Feeds

Two 'fake Apple stores' shut in China over trading permits

Problem with local gov, nothing to do with Apple

Seven Steps to Software Security

Several fake Apple Stores in China have been shuttered as they did not possess the requisite local business licences they needed to trade.

Existence of the phoney retail shops emerged last week amid suggestions that some were so convincing that even staff thought they were employed by Apple.

The ensuing media storm around the fake stores and their contents prompted a government investigation into potential counterfeiting in some 300 shops in the southwestern region.

According to Reuters, the reason for the closures was not that they were peddling dodgy gear – they were buying from authorised resellers – but that they didn't have commercial permits rubber-stamped by local government officials.

A mouthpiece for the Chinese government confirmed only two of the five stores had been closed. He told Reuters: "China has taken great steps to enforce intellectual property rights and the stores weren't selling fakes."

Channel bully boy Apple has strict criteria that prospective resellers must meet before they can open a store heavily peppered with its brand – understandably so – but even when resellers jump through hoops, they still find themselves competing directly with Apple and its fleet of shopfronts.

Apple has four bona fide stores in China, in the capital and Shanghai, but has 13 authorised resellers in Kunming, some of which are applying to become part of Apple's channel. ®

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.