loader

Preserving Brand Integrity: How E-commerce Can Combat the Rise of Counterfeits

E-commerce has transformed how we shop, making products accessible from anywhere with just a click. But with this convenience comes a dark side: counterfeit products are flooding online marketplaces at an alarming rate. For e-commerce brands, this growing issue presents a significant threat to their reputation, sales, and customer trust. Here’s why e-commerce brands are particularly vulnerable to counterfeiting and what they can do to protect themselves using online anti-counterfeiting services like those offered by AXENCIS.

The Rise of Counterfeit Products in Online Marketplaces

With e-commerce booming, counterfeiters have found a lucrative space to infiltrate. Online marketplaces allow sellers to reach a massive audience with minimal barriers, making them a prime target for fake goods. Knockoffs are no longer limited to back-alley markets—they’re creeping into mainstream online stores and listings.

Why is counterfeiting so rampant online? First, the anonymity provided by digital platforms allows counterfeiters to hide their identities and locations. They can easily create fake accounts, post counterfeit products, and disappear before anyone catches on. Second, the sheer scale of these online marketplaces makes it tough for brands to monitor every single listing. This creates an opening for fake products to slip through the cracks, which can damage the reputation of authentic brands.

For instance, customers might unknowingly purchase counterfeit items, only to find the quality lacking. This negative experience is likely to be linked to the original brand, causing long-term harm to its image and customer trust.

Proactive Measures to Protect E-commerce Brands

So, what can e-commerce brands do to fight back against counterfeiters? A reactive approach won’t cut it; by the time counterfeit products are discovered, the damage is often done. Instead, brands need to be proactive in safeguarding their integrity. Here are some key measures:

  1. Registering Trademarks and Intellectual Property: The first step to protecting a brand is securing trademarks and other intellectual property rights. This legal backing gives brands the authority to take action against counterfeiters and safeguard their authentic products.
  2. Constantly Monitor Marketplaces: Online marketplaces should be under constant surveillance. Brands need to regularly monitor listings and report suspicious or counterfeit items as quickly as possible. With counterfeiters being quick to adapt, ongoing vigilance is crucial.
  3. Leverage Advanced Technology: Manual monitoring isn’t enough, especially with the vast number of products and sellers on digital platforms. E-commerce brands should leverage cutting-edge online anti-counterfeiting services like those offered by AXENCIS, which use technology to detect and respond to counterfeits swiftly.
  4. Educate Consumers: It’s also essential to educate customers about the risks of counterfeit products and how to identify genuine items. Clear communication and awareness-building can help minimize the chances of customers being deceived.

How AXENCIS’s Online Anti-Counterfeiting Services Help

AXENCIS understands the unique challenges faced by e-commerce brands in fighting counterfeits. Their comprehensive online anti-counterfeiting services are designed to keep digital marketplaces free of fake goods, protecting both brands and their customers.

1. Advanced Monitoring and Detection
Using state-of-the-art technology, AXENCIS conducts vigilant surveillance of online platforms to identify counterfeit listings. This proactive monitoring helps brands detect fake products before they reach customers, minimizing the risk of negative customer experiences.

2. Swift Response and Removal
Speed is crucial when dealing with counterfeits. AXENCIS’s quick-response approach ensures that once counterfeit listings are identified, they are swiftly removed from online platforms. This fast action helps preserve brand integrity and stops counterfeiters in their tracks.

3. Customized Solutions
AXENCIS knows that every brand has unique needs. Their online anti-counterfeiting services are tailored to address the specific challenges faced by each client. Whether it’s detecting counterfeit products, monitoring online sellers, or enforcing IP rights, AXENCIS provides solutions that are customized to keep brands secure.

Final Thoughts

The threat of counterfeit products in the e-commerce space is growing rapidly, and ignoring it can lead to long-lasting consequences for brands. From a tarnished reputation to losing loyal customers, the stakes are high. However, by taking proactive measures and leveraging online anti-counterfeiting services like those from AXENCIS, e-commerce brands can protect themselves and their customers from counterfeit goods.

Counterfeiting isn’t going away, but neither is the ability to fight it effectively. With the right strategies in place, brands can maintain their authenticity and thrive in an ever-competitive digital marketplace. By investing in comprehensive protection, brands not only shield their market presence but also secure the trust and loyalty of their customers for years to come.

The Impact of IP Infringement on Customer Trust and Loyalty

Building a strong brand isn’t just about having a catchy logo or a memorable slogan; it’s also about winning customer trust and fostering loyalty. However, when a brand faces intellectual property (IP) infringement, its reputation is at risk, and so is the trust of its customers. Let’s explore how IP infringement affects a brand’s reputation and leads to a loss of customer trust, along with ways businesses can use IP brand protection to safeguard their market position.

Damaging a Brand’s Reputation

Reputation is the backbone of any successful brand. It’s what drives people to choose one product or service over another. However, IP infringement can severely damage this reputation. When competitors or counterfeiters use a brand’s trademarked logo, slogan, or design without permission, it leads to confusion among customers. Customers who are unaware of the infringement may end up associating poor-quality imitations with the original brand, resulting in a tarnished image.

Imagine buying a product you believe is from a reputable brand, only to find out it’s a low-quality knockoff. That’s frustrating and can shake customer confidence. This is why companies like AXENCIS offer comprehensive IP brand protection solutions, focusing on early detection and mitigation of IP infringements to protect their clients’ brand reputation.

Loss of Customer Trust

Trust is hard to earn but easy to lose. When customers start doubting the authenticity of a brand’s products, it becomes challenging to maintain their confidence. IP infringement cases, such as counterfeiting or unauthorized replication, often lead to inconsistent product quality in the market. Customers may unknowingly purchase counterfeit products, experience poor quality, and lose trust in the brand they once admired.

For instance, if a high-end fashion brand’s signature designs are frequently copied and sold at cheaper prices, customers may start questioning the brand’s credibility. Even if the brand is not directly responsible for the copies, their reputation takes the hit. AXENCIS understands this critical impact and provides businesses with robust IP brand protection services to keep unauthorized copies at bay.

Long-Term Consequences of IP Infringement

The damage caused by IP infringement doesn’t end with a few bad reviews or angry customers. Over time, this harm can snowball into more severe consequences for the business:

1. Decreased Customer Loyalty: When customers are repeatedly exposed to counterfeit or poorly replicated products, their perception of the brand changes. This erosion of trust leads to decreased loyalty, causing customers to shift to competing brands that they believe can deliver better quality and consistency.

2. Loss of Market Share: IP infringement dilutes a brand’s uniqueness, making it harder for genuine products to stand out. As a result, the original brand loses its competitive edge, which eventually translates into a loss of market share. Unauthorized replicas create confusion in the market, and customers buy knockoffs thinking they are the real deal.

