• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
location icon香港中环雪厂街二号圣佐治大厦五楼503室phone-icon +852 2868 0696 linkedintwitterfacebook
OLN IP Services
close-btn
OLN IP Services
Get bespoke and commercially-driven advice to your Intellectual Property
Learn More
OLN IP Services
OLN Online
close-btn
OLN Online
Powered by Oldham, Li & Nie, the law firm of choice for Hong Kong’s vibrant startup and SME community, OLN Online is a forward-looking and seamless addition to traditional legal services – a true disruptor.
Learn More
OLN IP Services
  • 简
    • ENG
    • 繁
    • FR
    • 日本語
Oldham, Li & Nie
OLN IP Services
close-btn
OLN IP Services
Get bespoke and commercially-driven advice to your Intellectual Property
Learn More
OLN IP Services
OLN Online
close-btn
OLN Online
Powered by Oldham, Li & Nie, the law firm of choice for Hong Kong’s vibrant startup and SME community, OLN Online is a forward-looking and seamless addition to traditional legal services – a true disruptor.
Learn More
OLN IP Services
  • 关于
        • 奖项与排名
        • 企业社会责任
  • 专业服务
        • 加拿大公证服务
        • 中国事务
        • 破产法
        • 人身伤害法
        • Startups & Venture Capital
        • 中国委托公证服务
        • 争议解决
        • 公司和商业法
        • 家事法
        • 保险
        • 私人客户 – 遗产规划和遗嘱认证
        • 税务咨询部
        • 投资基金
        • 长者法律服务
        • 商业诈骗和资产追踪
        • 法国事务
        • 知识产权法
        • 日本事务
        • 合规、调查和执法
        • 公证服务
        • 金融服务监管部
        • 加拿大公证服务
        • 中国事务
        • 公司和商业法
        • 商业诈骗和资产追踪
        • 争议解决
        • 香港雇佣法和商业移民法律服务
        • 家事法
        • 法国事务
        • 投资基金
        • 破产法
        • 保险
        • 知识产权法
        • 公证服务
        • 人身伤害法
        • 私人客户 – 遗产规划和遗嘱认证
        • 金融服务监管部
        • Startups & Venture Capital
        • 税务咨询部
        • 日本事务
        • 长者法律服务
        • 合规、调查和执法
        • 中国委托公证服务
        • 香港雇佣法和商业移民法律服务
  • 律師團隊
  • 最新消息
  • 办事处

Suite 503, St. George's Building,
2 Ice House Street, Central, Hong Kong

Tel. +852 2868 0696 | Send Email
linkedin twitter facebook
OLN Blue

OLN

  • Block Content Examples
  • Client Information & Registration
  • Contact Us
  • Cookie Policy (EU)
  • Globalaw
  • OLN Podcasts
  • Privacy Policy
  • Review
  • Test Blog
  • 专业服务
  • 关于我们
  • 办事处
  • 加入我们
  • 律師團隊
  • 我们的历史
    • 奖项与排名
    • 高李严律师行的企业社会责任
  • 所获奖项
  • 标准服务条款
  • 联系我们
  • 评价
  • 评语
  • 高李严律师事务所和社区
  • 高李严律师行
  • 关于
        • 奖项与排名
        • 企业社会责任
  • 专业服务
        • 加拿大公证服务
        • 中国事务
        • 破产法
        • 人身伤害法
        • Startups & Venture Capital
        • 中国委托公证服务
        • 争议解决
        • 公司和商业法
        • 家事法
        • 保险
        • 私人客户 – 遗产规划和遗嘱认证
        • 税务咨询部
        • 投资基金
        • 长者法律服务
        • 商业诈骗和资产追踪
        • 法国事务
        • 知识产权法
        • 日本事务
        • 合规、调查和执法
        • 公证服务
        • 金融服务监管部
        • 加拿大公证服务
        • 中国事务
        • 公司和商业法
        • 商业诈骗和资产追踪
        • 争议解决
        • 香港雇佣法和商业移民法律服务
        • 家事法
        • 法国事务
        • 投资基金
        • 破产法
        • 保险
        • 知识产权法
        • 公证服务
        • 人身伤害法
        • 私人客户 – 遗产规划和遗嘱认证
        • 金融服务监管部
        • Startups & Venture Capital
        • 税务咨询部
        • 日本事务
        • 长者法律服务
        • 合规、调查和执法
        • 中国委托公证服务
        • 香港雇佣法和商业移民法律服务
  • 律師團隊
  • 最新消息
  • 办事处

