Feeds

China won't protect IP until it gets its own IT

Fortune cookie

  • alert
  • submit to reddit

The Power of One Infographic

Comment This comment from a recent edition of Fortune magazine probably summarises the basic proposition underlying progress of IP protection in China. How will China acquire its own IP? How long will this take?

Since the early 1990s China has been an alluring consumer market. Initially products and, subsequently, services have been exported to China by enterprises keen to exploit the volume sales opportunities in that market. Patience and realism have frequently been shattered by vicious price competition. In part this derives from copying of the products and imitation of services by Chinese companies, many of which involve violation of intellectual property rights.

Experience has shown that whatever legislation may nominally exist in China over Intellectual Property rights are unenforceable without the power of the gun or active intervention from the Chinese State Authorities. When they can supply imitation goods and services so cheaply to the mass of the population and seemingly show that scale of economic progress in so doing, there is very little incentive for the Chinese State Authorities to take action against Intellectual Property pirates. Protests by foreign governments and importers have had very little impact on a Government whose objective is to build a world competitive economy as long as it does not threaten the monocratic power of the Communist Party.

Within the technology sector we have seen technology equipment such as PCs and mobile phone handsets cannibalised as domestic companies have copied, overproduced and slashed prices in competing with technology importers. IBM have, for example, sold their PC equipment making business to a Chinese manufacturer, in part because extensive copying and imitation, to focus on the software and service market in China.

How will those, which provide software-based products and services, fare combating the imitators and pirates? How immune are they to IP theft? Probably only highly sophisticated proprietary technology has any degree of immunity to copying and imitation at least for a while but long enough to see a return on the investment?

That may be a difficult and troublesome call to make. The Chinese State has "clamped down" in areas of software imitation and copying, where the copiers or imitators are perceived as a threat to the State. Technology enabling internet traffic to circumvent the State's oversight and control and technology enabling hacking or unauthorised access to State Organisations are such examples.

Microsoft is helping China to build its own software industry through "Wisecroft", in anticipation that "China will protect Intellectual Property when its has built its own IT industry." One must assume there is a vested interest in Microsoft's behaviour, not merely making their own contribution to alleviating third world hardship. On-going licensing and reciprocal software licensing arrangements are obvious opportunities. There is an absence of sensitivity to perceived anti-competitive issues in China. The company is unlikely to encounter problems of this nature. On the other hand overactive attempts or exercises in litigation is unlikely to succeed as a way of maintaining and protecting competitive advantage in China without the complicity of the Chinese State.

Encouraging China to build and own its own technology businesses is a pragmatic way of approaching the subject, though some foreign government may become uncomfortable where China builds technology businesses which are perceived to be an economic or security threat. Progress in protection of IP will be slow; measuring progress will be difficult. The time and pace of it are hard to determine.

© IT-Analysis.com

Related stories

US reveals intellectual property blacklist
Microsoft offshores patent war - so goes the WTO?
China's IT: an inside outsider's view

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.