3. Legal and Financial Challenges: Dealing with IP infringement involves legal battles, which are both time-consuming and costly. Even if a brand wins these battles, the financial losses incurred in the process and the damage to its reputation can be irreversible.

How Businesses Can Safeguard Their Brand’s Reputation

The key to maintaining customer trust and loyalty lies in preventing IP infringements before they spiral out of control. Here are some ways businesses can proactively protect their brands:

1. Invest in IP Brand Protection Solutions: To keep their brands safe from infringement, businesses should consider investing in advanced IP brand protection services. AXENCIS, for instance, offers state-of-the-art solutions to detect unauthorized use and violations. By identifying and addressing infringements early, businesses can prevent the spread of counterfeit products and safeguard their reputation.

2. Register Trademarks and Copyrights: Legal protection is essential for establishing ownership and exclusivity over a brand’s logos, designs, and content. Registering trademarks and copyrights provides businesses with a solid legal foundation to challenge infringers and enforce their rights effectively.

3. Actively Monitor the Market: Simply registering IP isn’t enough. It’s vital to actively monitor both digital and physical marketplaces for potential violations. AXENCIS employs innovative monitoring techniques to keep an eye out for any unauthorized replication or misuse of IP assets.

4. Raise Awareness Among Customers: Educating customers about the risks of counterfeit products and how to identify authentic goods can help minimize the chances of them falling for fake products. When customers are aware of what to look for, they are less likely to be misled by knockoffs.

5. Have a Legal Strategy in Place: Companies should be prepared with a clear legal strategy to deal with infringement cases efficiently. Having a dedicated team or partner like AXENCIS ensures that brands can swiftly address violations and take necessary legal actions to protect their reputation.

Conclusion

IP infringement significantly threatens a brand’s reputation, customer trust, and long-term success. The impact can lead to decreased loyalty, loss of market share, and costly legal battles—all of which could cripple even the strongest brands. Investing in comprehensive IP brand protection solutions, like those offered by AXENCIS, allows businesses to stay ahead of infringers and maintain their brand’s authenticity in the market.

By securing their intellectual property and actively monitoring for unauthorized use, businesses can preserve customer trust and loyalty. Ultimately, protecting a brand’s IP assets isn’t just about legal safeguards; it’s about maintaining the values, identity, and reputation that make the brand unique. A proactive approach to IP protection will not only minimize risks but also foster a sense of confidence among customers, reinforcing their loyalty in the long run.

Trademark Protection in Building a Strong Brand

Building a strong brand is crucial for businesses looking to stand out in a competitive market. It’s not just about a catchy name or a memorable logo—it’s about creating a unique identity that resonates with customers. One way to achieve this is by investing in trademark protection solutions, which play a vital role in solidifying a brand’s position and securing its future.

Establishing Distinctiveness in the Marketplace

In today’s crowded market, standing out is a challenge. Competitors are always on the lookout for successful ideas, and it’s not uncommon to see copycat brands trying to ride the coattails of an established name. This is where trademark protection solutionscome into play.

Trademarks, like brand logos, taglines, and product names, help create a distinctive identity that customers can easily recognize. By securing these elements with trademark protection, businesses can ensure their unique characteristics aren’t copied or misused. This sets the brand apart from others and strengthens its presence in the marketplace. AXENCIS, with a specialized Trademark Infringement Solution Service, focuses on preserving this distinctiveness by proactively identifying and addressing unauthorized use.

Preventing Brand Dilution

Brand dilution occurs when a company’s trademark or recognizable symbols are used by others without permission. When this happens, the brand’s image, value, and customer perception can take a hit. Imagine investing years of effort into building a reputable brand, only to have its identity watered down by imitators. That’s a business nightmare, to say the least.

Trademark protection acts as a shield against brand dilution. By preventing unauthorized use and ensuring that your brand’s name and logo remain exclusive, you maintain control over how your brand is perceived. AXENCIS’s advanced methodologies are designed to monitor and mitigate these risks, securing brand identity and preventing customer confusion.

Gaining Legal Exclusivity

One of the most significant benefits of trademark protection is the legal backing it provides. When a business registers its trademark, it gains the exclusive right to use that symbol or design. This legal exclusivity acts as a powerful tool, giving the trademark owner the ability to challenge any unauthorized usage in court.

AXENCIS leverages this principle by offering trademark protection solutions that not only detect violations but also provide the necessary legal foundation to act against infringers. By securing a trademark, businesses can confidently enforce their rights and eliminate threats to their brand’s integrity.

The Role of AXENCIS in Trademark Protection

At AXENCIS, we understand the importance of building a strong brand and the role trademark protection plays in achieving that. Our dynamic Trademark Infringement Solution Service is designed to give businesses peace of mind by offering comprehensive protection. From detecting unauthorized use to enforcing legal rights, AXENCIS ensures that brands can maintain their exclusivity and distinctiveness in the market.

With a meticulous approach to protecting original brand designs and employing innovative strategies, AXENCIS helps businesses preserve their unique identity. We enable brands to thrive in a competitive environment by minimizing the risks of infringement and maintaining a clear, strong presence.

Final Thoughts

Investing in trademark protection solutions is more than just a legal formality—it’s a strategic move for building a strong brand. It establishes distinctiveness, prevents brand dilution, and provides the legal power to safeguard a company’s most valuable assets. With our specialized services, businesses can confidently grow and maintain their identity in an ever-evolving marketplace. By prioritizing trademark protection, companies not only secure their future but also position themselves for long-term success.

Protecting Your Brand’s Integrity: The Importance of Comprehensive E-Commerce IP Management with AXENCIS

In the fast-paced world of e-commerce, protecting your brand’s integrity is more crucial than ever. Digital marketplaces offer incredible growth opportunities but also unique challenges, especially with intellectual property (IP) infringement. Counterfeit products and unauthorized use of trademarks and copyrights are everywhere, threatening your brand’s reputation. This is where AXENCIS comes in. With a focus on e-commerce IP infringement, AXENCIS provides comprehensive solutions to safeguard your brand across digital platforms. Let’s dive into why thorough IP management is essential and how AXENCIS can help.

The Digital Marketplace: A Double-Edged Sword

E-commerce has changed the game for businesses, opening up global markets and reaching more customers. But it also makes it easier for counterfeiters and IP thieves to exploit your original designs, trademarks, and copyrighted content. Unauthorized sellers can quickly pop up on online marketplaces, selling fake products that damage your brand’s reputation and confuse customers.

Why Comprehensive IP Management is Essential?

A piecemeal approach to IP management won’t cut it in today’s fast-paced world. You need a comprehensive strategy that covers all bases. This means detecting and preventing infringement and addressing issues swiftly when they arise. AXENCIS gets this and offers a robust, all-encompassing approach to IP management.

