SlideShare a Scribd company logo
You’re not in
Kansas anymore!

Protecting
Trade Secrets
In China

Jay Hoenig
                           MGM Studios
Hill & Associates, China

February 2009
About Hill & Associates
 Hill & Associates – Global
    Established in 1992 (HQ in Hong Kong)
    Asia’s largest risk management firm with 16 offices and 400 staff
 Hill & Associates - China (Shanghai, Beijing, HK)
    Established in the PRC in 1994
    Wholly Foreign-Owned Enterprise (WFOE)
 Four Primary Service Lines
    Fraud Prevention & Integrity Risk Management
    Corporate Intelligence
    Asset Protection & Enterprise Risk Management
    Risk Intelligence
 Compliant with international and local regulations and professional
 business ethics
Hill & Associates -- Clientele
Discussion Topics

I.    Trade secrets – More than just IP
II.   The Long March – Communes to market economy
III. Prevention is key!
IV. Fraud, theft, and corruption in China
V.    Proactive protection measures
VI. Conclusion
Trade Secrets & IP


“American Nobel Laureate Robert Solow discovered back
in 1956 that about 88 % of economic growth is attributable
to innovation.


…………………In today’s globalized economy that is truer
than ever. Innovation is a fundamental means of
differentiation.”


                                                     Mr. Werner Wenning
                             Chairman of the Board of Management, Bayer
                                                         June, 30th, 2004
Trade Secrets – More than just IP

•   Intellectual property (R&D activities)
•   Brands, trademarks, copyright, patents
•   Chemical processes, formulations and recipes
•   Manufacturing know-how
•   Machine design and performance data
•   Plant design and operations
•   Internal work processes
•   Training manuals
•   Financial data, client data, employee list
•   Vendor and supplier data
•   Strategic and tactical business plans
“…………Tell Me About China…….”
     Land of Complexities/Extremes/Contradictions

 •    Old/new cultures and environment
 •    Very rich/very poor
 •    “Relationship based”/rule of law
 •    Ethical/unethical behavior
 •    The “Party” direction/market economy
 •    Open/protected markets
 •    SOE’s - employment driven/profit driven
 •    Centralized/decentralized government
 •    Regulated/under regulated businesses
 •    Fast/slow – “rate of change”/bureaucracy
 •    Plaza 66/Wuling – the real China

All of these impact the IP/TS operating environment
Not in Kansas anymore…
• China is a high risk environment for IP
  and trade secret protection               “Toto, I have a feeling
• PRC investment incentives for              we’re not in Kansas
  bringing advanced
  technologies….why?                             anymore!”
• Threats from rogue employees,
  domestic and foreign competitors,
  vendors, suppliers and the State

• Competition for technology and a
  “competitive” edge is increasing

• Relying on the “legal” system for
  appropriate recourse is not realistic

• The question is not “if” you will loose
  your trade secrets, but “when”

• Companies should have a structured,
  disciplined and integrated approach                           MGM Studios

  to IP and TS protection
Business Environment – “Free for All”
The Long March -- Communes to market
                   economy




1989…a swamp!




…and now a global
business centre!
Before 1979 – Absolute economic disasters




 Eating from the Big Guo     The Great Leap Forward




The Great Steel Production   The Cultural Revolution
Phase 1: 1979 to 1992
 Starting from zero

• People’s communes ceased to
  exist

• Production units responsible for
  own profits and losses

• “Special Economic Zones”
  established

• From SRE to SOE

• 1989 Tiananmen Square incident
  – major set back to reform
Phase 2: 1992 to 2003
Deng’s economic reforms
State-owned enterprise reform
• Protect larger ones, let go of small ones
• SOEs step back, private enterprises move
   forward

• Privatization of SOEs
       M&A
       Convert to share holding company
       Sell to private sector

Famous Deng quotes:
• “Black cat and white cat”
• “Feeling the stones to cross the river”
• “Let a small group of people get rich first”
Phase 3: 2004 to Present
Scientific Development/Harmonious Society

