SlideShare una empresa de Scribd logo
1 de 36
You’re not in
Kansas anymore!

Protecting
Trade Secrets
In China

Jay Hoenig
                           MGM Studios
Hill & Associates, China

February 2009
About Hill & Associates
 Hill & Associates – Global
    Established in 1992 (HQ in Hong Kong)
    Asia’s largest risk management firm with 16 offices and 400 staff
 Hill & Associates - China (Shanghai, Beijing, HK)
    Established in the PRC in 1994
    Wholly Foreign-Owned Enterprise (WFOE)
 Four Primary Service Lines
    Fraud Prevention & Integrity Risk Management
    Corporate Intelligence
    Asset Protection & Enterprise Risk Management
    Risk Intelligence
 Compliant with international and local regulations and professional
 business ethics
Hill & Associates -- Clientele
Discussion Topics

I.    Trade secrets – More than just IP
II.   The Long March – Communes to market economy
III. Prevention is key!
IV. Fraud, theft, and corruption in China
V.    Proactive protection measures
VI. Conclusion
Trade Secrets & IP


“American Nobel Laureate Robert Solow discovered back
in 1956 that about 88 % of economic growth is attributable
to innovation.


…………………In today’s globalized economy that is truer
than ever. Innovation is a fundamental means of
differentiation.”


                                                     Mr. Werner Wenning
                             Chairman of the Board of Management, Bayer
                                                         June, 30th, 2004
Trade Secrets – More than just IP

•   Intellectual property (R&D activities)
•   Brands, trademarks, copyright, patents
•   Chemical processes, formulations and recipes
•   Manufacturing know-how
•   Machine design and performance data
•   Plant design and operations
•   Internal work processes
•   Training manuals
•   Financial data, client data, employee list
•   Vendor and supplier data
•   Strategic and tactical business plans
“…………Tell Me About China…….”
     Land of Complexities/Extremes/Contradictions

 •    Old/new cultures and environment
 •    Very rich/very poor
 •    “Relationship based”/rule of law
 •    Ethical/unethical behavior
 •    The “Party” direction/market economy
 •    Open/protected markets
 •    SOE’s - employment driven/profit driven
 •    Centralized/decentralized government
 •    Regulated/under regulated businesses
 •    Fast/slow – “rate of change”/bureaucracy
 •    Plaza 66/Wuling – the real China

All of these impact the IP/TS operating environment
Not in Kansas anymore…
• China is a high risk environment for IP
  and trade secret protection               “Toto, I have a feeling
• PRC investment incentives for              we’re not in Kansas
  bringing advanced
  technologies….why?                             anymore!”
• Threats from rogue employees,
  domestic and foreign competitors,
  vendors, suppliers and the State

• Competition for technology and a
  “competitive” edge is increasing

• Relying on the “legal” system for
  appropriate recourse is not realistic

• The question is not “if” you will loose
  your trade secrets, but “when”

• Companies should have a structured,
  disciplined and integrated approach                           MGM Studios

  to IP and TS protection
Business Environment – “Free for All”
The Long March -- Communes to market
                   economy




1989…a swamp!




…and now a global
business centre!
Before 1979 – Absolute economic disasters




 Eating from the Big Guo     The Great Leap Forward




The Great Steel Production   The Cultural Revolution
Phase 1: 1979 to 1992
 Starting from zero

• People’s communes ceased to
  exist

• Production units responsible for
  own profits and losses

• “Special Economic Zones”
  established

• From SRE to SOE

• 1989 Tiananmen Square incident
  – major set back to reform
Phase 2: 1992 to 2003
Deng’s economic reforms
State-owned enterprise reform
• Protect larger ones, let go of small ones
• SOEs step back, private enterprises move
   forward

• Privatization of SOEs
       M&A
       Convert to share holding company
       Sell to private sector

Famous Deng quotes:
• “Black cat and white cat”
• “Feeling the stones to cross the river”
• “Let a small group of people get rich first”
Phase 3: 2004 to Present
Scientific Development/Harmonious Society