AXENCIS: Your Defender in the Digital World

AXENCIS specializes in tackling the unique IP infringement issues on online platforms. Our strategies are tailored to combat the challenges posed by digital marketplaces, giving you a robust defense against unauthorized use. Whether it’s your logo, product designs, or creative content, AXENCIS ensures your intellectual property stays protected.

Advanced Technology for IP Protection

One standout feature of AXENCIS’s approach is the use of advanced technology. We use cutting-edge tools like digital watermarks, blockchain, and AI-driven analytics to track and prevent IP theft. These technologies help AXENCIS stay ahead of counterfeiters, ensuring your brand remains authentic and trustworthy.

Tailored Solutions for Every E-Commerce Platform

Different e-commerce platforms come with their own challenges. What works for Amazon might not be effective for Etsy or eBay. AXENCIS offers tailored solutions for each platform, knowing that a one-size-fits-all approach doesn’t work. This customization ensures your brand is protected no matter where your products are sold.

Proactive and Reactive Strategies

AXENCIS doesn’t just wait for e-commerce IP infringement to happen; we proactively prevent it. Our strategies include constant monitoring and quick response plans to handle any IP threats. By anticipating issues and setting up strong defenses, AXENCIS ensures your brand is always protected. But if infringement does occur, we’re ready with reactive measures to tackle it quickly.

Legal Support and Enforcement

Sometimes, protecting your IP means taking legal action against infringers. AXENCIS offers strong legal support to help you pursue and stop those who violate your IP rights. Our expertise in IP law means you have a powerful ally in your corner, ready to defend your brand’s integrity in court if needed.

Building and Maintaining Consumer Trust

In the digital marketplace, consumer trust is everything. Customers need to know that what they’re buying is the real deal. By preventing unlawful replication of your designs and content, AXENCIS helps maintain this trust. When consumers are confident that your products are genuine, they’re more likely to stay loyal to your brand.

Peace of Mind for E-Commerce Businesses

Running an e-commerce business is stressful enough without worrying about IP theft. With AXENCIS on your side, you can focus on what you do best—innovating and growing your business. Knowing your intellectual property is safe provides peace of mind, letting you concentrate on developing new products and reaching new markets.

Conclusion

In short, protecting your brand’s integrity in the e-commerce world needs a comprehensive, proactive approach to IP management. AXENCIS offers specialized solutions tailored to combat the unique challenges of digital marketplaces. The advanced technology, customized strategies, and strong legal support ensure your brand stays authentic and trustworthy.

With AXENCIS, you can rest easy knowing your intellectual property is protected, allowing you to focus on growing your business and serving your customers. Investing in AXENCIS isn’t just about protection; it’s about securing your brand’s future and maintaining its top spot in the competitive digital marketplace.

Cybersquatting & Typosquatting: Where Does The Web Identity Theft End?

This is the 21st Century, the era where a person could very erroneously type a wrong letter in a URL and end up in a rabbit hole of mischievous scams. That’s right. Autocorrect and simply not knowing the right domain extension could lead you into some unfortunate situations that might lead to parting with your hard-earned money.

According to statistics from First Site Guide, as of June 2021, there were 1.86 billion websites registered on the World Wide Web. However, this doesn’t leave a lot to be impressed about since over 1.4 million phishing sites are created every month. It’s mind-boggling to estimate the outrageous number of people falling to these scams and annoying antics every second. Cybercrime is the major disadvantage of the hitch-free methods, incredible ease, and extremely affordability of creating a website today. There’s little to no authenticity assurance (even with the “HTTPS” protocol), the bad has obviously outweighed the good, and of course, we are just getting started.

Rogue websites are one of the many forms of Intellectual Property infringement, where certain individuals or groups may create websites online for various malicious purposes such as selling counterfeits, hijacking brand identities for fraudulent purposes, scamming customers, spamming other websites, and running smear campaigns against individuals and legitimate brands.

Cybersquatting

To understand cybersquatting, imagine a group of kids heading up to summer camp is to share a sleeping hall with bunk beds assigned by name tags. Some of the kids would get to the hall first, occupy their beds and those of others, and then charge other kids $50 each to release corners that already had their names attached. Makes no sense, right?

On a larger and more bothersome scale, cybersquatting involves people occupying domain names of registered trademarks, personal brands, and public figures with the malicious intent to blackmail them into paying for these domains in the future. Other times, the culprits would take over the domains either to drive traffic to another site or to tap into the trademark’s authentic reputation and run scam operations online.

A registered brand may occupy only the .com extension of the domain name, leaving the .net, .org, and everything else unoccupied and vulnerable to online pirates. Many of the world’s top celebrities have been easy victims to these wicked antics. Madonna was forced into a legal battle when a guy named Dan Parisi registered a domain under her name, Madonna.com, and worked off her reputation to create an adult website. Madonna won the court case and had the site handed over to her.

 Jennifer Lopez only runs the .com extension of her name, Jenniferlopez.com, but someone created the .org and .net extensions to coordinate flimsy scams with affiliate links. J.LO battled relentlessly and eventually had the domains handed over to her.

Another variant of cybersquatting is parody sites, where apparently jobless individuals create websites as jokes to mock, mimic, or embarrass a person, brand, or business. It blows out of proportion when the parody starts getting more attention than the actual website and proceeds to spread malignant information or run embarrassing operations.

Cybersquatting has left many businesses unable to reach their full potentials online, losing their claims to domains that promise solid search engine ranking and considerable visibility. For the more malicious cases, it’s also one of the fastest ways to severely damage a brand’s reputation online by registering their trade name and running shameful operations on these sites.

Typosquatting

Typosquatting involves scammers registering the domain names of brands and businesses with highly likely or common spelling errors. This way, they can redirect traffic from the authentic sites and perpetuate all forms of cybercrime and malignant antics. Microwsoft.com, Guccci.com, Adobe33.com, Apple-brand.com, are some of the examples of the alterations that could leave genuine global brands smeared in the mud.

Some of the world’s most famous brands and top companies are daily victims of typosquatting attempts. For example, the number of “Google.com” variants in the world is virtually impossible to keep track of. From misspellings and the inclusion of symbols to number variations and transliteration, Google has an entire department of engineers working to keep these problems at bay. If you erroneously type Googel.com, you’d be redirected to Google.com and this is one excellent way of limiting brand abusers’ access to common misspellings.

Preventing cyber abuse

Just like counterfeiting and other forms of IP rights infringement, cyber abuse doesn’t only affect top-tier brands. Any business or brand with a semblance of an online reputation could be targeted. The abusers would work off your progress, damage your reputation, direct traffic away from your website, and create a mountain of search engine optimization issues. 

Below are a few tips for preventing cyber abuse:

Invest in buying extra domain extensions:

Don’t wait until you become a million-dollar business to buy the .org, .net, .space, .co, .online, and country-specific extensions of your domain name. This is also really helpful in online growth because clicks on these domains could be redirected to your main website to increase traffic, visibility, and sales.