• Less need for foreign capital; just technology & innovation
• Migration to high value/high tech products (R&D)
• Greater protectionism & worker rights (ACFTU)
• Greater investment scrutiny
• Increasing awareness of social and environmental issues
• Global resource “mining”
• Rising nationalism, more emboldened China
• Continuing reluctance to participate in global affairs
A riskier operating environment for foreign MNC
Continued Industrial Policy in China

China market economy is structured and regulated to meet a
  clear and deliberate “industrial” policy established every 5
  years. Example:
    • Foreign AP Headquarters – 223 (Shanghai alone)
    • Foreign R&D Centers – over 700 FIE
    • FDI “Go West” (high-tech outpost)

11th – 5 year plan (2006-2010) includes:
    • Two themes:
                 “Scientific approach to development”
                 “Constructing a harmonious Socialist society”
    •   Industry structure – quality, not scale
    •   Strengthen services (FSI, legal, banking, etc)
    •   Energy-saving and environmental protection
Operating challenges

AmCham's Top 10 challenges to conducting business in China:
#1     HR constraints                                                      33%
#2     Bureaucracy, lack of transparency                                   18%
#3     IPR infringements                                                   13%
#4     Protectionism/corruption/fraud                                      11%
#5     Visa difficulties for Chinese traveling to the US                     7%
#6     Collecting payments, assessing credit                                 6%
#7     Contract enforcement                                                  5%
#8     Difficulty obtaining RMB/USD, remitting capital                       3%
#9     Non-tariff market access barriers                                     3%
#10    Obtaining materials for production                                    2%
                               Source: AmCham Shanghai: 2007 China Business Report
Legal and Administrative Steps

• Non-compete clauses with employees

• Non-disclosure agreements with employees, vendors and
  suppliers

• Confidentiality Agreements

• Register Trade marks, patents and copyrights


“Provides foundation & framework
          for litigation”
Legal Protection and Recourse in China

Although the legal system
is improving, foreign companies
cannot rely on the system for fair
and impartial recourse and
enforcement of an IP/TS judgment.

Investigations and litigation are time
consuming, operationally disruptive,
and costly with unpredictable
results….enforcement is difficult.



Prevention is the key!
High Cost of Fraud in US

• Corruption impact is estimated at 4% of GDP
• The median loss caused by fraud is $175,000
• 7% of annual corporate revenue lost to fraud
• Costs $994 billion annually
• More than one quarter of the frauds cost in excess
  of $1 million        Source: 2008 ACFE Report to the Nation
IP Theft & Fraud Statistics – US (combine
with previous slide)
• 69.6% of business professionals have stolen some form of
   corporate IP from their employer when leaving a job.

• 32.6% of employees leaving a job took sales proposals
   and/or presentations with them.

• 30.4% admitted to taking information such as customer
   databases and contact information.

• The most commonly used method for stealing IP is to send
   electronic copies of documents and files to a personal email
   account.

• Only 28.2% think that IP theft is completely unacceptable.
Fraud & Corruption: China Statistics

• Corruption accounts for an estimated 13% to 16.9% of GDP
• Counterfeiting accounts for 8% of GDP
• “95% of those with jurisdiction over monopoly industries
   would be considered corrupt…….”

• “80% of government officials and 70% of CEO’s of SOE would
   be considered corrupt by other countries’ standards…..”

• 82% of major fraud cases involved company’s own employees
• 23% of applicants have used false names
• Secret commissions or kickbacks (43%)
• False invoicing (27%)
                            Source: Association of Search & Selection Consultants, Maxima plc, Economist
Why All the Fraud/Corruption in China?