• Less need for foreign capital; just technology & innovation
• Migration to high value/high tech products (R&D)
• Greater protectionism & worker rights (ACFTU)
• Greater investment scrutiny
• Increasing awareness of social and environmental issues
• Global resource “mining”
• Rising nationalism, more emboldened China
• Continuing reluctance to participate in global affairs
A riskier operating environment for foreign MNC
Continued Industrial Policy in China

China market economy is structured and regulated to meet a
  clear and deliberate “industrial” policy established every 5
  years. Example:
    • Foreign AP Headquarters – 223 (Shanghai alone)
    • Foreign R&D Centers – over 700 FIE
    • FDI “Go West” (high-tech outpost)

11th – 5 year plan (2006-2010) includes:
    • Two themes:
                 “Scientific approach to development”
                 “Constructing a harmonious Socialist society”
    •   Industry structure – quality, not scale
    •   Strengthen services (FSI, legal, banking, etc)
    •   Energy-saving and environmental protection
Operating challenges

AmCham's Top 10 challenges to conducting business in China:
#1     HR constraints                                                      33%
#2     Bureaucracy, lack of transparency                                   18%
#3     IPR infringements                                                   13%
#4     Protectionism/corruption/fraud                                      11%
#5     Visa difficulties for Chinese traveling to the US                     7%
#6     Collecting payments, assessing credit                                 6%
#7     Contract enforcement                                                  5%
#8     Difficulty obtaining RMB/USD, remitting capital                       3%
#9     Non-tariff market access barriers                                     3%
#10    Obtaining materials for production                                    2%
                               Source: AmCham Shanghai: 2007 China Business Report
Legal and Administrative Steps

• Non-compete clauses with employees

• Non-disclosure agreements with employees, vendors and
  suppliers

• Confidentiality Agreements

• Register Trade marks, patents and copyrights


“Provides foundation & framework
          for litigation”
Legal Protection and Recourse in China

Although the legal system
is improving, foreign companies
cannot rely on the system for fair
and impartial recourse and
enforcement of an IP/TS judgment.

Investigations and litigation are time
consuming, operationally disruptive,
and costly with unpredictable
results….enforcement is difficult.



Prevention is the key!
High Cost of Fraud in US

• Corruption impact is estimated at 4% of GDP
• The median loss caused by fraud is $175,000
• 7% of annual corporate revenue lost to fraud
• Costs $994 billion annually
• More than one quarter of the frauds cost in excess
  of $1 million        Source: 2008 ACFE Report to the Nation
IP Theft & Fraud Statistics – US (combine
with previous slide)
• 69.6% of business professionals have stolen some form of
   corporate IP from their employer when leaving a job.

• 32.6% of employees leaving a job took sales proposals
   and/or presentations with them.

• 30.4% admitted to taking information such as customer
   databases and contact information.

• The most commonly used method for stealing IP is to send
   electronic copies of documents and files to a personal email
   account.

• Only 28.2% think that IP theft is completely unacceptable.
Fraud & Corruption: China Statistics

• Corruption accounts for an estimated 13% to 16.9% of GDP
• Counterfeiting accounts for 8% of GDP
• “95% of those with jurisdiction over monopoly industries
   would be considered corrupt…….”

• “80% of government officials and 70% of CEO’s of SOE would
   be considered corrupt by other countries’ standards…..”

• 82% of major fraud cases involved company’s own employees
• 23% of applicants have used false names
• Secret commissions or kickbacks (43%)
• False invoicing (27%)
                            Source: Association of Search & Selection Consultants, Maxima plc, Economist
Why All the Fraud/Corruption in China?