Buy up misspellings as well:

Many business owners might consider this a bit of a paranoid stretch, but you’d appreciate it when your brand takes off massively and infringers start nosing about for inlets. 

Put out public service announcements regularly:

Always make intentional efforts across social media, mainstream media, and anywhere else you might have customers to disclaim any websites bearing your trademark outside your stipulated list of domains. Forewarn your customers and safeguard your reputation.

Do it the AXENCIS way:

Most times, cease-and-desist letters aren’t always an adequate option. At absolutely zero cost to your business, AXENCIS will deploy the smart brand protection plan to restore your reputation and help you reclaim your lost revenue. Our interdisciplinary team of analysts, scientists, and lawyers could pinpoint the location of the abusers and initiate legal actions against them: freezing the accounts, seizing their assets, reclaiming your domains, and securing large payouts for our brand. Read more about cost-free services HERE.

The Doubting Thomas Syndrome: Why Most Business Owners are Caught Off-Guard by Counterfeiting Problems

“Brand protection is an extremely important yet vastly under-regarded step to business building.”

Like COVID-19, counterfeiting is one of those hard-smacking realities that people never believe could happen to them – until it does. It’s one of those things you read about online, skim through in the journals, ignore statistics in the news, and while you accept that it’s quite real and happening to other people, something this awful simply can’t happen to your business.

Well, until you perform a random search of your patented product online and find 1-100 unfamiliar listings across Amazon, Wish, and Etsy. That’s right, a hard-smacking reality. Situations like this are often attributed to a mild/benign psychological affliction – The Doubting Thomas Syndrome, characterized by the need to see, experience, or witness something to believe it.

In this case, many business owners are at major losing ends by being merely reactive to counterfeiting issues. Reports show that at least 85% of genuine businesses are affected by counterfeiting and IP rights infringement in some form, ranging from full-on brand-jacking and trademark theft to nuisances like hashtag abuse. Many small business owners are convinced that piracy only happens to the top brands, the Chanel, Gucci, Microsoft, and Adobe league. Why spend scarce startup funds and unavailable time implementing anti-counterfeiting measures when the problem doesn’t even exist? “Could it even happen to a tiny business like mine?”

Sadly, even a day-old business could fall victim to leeching piracy. Waiting to actually witness infringements on your IP rights is akin to sitting like a duck in a bullet haze. You’d be left to grow a young business with an already soured reputation. One of the many disadvantages of e-commerce globalization is the ease at which anyone can abuse other people’s trademarks from any location in the world and get away with little or no consequences. 

What to expect from an actual counterfeiting case 

Counterfeiting is one of the many forms of intellectual property abuse and it affects only product businesses (physical and software items). By Wikipedia’s definition, counterfeiting is the act of “fraudulently imitating something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value than the real thing.”

Counterfeiting is not the same as copyright infringement – the use of copyrighted works without permission. However, many elements of trademark infringement can be found in counterfeiting. For example, a person creating fake versions of Nike’s Airforces will certainly use the company’s proprietary design and logo, even though the quality would most likely not be as excellent as Nike’s. In this case, a patent has been infringed, the logo has been abused, and a pirated product will be distributed into the online and physical markets to join the millions of Nike fakes already in circulation. If there’s one way to perfectly describe it, counterfeiting is an exhausting plague.

Here’s what to expect:

Exact copies of your products in circulation:

A counterfeiting problem generally implies that someone is recreating and possibly rebranding your product for sale. Most times, they are exact copies of your original ideas and could be so nicely executed that customers would have a hard time spotting the difference without serious inspection. Other times, they could be shameful attempts at recreation and anyone buying them would either know they are fake or accuse your brand of quality reduction.

Unwarranted complaints from customers:

This is one of the major dividends of a smeared reputation. It’s common on social media to find angry customers firing up comment sections of highly reputable businesses for suddenly selling poor-quality items. These comments are considered negative reviews and would certainly deter potential customers from patronizing these brands. Many times, angry customers unknowingly purchase counterfeit items and inevitably, the authentic brand would pay the price for a crime committed against their own business. The irony. 

It gets worse when these counterfeit products are capable of causing harm or fatalities to people. A business could be destroyed entirely when one life is lost from the consumption or use of a product bearing its trademark. In the heat of public outrage, no one would care if it’s counterfeited or not.

A decimated customer pool:

At some point in the counterfeiting cycle, it doesn’t exactly matter if the customers are intentionally buying knock-offs or they are being deceived by the culprits. The result is the same for your business: lower revenues, slashed sales, and a discouraging lack of brand loyalists. Most times, counterfeits are sold at prices far lower than the original, and sadly, for the average consumer in the currently unfavorable world economy, lower prices trump over excellent quality/durability.

Fake pages and websites springing up with your brand’s name:

Counterfeiters also need spaces to advertise their merchandise online. They build authentic-looking or crappy websites, create fake pages across social media, and dozens of listings on e-commerce marketplaces. Essentially, your brand has been hijacked.

Getting proactive

As a business owner, waiting to react to counterfeiting is one of the most counterproductive plans to deploy as a strategy. This only implies that a certain degree of damage would be done to your brand and reputation before you can swing into action. It’s a better approach to have a solid strategy already in place before these problems occur.

Brand protection is an extremely important yet vastly under-regarded step to business building. It involves a series of activities initiated by a business owner to prevent the illegal or unauthorized use or general abuse of their intellectual property. Essentially, it means to safeguard your brand from leeches working to reap off your progress.

At AXENCIS, we offer our clients a chance to protect their business, safeguard their reputation, and reclaim revenue lost to counterfeiting antics. We stand out by working the 21st-century way, running our cutting-edge proprietary software that performs thorough scans for infringement across all major online marketplaces. AXENCIS does not merely stop at taking down fake accounts and infringing listings – we target, pinpoint, and prosecute the culprits, regardless of their location on the globe. We help our clients reclaim lost revenue through the seizure of the culprits’ assets and liquidation of their accounts. This also allows us to provide our services COMPLETELY FREE OF CHARGE as our service costs are covered in this step. Simply put, AXENCIS, provides a loss-proof solution and long-lasting remedy to the counterfeiting nightmare.

$30 iPhones & $40 Richard Mille’s: Here’s why items are insanely cheap on Wish

Red, orange, and some more red flags should go off in your head if you’re spammed on Facebook with a carousel of sophisticated smartphones with prices as low as $20. Where an iPhone X from Apple should normally cost between $320 and $380 from trusted vendors, you could very easily find listings on Wish for about $30 to $50. A $50 brand-new iPhone.

HOW?

