Glossary of Essential Brand Protection Terms
Welcome to our Glossary of Essential Brand Protection Terms. In this guide, you’ll find clear definitions and practical examples of the key concepts surrounding intellectual property and brand reputation.
Intellectual Property Terms
Intellectual Property (IP)
Intellectual property, or IP, refers to creations of human intellect. IP includes inventions, literary and artistic works, designs, symbols, names, images, and more. IP rights allow creators, inventors, artists and other IP owners to benefit from the product of their work by granting them exclusive rights to use, produce, and profit from their creations.
Trademarks, copyright, and patents are the most important forms of IP, but trade dress, trade secrets, and other forms of IP also exist.
An inventor devises a novel type of bicycle brake system, registers a patent for the design, trademarks the product name, and also copyrights the user manual. By holding these IP rights, the inventor can control who manufactures and sells the brake system and how the written material is reproduced.
Trademark
Trademarks exist as a symbol, word, phrase, logo, or design that identifies and distinguishes the source of goods or services. Trademarks are legally protected to prevent consumer confusion and unauthorized use by other people or organizations. Registering a trademark grants the owner exclusive rights to use it in connection with specific goods or services, ensuring that customers know exactly what and from whom they’re purchasing.
To use a real-world example, Adidas's trademarks include:
- The brand name "Adidas" (a word mark)
- The three stripes logo (a logo mark)
- The name and the logo as a combined element (a composite mark)
Copyright
Copyright is granted to the creators of original works of authorship, such as literary, artistic, musical, and certain other creative intellectual works. Copyright gives creators exclusive rights to reproduce, distribute, perform, display, or license their artistic works.
An author writes a series of mystery novels and obtains a copyright, ensuring no one can print or sell copies without her permission.
Patents
Patents grant exclusive rights to an inventor over their inventions. They last for a fixed period, allowing them to exclude others from making, using, or selling their invention. Patents protect new and useful inventions or discoveries, providing inventors with a temporary monopoly over their creation.
Utility Patent
A utility patent protects the functional aspects of inventions such as processes, machines, and compositions of matter and typically lasts about 20 years from the filing date.
A startup develops a new type of eco-friendly engine design and secures a utility patent, stopping competitors from making or selling an identical engine.
Design Patent
A design patent protects the ornamental appearance of products, focusing solely on how they look rather than their function, lasting about 14 or 15 years.
A company obtains a design patent for the sleek, wave-like exterior of its new smartphone case, preventing competitors from copying its distinctive shape.
Provisional Patent Application
A provisional patent application secures an early priority date at a lower initial cost. Lasting 12 months, it allows inventors to refine their inventions and prepare for a full patent application without losing their initial filing date.
An inventor files a provisional application for a medical device prototype, giving time to conduct further testing and finalize details before filing a full utility patent.
Trade Dress
The visual appearance of a product or its packaging that signifies the source of the product to consumers, including shape, color, and design. Trade dress is protected under trademark law to prevent consumer confusion regarding the origin of products. It encompasses the total image of a product, ensuring that competitors cannot imitate the look and feel to mislead customers.
Coca-Cola has famously protected the shape of their glass bottles with trade dress. To achieve this, Coca-Cola had to show that the bottle was inherently distinctive enough to earn protection, and that it is "likely to serve primarily as a designator of origin of the product". Compounded with trademark protection for the brand and product name, Coca-Cola has an airtight IP defense for their flagship product.
Trade Secret
Confidential business information that provides a company with a competitive edge and is protected from disclosure or unauthorized use. Trade secrets can include formulas, practices, processes, designs, instruments, or patterns. Maintaining secrecy through non-disclosure agreements and security measures is crucial, as unauthorized use is considered unfair competition and can be legally challenged.
A candy manufacturer keeps its special caramel recipe in a locked vault and shares it only with two trusted employees, preventing other confectioners from replicating its unique flavor
Industrial Design
The ornamental or aesthetic aspect of a product, which may include three-dimensional features like shape or surface, or two-dimensional features like patterns or lines. Protecting industrial designs encourages innovation in product development and prevents others from copying the visual features that make a product unique, thereby enhancing brand identity and market competitiveness.