• Relationship-based society – “guanxi”
• Lack of transparency/checks-balances – opportunities
• Concentration of Power – The Party, PLA, PSB, etc
• Extremely low compensation for professionals – social
   pressure

• Poorly developed corporate governance – owner driven
• Under-development regulatory bodies
• Hesitant enforcement services – “source of tax revenue/jobs”
• Shifting/conflicting social values
• Vague moral/ethical business “grounding”
Motives for Fraud in China
Motivation for Committing Fraud/Theft

• Greed; money, power, prestige
• Lifestyle (gambling, sex, partying, etc)
• Financial pressures (business or personal)
• Family pressures
• Revenge
• Industrial espionage
Rationalization Reward / Risk

• Immature legal system
• Two-tier management -transparency
• Immature/incomplete company controls
• Reluctance to prosecute by MNC
• Greater labor law protection
• Increased sophisticated domestic competition
• Growing nationalism
• Growing protectionism
Opportunity to Commit Fraud / Theft

• JV vs. WFOE
• Lack of clear ethics policies and procedures
• Poor internal controls
• Immature company operating procedures
• Two-tier management structure
• Insufficient prevention strategies
• Insufficient detection strategies
• Failure to deal with fraud (e.g. allowing fraudsters to resign
   without criminal and / or civil action)
Prevention -- Protecting IP/Trade Secrets

• Human Resources
• Education and Training
• Information Technology (IT)
• Physical Security
• Controls and Monitoring
• Enforcement Measures
Prevention – HR: Education & Training

•   Integrity training and awareness training-all levels
        Set company expectations
        Appeal to sense of national pride
        Deputize your staff
        Explain PRC criminal law (not FCPA)
        In Mandarin
        Install “hotline”

•   Instill company loyalty through effective
    HR practices

•   Brief company travelers/visitors on
    security procedures

•   Develop a “need to know” IP culture

•   Develop an TS/IP working group

•   Rigidly enforce and prosecute
    violators
Prevention – Human Resources

• Pre-employment screening
• Reputation Due Diligence on senior employees
• Due Diligence on CDI, vendors and suppliers
• Non-disclosure and non-compete
  provisions
• Clear policies & procedures
  (what are trade secrets)

• Effective HR retention programs
  (reduce turnover)
• Rotation of key employees
• Termination procedures (laptops)
Prevention – IT Security

• Encrypt laptops, no USB ports
• No personal computers allowed
• Create an IT security training team
• Identify business critical systems (process
   flow maps)

• Establish an intrusion reporting system
• Continual vulnerability and penetration testing (server
   hardening)

• Develop standardize hardware and software enterprise wide
• Implement secure data transmission systems using
   encryption or other devices (LAN segmentation, WAN link
   routing, secure movement of high-risk data)
Prevention – Physical Security
•   Perimeter fence / barrier/ CCTV systems
•   Access control and ID’s
• Guarded lobbies/dual entry
• “Trained” guard force
• Compartmentalize functions
• Secure areas/controlled assess
• Surveillance/CCTV/motion detectors
• Occasional sweeps
• Unannounced audits, security searches
• Clean desk policies/shredders
• Visitor/Escort policies – laptops, camera’s
Controls and Monitoring
•   Know what is your IP.TS; what must/want to bring to China

•   Inventory and classify IP/TS according to the sensitivity
    level/segregate and control access

•   Document Protection:
     • Secure Storage (how, controlled by whom)
     • Copying procedures
     • Disposal procedures - internal or contracted
     • How are proprietary documents circulated
     • How are proprietary documents moved in or out of the country
•   Track data flows for unauthorized access

•   Manage suppliers w/multiple people (transparency)

•   Develop unique product or information identification

•   Team approach to key functions; i.e. procurement
Enforcement Measures

• Spot checks and audits
• Collaborate with other Companies in the industry
• Develop relationships with other industry groups
• Know your legal rights – register & apply
• Have good local counsel and risk consultant
• Vigorously prosecute violators
• Develop relationships with local government & law
   enforcement

• Know your competitors and the market
FDI Operating Lessons Learned

• People steal IP/TS …..failure to develop, present and train,
   and implement clear ethics policies in a timely manner

• Do not begin operating with immature operating and security
   procedures

• Avoid a two-tier management structure and localizing 100%
   too quickly

• Failure to aggressively deal with ethics violations
Conclusion

• Risks are manageable only
  when identified
• Know what you want to protect
• Develop a structured,
  disciplined approach to IP/TS
  protection “early”
• Know who you are dealing
  with!
• When investing, a
  reputational/operational due
  diligence is a must in China
• Remember the 6 D’s and 3 V’s
Thank you!

