Feeds

Coca Cola in the dock over illegal China GPS map claims

Sugar Daddy says GPS logistics tools were commercially available

Choosing a cloud hosting partner with confidence

The perils of doing business in China were highlighted again recently after it was revealed that Coca Cola is under investigation following allegations it illegally mapped parts of Yunnan province.

The FT translated a notice on a local government web site in the region apparently accusing the fizzy drinks giant of "illegally collecting classified information with handheld GPS equipment".

Coca Cola is not the only company under investigation: the Yunnan Geographical Information Bureau of Surveying is considering 21 cases. But the company has been lumped in with cases concerning mapping of military bases, which ups the ante a tad.

A statement from the drinks-maker sent to the paper said it was co-operating fully with the investigation and that location-based mapping and logistics kit used at its local bottling plants are only being used to improve fuel efficiency and customer service.

"These customer logistics systems are broadly used for commercial application across many industries in China and worldwide," it continued.

Multi-national companies operating in China using similar mapping tools will be hoping the investigation does not signify the beginning of a crackdown by local authorities, as that GPS tools have become all-but indispensable to sophisticated logistics operations.

The government is certainly signalling a harder line on mapping regulations, with proposals released in September last year including a requirement for all commercial map service providers to locate their data centres inside the country.

The aim is that tighter regulation will boost national security by reducing the likelihood of sensitive geographical information ending up in the wrong hands. China is also planning to increase fines for providers which fail to include its “full territory” when compiling maps, as sometimes happens when cartographers decide disputed lands such as the Diaoyu Islands don't belong in Chinese territory.

Tensions regarding national security are obviously pretty high in the region at the moment with allegations of online spying being thrown back and forth with increasing regularity by the US and China.

Ironically enough, Coca Cola was allegedly one of those US companies hit by Chinese hackers in a long-term APT-style attack,a report claimed last year. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.