Duševní vlastnictví

This page is also available in

Displaying 11 - 20 of 20

Pages

přijatá stanoviska on 14/03/2018
Odkaz: 
INT/840-EESC-2017-06184-00-00-AC-TRA
Plenární zasedání: 
533 -
Mar 14, 2018 Mar 15, 2018

The EESC agrees with the Commission's objectives regarding the harmonisation of legal systems and the interpretation of the 2004 intellectual property rights enforcement directive (IPRED).

Intellectual property package

přijatá stanoviska on 11/12/2014
Odkaz: 
REX/416-EESC-2014-5462
Plenární zasedání: 
503 -
Dec 10, 2014 Dec 11, 2014

The main policy objective is to reduce the level of IPR infringements outside the EU – which detrimentally affect EU right holders – while better tailoring our action so as to also take account of specific challenges and needs of for example developing countries.

Strategy for the protection and enforcement of intellectual property rights in third countries

přijatá stanoviska on 16/09/2015
Odkaz: 
CCMI/136-EESC-0000

Digital technologies have reached a degree of maturity that allows their use across a wide range of economic sectors in manufacturing as well as in service industries. According to the 2010 edition of the European Working Conditions Survey (EWCS), more than 50% of the EU workforce use ICT in their daily work, with individual EU Member States reaching rates above 85%. Services sectors are identified as the heaviest users of ICT (for instance, more than 90% of finance employees using ICTS in their daily work), which is to be seen as a natural consequence of the increasing digitalisation of many services – such as eBanking, eCommerce, and online media. 

Effects of digitalisation on service industries and employment (own-initiative opinion)

Study
120 pages

This study examines the impact of cyber-related threats and challenges on corporate Europe and the degree of engagement of European businesses in tackling issues at stake. Although the new digitization era offers huge economic and social opportunities, it also changes the nature and magnitude of cyber risks and creates new vulnerabilities cyber attackers seek to exploit.

Published in: 
2018

Pages