• Relationship-based society – “guanxi”
• Lack of transparency/checks-balances – opportunities
• Concentration of Power – The Party, PLA, PSB, etc
• Extremely low compensation for professionals – social
   pressure

• Poorly developed corporate governance – owner driven
• Under-development regulatory bodies
• Hesitant enforcement services – “source of tax revenue/jobs”
• Shifting/conflicting social values
• Vague moral/ethical business “grounding”
Motives for Fraud in China
Motivation for Committing Fraud/Theft

• Greed; money, power, prestige
• Lifestyle (gambling, sex, partying, etc)
• Financial pressures (business or personal)
• Family pressures
• Revenge
• Industrial espionage
Rationalization Reward / Risk

• Immature legal system
• Two-tier management -transparency
• Immature/incomplete company controls
• Reluctance to prosecute by MNC
• Greater labor law protection
• Increased sophisticated domestic competition
• Growing nationalism
• Growing protectionism
Opportunity to Commit Fraud / Theft

• JV vs. WFOE
• Lack of clear ethics policies and procedures
• Poor internal controls
• Immature company operating procedures
• Two-tier management structure
• Insufficient prevention strategies
• Insufficient detection strategies
• Failure to deal with fraud (e.g. allowing fraudsters to resign
   without criminal and / or civil action)
Prevention -- Protecting IP/Trade Secrets

• Human Resources
• Education and Training
• Information Technology (IT)
• Physical Security
• Controls and Monitoring
• Enforcement Measures
Prevention – HR: Education & Training

•   Integrity training and awareness training-all levels
        Set company expectations
        Appeal to sense of national pride
        Deputize your staff
        Explain PRC criminal law (not FCPA)
        In Mandarin
        Install “hotline”

•   Instill company loyalty through effective
    HR practices

•   Brief company travelers/visitors on
    security procedures

•   Develop a “need to know” IP culture

•   Develop an TS/IP working group

•   Rigidly enforce and prosecute
    violators
Prevention – Human Resources

• Pre-employment screening
• Reputation Due Diligence on senior employees
• Due Diligence on CDI, vendors and suppliers
• Non-disclosure and non-compete
  provisions
• Clear policies & procedures
  (what are trade secrets)

• Effective HR retention programs
  (reduce turnover)
• Rotation of key employees
• Termination procedures (laptops)
Prevention – IT Security

• Encrypt laptops, no USB ports
• No personal computers allowed
• Create an IT security training team
• Identify business critical systems (process
   flow maps)

• Establish an intrusion reporting system
• Continual vulnerability and penetration testing (server
   hardening)

• Develop standardize hardware and software enterprise wide
• Implement secure data transmission systems using
   encryption or other devices (LAN segmentation, WAN link
   routing, secure movement of high-risk data)
Prevention – Physical Security
•   Perimeter fence / barrier/ CCTV systems
•   Access control and ID’s
• Guarded lobbies/dual entry
• “Trained” guard force
• Compartmentalize functions
• Secure areas/controlled assess
• Surveillance/CCTV/motion detectors
• Occasional sweeps
• Unannounced audits, security searches
• Clean desk policies/shredders
• Visitor/Escort policies – laptops, camera’s
Controls and Monitoring
•   Know what is your IP.TS; what must/want to bring to China

•   Inventory and classify IP/TS according to the sensitivity
    level/segregate and control access

•   Document Protection:
     • Secure Storage (how, controlled by whom)
     • Copying procedures
     • Disposal procedures - internal or contracted
     • How are proprietary documents circulated
     • How are proprietary documents moved in or out of the country
•   Track data flows for unauthorized access

•   Manage suppliers w/multiple people (transparency)

•   Develop unique product or information identification

•   Team approach to key functions; i.e. procurement
Enforcement Measures

• Spot checks and audits
• Collaborate with other Companies in the industry
• Develop relationships with other industry groups
• Know your legal rights – register & apply
• Have good local counsel and risk consultant
• Vigorously prosecute violators
• Develop relationships with local government & law
   enforcement

• Know your competitors and the market
FDI Operating Lessons Learned

• People steal IP/TS …..failure to develop, present and train,
   and implement clear ethics policies in a timely manner

• Do not begin operating with immature operating and security
   procedures

• Avoid a two-tier management structure and localizing 100%
   too quickly

• Failure to aggressively deal with ethics violations
Conclusion

• Risks are manageable only
  when identified
• Know what you want to protect
• Develop a structured,
  disciplined approach to IP/TS
  protection “early”
• Know who you are dealing
  with!
• When investing, a
  reputational/operational due
  diligence is a must in China
• Remember the 6 D’s and 3 V’s
Thank you!

