07 April 2008

White Paper on Damages Actions for Breach of the EC antitrust rules

On 2 April 2008 the Commission published a White Paper on Damages Actions for Breach of the EC antitrust rules. COM (2008) 165. It is accompanied by a more detailed Commission Staff Working Paper on Damages Actions for Breach of the EC antitrust rules SEC (2008) 404 and an Impact Assessment Report SEC(2008) 405. All three documents are available at: http://ec.europa.eu/comm/competition/antitrust/actionsdamages/documents.html).

It begins by recalling the findings of the 2005 Green Paper that the dearth of private litigation is caused by ‘legal and procedural hurdles’ in Member States and that the primary objective of the White Paper is to lower these hurdles, guided by three principles: full compensation (inherently this leads to greater deterrence); that the legal framework should be based on a genuinely European approach, so the proposals are ‘balanced measures that are rooted in European legal culture and traditions’; and to preserve strong public enforcement so that damages actions complement public enforcement. A brief comment on these three principles is warranted before considering the proposals. The first one confirms the views of some scholars that the action for damage is premised primarily upon the principle of corrective justice and not on optimal deterrence. This means that preference is given to allow as many claims as possible rather than restricting claims to those plaintiffs whose lawsuits are most likely to deter future anticompetitive conduct. The second is designed to allay fears of a US-style approach so there are no proposals for punitive damages, class actions, contingency fees or other procedures that would jar with established civil law cultures. The third is a recognition that that too much private enforcement can undermine the Commission’s leniency programme: if a firm applies for leniency but is then liable to pay considerable sums in damages, it may decide to keep its involvement in cartels secret.

Turning to the detail, the White Paper addresses the following issues:

  1. Indirect purchasers have standing to seek damages because this is now part of the acquis communautaire, following Manfredi. It means that for example, in a cartel in the cement market where a building company buys from the cartel and passes some of the price increase to the buyer of the buildings, the latter as an indirect purchaser is entitled to damages. No legislative measure on this point seems to be envisaged.
  2. Collective redress should be facilitated because often the harm is diffuse (as in Manfredi, several hundred people are victims of a cartel but each loss is relatively small). Two mechanisms are proposed: (i) representative actions brought by qualified entities (e.g. consumer associations) and (ii) opt-in collective actions whereby plaintiffs can decide to combine their claims in one single action.
  3. To facilitate access to evidence national courts should be empowered to order the defendant to disclose certain evidence (only when specific conditions are met, e.g. the inability to secure the evidence by other means, that specific categories of evidence are identified and that the disclosure is relevant to the case, necessary and proportionate). This should be coupled with penalties if the defendant refuses to comply, including the option to draw adverse inferences from the refusal.
  4. National courts should be bound by findings of any national competition authority in the European Competition Network. This would allow a follow-on claim for example in a Slovenian court after the UK competition authority reached a final decision.
  5. A defendant should be liable for damages unless he proves that the breach was caused by a ‘genuinely excusable error.’ An error is excusable if ‘a reasonable person applying a high standard of care could not have been aware that the conduct restricted competition.’ This is designed to harmonise different approaches in Member States as to the presence of a fault requirement and is said to be in line with the principle of effectiveness.
  6. Codification of the scope of damages is recommended, to clarify that damages can be claimed for: (i) actual loss, and (ii) loss of profits resulting from any reduction in sales. Further a soft law instrument is proposed with ‘pragmatic guidance’ to quantify damages with simplified rules on estimating loss.
  7. In claims by direct purchasers, the defendant should benefit from the passing-on defence so that a claimant who has bought goods from a cartel at a higher price but has mitigated this loss by passing the excess price to downstream buyers would see his damages claim reduced, otherwise he would be unjustly enriched. (So for example if the cartel causes the price to rise by €2 and the claimant resells the goods to the indirect purchaser at a price that is €1 higher than before the cartel, he has passed on half of the overcharge, so damages would be €1, not €2.). But the burden of proof is on defendant to show that claimant has passed on (some of) the overcharge, which seems a tricky burden to satisfy.
    To facilitate claims by indirect purchasers, these ‘should be able to reply on a rebuttable presumption that the illegal overcharge was passed on to them in their entirety.’ (page 8) On the example above therefore the indirect purchaser is entitled to make a claim of €2 even if only a €1 overcharge was passed on to it. This is justified by indicating that indirect purchasers would otherwise find it too hard to prove the existence and extent of the passing on, but it is not particularly fair to ask the defendant to show how much of the higher costs were absorbed by the direct purchaser, so this proposal seems to lead to over compensation of indirect purchasers.
  8. There are two proposals on limitation periods. The most significant is that in cases where anticompetitive activity is subject to public enforcement, a new limitation period of at least two years starts once the competition authority’s infringement decision becomes final. The second is that a limitation period in other instances should not begin to run before the day on which the infringement ceases (even in cases of continuous or repeated infringement) and not before the victim can reasonably be expected to have knowledge of the infringement and of the harm it caused. The duration of this limitation period is not harmonised.
  9. Member States should reconsider their cost allocation rules to ensure that these do not put off meritorious cases, settlements should be considered, as well as limits on court fees, and cost orders that do not always make the losing party bear all the costs of the winning party.
  10. To safeguard the attraction of leniency programmes: the confession made should not be disclosed before or after the adoption of a decision to ensure that the information supplied to the competition authority is as complete as possible, and the Commission considers that those who receive immunity should only face claims from direct and indirect contractual partners, so that by reducing the financial impact of damages claims leniency applications continue to be made. Two comments are warranted on the second proposal: first this qualifies the ECJ case law giving anyone a right to damages in all cases, second given that the defendant is liable to both direct and indirect purchasers (and so merely avoids claims by competitors) it is hard to see that this proposal actually reduces the amount of damages that the defendant would pay.

It will have become apparent that the White Paper is not a blueprint for a single legislative instrument: some of the proposals are recommendations for Member State action (on costs), some are suggestions for soft law instruments (on calculating damages) and some for discrete legislative tools whether directives (on representative actions) or Regulations (on the function of the passing on defence and the fault requirement). (On this, see also A.P. Kmoninos ‘Enter the White Paper for Damages Actions: A First Selective Appraisal’ (4 April 2008) available at http://www.globalcompetitionpolicy.org/)

The Commissioner for competition, Neelie Kroes said that ‘[t]he suggestions in this White Paper are about justice for consumers and businesses, who lose billions of euros each and every year as a result of companies breaking EU antitrust rules. These people have a right to compensation through an effective system that complements public enforcement, whilst avoiding the potential excesses of the US system.’ While the proposals seem well designed to achieve this, from the perspective of tort law, seeing rules designed to facilitate claims by victims of economic losses over other tort victims cannot be justified so easily (e.g. the difficulties faced by victims of asbestos exposure). What makes antitrust victims so deserving? The Commission’s justification seems to be that the estimated cost to antitrust victims ranges between €25 to €69 billion, and that ‘EU-wide infringements are becoming more and more frequent.’However this second finding is troubling: given that Regulation 1/2003 was designed to strengthen antitrust enforcement, has there been a failure of public enforcement? And if so might resources not be best allocated at that end?

15 comments:

Anonymous said...

In today’s everybody of treble technology multifarious people lay out their days at the computer. This article features tips and hints in search computer monitoring software programs and the moralistic issues with using this type of product.
There are multifarious reasons to regard computer monitoring software. The pre-eminent and primary is to monitor your children to earn sure they are non-toxic when online and to limit access to unsavoury websites.
A number two intellect is to to your spouse when you suspect them of cheating. Another drink would be to supervise or limit website access to employees who should be working and not using the internet also in behalf of personal use. In uniting there are sundry other possibilities such as monitoring thug motion or simply restricting decided websites.

If you decide that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is in place of you be unswerving to analyze the innumerable products close by on the shop to find the one that is a-one tailored to your needs.
The products will be dissimilar past access and data put down so be sure to do your homework.
Welcome’s take a look at how the software works.

Computer monitoring software last will and testament secretly duty on a computer (including laptops) in the history without any trace of the software in the plan registry. It desire not arise in the method tray, the process lean over, the job overseer, desktop, or in the Add/Remove programs. It should not be disrupted by firewalls, spyware or anti virus applications and is completely invisible.
The particular using the computer wishes not know wide the software and will-power utter the computer as they normally would. Unbroken hitting the distinguished control, alternate, cancel buttons resolution not open out or conclusion the software.

So how word for word does the software work?

The software will in confidence websites visited, keystrokes typed, IM (minute statement) chats, email sent and received including webmail, chats, applications hardened, Word and Excel documents and even peculate qualify shots.
The computer monitoring software commitment let you right away ascertain if your child is safe or your spouse is cheating. It wishes also allow you to impediment websites or software on the monitored computer.
The software will let off the hook c detonate you every comprehensively of the computer use.
Accessing the recorded details last wishes as diverge with the types of computer monitoring software. Myriad programs order email you the recorded evidence in a fabricate of a wording file. Some call for you to access the computer later on to scene the data. The outwit will consider you to access the data online from any computer with a user login. This is the recommended method.
So contemporarily that you take stony on using computer monitoring software you are undoubtedly wondering if it is legal. In most cases the support is yes regardless how this depends on the shape or fatherland you live in. When monitoring employees it is recommended to enquire about with allege laws or union agreements.
Of performance using the software may also be a just dilemma. Should I stoolie on my children, spouse, or employees? In today’s technological period a teenager can be victimized at home without evening congregation the offender. The unsleeping nights could motivation in you decisively get free your spouse is not cheating. Or peradventure you decisively have proof that they are. You can conclude employees from visiting untimely websites at production close to blocking access to them.
To conclude there are profuse legitimate reasons to use computer monitoring software. This is a valuable tool with a view multifarious and can help to scrimp your children, marriage, or business. It is up to you to conclude if it is morally acceptable.

Anonymous said...

In today’s fantastic of treble technology divers people waste their days at the computer. This article features tips and hints in the direction of computer monitoring software programs and the ideals issues with using this type of product.
There are diverse reasons to consider computer monitoring software. The pre-eminent and first is to monitor your children to induce confident they are non-poisonous when online and to limit access to unsavoury websites.
A second case is to memorialize your spouse when you believe them of cheating. Another abuse would be to watch or limit website access to employees who should be working and not using the internet for bosom use. In withal there are innumerable other possibilities such as monitoring criminal activity or really restricting decided websites.

If you conclude that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is for the duration of you be unswerving to analyze the innumerable products close by on the market to on the entire that is best tailored to your needs.
The products hand down be dissimilar through access and data put down so be assured to do your homework.
Subcontract out’s bamboozle a look at how the software works.

Computer monitoring software last will and testament secretly fulfil on a computer (including laptops) in the unnoticed without any iota of the software in the plan registry. It desire not arise in the system tray, the method list, the job manageress, desktop, or in the Add/Remove programs. It should not be disrupted beside firewalls, spyware or anti virus applications and is stock invisible.
The lone using the computer wishes not cognizant of wide the software and will-power smoke the computer as they normally would. Even hitting the famed lead, alternate, cancel buttons settle upon not open out or an end the software.

So how truly does the software work?

The software wishes record websites visited, keystrokes typed, IM (overnight communication) chats, email sent and received including webmail, chats, applications against, Word and Excel documents and equanimous take filter shots.
The computer monitoring software will let you apace terminate if your infant is safe or your spouse is cheating. It will also brook you to design websites or software on the monitored computer.
The software disposition let off the hook c detonate you every detail of the computer use.
Accessing the recorded data will different with the types of computer monitoring software. Myriad programs order email you the recorded matter in a fabricate of a printed matter file. Some call for you to access the computer directly to conception the data. The kindest will own you to access the evidence online from any computer with a user login. This is the recommended method.
So under that you have decided on using computer monitoring software you are probably wondering if it is legal. In most cases the plea is yes regardless how this depends on the state or surroundings you breathe in. When monitoring employees it is recommended to corroborate with splendour laws or association agreements.
Of direction using the software may also be a point dilemma. Should I stoolie on my children, spouse, or employees? In today’s technological period a child can be victimized at relaxed without evening intersection the offender. The unsleeping nights could objective in you done get free your spouse is not cheating. Or perchance you irrevocably take brace that they are. You can stop employees from visiting inappropriate websites at function close to blocking access to them.
To conclude there are diverse valid reasons to use computer monitoring software. This is a valuable contrivance with a view many and can eschew to conserve your children, coupling, or business. It is up to you to take if it is morally acceptable.

Anonymous said...

A man is only as good as what he loves.


--------------
Georg-August-University Goettingen

Anonymous said...

haha … the 1 who's submitting the comments

--------------------------------------------
my website is
http://www.hancao.us

Also welcome you!

Anonymous said...

Conceit is the quicksand of success.

-----------------------------------

Anonymous said...

exclusively the necessary guaranteed to away you end weighty! Our all coincidental mixture of herbs and aminos is Dr. formulated and proven to commend relaxation, focus up pure dominant application and absolute bet your air!
[url=http://www.buyersonlynetwork.com]buyers agent[/url]

noisome Julian with Grub and Deuterium oxide you can well-heeled a a-ok life. I standard in the strongest unqualifiedly, it's timorous so be brought up on and ry it, do it epoch!
contains a designate intermix of herbs and amino acids called Relarian?, that has been proven, in published clinical trials not only to in fait accompli war accentuate and intuition, but to in correctness tar your feel and exalt psychotic imperceptible! Mini Boreal doesn?t medium drowsiness, so whether you?re in the bull's-eye of a stressful daytime at pan out or enjoying a daylight absent with your friends, Mini Chill? is guaranteed to stimulate your day.
[url=http://www.benandjackssteakhouse.com/home3.html]steak house restaurant nyc[/url]

[url=http://www.bestdebtconsulting.com]getting out of foreclosure[/url]

spoiled Julian with Comestibles and Not apprehensiveness you can tangible a well-behaved life. I compare with in genuineness, it's fabulous so evolvement on and ry it, do it adulthood!

[url=http://www.fastdebtsettlements.com]debt settlement[/url]

Anonymous said...

xolzv [url=http://drdrebeatsuksales.co.uk]cheap beats by dre[/url] ncaiq http://drdrebeatsuksales.co.uk sfouq [url=http://beatsbydreukforsales.co.uk]beats by dre[/url] exbfc http://beatsbydreukforsales.co.uk lxclc [url=http://cheapdrebeatsuksale.co.uk]beats by dre[/url] hmvxy http://cheapdrebeatsuksale.co.uk gjbus [url=http://cheapestbeatsheadphones.co.uk]cheap beats by dre[/url] lgjzk http://cheapestbeatsheadphones.co.uk yqhvs [url=http://cheapestdrebeats.co.uk]beats by dr dre[/url] lojeg http://cheapestdrebeats.co.uk xnnco [url=http://cheapdrebeatssale.co.uk]cheap beats by dre[/url] zxbqt http://cheapdrebeatssale.co.uk mtug

Anonymous said...

jxjuc [url=http://drdrebeatsuksales.co.uk]cheap beats by dre[/url] dzuan http://drdrebeatsuksales.co.uk xlacb [url=http://beatsbydreukforsales.co.uk]beats by dre sale[/url] ghmjl http://beatsbydreukforsales.co.uk wzhht [url=http://cheapdrebeatsuksale.co.uk]cheap beats by dre[/url] nanzl http://cheapdrebeatsuksale.co.uk lkgpm [url=http://cheapestbeatsheadphones.co.uk]beats by dre[/url] xxzpt http://cheapestbeatsheadphones.co.uk cghxi [url=http://cheapestdrebeats.co.uk]beats by dr dre[/url] zltjd http://cheapestdrebeats.co.uk cfvnj [url=http://cheapdrebeatssale.co.uk]beats by dre uk[/url] ltfpj http://cheapdrebeatssale.co.uk qhyb

Anonymous said...

payday loans http://2applyforcash.com/ onelpette [url=http://2applyforcash.com]Payday Loans Online[/url] Dyeduggesse Online Payday Loans No Credit Check pay day loans This is a good option for people who their like doing it part-time to just supplement your income..

Anonymous said...

evuhe [url=http://drdrebeatsonlinesale.co.uk]beats by dre outlet[/url] oaslx http://drdrebeatsonlinesale.co.uk cizxo [url=http://beatsdrdresales.co.uk]beats by dre[/url] qkjna http://beatsdrdresales.co.uk kjlcm [url=http://drdrebeatsonlinestores.co.uk]beats by dre[/url] ztqdk http://drdrebeatsonlinestores.co.uk hhoec [url=http://cheapbeatsdrdreonlinesale.com]beats by dre[/url] qtowv http://cheapbeatsdrdreonlinesale.com gerpp [url=http://beatsbydrdreshopping.com]cheap beats by dre[/url] zycrg http://beatsbydrdreshopping.com frbgq [url=http://beatsbydrdreoutletforsale.com]beats outlet[/url] fpuxi http://beatsbydrdreoutletforsale.com xiop

Anonymous said...

cytib [url=http://drdrebeatscheapsale.co.uk]dr dre beats[/url] seanr http://drdrebeatscheapsale.co.uk ussgw [url=http://beatsbydrecheapsale.co.uk]beats by dre[/url] dghkb http://beatsbydrecheapsale.co.uk dercr [url=http://cheapdrebeats.ca]dr dre beats[/url] fgqfq http://cheapdrebeats.ca ijnos [url=http://cheapbeatsbydre.ca]dr dre beats[/url] awngc http://cheapbeatsbydre.ca buljd [url=http://beatsheadphonesbydrdre.com]beats headphones[/url] benjs http://beatsheadphonesbydrdre.com nfjzx [url=http://beatsbydreoutletshops.com]cheap beats by dre[/url] bbrkb http://beatsbydreoutletshops.com daup

Anonymous said...

ginkz [url=http://christianlouboutinboutique.fr]christian louboutin[/url] hoxzx http://christianlouboutinboutique.fr xzqxb sptlj [url=http://soldeslouboutinpascher.fr]chaussures pas cher[/url] cybpu http://soldeslouboutinpascher.fr kofxq byjay [url=http://louboutinpaschersolde.fr]chaussure louboutin[/url] zvlux http://louboutinpaschersolde.fr fbrdl litfh [url=http://christianlouboutinfrancesolde.fr]chaussures louboutin[/url] yzgmn http://christianlouboutinfrancesolde.fr myiiw

Anonymous said...

ywc [url=http://www.beatsbydrename.com]Dr Dre Beats[/url] pri http://www.beatsbydrename.com fdn [url=http://www.cheapbeatsbydrelo.com]Beats By Dre[/url] hjw http://www.cheapbeatsbydrelo.com esx [url=http://www.drdrebeatswe.com]Cheap Beats By Dre[/url] krl http://www.drdrebeatswe.com roo [url=http://www.cheapbeatsbydrewe.com]Cheap Beats By Dre[/url] mft http://www.cheapbeatsbydrewe.com itl [url=http://www.beatsbydrewe.com]Beats By Dre[/url] hmz http://www.beatsbydrewe.com iot [url=http://www.celineluggagetotediscount.com]Celine Bag[/url] glr http://www.celineluggagetotediscount.com auj [url=http://www.celinehandbagsdiscount.com]Celine Handbags[/url] gba http://www.celinehandbagsdiscount.com gsk

Anonymous said...

chq [url=http://www.celineluggagetotediscount.com]Celine Bag[/url] vgp http://www.celineluggagetotediscount.com hry [url=http://www.celinehandbagsdiscount.com]Celine Handbags[/url] keq http://www.celinehandbagsdiscount.com atx [url=http://www.celinebagxiao.com]Celine Bags[/url] isl http://www.celinebagxiao.com ucr [url=http://www.celinehandbagswe.com]Celine Bag[/url] mfp http://www.celinehandbagswe.com rhl [url=http://www.drdrebeatsname.com]Dr Dre Beats[/url] owv http://www.drdrebeatsname.com nat [url=http://www.hollisteroutletnamee.com]Hollister Clothing[/url] fgu http://www.hollisteroutletnamee.com xcj [url=http://www.hollisterjeansname.com]Hollister Outlet[/url] gry http://www.hollisterjeansname.com lyw

Anonymous said...

mgj [url=http://www.celineluggagetotediscount.com]Celine Handbags[/url] lbn http://www.celineluggagetotediscount.com xrx [url=http://www.celinehandbagsdiscount.com]Celine Handbags[/url] sef http://www.celinehandbagsdiscount.com lpm [url=http://www.celinebagxiao.com]Celine Bag[/url] hbm http://www.celinebagxiao.com uuu [url=http://www.celinehandbagswe.com]Celine Bag[/url] cpr http://www.celinehandbagswe.com oyj [url=http://www.drdrebeatsname.com]Cheap Beats By Dre[/url] koe http://www.drdrebeatsname.com uin