Emigration from Hong Kong: The Importance of Pre-Migration Tax Planning (1)

OLN Marketing

Emigration from Hong Kong: The Importance of Pre-Migration Tax Planning (1)

August 9, 2019 by OLN Marketing

The colloquial phrase “the grass is always greener on the other side of the fence” is perhaps most fitting to describe the proliferation of emigration thoughts in the minds of the Hong Kong people recently. According to an article from the South China Morning Post, there were two distinct periods in Hong Kong which prompted a flux of emigration from Hong Kong: the first was before the handover of sovereignty over Hong Kong from Britain to China in 1997 whilst the second was after the “Umbrella Movement” by the Pro-Democrats in 2014. Now, the alarming situation in Hong Kong instils concerns into local residents over the stability and prosperity of the place, marking a possible third wave of emigration. Many have begun searching for an emigration destination which presents better living, better protection, and better future or retirement for themselves and their next generation. Census shows that the top destinations for emigration by the Hong Kong people include Canada, Australia, Taiwan and the United States. This article examines from a taxation point of view the considerations a person should pay due regard to before emigration so as to better plan for future taxes which might arise at the time of and after the emigration in the emigration country. For brevity, the article will limit its analysis to migration from Hong Kong to the United States, and accordingly, the taxation issues in this respect.

Brief Overview of Steps to Obtain US Citizenship

To obtain US citizenship, one has to first apply for permanent residency and the Lawful Permanent Resident Card, commonly known as the “green card”, before applying for naturalization after having held the “green card” for five years and satisfied other requirements.

For a resident alien, meaning a person who holds a “green card” or anyone who has stayed in the country for at least 31 days in one calendar year and 183 days over the past three years are subject to worldwide income tax, like US citizens.

Absence of Bilateral Double Taxation Treaty between Hong Kong and the United States

Hong Kong currently does not have a comprehensive treaty for double taxation with the United States as it has only concluded a double taxation agreement for shipping income.  This essentially means that, in the absence of bilateral tax concessions, a US citizen or resident alien whose income has a Hong Kong source will be taxed twice, one time in Hong Kong-based on Hong Kong’s territorial source principle of taxation, and another time in the United States based on the worldwide income principle.

Pre-emigration Tax Planning, FGT and FNGT

As could be imagined, one would face a drastic change in his/ her tax position by moving from a low tax regime (Hong Kong) to the US. There are a number of taxation tools available which can potentially mitigate the impacts.

 (1) Setting up a Trust

One of the commonly adopted tax planning tools is setting up a foreign grantor trust (the “FGT”) for people who wish to become a US tax resident.  Such tax planning tool is considered very efficient for people who own substantial assets prior to becoming a US tax resident, for US income tax and estate duty purposes. The beauty of such trusts is that the income from the distribution of such trust is not taxable. The income would otherwise be taxable if it comes directly to the US citizen from the underlying investments.

In a typical FGT structure, a non-US person will settle a non-US revocable trust for the benefit of US family members (including those who wish to emigrate to the United States).  From a US tax perspective, the settlor, during his lifetime, will be considered the owner of the trust assets.  It follows that any distributions to be beneficiaries (including those US persons) will not give rise to any US tax liability on the part of the beneficiaries notwithstanding the fact that there will be US reporting obligations. 

Foreign non-grantor trust (the “FNGT”), on the other hand, with appropriate structure in place, can achieve favourable tax results for US persons, especially in the context of inheritance. 