 Jay Josef Hoenig
 President

 6A, Huamin Empire Plaza
 728 Yan’an West Road
 Shanghai, PR China

 Tel: (86 21) 5238 5599
 Fax: (86 21) 5237 1693
 Jay.hoenig@hill-assoc.com

 info@hill-assoc.com
 www.hill-assoc.com

More Related Content

Viewers also liked

JUNTOS PODEMOS DISMINUIR EL RUIDO
JUNTOS PODEMOS DISMINUIR EL RUIDOJUNTOS PODEMOS DISMINUIR EL RUIDO
JUNTOS PODEMOS DISMINUIR EL RUIDO
Ronald Jamanca Molina
 
Taller de xarxes socials per a la gestió de comunitats
Taller de xarxes socials per a la gestió de comunitatsTaller de xarxes socials per a la gestió de comunitats
Taller de xarxes socials per a la gestió de comunitats
connectalia
 
Presentation1
Presentation1Presentation1
Presentation1
AFIQAH IBRAHIM
 
Indusblue Company Profile
Indusblue Company ProfileIndusblue Company Profile
Indusblue Company Profile
Darren Pereira
 
Standard Grade Business Management - Finance
Standard Grade Business Management - FinanceStandard Grade Business Management - Finance
Standard Grade Business Management - Finance
Musselburgh Grammar School
 
Présentation Ceph
Présentation CephPrésentation Ceph
Présentation Ceph
clevernetsystemsgeneva
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
VMware Tanzu
 
CAMBRIDGE AS HISTORY: JAPAN MILITARISM
CAMBRIDGE AS HISTORY: JAPAN MILITARISMCAMBRIDGE AS HISTORY: JAPAN MILITARISM
CAMBRIDGE AS HISTORY: JAPAN MILITARISM
George Dumitrache
 
4 oz t_2015
4 oz t_20154 oz t_2015
4 oz t_2015
Agent Plus UK
 
7 Ways To Leverage Sp For Pm Success
7 Ways To Leverage Sp For Pm Success7 Ways To Leverage Sp For Pm Success
7 Ways To Leverage Sp For Pm Success
O'Reilly Media
 

Viewers also liked (11)

JUNTOS PODEMOS DISMINUIR EL RUIDO
JUNTOS PODEMOS DISMINUIR EL RUIDOJUNTOS PODEMOS DISMINUIR EL RUIDO
JUNTOS PODEMOS DISMINUIR EL RUIDO
 
Taller de xarxes socials per a la gestió de comunitats
Taller de xarxes socials per a la gestió de comunitatsTaller de xarxes socials per a la gestió de comunitats
Taller de xarxes socials per a la gestió de comunitats
 
Need Dough?
Need Dough?Need Dough?
Need Dough?
 
Presentation1
Presentation1Presentation1
Presentation1
 
Indusblue Company Profile
Indusblue Company ProfileIndusblue Company Profile
Indusblue Company Profile
 
Standard Grade Business Management - Finance
Standard Grade Business Management - FinanceStandard Grade Business Management - Finance
Standard Grade Business Management - Finance
 
Présentation Ceph
Présentation CephPrésentation Ceph
Présentation Ceph
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
 
CAMBRIDGE AS HISTORY: JAPAN MILITARISM
CAMBRIDGE AS HISTORY: JAPAN MILITARISMCAMBRIDGE AS HISTORY: JAPAN MILITARISM
CAMBRIDGE AS HISTORY: JAPAN MILITARISM
 