A furniture maker protects the distinctive contoured form and geometric patterns on its new chair, ensuring rivals cannot market identical-looking seating that confuses buyers.
Trademark Dilution
The weakening of a famous trademark's reputation or uniqueness due to unauthorized use by others, even if there is no confusion among consumers. Dilution can occur through blurring (weakening the association) or tarnishment (harming the brand's image), ultimately diminishing the trademark's value and distinctiveness.
A well-known tech brand with a famous logo sees another company use a very similar logo on unrelated products. Even if consumers know they aren’t the same brand, this use diminishes the prestige and exclusivity of the original mark.
Cease and Desist Letter
A cease and desist letter is a formal request sent to an individual or organization demanding that they stop illegal or infringing activity. It is often a first step before legal proceedings.
A fashion company sends a cease and desist letter to a retailer selling counterfeit handbags, warning of further legal action if sales do not stop.
Injunction (IP Injunctions)
An injunction is a court order requiring an individual or business to stop certain activities. In IP law, injunctions can prevent further infringement while a case is being resolved.
A software firm wins an injunction against a competitor to stop distributing a program that infringes on its patented code.
Customs Enforcement
Customs enforcement refers to actions taken by border agencies to detect and seize counterfeit or infringing goods entering a country. Brands often work with customs to protect their IP rights internationally.
Customs officers intercept a shipment of counterfeit sneakers at a port, preventing thousands of fake pairs from reaching the market.
Notice-and-Takedown
Notice-and-takedown is a legal framework that allows rights holders to request the removal of infringing or illegal content from platforms. Platforms typically must act promptly once notified.
A film studio files a notice-and-takedown request with a video-sharing platform to remove pirated copies of its new movie.
Safe Harbor
Safe harbor provisions protect online platforms from liability for user-generated content, as long as they comply with notice-and-takedown requests and other legal obligations.
An e-commerce platform avoids liability for counterfeit goods sold by third parties after demonstrating compliance with safe harbor laws and promptly removing infringing listings.
Brand Protection Terms
Brand Protection
The strategies and actions taken to safeguard a company's brand identity, reputation, and intellectual property from unauthorized use or infringement. This includes legal measures, technological solutions, and proactive strategies to prevent misuse or dilution of the brand. Effective brand protection helps maintain brand value, ensures customer trust, and supports long-term business success.
A craft chocolate company trademarks its logo, employs a monitoring service to scan online shops for fake versions of its gourmet bars, and collaborates with customs to stop suspicious shipments at the border. When counterfeit bars surface, the company issues takedown requests and educates consumers on identifying authentic packaging. By actively enforcing its rights and maintaining tight quality control, the chocolate maker preserves its premium reputation and customer loyalty.
Saturation Rate
Saturation rate measures the share of a product category or brand presence that remains exposed to counterfeits, trademark abuse, or other IP threats. It focuses on the big picture: how much of the total market is still at risk. By tracking Saturation Rate over time, brand protection teams gain a clearer view of enforcement effectiveness and can prioritize resources where the need is greatest.
A luxury skincare brand uses saturation rate to monitor counterfeit risk across online marketplaces. They notice a spike in saturation rate for their best-selling serum and decide to focus enforcement efforts on that product.
Infringement
Unauthorized use of protected intellectual property rights, violating the rights of the IP owner. Infringement can occur intentionally or unintentionally and may result in legal action. Monitoring for infringement and enforcing rights through legal remedies are crucial for maintaining brand integrity and value.
A new startup copies patented aerodynamic wheel technology from a leading e-bike manufacturer without permission. Customers, believing they’re buying a superior product, encounter safety issues due to the substandard knockoff design.
Counterfeit Goods
Imitation products that are sold illegally under another's brand name without authorization. Counterfeit goods often have inferior quality and can pose safety risks to consumers. The proliferation of counterfeit products undermines legitimate businesses, erodes brand trust, and can lead to significant financial losses and legal complications.
A market stall sells watches that look identical to a luxury brand’s signature timepiece but are cheaply made knockoffs using the same logo without permission.