(2) Existing Trust

It is not uncommon that some Hong Kong people who wish to become a US person are already beneficiaries of a trust.  In light of any forthcoming US residency, the trust structure shall be revisited to avoid any adverse tax implications.

To minimise US taxes, generally speaking, the trust should prior to the beneficiary becoming a US person (1) make as much distributions as possible to the beneficiaries, (2) distribute all unpaid retained earnings and in which case the personal financials have to be revised to reflect that the beneficiary has already received the same and such distribution has now converted into the beneficiary’s personal assets which is not subject to US tax, (3) re-valuate the trust assets reflecting the mark-to-market adjustments in the financial accounts of the trust; and/or (4) “step up” in basis of the assets to minimise capital gain taxes.

Conclusion

In closing, in considering emigration (especially into the United States), one has to pay sufficient regard a priori to the tax ramifications with being a resident of the country emigrated to. There are various tax planning tools which can considerably reduce tax liabilities which have to be deployed before the change of residency. In this regard, a carefully-planned tax-minimisation framework should be adopted before emigration to maximise tax efficiency

OLN provides a range of tax advisory services in the migration context. If you have any questions on the above, please contact one of the members of our Tax Advisory Team.

Disclaimer: This article is for reference only. Nothing herein shall be construed as US or Hong Kong legal advice or any legal advice for that matter to any person. Oldham, Li & Nie shall not be held liable for any loss and/or damage incurred by any person acting as a result of the materials contained in this article.

Filed Under: 税务咨询部

Motion! Debate Training

July 31, 2019 by OLN Marketing

On Saturday, 27 July 2019, OLN partnered with ChickenSoup Foundation to host another meaningful CSR event with students from Mu Kuang English School. Through two rounds of debate training in English, our volunteers were able to pass on their critical thinking, presentation and advocacy skills as lawyers to the young students. We were delighted to hear from the enthusiastic participants that they learnt a lot of useful skills in presenting their arguments in a succinct, cohesive and organized manner through this workshop, and the school is now contemplating further training for the students!

Stay tuned for our next CSR event in October – Brick party plus community dinner!

Filed Under: 最新消息

How to Tackle Email Scams

July 16, 2019 by OLN Marketing

You cannot trust anyone — “One may smile, and smile, and be a villain.”

While not everyone has heard of this quote from William Shakespeare’s famous play Hamlet, you will have to agree that it fittingly describes the Hamlet-esque story that you find in your email inbox out of the blue: his father having passed away, a Nigerian prince’s throne was usurped by his uncle and he now needs your help to transfer his funds out of Nigeria, in return you would keep a portion of the funds. All you have to do is to give him your personal details (so the Prince knows who you are), your bank account number (for you to temporarily “safekeep” his funds), and of course, to pay a fee in advance.

Yes, this is apparently a scamming technique that has been widely deployed since the 1980s, and while every year there are still people who succumb to the temptation of windfall, more and more people are aware of the reality.

Fraudsters are therefore making use of a different modus operandi in recent years, one that is more specific instead of the “spray and pray” Nigerian prince model. Also carried out by way of email scam, fraudsters would first hack email accounts or compromise computers to obtain vital information, then tailor-make the fraud scheme to deceive the email recipients into paying them.

How do email scams operate?

In many cases that we came across, the victims are mostly trading companies with business counterparts all across the globe. The diagram below illustrates how the scheme operates.

  1. There had been genuine sale of goods by the Supplier to the Victim.
  2. The Supplier then sent payment invoice (sometimes together with the bill of lading, the purchase order etc.) to the Victim via email. 
  3. The Fraudster, having hacked the Supplier’s email account, pretended to be the Supplier and send a forged payment invoice, bill of lading and purchase order by changing the bank account details and the document letterheads via email. The forged email would normally come from a fraudulent account which is strikingly similar to the Supplier’s genuine email account (e.g. changing from sales@abcengineering.com to sales@abcengineeering.com), misleading the Victim to believe that the email was from the Supplier itself. The façade is further reinforced by the Fraudster justifying the different payment details with excuses such as change in accounting policies. The Victim is of course reasonable and courteous enough not to venture too far and challenge the legitimacy of such policy.
  4. The Victim, failing to notice the subtle difference in the forged email, remitted money to the Fraudster’s bank account.
  5. The Victim would eventually realize the scam perpetrated by the Fraudster upon the Supplier’s reminder chasing for payment or its notice that money was never received. The scam might be discovered slightly earlier if the Victim sends a remittance advice to the Supplier, and then the Supplier informs the Victim that the recipient bank account is apparently not the Supplier’s bank account.
  6. By that time, it is likely that the Fraudster has dissipated the funds from its bank account, most probably to other jurisdictions.

