Feeds

China won't protect IP until it gets its own IT

Fortune cookie

  • alert
  • submit to reddit

Security for virtualized datacentres

Comment This comment from a recent edition of Fortune magazine probably summarises the basic proposition underlying progress of IP protection in China. How will China acquire its own IP? How long will this take?

Since the early 1990s China has been an alluring consumer market. Initially products and, subsequently, services have been exported to China by enterprises keen to exploit the volume sales opportunities in that market. Patience and realism have frequently been shattered by vicious price competition. In part this derives from copying of the products and imitation of services by Chinese companies, many of which involve violation of intellectual property rights.

Experience has shown that whatever legislation may nominally exist in China over Intellectual Property rights are unenforceable without the power of the gun or active intervention from the Chinese State Authorities. When they can supply imitation goods and services so cheaply to the mass of the population and seemingly show that scale of economic progress in so doing, there is very little incentive for the Chinese State Authorities to take action against Intellectual Property pirates. Protests by foreign governments and importers have had very little impact on a Government whose objective is to build a world competitive economy as long as it does not threaten the monocratic power of the Communist Party.

Within the technology sector we have seen technology equipment such as PCs and mobile phone handsets cannibalised as domestic companies have copied, overproduced and slashed prices in competing with technology importers. IBM have, for example, sold their PC equipment making business to a Chinese manufacturer, in part because extensive copying and imitation, to focus on the software and service market in China.

How will those, which provide software-based products and services, fare combating the imitators and pirates? How immune are they to IP theft? Probably only highly sophisticated proprietary technology has any degree of immunity to copying and imitation at least for a while but long enough to see a return on the investment?

That may be a difficult and troublesome call to make. The Chinese State has "clamped down" in areas of software imitation and copying, where the copiers or imitators are perceived as a threat to the State. Technology enabling internet traffic to circumvent the State's oversight and control and technology enabling hacking or unauthorised access to State Organisations are such examples.

Microsoft is helping China to build its own software industry through "Wisecroft", in anticipation that "China will protect Intellectual Property when its has built its own IT industry." One must assume there is a vested interest in Microsoft's behaviour, not merely making their own contribution to alleviating third world hardship. On-going licensing and reciprocal software licensing arrangements are obvious opportunities. There is an absence of sensitivity to perceived anti-competitive issues in China. The company is unlikely to encounter problems of this nature. On the other hand overactive attempts or exercises in litigation is unlikely to succeed as a way of maintaining and protecting competitive advantage in China without the complicity of the Chinese State.

Encouraging China to build and own its own technology businesses is a pragmatic way of approaching the subject, though some foreign government may become uncomfortable where China builds technology businesses which are perceived to be an economic or security threat. Progress in protection of IP will be slow; measuring progress will be difficult. The time and pace of it are hard to determine.

© IT-Analysis.com

Related stories

US reveals intellectual property blacklist
Microsoft offshores patent war - so goes the WTO?
China's IT: an inside outsider's view

Choosing a cloud hosting partner with confidence

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Why Oracle CEO Larry Ellison had to go ... Except he hasn't
Silicon Valley's veteran seadog in piratical Putin impression
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.