 Jay Josef Hoenig
 President

 6A, Huamin Empire Plaza
 728 Yan’an West Road
 Shanghai, PR China

 Tel: (86 21) 5238 5599
 Fax: (86 21) 5237 1693
 Jay.hoenig@hill-assoc.com

 info@hill-assoc.com
 www.hill-assoc.com

Más contenido relacionado

Destacado

Destacado (11)

JUNTOS PODEMOS DISMINUIR EL RUIDO
JUNTOS PODEMOS DISMINUIR EL RUIDOJUNTOS PODEMOS DISMINUIR EL RUIDO
JUNTOS PODEMOS DISMINUIR EL RUIDO
 
Taller de xarxes socials per a la gestió de comunitats
Taller de xarxes socials per a la gestió de comunitatsTaller de xarxes socials per a la gestió de comunitats
Taller de xarxes socials per a la gestió de comunitats
 
Need Dough?
Need Dough?Need Dough?
Need Dough?
 
Presentation1
Presentation1Presentation1
Presentation1
 
Indusblue Company Profile
Indusblue Company ProfileIndusblue Company Profile
Indusblue Company Profile
 
Standard Grade Business Management - Finance
Standard Grade Business Management - FinanceStandard Grade Business Management - Finance
Standard Grade Business Management - Finance
 
Présentation Ceph
Présentation CephPrésentation Ceph
Présentation Ceph
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
 
CAMBRIDGE AS HISTORY: JAPAN MILITARISM
CAMBRIDGE AS HISTORY: JAPAN MILITARISMCAMBRIDGE AS HISTORY: JAPAN MILITARISM
CAMBRIDGE AS HISTORY: JAPAN MILITARISM
 
4 oz t_2015
4 oz t_20154 oz t_2015
4 oz t_2015
 
7 Ways To Leverage Sp For Pm Success
7 Ways To Leverage Sp For Pm Success7 Ways To Leverage Sp For Pm Success
7 Ways To Leverage Sp For Pm Success
 

Similar a Protecting Trade Secrets in China

PANEL5Presentacin1WernerBijkerk_20190417153502.ppt
PANEL5Presentacin1WernerBijkerk_20190417153502.pptPANEL5Presentacin1WernerBijkerk_20190417153502.ppt
PANEL5Presentacin1WernerBijkerk_20190417153502.ppt
Abu Kausar
 
US China Legal Exchange - 12-9-13
US China Legal Exchange - 12-9-13US China Legal Exchange - 12-9-13
US China Legal Exchange - 12-9-13
Jim Chapman
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
Alan Greggo
 

Similar a Protecting Trade Secrets in China (20)

Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Internal Controls In China
Internal Controls In ChinaInternal Controls In China
Internal Controls In China
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Risky Business in China (Themes) v2
Risky Business in China (Themes) v2Risky Business in China (Themes) v2
Risky Business in China (Themes) v2
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptxModule 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
IPR Protection
IPR ProtectionIPR Protection
IPR Protection
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Trade Secret Asset Management
Trade Secret Asset ManagementTrade Secret Asset Management
Trade Secret Asset Management
 
PANEL5Presentacin1WernerBijkerk_20190417153502.ppt
PANEL5Presentacin1WernerBijkerk_20190417153502.pptPANEL5Presentacin1WernerBijkerk_20190417153502.ppt
PANEL5Presentacin1WernerBijkerk_20190417153502.ppt
 
US China Legal Exchange - 12-9-13
US China Legal Exchange - 12-9-13US China Legal Exchange - 12-9-13
US China Legal Exchange - 12-9-13
 
Identity Checkpoint
Identity CheckpointIdentity Checkpoint
Identity Checkpoint
 
Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Romney ch05
Romney ch05Romney ch05
Romney ch05
 