What to do next?

  1. A complaint should be filed to the Hong Kong Police or the Joint Financial Intelligence Unit (JFIU) such that they might take action to freeze the Fraudster’s bank account in Hong Kong.
  2. At the same time, the victim should file a parallel report to the relevant authority in its jurisdiction. Certain jurisdictions have online reporting systems dedicated to cybercrimes, such as the Internet Crime Complaint Center (IC3) under the U.S.A. Federal Bureau of Investigation and the U.K. “Action Fraud” National Fraud & Cyber Crime Reporting Centre.
  3. A letter should also be issued to banks (including the sending and recipient banks), alerting them of the scam and demanding return of the defrauded fund and/or preservation of the fund in the relevant bank accounts.

The victim’s effort to recover the money is always a race against time. It is therefore always advisable to act as soon as possible, and ideally within 24 hours from the fund transfer, as thereafter the fraudster is very likely to have already dissipated the funds. If law enforcement authorities or banks have not decided to freeze the relevant accounts, the victim should seek assistance from lawyers to apply for a Mareva Injunction (i.e. asset-freezing order) on the civil route to prevent dissipation. 

If the money is successfully retained in the bank account pursuant to the injunction, civil proceedings should be commenced against the bank account holder to recover the money in equity. The fraudster is very unlikely to contest the proceedings (by this time he probably has absconded) so the victim can apply for a monetary default judgment against the fraudster unhindered. To actually recover the money, the victim then needs to apply for a garnishee order, which once granted will compel the bank to directly transfer the money from the fraudster’s bank account to the victim.

Recent case law suggests that other than the conventional way of obtaining a monetary default judgment, the victim might also seek a declaration in default to assert a proprietary claim over the funds in the fraudster’s bank account which, if succeeds, would lead to a vesting order. The bank will then be compelled to immediately transfer the money back to the victim without the need to wait for the garnishee order. 

If the money has already been dissipated by the time the injunction is obtained, the victim will have to take extra steps to “trace” the money. A discovery order for banker’s record needs to be obtained first, so that the victim can ascertain the flow of the money and track down where it was transferred to. Most of the time it would be a cross-jurisdiction transfer, which adds another obstacle to the victim’s recovery. The victim will have to engage lawyers in that jurisdiction to commence new proceedings against the new, foreign recipient of the money, and also conduct further discovery and tracing to ascertain the latest whereabouts of the money. As one may see, if the money cannot be frozen in time, the matter will be very complicated with time and costs spiraling out of control, and at the end of the day, the fraudster may still be one step ahead of the victim so that the victim cannot recover the stolen money. This is exactly why the victim is advised above to act as soon as possible.

Prevention is better than cure

It is always better to take preventative measures rather than looking out for remedies. You may check out some practical preemptive measures from the Police’s article “Tips for Smart Netizens” which is available at http://www.police.gov.hk/ppp_en/04_crime_matters/tcd/tips.html

What OLN can do for you

OLN has acted for the victims in many email scam incidents, and electronic fraud cases generally. On most occasions, OLN has successfully obtained the Mareva Injunction and recovered a substantial portion of the defrauded money (if not entirely). With extensive experience in civil litigation, we will be able to assist you in a swift and efficient manner. 

Another fitting quote by William Shakespeare in Henry VI would be appropriate to conclude this article:

“Wise men ne’er sit and wail their loss, but cheerily seek how to redress their harms.” 