This is because a vast majority of the vendors and manufacturers on Wish are located in China, the poster country for counterfeiting and piracy. Chinese manufacturers have the highest production advantage in the world due to a series of national policies and time-evolved strategies to greatly reduce manufacturing and international shipping costs. It’s generally assumed that Chinese producers simply pay less in taxes and wages when compared to other advanced countries. This advantage only contributes partly to the overall scene, where manufacturers in China pay close attention to learning curves and come up with “innovative” ways to slash down overall production costs. The result is inevitable – low-quality products at insanely affordable prices.

While Wish first debuted in 2010 as an American international e-commerce platform, they began to market wholesale and retail merchandise in 2013. While they never planned to be the no. 1 “online dollar store”, extreme affordability for a wide variety of products became the game plan over time. 

While the abnormally low prices could be suspicious, Wish can be compared to Amazon and eBay in terms of user safety. It was named the most downloaded shopping app in 2018 and is now ranked the third-largest e-commerce company in the United States. This means that you can very safely key in your user details, order products, and they’ll be delivered to your doorstep or chosen pickup station.

Wish Infringement: The actual problem

While your products may safely arrive (usually takes forever due to the super-low shipping fees), no one promises they are going to be what you saw on the product listing. Hundreds of user reviews on the site and Quora contain bitter complaints about the abysmal quality of clothes, products not being the same sizes, electronics malfunctioning within a single day of use, and when you order a Gucci bag for $5, don’t get upset when a Versace purse arrives.

Wish prides itself as a company that pays attention to the counterfeiting problem. However, a disclaimer in IP rights protection policy states that “as a passive platform, Wish is not actively involved in the listing, sale or delivery of items offered by its merchants.” A nicer way to say, “We are not responsible”.

While Amazon, eBay, and other top sites also deal with counterfeit products and fake listings, Wish has a more complex bite of the problem because it doesn’t supply as many American and international brands as the other platforms. Also, its niche of the market and stronghold lies in supplying products at heavily discounted prices. The only way to sustain the target market at the beginning was for vendors to offer irresistible low prices directly from their factories without resellers or third-party vendors.

However, this means it also has a strong reputation as the “low expectations” kind of e-commerce website. Generally, for actual Chinese brands and companies, the products are cheap, relatively good and if you’re not buying something with the potential to explode or cause harm, you should be quite satisfied.

However, an illegally disappointing situation blooms when registered international brands are counterfeited relentlessly on Wish. These days, it’s almost as if there’s no filter for these vendors as they sell regularly-priced $100,000 Richard Milles and $1,700 Apple products for as low as $20. Sadly, thousands of customers intentionally seek out popular brands as knock-offs – fully aware of the highly likely inferior quality. You can only hope the item would look a little presentable and last longer than 3 days.

How does Wish protect authentic brands?

Wish reserves the right to remove any listing infringing on legitimately registered IP rights from its platform, without the permission of the vendor. Merchants and brands whose rights and trademarks have been abused can file a report to Wish, providing evidence of infringement and identifying the counterfeited products. Upon verification of the report, Wish may disable the infringer’s access to the products or listings and if the culprit user is a repeat offender, they may be totally banned from the platform forever.

The major problem all e-commerce platforms encounter with counterfeiters is recurrence. The algorithms may be able to ban an IP address from creating more accounts, and some technologies are sophisticated enough to fish out VPN users. Sadly, most counterfeiters operate off several devices and it’s only a matter of time before they pop up again.

Simply put, your brand protection responsibilities remain largely up to you.

At AXENCIS, we provide business owners and anti-counterfeiting managers with a 21-st century inspired solution for tracking, verifying, uprooting, and prosecuting cases of infringement and brand abuse. Where traditional methods mostly stop at removing listings and manually searching online platforms for future pop-ups, AXENCIS offers the smart brand protection solution, where an expert team of investigators deploys our cutting-edge software to constantly scan all major marketplaces online – Amazon, eBay, Wish, Alibaba, Joomla, etc. Following the removal of counterfeit listings, we step up the notch to target, track down, and prosecute the culprits, regardless of their location in the world. Their accounts are frozen and assets seized, allowing us to secure compensating payouts for our clients to reclaim their revenue.

AXENCIS offers all these benefits – and then some – completely free of charge to our clients. ALL our operational costs are covered from a percentage of the culprits’ assets, allowing us to offer the ultimate no-loss solution to relentless counterfeiting. 

As a customer shopping on Wish, here are some tips rules to avoid purchasing disappointing items:

  • Always read product reviews. They are not always truthful or authentic on every platform, but they could be very helpful.
  • The product sizes can be very deceptive – or non-existent. Items are usually smaller than they look in the pictures.
  • Edited pictures make low-quality products appear sophisticated.
  • Pay attention to the seller’s information and Wish ratings.
  • If it’s an obvious fake, don’t go for it. It’s usually not worth the toss of dignity.

Choosing an IP Rights Enforcement Plan – Here’s what to consider

There are far too many possible scenarios through which a brand’s intellectual property rights could be abused or infringed upon. Some are small-scale, possibly negligible, and others may threaten to destroy the growth, progress, and overall success of the business.

For example, a big company running a massive followership on Instagram may have one loyalist set up an unauthorized fan page out of genuine love. The fan page proceeds to garner a considerably large following by reposting content from the brand’s main page. They also never pretend to be the actual owners of the business, sell items, or divert customers. The page was created entirely to promote love and draw attention to the business. However, they are using content without permission, not giving due credits to the original business, and while they are not hurting the brand, this kind of behavior should not be encouraged.

To solve the problem and not lose a solid following of loving fans, the business owners privately send a gently-toned yet firm letter to the fan page’s administrators, instructing them to always credit content to the original brand and also appreciating their efforts at promoting the business. This fan page complies, and the issue is solved.

However, a more problematic situation turns up when a fan page begins to run a side business off the reputation of the main brand. They are selling a wide variety of their own merch designed with the brand’s logos and ideas, running ads on the page, and diverting a significant cut of the customer pool. They’ve become parasitic and would probably cause the business to lose a chunk of revenue.

The problem is solved with the deployment of a full-on brand protection strategy, beginning with the removal or deletion of the page by Instagram, collation of evidence against the page’s administrator, and a prosecution process to secure a compensating payment from the culprit to the original brand.

The cases above are two different IP rights infringement scenarios handled with different scale-suitable strategies. Essentially, you don’t exactly need to bring a gun to a knife fight or vice versa. Coming up with an enforcement or protection plan might be a bit tricky for many entrepreneurs, and so, below are a few considerations to keep in mind.

The nature of the problem

As described above in the example cases, a simple letter could totally solve one infringement case while in another, a full-blown court case spanning through several months would be the only option. It all depends on the nature of the problem – how serious or minor was the infringement on your IP rights? A culprit that’s merely using your brand’s special hashtags and another that’s counterfeiting your merchandise for sale couldn’t possibly be handled with the same approach. The severity of the infringement largely determines what plan to be deployed.