Anil kona
Anil konaAnil kona
Anil kona
 

Más de Enterprise Security Risk Management

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
Enterprise Security Risk Management
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Enterprise Security Risk Management
 

Más de Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Último

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Último (20)

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

Protecting Trade Secrets in China

  • 1. You’re not in Kansas anymore! Protecting Trade Secrets In China Jay Hoenig MGM Studios Hill & Associates, China February 2009
  • 2. About Hill & Associates Hill & Associates – Global Established in 1992 (HQ in Hong Kong) Asia’s largest risk management firm with 16 offices and 400 staff Hill & Associates - China (Shanghai, Beijing, HK) Established in the PRC in 1994 Wholly Foreign-Owned Enterprise (WFOE) Four Primary Service Lines Fraud Prevention & Integrity Risk Management Corporate Intelligence Asset Protection & Enterprise Risk Management Risk Intelligence Compliant with international and local regulations and professional business ethics
  • 3. Hill & Associates -- Clientele
  • 4. Discussion Topics I. Trade secrets – More than just IP II. The Long March – Communes to market economy III. Prevention is key! IV. Fraud, theft, and corruption in China V. Proactive protection measures VI. Conclusion
  • 5. Trade Secrets & IP “American Nobel Laureate Robert Solow discovered back in 1956 that about 88 % of economic growth is attributable to innovation. …………………In today’s globalized economy that is truer than ever. Innovation is a fundamental means of differentiation.” Mr. Werner Wenning Chairman of the Board of Management, Bayer June, 30th, 2004
  • 6. Trade Secrets – More than just IP • Intellectual property (R&D activities) • Brands, trademarks, copyright, patents • Chemical processes, formulations and recipes • Manufacturing know-how • Machine design and performance data • Plant design and operations • Internal work processes • Training manuals • Financial data, client data, employee list • Vendor and supplier data • Strategic and tactical business plans
  • 7. “…………Tell Me About China…….” Land of Complexities/Extremes/Contradictions • Old/new cultures and environment • Very rich/very poor • “Relationship based”/rule of law • Ethical/unethical behavior • The “Party” direction/market economy • Open/protected markets • SOE’s - employment driven/profit driven • Centralized/decentralized government • Regulated/under regulated businesses • Fast/slow – “rate of change”/bureaucracy • Plaza 66/Wuling – the real China All of these impact the IP/TS operating environment
  • 8. Not in Kansas anymore… • China is a high risk environment for IP and trade secret protection “Toto, I have a feeling • PRC investment incentives for we’re not in Kansas bringing advanced technologies….why? anymore!” • Threats from rogue employees, domestic and foreign competitors, vendors, suppliers and the State • Competition for technology and a “competitive” edge is increasing • Relying on the “legal” system for appropriate recourse is not realistic • The question is not “if” you will loose your trade secrets, but “when” • Companies should have a structured, disciplined and integrated approach MGM Studios to IP and TS protection
  • 9. Business Environment – “Free for All”
  • 10. The Long March -- Communes to market economy 1989…a swamp! …and now a global business centre!
  • 11. Before 1979 – Absolute economic disasters Eating from the Big Guo The Great Leap Forward The Great Steel Production The Cultural Revolution
  • 12. Phase 1: 1979 to 1992 Starting from zero • People’s communes ceased to exist • Production units responsible for own profits and losses • “Special Economic Zones” established • From SRE to SOE • 1989 Tiananmen Square incident – major set back to reform
  • 13. Phase 2: 1992 to 2003 Deng’s economic reforms State-owned enterprise reform • Protect larger ones, let go of small ones • SOEs step back, private enterprises move forward • Privatization of SOEs M&A Convert to share holding company Sell to private sector Famous Deng quotes: • “Black cat and white cat” • “Feeling the stones to cross the river” • “Let a small group of people get rich first”