Knockoff or Copycat
A product that closely resembles another product in appearance and function, but doesn’t infringe on the trademarked name or other IP of the original item. These products are often made with cheaper materials and sold at a lower price. Knockoffs or copycats rely on actual innovators and creators to make new things, and can confuse consumers and dilute the market for genuine products, despite not being an actual counterfeit.
A clothing manufacturer produces jackets that closely resemble a trendy designer brand’s signature look—with similar stitching patterns and a distinctive cut. However, the copycat does not use the original’s brand name, making the product cheaper but potentially confusing shoppers who think it might be just as high-quality.
Digital Piracy
The unauthorized copying, distribution, or use of digital content, such as software, music, or movies. Digital piracy infringes on copyright laws and can result in substantial revenue losses for creators and rights holders. Combating piracy involves legal actions and technological measures like digital rights management to protect content integrity.
A website offers free downloads of a popular video game’s latest release without the developer’s permission, causing the legitimate publisher to lose potential sales.
Cybersquatting
The practice of registering, trafficking in, or using a domain name with bad faith intent to profit from the trademark of another. Cybersquatters often attempt to sell the domain back to the rightful owner at an inflated price or use it to deceive consumers. Legal remedies, such as the Uniform Domain-Name Dispute-Resolution Policy (UDRP), can help recover such domain names.
Someone registers the domain name “stellarfootwear.com” after learning of a new shoe brand called Stellar Footwear, hoping to resell it to the brand owner at a high price.
Typosquatting
A form of cybersquatting that relies on typographical errors made by internet users when inputting a website address. Typosquatters register misspelled versions of domain names to redirect users to malicious sites, display unwanted ads, or capture personal information.
A site called “facbook.com” intentionally capitalizes on common misspellings of “facebook.com,” redirecting users to deceptive pages.
Phishing
A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication. Phishing schemes often use emails or websites that mimic legitimate brands, tricking users into revealing passwords, credit card numbers, or other personal data.
An email pretending to be from a well-known bank urges recipients to “verify their account” by entering login details on a fake website, capturing sensitive data.
Social Media Impersonation
Creating fake social media profiles to deceive others by pretending to be someone else or a brand. Impersonators may spread misinformation, scam followers, or damage the brand's reputation. Brands must monitor social media platforms and engage with administrators to remove fraudulent accounts promptly.
An impersonator sets up an account mimicking a small vegan café, posting misleading updates about tainted ingredients and poor kitchen hygiene. Customers see the posts, believe the café’s standards have fallen, and stop visiting, hurting the real business.
Brand Hijacking
Brand hijacking occurs when unauthorized parties take over or misuse a brand’s identity online or offline, often to deceive consumers or redirect them to fraudulent products and services. This can damage reputation, confuse customers, and erode trust.
A fraudulent seller creates a fake online store using a well-known clothing brand’s logo and imagery, tricking customers into believing they are buying authentic items.
Fake Reviews / Review Manipulation
Fake reviews are fabricated customer feedback, often posted to artificially inflate or deflate a brand’s reputation. Review manipulation undermines trust and can mislead consumers into making poor purchasing decisions.
A competitor hires people to post dozens of negative reviews on a rival’s product page, driving down ratings and discouraging sales.
Deepfake Content Misuse of Brands
Deepfake misuse involves using AI-generated audio, video, or images to impersonate brands or their representatives. These can be used in scams, misinformation, or fraudulent advertising, eroding brand credibility.
A deepfake video of a company’s CEO circulates online, falsely announcing a merger, causing confusion and stock volatility.
Marketplace Infringement
Marketplace infringement occurs when counterfeiters, copycats, or unauthorized sellers exploit platforms like Amazon, eBay, or Alibaba to sell infringing goods. These platforms can be hotspots for IP abuse.
Multiple sellers on Amazon list fake versions of a luxury watch, using stolen product photos and descriptions to deceive buyers.
Web Crawling / Scanning for Infringement
Web crawling for infringement involves using automated tools to scan websites, marketplaces, and social media for counterfeit goods, piracy, or unauthorized brand use.
A brand uses automated crawlers to identify unauthorized sellers listing its products on dozens of online marketplaces.
