.
The scope of this paper is to open a line of thought, the initiatives to be implemented will be largely supported financially by industry facing this scourge.
Research evidence implies the provision of a set of exhibits, both material and documentary compelling, justifying the infringement action. It is in this process that must emerge to create income-generating IT initiatives with added value.
Also given the multifaceted interactions related to social facts inherent in counterfeiting, their Mapping covers both the economic, socio-cultural and security of Côte d'Ivoire. To this end IT initiatives with revenue generating value added, must take into account all these aspects to be part of a long term perspective. For this reason, that although this is possible at our level, to make proposals "in vitro" in this sense, wisdom as an expert "green IT" we recommend opting for a participatory approach, synergy with all stakeholders addictive significant local and international. So we would be willing to undertake this study project, which fits well with one of our areas of expertise "green IT".
YEBOUE Henri, Engineer-Telecom Networks, CEO ,GRADD Telecom.
Website: http://www.gradd-telecom.com
e-mail: info@gradd-telecom.com