  • 14. Phase 3: 2004 to Present Scientific Development/Harmonious Society • Less need for foreign capital; just technology & innovation • Migration to high value/high tech products (R&D) • Greater protectionism & worker rights (ACFTU) • Greater investment scrutiny • Increasing awareness of social and environmental issues • Global resource “mining” • Rising nationalism, more emboldened China • Continuing reluctance to participate in global affairs A riskier operating environment for foreign MNC
  • 15. Continued Industrial Policy in China China market economy is structured and regulated to meet a clear and deliberate “industrial” policy established every 5 years. Example: • Foreign AP Headquarters – 223 (Shanghai alone) • Foreign R&D Centers – over 700 FIE • FDI “Go West” (high-tech outpost) 11th – 5 year plan (2006-2010) includes: • Two themes: “Scientific approach to development” “Constructing a harmonious Socialist society” • Industry structure – quality, not scale • Strengthen services (FSI, legal, banking, etc) • Energy-saving and environmental protection
  • 16. Operating challenges AmCham's Top 10 challenges to conducting business in China: #1 HR constraints 33% #2 Bureaucracy, lack of transparency 18% #3 IPR infringements 13% #4 Protectionism/corruption/fraud 11% #5 Visa difficulties for Chinese traveling to the US 7% #6 Collecting payments, assessing credit 6% #7 Contract enforcement 5% #8 Difficulty obtaining RMB/USD, remitting capital 3% #9 Non-tariff market access barriers 3% #10 Obtaining materials for production 2% Source: AmCham Shanghai: 2007 China Business Report
  • 17. Legal and Administrative Steps • Non-compete clauses with employees • Non-disclosure agreements with employees, vendors and suppliers • Confidentiality Agreements • Register Trade marks, patents and copyrights “Provides foundation & framework for litigation”
  • 18. Legal Protection and Recourse in China Although the legal system is improving, foreign companies cannot rely on the system for fair and impartial recourse and enforcement of an IP/TS judgment. Investigations and litigation are time consuming, operationally disruptive, and costly with unpredictable results….enforcement is difficult. Prevention is the key!
  • 19. High Cost of Fraud in US • Corruption impact is estimated at 4% of GDP • The median loss caused by fraud is $175,000 • 7% of annual corporate revenue lost to fraud • Costs $994 billion annually • More than one quarter of the frauds cost in excess of $1 million Source: 2008 ACFE Report to the Nation
  • 20. IP Theft & Fraud Statistics – US (combine with previous slide) • 69.6% of business professionals have stolen some form of corporate IP from their employer when leaving a job. • 32.6% of employees leaving a job took sales proposals and/or presentations with them. • 30.4% admitted to taking information such as customer databases and contact information. • The most commonly used method for stealing IP is to send electronic copies of documents and files to a personal email account. • Only 28.2% think that IP theft is completely unacceptable.
  • 21. Fraud & Corruption: China Statistics • Corruption accounts for an estimated 13% to 16.9% of GDP • Counterfeiting accounts for 8% of GDP • “95% of those with jurisdiction over monopoly industries would be considered corrupt…….” • “80% of government officials and 70% of CEO’s of SOE would be considered corrupt by other countries’ standards…..” • 82% of major fraud cases involved company’s own employees • 23% of applicants have used false names • Secret commissions or kickbacks (43%) • False invoicing (27%) Source: Association of Search & Selection Consultants, Maxima plc, Economist
  • 22. Why All the Fraud/Corruption in China? • Relationship-based society – “guanxi” • Lack of transparency/checks-balances – opportunities • Concentration of Power – The Party, PLA, PSB, etc • Extremely low compensation for professionals – social pressure • Poorly developed corporate governance – owner driven • Under-development regulatory bodies • Hesitant enforcement services – “source of tax revenue/jobs” • Shifting/conflicting social values • Vague moral/ethical business “grounding”
  • 23. Motives for Fraud in China
  • 24. Motivation for Committing Fraud/Theft • Greed; money, power, prestige • Lifestyle (gambling, sex, partying, etc) • Financial pressures (business or personal) • Family pressures • Revenge • Industrial espionage