AI-Powered Brand Monitoring
AI-powered monitoring uses machine learning to detect and track brand misuse, counterfeits, or IP violations across digital channels at scale.
An AI system alerts a fashion company when a newly launched counterfeit handbag listing appears on a social media marketplace.
Image Recognition for Counterfeits
Image recognition technology identifies counterfeit products by comparing images of goods to authentic brand visuals, detecting mismatches in logos, packaging, or product design.
An online marketplace integrates image recognition to automatically flag fake sneakers with incorrectly shaped logos and mismatched stitching.
Brand Compliance Monitoring
Brand compliance monitoring ensures that authorized sellers, licensees, or partners follow brand guidelines, pricing policies, and IP agreements.
A brand monitors online retailers to ensure they follow its Minimum Advertised Price (MAP) policy and use approved marketing materials.
Takedown Automation
Takedown automation leverages technology to streamline sending takedown notices and enforcing IP rights across multiple platforms simultaneously.
A software tool automatically generates and submits takedown requests to marketplaces hosting counterfeit product listings.
Reputation Management
Reputation management involves strategies to influence and maintain how a brand is perceived online and offline. It includes monitoring reviews, addressing negative publicity, and promoting positive messaging.
After a viral negative review, a hotel responds promptly, resolves the issue, and encourages satisfied customers to share their experiences online.
Online Brand Trust
Online brand trust is the confidence consumers have in a brand’s authenticity, reliability, and ethical conduct in digital environments. Strong brand trust drives loyalty and long-term engagement.
A retailer boosts online brand trust by offering secure payment systems, authentic product guarantees, and transparent customer service.
Brand Security
Brand security refers to the protection of a company’s assets, reputation, and intellectual property from both digital and physical threats. It spans cybersecurity, anti-counterfeiting, and enforcement strategies.
A luxury watchmaker implements strict cybersecurity protocols and collaborates with enforcement agencies to prevent counterfeit sales.
Risk Assessment (Brand/IP Risk)
Risk assessment involves evaluating potential threats to a brand’s reputation, IP rights, and operations. This process helps businesses prioritize enforcement actions and allocate resources effectively.
A brand conducts a risk assessment to identify which product categories face the highest counterfeit exposure, prioritizing enforcement in those areas.
Gray Market Terms
Gray Market Goods
Authentic branded products that are sold through unauthorized channels, often circumventing authorized distribution networks. While not illegal, gray market goods can affect pricing, customer service, and brand reputation. Brands may lose control over product quality and warranties, leading to customer dissatisfaction.
A retailer purchases authentic smartphones from a foreign distributor and resells them domestically without the brand owner’s approval, offering no official warranty or support, and selling them under the price set out by the MAP (Minimum Advertised Pricing) policy.
Parallel Importing
Importing genuine branded goods into a market without the consent of the intellectual property owner, often at lower prices. Parallel imports can disrupt authorized distribution agreements and impact local pricing strategies. Legal treatment varies by country, creating complexities in enforcing brand protection.
A seller buys genuine designer bags cheaply in another country and then resells them locally at discounted rates, circumventing the brand’s authorized distribution system.
Unauthorized Resellers
Unauthorized resellers are individuals or businesses that sell genuine branded products without the approval of the brand owner. While the goods themselves may be authentic, unauthorized reselling can undermine pricing policies, warranties, and customer service standards.
A reseller purchases legitimate skincare products from overseas distributors and sells them on e-commerce sites without the brand’s consent, bypassing official pricing and quality controls.
Product Diversion
Product diversion refers to the distribution of genuine goods through unintended or unauthorized channels. These diverted products may not meet the brand’s quality, pricing, or geographic restrictions, creating inconsistencies in the market.
A beverage company ships drinks intended for hotels in Asia, but distributors resell them to supermarkets in Europe at lower prices, undercutting local authorized partners.
Supply Chain Leaks
Supply chain leaks happen when branded products are lost, stolen, or deliberately diverted during manufacturing or distribution. Leaked goods often end up in unauthorized markets, damaging pricing integrity and increasing counterfeit risks.
A shipment of luxury handbags disappears from a logistics hub and surfaces on unauthorized online marketplaces at discounted prices.