This article is for information purposes only. Its contents do not constitute legal advice and readers should not regard this article as a substitute for detailed advice in individual instances.

Filed Under: 争议解决

Quick way to get what you want before starting the legal fight with fellow partners and shareholders – Injunctions

July 5, 2019 by OLN Marketing

Shareholders disputes can take years to conclude whether via arbitration or the court system in HK but interim injunctions can offer quick relief even before the issuance of legal proceedings.

Injunctions can be used to maintain a board’s composition and prevent “illegal” resolutions from being passed:

  • To remain in management of the company: When 2 camps of shareholders are in a disagreement over the management of the company, often, directors are removed from the board without the appropriate number of votes or proper notice, in violation of the articles of association/shareholders agreement. One way of maintaining the status quo before the alleged breach took place is to obtain a pre-action injunction requiring the company to reconstitute the board such that those wrongfully removed are re-appointed. The victim can subsequently issue the proper proceedings to support the injunction, e.g. fraud, unfair prejudice, breach of contract. In the right circumstances, with the interim injunction in place, parties will gain leverage in subsequent settlement negotiations.
  • To prevent board/shareholders meetings from abuse: When directors do not observe terms imposed by contract or statute in holding board/shareholders meetings, an injunction can be obtained to restrain the convening of the meeting in question and the passing of specific resolutions.

Injunctions are also important tools in protecting the very assets that form the subject matter of the dispute. Often, interim injunctions effectively dispose of the dispute. 

  • To identify the wrongdoer and important evidence against the wrongdoer from an innocent third party (Norwich Pharmacal): Quite often, assistance from the Court is required to compel an innocent third party, e.g. a bank in internet fraud cases, to disclose information or documents relating to the wrongdoer and the wrongdoing.
  • To secure source of payment pending suit (Mareva): Restraining a defendant or would-be defendant from dissipating assets is a very important legal remedy in a variety of cases especially where the ownership rights of the assets in question are contested and their dissipation would effectively foreclose any chances of recovery/ enforcement, e.g. shares, cash in winding up cases.

One of the tricks lies in making the correct decision in conducting the application on an ex parte basis (i.e. where the other party is not aware of the application and is not present to argue their case) or on an inter partes basis (i.e. full notice to the other side is given).  Your legal advisor needs to strike a balance between several factors: maintaining secrecy, going for speed and running the risk of having the injunction discharged due to failure to provide full and frank disclosure.

Recent case development on anti-suit injunctions: In cross-border contractual disputes, a Hong Kong arbitration clause can form the basis of an injunction to restrain a plaintiff from continuing legal proceedings in a foreign jurisdiction (see Dickson Valora Group (Holdings) Co Ltd and another v Fan Ji Qian [2019] HKCFI 482).

If you wish to learn more about injunctions within the context of shareholders disputes or other types of litigation, please feel free to speak to our litigation partner, Eunice Chiu or stay tuned for our in-house CPD.

Eunice Chiu
+852 9169 4356 / 2186 1885
Partner, Dispute Resolution
Oldham, Li & Nie

Filed Under: 争议解决

Is Internet Doxing (起底) lawful?

July 5, 2019 by OLN Marketing

Introduction

With the advent of computer technology and abundance of information on the internet readily accessible by the public at virtually no cost, it is increasingly straightforward and cost-effective for individuals and organizations to seek information about one another for various purposes, for example for due diligence by business entities on their acquisition targets in the commercial world. On the other hand, it is also increasingly common to see internet doxing (起底) activities intended for “public trial by the netizens” (網絡公審) happen on online social media platforms. (For the purposes of this article, internet doxing means searching for and publishing private or identifying information about a particular individual on the Internet).