4 oz t_2015
4 oz t_20154 oz t_2015
4 oz t_2015
 
7 Ways To Leverage Sp For Pm Success
7 Ways To Leverage Sp For Pm Success7 Ways To Leverage Sp For Pm Success
7 Ways To Leverage Sp For Pm Success
 

Similar to Protecting Trade Secrets in China

Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
William Gamble
 
Internal Controls In China
Internal Controls In ChinaInternal Controls In China
Internal Controls In China
iohann Le Frapper
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
Glenn E. Davis
 
Risky Business in China (Themes) v2
Risky Business in China (Themes) v2Risky Business in China (Themes) v2
Risky Business in China (Themes) v2
Jeremy Gordon
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
OCTF Industry Engagement
 
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptxModule 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
NHITRNQUNH2
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
IPR Protection
IPR ProtectionIPR Protection
IPR Protection
Brett Miller
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
Dan Houser
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Trade Secret Asset Management
Trade Secret Asset ManagementTrade Secret Asset Management
Trade Secret Asset Management
Donal O'Connell
 
PANEL5Presentacin1WernerBijkerk_20190417153502.ppt
PANEL5Presentacin1WernerBijkerk_20190417153502.pptPANEL5Presentacin1WernerBijkerk_20190417153502.ppt
PANEL5Presentacin1WernerBijkerk_20190417153502.ppt
Abu Kausar
 
US China Legal Exchange - 12-9-13
US China Legal Exchange - 12-9-13US China Legal Exchange - 12-9-13
US China Legal Exchange - 12-9-13
Jim Chapman
 
Identity Checkpoint
Identity CheckpointIdentity Checkpoint
Identity Checkpoint
alaskanrogue
 
Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09
Eddie Kelly
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting
James Deiotte
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
Alan Greggo
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
OCTF Industry Engagement
 
Romney ch05
Romney ch05Romney ch05
Romney ch05
Sri Rahayu
 
Anil kona
Anil konaAnil kona
Anil kona
thriddas
 

Similar to Protecting Trade Secrets in China (20)

Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Internal Controls In China
Internal Controls In ChinaInternal Controls In China
Internal Controls In China
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Risky Business in China (Themes) v2
Risky Business in China (Themes) v2Risky Business in China (Themes) v2
Risky Business in China (Themes) v2
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptxModule 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
Module 2A Opportunities and challenges of doing business in Asia-Pacific.pptx
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
IPR Protection
IPR ProtectionIPR Protection
IPR Protection
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Trade Secret Asset Management
Trade Secret Asset ManagementTrade Secret Asset Management
Trade Secret Asset Management
 
PANEL5Presentacin1WernerBijkerk_20190417153502.ppt
PANEL5Presentacin1WernerBijkerk_20190417153502.pptPANEL5Presentacin1WernerBijkerk_20190417153502.ppt
PANEL5Presentacin1WernerBijkerk_20190417153502.ppt
 
US China Legal Exchange - 12-9-13
US China Legal Exchange - 12-9-13US China Legal Exchange - 12-9-13
US China Legal Exchange - 12-9-13
 
Identity Checkpoint
Identity CheckpointIdentity Checkpoint
Identity Checkpoint
 
Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Romney ch05
Romney ch05Romney ch05
Romney ch05
 
Anil kona
Anil konaAnil kona
Anil kona
 

More from Enterprise Security Risk Management

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
Enterprise Security Risk Management
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
Enterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Enterprise Security Risk Management
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Enterprise Security Risk Management
 

More from Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Recently uploaded

Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
TIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup IndustryTIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup Industry
timesbpobusiness
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
➑➌➋➑➒➎➑➑➊➍
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
katiejasper96
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 

Recently uploaded (20)

Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
TIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup IndustryTIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup Industry
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 