Generally, a product deployment manager, anti-counterfeiting representative, or HR manager –depending on the size of the organization – could work with a legal advisor to draw up notices and cease-and-desist letters for simple cases. On the other hand, a business might have to outsource its entire brand protection department to an external service. For larger businesses with considerable visibility, this is best done before the situation arises or gets out of hand.

Handling within or outsourcing

This decision depends on the size of your business and of course, the nature of any issues that may already be in play. Sometimes, a brand may not exactly have the resources or capability to internally handle or dispel IP rights abuse issues. Consider connecting with a company that specializes in brand protection. For many businesses, this may not be the most budget-friendly or cost-effective plan – outsourcing usually costs a lot of money.

However, at AXENCIS, the smart brand protection plan is deployed by our team of expert investigators using our brand-developed, monitoring and surveillance software to scan all major online marketplaces for infringements. We constantly monitor the web and run background checks on possible infringement cases for verification, prior to the full take-down and prosecution procedures. We also secure substantial compensations for our clients through the seizure of the culprits’ assets. All our services are rendered free of charge to the client, totally free of any hidden costs as our operational fees are covered from a percentage of the seized assets.

Not every outsourced service would deplete your revenue. For example, AXENCIS works to help you reclaim it.

Customer loyalty

It’s important to consider the possible impacts of IP rights enforcement on an existing fan base or customer pool. Referring back to the case of fan pages, if the community is not necessarily malignant to the progress of the company, a forceful approach might just cause the company to lose a significant number of loyalists. In this case, a diplomatic approach is wiser. Recall that this fan page is actually drawing attention and loyalty to your business – taking nothing for itself. Harshly uprooting them would most likely turn out to be counter-productive.

Future occurrences

When it comes to intellectual property problems, they are not exactly situations you can simply wish away. It’s important to always be ready for the worst because the larger a business grows, the more likely it is to be bothered by antics from people looking to tap into its success. Any strategy being implemented in the present should have some solid plans for preventing infringement cases in the future and protecting the brand in the long term.

“Brandjacking” Trend in 2021 – Rarely Beneficial, Mostly Destructive

For some context, imagine going through your Instagram DMs on a random day and you spot a message from the username: VersaceTrivia”. They claim you’ve been shortlisted for some contest organized by the global Italian fashion company, Versace, and all you have to do is pay $20 to a CashApp account to enroll in the trivia game. After this, you stand a chance to win $10,000 and free gifts from any Versace outlet in your locale.

From a mile away, many people would smell a scam being run by some dingbat who probably hasn’t paid his electricity bill for the month. There would be no need to link any of it to the actual, legitimate Versace. Sadly, not everyone would get the drift and you’d find people on forums, websites, even in Versace’s comment sections, calling them out for trying to scam customers and prospective patrons of an embarrassing $20 token.

Essentially, Versace’s reputation has been considerably dragged in the mud because their brand was hijacked, or, as MarkMonitor termed it, they got brandjacked. This is exactly what happens to companies on Amazon, eBay, and Wish when apparently, their products are being sold in hundreds but they only make meager profits. They are “sharing their identity” with dozens of other sellers and take-downs won’t always solve the problem.

By proper definition, brandjacking describes an activity or series of actions geared toward assuming the identity of a business, brand, person, company, or entity – totally or partially taking over certain elements from their name and logos to ideas and concepts. Basically, brandjacking means pretending to be a brand you are not. It’s like catfishing, but for businesses. Brandjacking is classified as a major form of IP rights infringement and brand abuse. Brandjackers always infringe on at least one or possibly all of a genuine brand’s trademarks, sometimes tapping into their customer pools, slashing revenue, ripping off customers, or smearing the reputation of the business.

However, brandjacking is a broad term and is not always performed with malicious intent and in rare cases, it could be beneficial to authentic businesses.

Since Instagram’s best functionalities were previously only on mobile phones with poor provisions for web-viewing on tablets and PCs, software developers Pek Pongpaet and Brandon Leonardo launched Pinstagram – a mash-up of Instagram and Pinterest. Users could then view Instagram feeds in the waterfall layout of Pinterest, resizable to fit different screen sizes.

While it certainly contributed to the popularity of Pinterest, Instagram benefited greatly as it had more people viewing across multiple devices. The brands never commented on this mashup, but they never sued or complained, either. This is one of the rare occasions where brandjacking causes no harm. Another instance is people creating fan/update pages of businesses and personalities on social media out of pure loyalty and love – with no intent to scam customers and fans or discredit the brand.

With the rise of the internet and the ease of creating fake pages and websites, brandjacking is at an all-time high and a major source of concern for businesses at all levels. Instagram alone records over a billion users on its app as of 2021, but in reality, only about 50-60% of the accounts are real. The rest are bots and fake accounts created by people for various reasons, one of which is brandjacking. On Facebook, the reality is the same and it’s seemingly worsening with time.

Categories of brandjacking (with example cases)

Identity Theft

This is the commonest form and the major scenario both in the physical world and in the online sphere. Infringers would assume the name, logos, social media usernames, associated designs, and general identity of another brand with the intent to steal customers and corner patrons to fake websites, stores, and pages. 

Consumers lose estimably $60 billion every year to identity criminals posing as legitimate businesses.

In 2017, a case went viral of a man who got scammed out of $100,000 when he made a one-time payment into a fake account for a luxury Mercedes Benz car. One of the numerous fake Mercedes pages on Instagram had built a pretty convincing and solid profile over a few months. From the Mercedes three-star logo to the exact website URL, the page had hijacked every facet of the German giant’s identity. Despite being unverified, 250,000 was pretty convincing and a guy parted with $100,000, only to find out the next hour that the page had been dissolved.

Fake employee/manager

One of the most common instances of this is on social media, where random accounts with AVIs of people sitting in front of PCs, wearing headsets, and looking all prim would slide into your DM. They’d claim to be employees or “verification managers” at Instagram/Facebook/Twitter, and with only $15,000, you could get the coveted blue tick on your account.

If you fall prey, you’d part with your precious cash.

Even in physical markets, many brands, especially small/growing businesses have gone under due to marred reputations caused by brandjackers. For example, a person could create a false ID and assume the identity of a real estate company, receiving down payments from eager homeowners, and eventually, they’d disappear with accumulated funds, leaving the company in trouble and dozens of payees, stranded.

Copy websites and fake online stores

You’d often see warnings from tech experts online, telling people never to enter their information on websites preceded by “http” instead of “https”, which is the more secure version. While this is great advice, it’s not foolproof because scammers now go as far as creating https sites and verifying online stores with similar extensions to existing businesses.

If an authentic business owns the URL, https://www.sandy.com, brandjackers could purchase https://www.sandy.net, https://www.sandy.org, or even https://www.sandyy.com, either to spite the business or scam its customers.

