{"id":101149,"date":"2018-09-12T06:05:12","date_gmt":"2018-09-12T10:05:12","guid":{"rendered":"https:\/\/ipwatchdog.com\/?p=101149"},"modified":"2018-09-11T20:14:11","modified_gmt":"2018-09-12T00:14:11","slug":"managing-international-trademark-portfolios-globalization","status":"publish","type":"post","link":"https:\/\/ipwatchdog.com\/2018\/09\/12\/managing-international-trademark-portfolios-globalization\/id=101149\/","title":{"rendered":"Managing international trademark portfolios in the Age of Globalization"},"content":{"rendered":"

\"\"<\/a>Managing international trademark portfolios in the age of globalization can be a fickle endeavor.\u00a0 Ecommerce has blown the top off traditional thinking as it relates not only to advising your clients on what and where to file, but also how to strategically maintain those filings in the face of an increasingly crowded and adversarial global marketplace.\u00a0 When a brand attempts to gain a foothold with an emerging clientele, fortune tends to favor the strategically bold.\u00a0 For this reason, companies are often trying to establish their IP rights in countries where actual use or implementation may not be in the cards for years.\u00a0 In the case of trademarks, the benefits are obvious: if\/when a product is launched, a service begins, or a brand is introduced, a strong and enforceable portfolio is waiting to greet and protect it.\u00a0 However, in jurisdictions around the world, such a strategy leaves open the possibility of an attack on these rights, most commonly in the form of a non-use cancellation action.\u00a0 Thus, when considering a trademark filing strategy for international clients, it is important to contemplate a workable scheme to protect the filings from eventual vulnerability.<\/p>\n

If use of the trademark in association with the goods\/services for which it is registered is sufficient, vulnerability is not a concern.\u00a0 But what if there is only partial use?\u00a0 What if there is no use at all?\u00a0 Assuming the trademark owner maintains an interest in protecting the assets, there are helpful considerations for formulating a vulnerability strategy.<\/p>\n