  • 25. Rationalization Reward / Risk • Immature legal system • Two-tier management -transparency • Immature/incomplete company controls • Reluctance to prosecute by MNC • Greater labor law protection • Increased sophisticated domestic competition • Growing nationalism • Growing protectionism
  • 26. Opportunity to Commit Fraud / Theft • JV vs. WFOE • Lack of clear ethics policies and procedures • Poor internal controls • Immature company operating procedures • Two-tier management structure • Insufficient prevention strategies • Insufficient detection strategies • Failure to deal with fraud (e.g. allowing fraudsters to resign without criminal and / or civil action)
  • 27. Prevention -- Protecting IP/Trade Secrets • Human Resources • Education and Training • Information Technology (IT) • Physical Security • Controls and Monitoring • Enforcement Measures
  • 28. Prevention – HR: Education & Training • Integrity training and awareness training-all levels Set company expectations Appeal to sense of national pride Deputize your staff Explain PRC criminal law (not FCPA) In Mandarin Install “hotline” • Instill company loyalty through effective HR practices • Brief company travelers/visitors on security procedures • Develop a “need to know” IP culture • Develop an TS/IP working group • Rigidly enforce and prosecute violators
  • 29. Prevention – Human Resources • Pre-employment screening • Reputation Due Diligence on senior employees • Due Diligence on CDI, vendors and suppliers • Non-disclosure and non-compete provisions • Clear policies & procedures (what are trade secrets) • Effective HR retention programs (reduce turnover) • Rotation of key employees • Termination procedures (laptops)
  • 30. Prevention – IT Security • Encrypt laptops, no USB ports • No personal computers allowed • Create an IT security training team • Identify business critical systems (process flow maps) • Establish an intrusion reporting system • Continual vulnerability and penetration testing (server hardening) • Develop standardize hardware and software enterprise wide • Implement secure data transmission systems using encryption or other devices (LAN segmentation, WAN link routing, secure movement of high-risk data)
  • 31. Prevention – Physical Security • Perimeter fence / barrier/ CCTV systems • Access control and ID’s • Guarded lobbies/dual entry • “Trained” guard force • Compartmentalize functions • Secure areas/controlled assess • Surveillance/CCTV/motion detectors • Occasional sweeps • Unannounced audits, security searches • Clean desk policies/shredders • Visitor/Escort policies – laptops, camera’s
  • 32. Controls and Monitoring • Know what is your IP.TS; what must/want to bring to China • Inventory and classify IP/TS according to the sensitivity level/segregate and control access • Document Protection: • Secure Storage (how, controlled by whom) • Copying procedures • Disposal procedures - internal or contracted • How are proprietary documents circulated • How are proprietary documents moved in or out of the country • Track data flows for unauthorized access • Manage suppliers w/multiple people (transparency) • Develop unique product or information identification • Team approach to key functions; i.e. procurement
  • 33. Enforcement Measures • Spot checks and audits • Collaborate with other Companies in the industry • Develop relationships with other industry groups • Know your legal rights – register & apply • Have good local counsel and risk consultant • Vigorously prosecute violators • Develop relationships with local government & law enforcement • Know your competitors and the market
  • 34. FDI Operating Lessons Learned • People steal IP/TS …..failure to develop, present and train, and implement clear ethics policies in a timely manner • Do not begin operating with immature operating and security procedures • Avoid a two-tier management structure and localizing 100% too quickly • Failure to aggressively deal with ethics violations
  • 35. Conclusion • Risks are manageable only when identified • Know what you want to protect • Develop a structured, disciplined approach to IP/TS protection “early” • Know who you are dealing with! • When investing, a reputational/operational due diligence is a must in China • Remember the 6 D’s and 3 V’s
  • 36. Thank you! Jay Josef Hoenig President 6A, Huamin Empire Plaza 728 Yan’an West Road Shanghai, PR China Tel: (86 21) 5238 5599 Fax: (86 21) 5237 1693 Jay.hoenig@hill-assoc.com info@hill-assoc.com www.hill-assoc.com