Protecting Trade Secrets in China

  • 1. You’re not in Kansas anymore! Protecting Trade Secrets In China Jay Hoenig MGM Studios Hill & Associates, China February 2009
  • 2. About Hill & Associates Hill & Associates – Global Established in 1992 (HQ in Hong Kong) Asia’s largest risk management firm with 16 offices and 400 staff Hill & Associates - China (Shanghai, Beijing, HK) Established in the PRC in 1994 Wholly Foreign-Owned Enterprise (WFOE) Four Primary Service Lines Fraud Prevention & Integrity Risk Management Corporate Intelligence Asset Protection & Enterprise Risk Management Risk Intelligence Compliant with international and local regulations and professional business ethics
  • 3. Hill & Associates -- Clientele
  • 4. Discussion Topics I. Trade secrets – More than just IP II. The Long March – Communes to market economy III. Prevention is key! IV. Fraud, theft, and corruption in China V. Proactive protection measures VI. Conclusion
  • 5. Trade Secrets & IP “American Nobel Laureate Robert Solow discovered back in 1956 that about 88 % of economic growth is attributable to innovation. …………………In today’s globalized economy that is truer than ever. Innovation is a fundamental means of differentiation.” Mr. Werner Wenning Chairman of the Board of Management, Bayer June, 30th, 2004
  • 6. Trade Secrets – More than just IP • Intellectual property (R&D activities) • Brands, trademarks, copyright, patents • Chemical processes, formulations and recipes • Manufacturing know-how • Machine design and performance data • Plant design and operations • Internal work processes • Training manuals • Financial data, client data, employee list • Vendor and supplier data • Strategic and tactical business plans
  • 7. “…………Tell Me About China…….” Land of Complexities/Extremes/Contradictions • Old/new cultures and environment • Very rich/very poor • “Relationship based”/rule of law • Ethical/unethical behavior • The “Party” direction/market economy • Open/protected markets • SOE’s - employment driven/profit driven • Centralized/decentralized government • Regulated/under regulated businesses • Fast/slow – “rate of change”/bureaucracy • Plaza 66/Wuling – the real China All of these impact the IP/TS operating environment
  • 8. Not in Kansas anymore… • China is a high risk environment for IP and trade secret protection “Toto, I have a feeling • PRC investment incentives for we’re not in Kansas bringing advanced technologies….why? anymore!” • Threats from rogue employees, domestic and foreign competitors, vendors, suppliers and the State • Competition for technology and a “competitive” edge is increasing • Relying on the “legal” system for appropriate recourse is not realistic • The question is not “if” you will loose your trade secrets, but “when” • Companies should have a structured, disciplined and integrated approach MGM Studios to IP and TS protection
  • 9. Business Environment – “Free for All”
  • 10. The Long March -- Communes to market economy 1989…a swamp! …and now a global business centre!
  • 11. Before 1979 – Absolute economic disasters Eating from the Big Guo The Great Leap Forward The Great Steel Production The Cultural Revolution
  • 12. Phase 1: 1979 to 1992 Starting from zero • People’s communes ceased to exist • Production units responsible for own profits and losses • “Special Economic Zones” established • From SRE to SOE • 1989 Tiananmen Square incident – major set back to reform
  • 13. Phase 2: 1992 to 2003 Deng’s economic reforms State-owned enterprise reform • Protect larger ones, let go of small ones • SOEs step back, private enterprises move forward • Privatization of SOEs M&A Convert to share holding company Sell to private sector Famous Deng quotes: • “Black cat and white cat” • “Feeling the stones to cross the river” • “Let a small group of people get rich first”
  • 14. Phase 3: 2004 to Present Scientific Development/Harmonious Society • Less need for foreign capital; just technology & innovation • Migration to high value/high tech products (R&D) • Greater protectionism & worker rights (ACFTU) • Greater investment scrutiny • Increasing awareness of social and environmental issues • Global resource “mining” • Rising nationalism, more emboldened China • Continuing reluctance to participate in global affairs A riskier operating environment for foreign MNC
