Coming Conflict with China: Part 4 - Cyber Spying and IP Theft

Thomas Fox - Compliance Evangelist
Contact
In the short span of the 21st Century, the world’s two top powers, the United States and China have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? In this special 5-part Series, Tom Fox and Brandon Daniels, CEO of Exiger, a leading global third-party and supply chain management software company, explore issues diverse as a real danger, supply chain, exports, cyber-attacks, See more +
In the short span of the 21st Century, the world’s two top powers, the United States and China have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? In this special 5-part Series, Tom Fox and Brandon Daniels, CEO of Exiger, a leading global third-party and supply chain management software company, explore issues diverse as a real danger, supply chain, exports, cyber-attacks, and IP theft from the business perspective and give the compliance and business executive their viewpoints on what you can do to not only prepare your company but protect it as well. In Part IV, China’s aggressive tactics to steal intellectual property, we consider the responses to protect the US’s IP and how to take aggressive action against the Chinese government to seek remuneration for stolen assets.

What are China’s aggressive tactics in stealing intellectual property from countries all over the world? Through intelligence gathering, academic partnerships, and supply chain buyouts, China has managed to copy and counterfeit American business products and other technologies. Companies must harden their defenses and refuse to stand for IP theft by using the Rule of Law to take a stand against the theft of US intellectual property. Through a concerted effort, companies can fight back and reclaim their assets.

Key Highlights:

1. How is China aggressively stealing intellectual property and technology?

2. How is counterfeiting built into the Chinese economic model?

3. Why is the Rule of Law a critical recourse for companies whose intellectual property is stolen by China? See less -

Embed
Copy

Other MultiMedia by Thomas Fox - Compliance Evangelist

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Thomas Fox - Compliance Evangelist | Attorney Advertising

Written by:

Thomas Fox - Compliance Evangelist
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Thomas Fox - Compliance Evangelist on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide