Six Tactics for Identifying and Guarding Against IP Infringement