Recently, the Privacy Commissioner for Personal Data Stephen Wong Kai-yi has revealed in a radio interview that his office received a staggering number of over 200 complaints about Police officers being the subject of internet doxing. The Commissioner criticized that certain pictures and social media posts initially shared on the internet by some police officers for purely recreational reasons have been maliciously extracted and reposted on internet forums and other social media platforms with the ulterior motive of identifying those police officers who the perpetrator regards, rightly or wrongly, as “rogue” or “dirty” cops so that they could be castigated and ridiculed by other netizens. In particular, the Commissioner seemed to be of the view that such internet doxing could potentially be illegal because of the following reasons:- (1) even though the data was retrieved from the public domain, the data was there for a restricted purpose; (2) reposting was not authorised by the author; and (3) the extraction and application of the data might have been for an ulterior motive such as criminal threat or defamation.

Insofar as these internet incidences are concerned, this article aims to examine the surrounding legal issues arising from the specific question — have we unintentionally breached the law by conducting internet doxing?

Is mere investigation of personal data lawful?

Mere investigation, i.e. searching for and collating information without publishing it on the internet is lawful so long as it is obtained legally from the internet for domestic purpose, i.e. the information collected is kept by the user itself and not subsequently shared on the internet. This domestic purpose is specifically allowed by section 52 of the Personal Data (Privacy) Ordinance (Cap. 486) (“PDPO”). It is commonplace for individuals and organizations including law firms to undertake investigative and due diligence process. For example in a commercial deal, a prudent party would usually conduct internet due diligence on their counterparties. Many individuals also collect information on the internet for example about a celebrity for recreational purpose. Such activities themselves for own reading or information shall be lawful provided always that such information is obtained in a lawful manner.

Is collating, consolidating and reporting of personal data found from public domain lawful?

What if you make a further step from mere retrieval and investigation to collate, consolidate and reporting? While the issue has never been tried at Court, there has been an investigation report published by the Office of the Privacy Commissioner for Personal Data in 2013 concerning a mobile app provider “Do No Evil” (起你底).  Do No Evil (起你底) compiled a database of various personal information of individuals collected from the public records of various government institutions where the users of the app (mainly employers) could access such information as litigation and bankruptcy records of the targeted individuals before considering hiring them. The Commissioner was of the view that the app had breached PDPO because:  (i) it was not in line with Data Protection Principle (“DPP”) 3 of the PDPO as personal data is used outside the original purpose of being available in public authorities [to be further discussed below]; (ii) data subjects had reasonable expectation of privacy. It is perhaps not surprising to note that such views were subject to legal criticism.  First, “reasonable expectation of privacy” has no place in PDPO. Even if “reasonable expectation of privacy” exists, individuals waive such expectation or cease to have such expectation when their data have lawfully and officially been published in public domain. Second, nowhere was the “original purpose” stated in those public authorities. It appears artificial to imply certain restriction over the scope of purpose. In any event, in this particular case, the mobile app provider was only required by the Commissioner to cease disclosing data. The case was not brought to the Court system for adjudication and the legal issue therefore remains unsettled.

Is reposting of personal data found from public domain lawful?

PDPO imposes onerous obligations over data users in handling personal data received from the internet. DPP3 specifies that personal data should not be used for a new purpose without the prescribed consent of the data subject. “New purpose” under this principle refers to any purpose other than the one which was originally intended for when it was provided or collected or a directly related purpose. “Prescribed consent” means the express and voluntary consent given by the data subject in writing which has not been withdrawn. The Guidance on Use of Personal Data Obtained from the Public Domain published by the Office of the Privacy Commissioner for Personal Data makes it clear that “the fact that a data subject’s personal data can be obtained from the public domain shall not be taken to mean that the data subject has given blanket consent for use of his/her personal data for whatever purposes.” This view has also now been judicially affirmed in the court case of Re Hui Kee Chun CACV 4/2012. This evinces the PDPO’s strict objective to ensure personal data is kept adequately protected from misuse and abuse. For example, if a data user extracts different pieces of personal information of the data subject (from the same source or different sources) on the internet and publishes such information in a combined form on a social media platform, such as Facebook, this may breach DPP3 as each piece of information may have been initially provided for one or more specific purposes and their combination could potentially constitute a “new purpose” forbidden by DPP3.