Smear campaigns

This usually happens when rival businesses take the competition too far. In 2011, Apple sued Samsung for $2.5 billion for smearing the former’s image in an ad campaign. Apple had just released the iPhone 5 and Samsung also debuted the Galaxy S3. The latter created a video showing a line of Apple’s fans queuing up to buy the iPhone 5, but somehow, they got confused about the specs and new features. Then enters the Galaxy S3, all bold and superior, taking the shine. Apple had none of it, and so the controversial lawsuit was slammed heavily on Samsung.

Subtle immersion

This involves tiny, seemingly negligible acts performed by a person or group to tap into the reputation of another business, geared toward increasing popularity and profit. While it comes off as non-parasitic, using the hashtags of another business repeatedly on your social media posts is a subtle form of brandjacking. 

Using the hashtag #burberry in all your posts would connect you to Burberry’s hashtag pull-up when customers search the brand. So your posts are getting promoted for free and instead of seeing exclusive Burberry content, fans would have to sift through your brand’s items as well – and it’s extremely annoying when this infringing content is not even related to fashion.

Staying ahead of brandjackers – what can you do?

The first question is, “Should every business, including the small ones be worried about brandjacking?”

The answer is YES. Even a one-month-old struggling business could be subject to brandjacking antics, and at this stage of the journey, it’s easy to pack up from the ripple effects of an early reputation smear. Many business owners believe that brand protection strategies should only be deployed when real problems occur. However, this would mean that a degree of damage has already been done. These safeguarding strategies should be deployed at the earliest stages for maximum protection.

Constant or periodic surveillance of the web

You need to virtually get some “boots on the ground” to monitor the internet and all major platforms for people posing to be you and abusing your brand. At AXENCIS, our smart brand protection plan is deployed by a team of expert investigators using our proprietary monitoring and surveillance software to scan all major marketplaces for infringements. We constantly monitor the web and run background checks on possible cases for verification, prior to the full take-down and prosecution procedures.

Buy up extra extensions and related domains

It’s not a waste of funds to invest in purchasing the .net, .org, .store, and .online extensions of your brand’s URL. This would prevent brandjackers from taking advantage of the free domains, afflicting your SEO progress, and possibly scamming your customers. As your visibility increases, you may also purchase common misspellings of your business name. For instance, Google.com owns the site googel.com, a common misspelling of their URL that redirects to the actual site.

Send email alerts to customers

This is another reason why virtual “boots on the ground” are important. Having all your loyal customers on an email list is essential for alerting them when possible scammers come up on your radar. Paypal employs this method regularly to warn its millions of customers around the world. Banks do this all the time, and it’s extremely helpful in keeping your patrons abreast of every possible identity theft situation.

Be prepared

Again, it doesn’t matter if your business is only a day old. Brandjacking doesn’t merely affect global giants or top public figures. Everyone could be a victim, on any scale, at any stage. Always be ready with a strategy to prevent infringers and brand abusers from taking advantage of your hard work. The best approach is to safeguard your reputation before it’s smeared. This way, you’d put up a stronger stand against brandjackers. 

Counterfeit face masks, PPE kits, and sanitizers: How covid-19 created a sub-industry for counterfeiters

 
 

While most of the world was grappling with the reality of a pandemic claiming lives, devastating public health, and crashing economies, criminal groups saw an opportunity to turn the tides in their favor. Across many places in early 2020, the prices of essentials such as face masks and hand sanitizers spiked by as much as 200%. Demand overrode supply by far and these items became a luxury to find and afford. Other personal protective equipment, as scarce as they were, could be sourced at prices 50-100% higher than normal.

This economic situation created the perfect avenue for counterfeiters and patent infringers to thrive at the highest potential – especially when governments made the use of safety items such as masks compulsory in many countries. As the store shelves ran empty, suppliers were locked out of countries due to travel restrictions, and people were willing to give anything for protective materials to be made available again.

As expected, fakes filled the markets and demand slowly began to recede. Especially in third-world countries, thousands of people complained of sanitizers burning the skin, masks with no filters, gloves that ripped within a minute of use, and medical practitioners were supplied substandard Hazmat suits that didn’t meet the strict industry-stipulated requirements. While the counterfeit prices weren’t as affordable as they before the pandemic, they were cheaper than the originals and over time, consumers began to specifically seek out cheap quality over standard materials. Many of these products are unbranded and despite merchandise protection efforts in many locations, they still flooded the pharmacies, local drug stores, and online marketplaces.

counterfeiters

A significantly outstanding case of safety gear counterfeiting was witnessed in India, where the highly unregulated trading atmosphere has made it especially easy for fake products to thrive. According to the Central Bureau of Investigation, India’s premier investigation agency, counterfeiters were using highly toxic substances to manufacture sanitizers and most people would fall into these scams following advance payments on rogue websites.

Copycat websites were a major issue for the United States. Hundreds of fake websites sprung up and still exist where people make payments and order batches of face masks, gloves, and sanitizers that may never be received. Some of the websites are created with such sophisticated automation technologies that they’d dissolve, vanish, and resurface with a different URL following every single verified purchase made.

“Because of the demand for PPE and things like hand sanitizer and toilet paper, we have a lot of people putting up websites purporting to offer those products. One of the things we see is where they essentially copy a legitimate website,” said Todd Kossow, director of the Federal Trade Commission in the Midwest. “The warning is really the same we give for any online shopping. It’s really easy for somebody to set up a website and purported to be a legitimate online merchant. Consumers should do their homework before they purchase something.”a

 
 

How to identify a fake N95 mask

N95 mask

The most available brand of N95 face masks is 3M, an American multinational business conglomerate and manufacturing company. However, in the wake of the COVID-19 outbreak, the company reported a spike in instances of fake cup-shaped N-95 respirators filling the markets, endangering people’s lives, and cutting into the company’s revenue pool as distribution channels continue to emerge in every part of the world. N95 masks have always been counterfeited but the pandemic caused exponential spikes in piracy figures.

Designed with special materials and filters, these masks are intended to prevent the spread of the virus and protect the wearer. Substandard N95 masks endanger the lives of users and ultimately damage the genuine company’s reputation. Many health workers have reported cases of being compelled to work with fake face masks due to the unavailability of original products.

Some guidelines are stated below on how to identify fake N95s, according to 3M.

  1. The printing on the mask would smear when wiped with alcohol.
  2. It has a strong chemical odor – something in the likes of urea or ammonia.
  3. The straps are too loosely attached or made of weak material.
  4. The mask is constructed out of thin, tissue-like filters and materials.
  5. Un-matching lot numbers on the box and mask.
  6. The mask does not fit – too small or too big.

How to identify fake Hazmat Suits

Hazmat Suits

Short for Hazardous Material suits, a Hazmat suit is defined by The United States Department of Homeland Security as “an overall garment worn to protect people from hazardous materials or substances, including chemicals, biological agents, or radioactive materials.” They come in various types and specifications, depending on the purpose of an outing and the possible level of harm. The suits worn by firefighters are a lot stronger and made with more refractory material than those worn by bio-agent personnel.

