Feeds

China won't protect IP until it gets its own IT

Fortune cookie

  • alert
  • submit to reddit

Eight steps to building an HP BladeSystem

Comment This comment from a recent edition of Fortune magazine probably summarises the basic proposition underlying progress of IP protection in China. How will China acquire its own IP? How long will this take?

Since the early 1990s China has been an alluring consumer market. Initially products and, subsequently, services have been exported to China by enterprises keen to exploit the volume sales opportunities in that market. Patience and realism have frequently been shattered by vicious price competition. In part this derives from copying of the products and imitation of services by Chinese companies, many of which involve violation of intellectual property rights.

Experience has shown that whatever legislation may nominally exist in China over Intellectual Property rights are unenforceable without the power of the gun or active intervention from the Chinese State Authorities. When they can supply imitation goods and services so cheaply to the mass of the population and seemingly show that scale of economic progress in so doing, there is very little incentive for the Chinese State Authorities to take action against Intellectual Property pirates. Protests by foreign governments and importers have had very little impact on a Government whose objective is to build a world competitive economy as long as it does not threaten the monocratic power of the Communist Party.

Within the technology sector we have seen technology equipment such as PCs and mobile phone handsets cannibalised as domestic companies have copied, overproduced and slashed prices in competing with technology importers. IBM have, for example, sold their PC equipment making business to a Chinese manufacturer, in part because extensive copying and imitation, to focus on the software and service market in China.

How will those, which provide software-based products and services, fare combating the imitators and pirates? How immune are they to IP theft? Probably only highly sophisticated proprietary technology has any degree of immunity to copying and imitation at least for a while but long enough to see a return on the investment?

That may be a difficult and troublesome call to make. The Chinese State has "clamped down" in areas of software imitation and copying, where the copiers or imitators are perceived as a threat to the State. Technology enabling internet traffic to circumvent the State's oversight and control and technology enabling hacking or unauthorised access to State Organisations are such examples.

Microsoft is helping China to build its own software industry through "Wisecroft", in anticipation that "China will protect Intellectual Property when its has built its own IT industry." One must assume there is a vested interest in Microsoft's behaviour, not merely making their own contribution to alleviating third world hardship. On-going licensing and reciprocal software licensing arrangements are obvious opportunities. There is an absence of sensitivity to perceived anti-competitive issues in China. The company is unlikely to encounter problems of this nature. On the other hand overactive attempts or exercises in litigation is unlikely to succeed as a way of maintaining and protecting competitive advantage in China without the complicity of the Chinese State.

Encouraging China to build and own its own technology businesses is a pragmatic way of approaching the subject, though some foreign government may become uncomfortable where China builds technology businesses which are perceived to be an economic or security threat. Progress in protection of IP will be slow; measuring progress will be difficult. The time and pace of it are hard to determine.

© IT-Analysis.com

Related stories

US reveals intellectual property blacklist
Microsoft offshores patent war - so goes the WTO?
China's IT: an inside outsider's view

Maximizing your infrastructure through virtualization

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.