  • 15. Continued Industrial Policy in China China market economy is structured and regulated to meet a clear and deliberate “industrial” policy established every 5 years. Example: • Foreign AP Headquarters – 223 (Shanghai alone) • Foreign R&D Centers – over 700 FIE • FDI “Go West” (high-tech outpost) 11th – 5 year plan (2006-2010) includes: • Two themes: “Scientific approach to development” “Constructing a harmonious Socialist society” • Industry structure – quality, not scale • Strengthen services (FSI, legal, banking, etc) • Energy-saving and environmental protection
  • 16. Operating challenges AmCham's Top 10 challenges to conducting business in China: #1 HR constraints 33% #2 Bureaucracy, lack of transparency 18% #3 IPR infringements 13% #4 Protectionism/corruption/fraud 11% #5 Visa difficulties for Chinese traveling to the US 7% #6 Collecting payments, assessing credit 6% #7 Contract enforcement 5% #8 Difficulty obtaining RMB/USD, remitting capital 3% #9 Non-tariff market access barriers 3% #10 Obtaining materials for production 2% Source: AmCham Shanghai: 2007 China Business Report
  • 17. Legal and Administrative Steps • Non-compete clauses with employees • Non-disclosure agreements with employees, vendors and suppliers • Confidentiality Agreements • Register Trade marks, patents and copyrights “Provides foundation & framework for litigation”
  • 18. Legal Protection and Recourse in China Although the legal system is improving, foreign companies cannot rely on the system for fair and impartial recourse and enforcement of an IP/TS judgment. Investigations and litigation are time consuming, operationally disruptive, and costly with unpredictable results….enforcement is difficult. Prevention is the key!
  • 19. High Cost of Fraud in US • Corruption impact is estimated at 4% of GDP • The median loss caused by fraud is $175,000 • 7% of annual corporate revenue lost to fraud • Costs $994 billion annually • More than one quarter of the frauds cost in excess of $1 million Source: 2008 ACFE Report to the Nation
  • 20. IP Theft & Fraud Statistics – US (combine with previous slide) • 69.6% of business professionals have stolen some form of corporate IP from their employer when leaving a job. • 32.6% of employees leaving a job took sales proposals and/or presentations with them. • 30.4% admitted to taking information such as customer databases and contact information. • The most commonly used method for stealing IP is to send electronic copies of documents and files to a personal email account. • Only 28.2% think that IP theft is completely unacceptable.
  • 21. Fraud & Corruption: China Statistics • Corruption accounts for an estimated 13% to 16.9% of GDP • Counterfeiting accounts for 8% of GDP • “95% of those with jurisdiction over monopoly industries would be considered corrupt…….” • “80% of government officials and 70% of CEO’s of SOE would be considered corrupt by other countries’ standards…..” • 82% of major fraud cases involved company’s own employees • 23% of applicants have used false names • Secret commissions or kickbacks (43%) • False invoicing (27%) Source: Association of Search & Selection Consultants, Maxima plc, Economist
  • 22. Why All the Fraud/Corruption in China? • Relationship-based society – “guanxi” • Lack of transparency/checks-balances – opportunities • Concentration of Power – The Party, PLA, PSB, etc • Extremely low compensation for professionals – social pressure • Poorly developed corporate governance – owner driven • Under-development regulatory bodies • Hesitant enforcement services – “source of tax revenue/jobs” • Shifting/conflicting social values • Vague moral/ethical business “grounding”
  • 23. Motives for Fraud in China
  • 24. Motivation for Committing Fraud/Theft • Greed; money, power, prestige • Lifestyle (gambling, sex, partying, etc) • Financial pressures (business or personal) • Family pressures • Revenge • Industrial espionage
  • 25. Rationalization Reward / Risk • Immature legal system • Two-tier management -transparency • Immature/incomplete company controls • Reluctance to prosecute by MNC • Greater labor law protection • Increased sophisticated domestic competition • Growing nationalism • Growing protectionism