With regards to the pandemic, many health workers have a hard time believing in the existence of counterfeit Hazmat suits. However, there is very little beyond the capability of Chinese counterfeiters with sophisticated factories and substandard raw materials.

Some guidelines are stated below on how to identify fake Hazmat suits:

  1. Check the porosity. Some Hazmats are air-tight but a suit intended for use within proximity of a bio-agent should not be breathable.
  2. The attached gas masks may have rough markings around the openings. This is a sign of poor factory work and weak manufacturing standards.
  3. Check the body of the suit and attempt to confirm the serial number with the acclaimed manufacturing authorities. If it’s a fake, you won’t get past the first step as any attached website would most likely be defunct.
  4. The suit is either too unreasonably large or too small.
  5. The width of the suit is too tight. An original Hazmat suit should have enough room left for any body size.
 
 

How to identify fake hand sanitizers

hand sanitizers

Hand sanitizers are another gold mine for counterfeiters. The World Health Organization and other health regulatory bodies have ruled that standard hand sanitizers must contain at least 70% alcohol. Many counterfeiters would produce a version with as low as 40% alcohol and a generous supply of nitrogen oxide for the maximum cooling and quick-dry effect. People would end up inadequately sanitizing their hands against a powerful droplet-transmitted virus.

Below are guidelines for identifying fake hand sanitizers:

  1. Its alcohol content is less than 70%
  2. It has a foul odor such as urine, ammonia, or burning paper.
  3. It has extremely fragrant. Some hand sanitizers are made with fragrances but when t overwhelming, it becomes a red flag.
  4. It lacks manufacturing and expiry dates. No authentic manufacturer would bottle and package hand sanitizers for commercial sales without these important dates.
  5. It lacks a serial number or a QR code.
  6. It does not pass the hairdryer test: The hairdryer test is based on the principle that the boiling point of the sanitizer if it contains sufficient alcohol (78 degrees Celsius) will be reached faster than that of ordinary clan water (100 degrees Celsius). Scoop a tablespoon of sanitizer into one bowl and a tablespoon of clean water into another bowl. Heat a dryer and separately target each bowl for at least 30seocnds. If the sanitizer dries up more significantly compared to the water, then the alcohol content is appropriate. If only a little dries up, it most likely has an insufficient alcohol content.
We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Privacy Policy

What information do we collect?

We collect information from you when you register on our site or place an order. When ordering or registering on our site, as appropriate, you may be asked to enter your: name, e-mail address or mailing address.

What do we use your information for?

Any of the information we collect from you may be used in one of the following ways: To personalize your experience (your information helps us to better respond to your individual needs) To improve our website (we continually strive to improve our website offerings based on the information and feedback we receive from you) To improve customer service (your information helps us to more effectively respond to your customer service requests and support needs) To process transactions Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested. To administer a contest, promotion, survey or other site feature To send periodic emails The email address you provide for order processing, will only be used to send you information and updates pertaining to your order.

How do we protect your information?

We implement a variety of security measures to maintain the safety of your personal information when you place an order or enter, submit, or access your personal information. We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Payment gateway providers database only to be accessible by those authorized with special access rights to such systems, and are required to?keep the information confidential. After a transaction, your private information (credit cards, social security numbers, financials, etc.) will not be kept on file for more than 60 days.

Do we use cookies?

Yes (Cookies are small files that a site or its service provider transfers to your computers hard drive through your Web browser (if you allow) that enables the sites or service providers systems to recognize your browser and capture and remember certain information We use cookies to help us remember and process the items in your shopping cart, understand and save your preferences for future visits, keep track of advertisements and compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future. We may contract with third-party service providers to assist us in better understanding our site visitors. These service providers are not permitted to use the information collected on our behalf except to help us conduct and improve our business. If you prefer, you can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies via your browser settings. Like most websites, if you turn your cookies off, some of our services may not function properly. However, you can still place orders by contacting customer service. Google Analytics We use Google Analytics on our sites for anonymous reporting of site usage and for advertising on the site. If you would like to opt-out of Google Analytics monitoring your behaviour on our sites please use this link (https://tools.google.com/dlpage/gaoptout/)

Do we disclose any information to outside parties?

We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.

Registration

The minimum information we need to register you is your name, email address and a password. We will ask you more questions for different services, including sales promotions. Unless we say otherwise, you have to answer all the registration questions. We may also ask some other, voluntary questions during registration for certain services (for example, professional networks) so we can gain a clearer understanding of who you are. This also allows us to personalise services for you. To assist us in our marketing, in addition to the data that you provide to us if you register, we may also obtain data from trusted third parties to help us understand what you might be interested in. This ‘profiling’ information is produced from a variety of sources, including publicly available data (such as the electoral roll) or from sources such as surveys and polls where you have given your permission for your data to be shared. You can choose not to have such data shared with the Guardian from these sources by logging into your account and changing the settings in the privacy section. After you have registered, and with your permission, we may send you emails we think may interest you. Newsletters may be personalised based on what you have been reading on theguardian.com. At any time you can decide not to receive these emails and will be able to ‘unsubscribe’. Logging in using social networking credentials If you log-in to our sites using a Facebook log-in, you are granting permission to Facebook to share your user details with us. This will include your name, email address, date of birth and location which will then be used to form a Guardian identity. You can also use your picture from Facebook as part of your profile. This will also allow us and Facebook to share your, networks, user ID and any other information you choose to share according to your Facebook account settings. If you remove the Guardian app from your Facebook settings, we will no longer have access to this information. If you log-in to our sites using a Google log-in, you grant permission to Google to share your user details with us. This will include your name, email address, date of birth, sex and location which we will then use to form a Guardian identity. You may use your picture from Google as part of your profile. This also allows us to share your networks, user ID and any other information you choose to share according to your Google account settings. If you remove the Guardian from your Google settings, we will no longer have access to this information. If you log-in to our sites using a twitter log-in, we receive your avatar (the small picture that appears next to your tweets) and twitter username.

Children’s Online Privacy Protection Act Compliance

We are in compliance with the requirements of COPPA (Childrens Online Privacy Protection Act), we do not collect any information from anyone under 13 years of age. Our website, products and services are all directed to people who are at least 13 years old or older.

Updating your personal information

We offer a ‘My details’ page (also known as Dashboard), where you can update your personal information at any time, and change your marketing preferences. You can get to this page from most pages on the site – simply click on the ‘My details’ link at the top of the screen when you are signed in.

Online Privacy Policy Only

This online privacy policy applies only to information collected through our website and not to information collected offline.

Your Consent

By using our site, you consent to our privacy policy.

Changes to our Privacy Policy

If we decide to change our privacy policy, we will post those changes on this page.
Save settings
Cookies settings