Furthermore, in such a case, even if the data user does not himself makes adverse comments about the individual, if there is realistic risks of harm, including identity theft, financial loss, harassment, injury to feelings of the individual (such as allowing other forum users to hurl harassing comments on the individual), the data user may also breach section 64 of the PDPO, which prohibits usage of personal data with the intent to (a) obtain gain for himself/herself or another person or (b) cause loss to the data subject or (c) if the disclosure causes psychological harm to the data subject. An offence under this section is punishable by a fine of $1,000,000 and to imprisonment for 5 years. It should be noted that this section was rarely invoked in the past.  The actual application of this section could be problematic. First, it requires investigation on the state of mind of the data user because an “intent” is required. Second, psychological harm to the victim is largely subjective. The government emphasized, prior to the promulgation of PDPO, that the court will rely on expert evidence to prove whether disclosure of information has caused psychological harm to the victim.

It may also be worth noting that there are statutory exemptions to the above position under Part VIII of the PDPO. In brief, it would be lawful if the “new purposes” are:-

  1. prevention or detection of crime (section 58);
  2. prevention of serious physical or mental harm of any person (section 59);
  3. it is required by law to do so or it is for exercising or defending a person’s legal rights in Hong Kong (section 60B);
  4. it is published by a news activity business (section 61);
  5. it is for research and statistics where the identity of the data subject is kept anonymous (section 62); and
  6. emergency situation which calls identification of an individual who is reasonably suspected to be or is involved in a life-threatening situation (section 63 C).

OLN provides a range of legislative compliance legal services. If you have any questions on the above, please contact one of the members of our Team.

Disclaimer: This article is for reference only. Nothing herein shall be construed as legal advice to any person. Oldham, Li & Nie shall not be held liable for any loss and / or damage incurred by any person acting as a result of the materials contained in this article.

Filed Under: 争议解决

Amendments to the PRC Trademark Law to Combat Bad-faith Trademark Filings and Counterfeiters

June 27, 2019 by OLN Marketing

“Several Provisions for Regulating Trademark Application and Registration (“Draft for Comments”)” on 12 February 2019

The National Intellectual Property Administration, PRC (“CNIPA”) recently published “Several Provisions for Regulating Application for Registration of Trademarks (Draft for Comments)” (referred as “Draft” ) on 12 February 2019, aiming to strengthen regulation of trademark applications and registrations, and regulate bad faith trademark application and registration that seriously disorder to the market economy and trademark administration.

According to the Draft Provision listed out in Annex 1 an exhausted list of situations which are regarded as “abnormal application” for trademark registrations:

  1. Applying for registration of a trademark which is a imitation of others’ trademarks that the relevant public are familiar with, in order to ride on other’s business reputations;
  2. Pre-emptively registering a trademark which is already used by others and has a certain influence in order to abstract other’s business reputation via improper means;
  3. Pre-emptively applying for registration of a trademark that is identical with or similar to the marks/logos/names over which others have prior rights, and such existence of prior rights are known or should be known to the applicant;
  4. Applying for registration of trademarks repeatedly with obvious improper purpose;
  5. Applying for a large number of trademark registrations within a short period of time which obviously exceeds a reasonable limit;
  6. Applying for trademark registrations without intentional actual use, where there is no actual need to obtain trademarks exclusive right for goods and services;
  7. Applying for trademark registrations which violating the principle of good faith, infringing the legitimate rights and interests of others or disordering the market; and
  8. Assisting other individuals or trademark agents to perform application for trademark registrations items 1 to 7 above-mentioned.

Activity which falls within the meaning of abnormal application above mentioned shall be regulated according to the Trademark law.

Amendments to the PRC Trademark Law – passed on 23 April 2019 and will come effect on 1 November 2019

On 23 April 2019, the Standing Committee of the National People’s Congress (“NPC”) approved several amendments of the PRC Trademark Law (“2019 Trademark Law”) mainly strengthening and regulating bad faith trademark filings (the above said Draft has indeed been primarily embodied into this amendments), which is the fourth amendment of the PRC Trademark Law after the first in 1993, the second in 2001 and the third in 2013.