  • 26. Opportunity to Commit Fraud / Theft • JV vs. WFOE • Lack of clear ethics policies and procedures • Poor internal controls • Immature company operating procedures • Two-tier management structure • Insufficient prevention strategies • Insufficient detection strategies • Failure to deal with fraud (e.g. allowing fraudsters to resign without criminal and / or civil action)
  • 27. Prevention -- Protecting IP/Trade Secrets • Human Resources • Education and Training • Information Technology (IT) • Physical Security • Controls and Monitoring • Enforcement Measures
  • 28. Prevention – HR: Education & Training • Integrity training and awareness training-all levels Set company expectations Appeal to sense of national pride Deputize your staff Explain PRC criminal law (not FCPA) In Mandarin Install “hotline” • Instill company loyalty through effective HR practices • Brief company travelers/visitors on security procedures • Develop a “need to know” IP culture • Develop an TS/IP working group • Rigidly enforce and prosecute violators
  • 29. Prevention – Human Resources • Pre-employment screening • Reputation Due Diligence on senior employees • Due Diligence on CDI, vendors and suppliers • Non-disclosure and non-compete provisions • Clear policies & procedures (what are trade secrets) • Effective HR retention programs (reduce turnover) • Rotation of key employees • Termination procedures (laptops)
  • 30. Prevention – IT Security • Encrypt laptops, no USB ports • No personal computers allowed • Create an IT security training team • Identify business critical systems (process flow maps) • Establish an intrusion reporting system • Continual vulnerability and penetration testing (server hardening) • Develop standardize hardware and software enterprise wide • Implement secure data transmission systems using encryption or other devices (LAN segmentation, WAN link routing, secure movement of high-risk data)
  • 31. Prevention – Physical Security • Perimeter fence / barrier/ CCTV systems • Access control and ID’s • Guarded lobbies/dual entry • “Trained” guard force • Compartmentalize functions • Secure areas/controlled assess • Surveillance/CCTV/motion detectors • Occasional sweeps • Unannounced audits, security searches • Clean desk policies/shredders • Visitor/Escort policies – laptops, camera’s
  • 32. Controls and Monitoring • Know what is your IP.TS; what must/want to bring to China • Inventory and classify IP/TS according to the sensitivity level/segregate and control access • Document Protection: • Secure Storage (how, controlled by whom) • Copying procedures • Disposal procedures - internal or contracted • How are proprietary documents circulated • How are proprietary documents moved in or out of the country • Track data flows for unauthorized access • Manage suppliers w/multiple people (transparency) • Develop unique product or information identification • Team approach to key functions; i.e. procurement
  • 33. Enforcement Measures • Spot checks and audits • Collaborate with other Companies in the industry • Develop relationships with other industry groups • Know your legal rights – register & apply • Have good local counsel and risk consultant • Vigorously prosecute violators • Develop relationships with local government & law enforcement • Know your competitors and the market
  • 34. FDI Operating Lessons Learned • People steal IP/TS …..failure to develop, present and train, and implement clear ethics policies in a timely manner • Do not begin operating with immature operating and security procedures • Avoid a two-tier management structure and localizing 100% too quickly • Failure to aggressively deal with ethics violations
  • 35. Conclusion • Risks are manageable only when identified • Know what you want to protect • Develop a structured, disciplined approach to IP/TS protection “early” • Know who you are dealing with! • When investing, a reputational/operational due diligence is a must in China • Remember the 6 D’s and 3 V’s
  • 36. Thank you! Jay Josef Hoenig President 6A, Huamin Empire Plaza 728 Yan’an West Road Shanghai, PR China Tel: (86 21) 5238 5599 Fax: (86 21) 5237 1693 Jay.hoenig@hill-assoc.com info@hill-assoc.com www.hill-assoc.com