The swift release of 2019 Trademark Law was unexpected after a short time of the publication of the Draft. This is very likely to facilitate the trade negotiations on one of the topics relating to the protection of Intellectual property between China and the United States.

The amendments are primarily in relation to three aspects and change of six Articles:

  • Crackdown on bad faith trademark filings/filers;
  • Penalties for acts of malicious trademark registration and litigation; and
  • Rises of the statutory compensation/damages for trademark infringement.

Articles of the PRC Trademark Law amended:

Article 4: this clause “an application for trademark registration filed in bad faith without any intention to use the trademark shall be rejected.” was newly added to Article 4.

Article 19: “trademark agents shall not represent the applicant to file application for trademark registration if the trademark agents know or should know that the trademark violates Article 4.”

Article 33: “any party considers an application for trademark registration violates Articles 4 and 19.4 may oppose it within the publication period.”

Article 44: “a trademark registration that violates Articles 4 and 19.4 can be invalidated either by the TMO’s own initiative or an application for invalidation filed by any entity or individual.”

Article 63.1: “if malicious trademark infringement is serious, punitive damages is up to 5 times of the actual damages.” It is 3 times under the current Trademark Law.

Article 63.3: “if it is difficult to affirm actual lost, benefits from the infringement, and license fee, the statutory damages is up to RM¥5 million (around US$750,000)”. It is up to RM¥3 million (around US$430,000) under the current PRC Trademark Law.

Article 63.4: this clause “upon request of trademark rights owner, the Courts shall order destruction of the products bearing counterfeit trademarks, materials and tools mainly used to manufacture the counterfeit products without any compensations; or under special circumstances, the said materials and tools are prohibited to entry into business channels without any compensations” was newly added as Article 63.4.

Remark

The amendments are of concern to practitioners and true brand owners, who would benefit from these amendments. Under the amendments, applications for trademark registration filed in bad faith without any intention to use the trademark shall be rejected for registration, which shows that CNIPA takes serious actions to prevent pirated trademarks from being registered at the beginning. Besides, the increase of statutory compensation for trademark infringement may act a deterrent to trademark squatters.

In earlier 2018, CNIPA did refuse many applications that were considered as copies/imitations of others’ prior reputable trademarks. For instance, one Chinese company named “Weihai Disu Trading Ltd filed more than 300 applications for marks that fully contains others’ prior reputable trademarks. For more information about please see http://sbj.saic.gov.cn/gzdt/201801/t20180112_271756.html.

The amendments aim to help rights holders take action against bad faith trademark filers and counterfeiters. Nevertheless, this mainly depends on how the authorities implement the amendments in real cases. We are expecting more specific guidance from the implementation of the Amended Trademark Law, which is in general to be released before the effective date of 1 November 2019.

For more reference to the trend of Chinese government, please see http://english.cnipa.gov.cn/news/officialinformation/1138487.htm, after the pass of the 2019 PRC Trademark Law, Shen Changyu, head of CNIPA, said “China will continue to refine its intellectual property laws and improve its punitive damages system” on 25 April 2019.

Filed Under: 知识产权法

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • Interim pages omitted …
  • Page 53
  • Go to Next Page »

Primary Sidebar

This website uses cookies to optimise your experience and to collect information to customise content. By closing this banner, clicking a link or continuing to browse otherwise, you agree to the use of cookies. Please read the cookies section of our Privacy Policy to learn more. Learn more

Footer

OLN logo

香港中环雪厂街二号圣佐治大厦
五楼503室

电话 +852 2868 0696 | 电邮我们
关于 律师团队 办事处 OLN IP Services 私隐政策
专业服务 最新消息 加入我们 OLN Online
关于 专业服务 律师团队 最新消息 办事处
加入我们 OLN IP Services OLN Online 私隐政策
linkedin twitter facebook
OLN logo

© 2025 Oldham, Li & Nie. All Rights Reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
联系我们

请在此处分享您的消息的详细信息。我们会尽快与您联系。

    x