GM / VOLKSWAGEN: A CASE OF INDUSTRIAL ESPIONAGE Youjung Byon Edward Urban Tim Nguyen.

Slides:



Advertisements
Similar presentations
Unit 13 International Marketing
Advertisements

Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
CARTEL CASE STUDY John W. McReynolds Assistant Chief New York Field Office Antitrust Division U.S. Department of Justice
Copper Theft Update Mayor and Council May 22, 2012.
Chapter 8 Part II. 2 New York v. Burger, 482 U.S. 691 (1987) Search of junk yard for stolen goods Lower court excluded the evidence in the criminal trial:
The University Startup Company Law Firm California Massachusetts Florida (310) Stephen P.
Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska.
United States v. Nosal. The Nosal Fact Pattern Korn/Ferry computer Confidential information and trade secrets Authorized access by users logging in with.
MOVING FORWARD- CURRENT US/CANADA ATF TOBACCO INITIATIVES Jeff Cohen ATF Associate Chief Counsel.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
Intellectual Property Boston College Law School February 13, 2008 Trade Secret – Part 3.
High Tech Products and Intellectual Property Erinn Woodcock Rick Nortz Paula Ramko Lance Gomes.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
QPF FINANCE GROUP VENDOR PRESENTATION. HISTORY  Queensland Pacific Finance "QPF’’- commenced trading during the late 1970’s providing finance for motor.
Chapter 5 Intellectual Property & Internet Law
4 years in the life of the Egyptian Competition Authority.
OGT SESSION 1 ECONOMICS.
NON-COMPETES: SHOULD YOU HAVE THEM, AND WHAT TO DO WHEN FACED WITH ONE? Jonathan A. Keselenko Partner Foley Hoag LLP February 6, 2008.
Chapter Three The Contemporary Law Enforcement Industry
Chapter Two Ethical & Legal Issues.
ISSUES IN FBI LAW ENFORCEMENT RELATED TO COUNTER-TERRORISM INVESTIGATIONS Ranjana Natarajan National Security Clinic University of Texas School of Law.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. Police in America Chapter Three The Contemporary Law Enforcement Industry.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
Winter Conference February 2, Dealing with the Ugly Face of Fraud Holly Frook Graham, CPA, CFE Arizona Office of the Auditor General.
HIPAA PRIVACY AND SECURITY AWARENESS.
Regulation and Deregualtion. Market Power Monopolies and oligopolies control prices, and output. Will often drive other competitors out of the market.
Did not exist under the Articles of Confederation Americans wanted one elected person other countries could identify and respect They didn’t want someone.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
Employer Alert: New Duty to Police Illegal Activities in the Workplace Presented by M. Karen Thompson.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Information Warfare Playgrounds to Battlegrounds.
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
Cyber Security Nevada Businesses Overview June, 2014.
Police must verify legal status of anyone that they reasonably suspect of being in the country illegally Misdemeanor charges for not carrying immigration.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 22 Criminal Law and Procedure in Business.
The Rights of the People and the States Amendments 9-10.
1 Trade Secrets ___________________________ Business Organizations II Mike Brigner, J.D.
Enforcing IP Rights Involving Foreign Companies Greg Vogler Chicago, Illinois May 2013.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
SNB - REACT Business Perspective IPR Protection April 1, 2009 Presentation Eli Mufisovski.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Information Warfare Playgrounds to Battlegrounds.
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Welcome C&E Students Grab your handout and settle in Roll Call Question: What would your “last meal” be? Bell Work: What are the steps in a criminal justice.
Boston New York San Francisco Washington, DC Woods Hole Oceanographic Institute Understanding Intellectual Property June 4, 2008.
Payment Risk Management Chip Martin Bottomline Technologies.
DATA COLLECTION William McCarty Chairman Indiana Utility Regulatory Commission September 9-10 Riga, Latvia.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
group-chinas-sinovel-charged-by-u-s-with-stealing-trade/
2010 NASBITE CGBP Review – Management International Trade Center.
Bellwork Think about this…. Historical Event
Chapter Three The Contemporary Law Enforcement Industry
Warm Up – Last Meals row-prisoners-last-meals.
Chapter 1: Policing in America
Cyber Trends and Market Update
Chapter 6 Study Guide Answers.
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Theft of Trade Secrets & Economic Espionage
Pre-Trial Procedures Search and Seizure.
Chapter 6 Study Guide Answers.
The Private Security Industry
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

GM / VOLKSWAGEN: A CASE OF INDUSTRIAL ESPIONAGE Youjung Byon Edward Urban Tim Nguyen

Jose Ignacio Lopez  The “Grand Inquisitor”  : Firestone in Bilbao, Spain  : GM Europe’s offices in Spain  1987: GM Head of Purchasing for Europe  April 1992: GM Vice President for Worldwide Purchasing  March 1993: VW Chief of Production Organization and Purchasing “warriors”  “Warriors”  Plant X

INDUSTRIAL ESPIONAGE  Employee Discontent  Industrial Espionage  Information Brokers  Anti-Espionage Services

FRAUD  GM claim 4 sets of materials taken by Lopez (1) 3,350-page listing of the 60,000 parts, their suppliers, their cost, and their delivery schedules for GM-Europe (2) GM’s future product line details (3) Detailed manufacturing and cost study of Plant X (4) Portfolio of presentation materials used by Lopez in cutting supplier costs  German police discover 4 boxes of internal GM documents in the home of Lopez’ warriors

GENERAL MOTORS  General Motors Corp. (NYSE: GM), the world's largest vehicle manufacturer, employs about 325,000 people globally.  GM has manufacturing operations in 32 countries and its vehicles are sold in 192 countries.  In 2003, GM sold nearly 8.6 million cars and trucks, about 15 percent of the global vehicle market.  GM parts and accessories are sold under the GM, GM Goodwrench and ACDelco brands.

VOLKSWAGEN AG

FINANCIALS

INDICTMENT  The Justice Department investigated Lopez and indicted him in U.S. district court in Detroit on charges of wire fraud and transportation of stolen property.  Reasoning: ing documents often will fail to count as “wire fraud” because the theft does not defraud the owner within the meaning of the statute as it has been construed by the courts. (See 18 U.S.C. § 1343 (2000), amended by Pub. L. No , 116 Stat. 805 (2002). (Also see James H.A. Pooley et al., Understanding the Economic Espionage Act of 1996, 5Tex. Intell. Prop. L.J. 177, 186 [1997]).  The government, however, was not able to charge him directly with trade secret theft because it was not a federal crime at that time.

POLITICAL & ECONOMIC DIMENSIONS OF THE FRAUDULENT SCHEME  Regulatory dimension: Trade Secrets vs. Patents  Issues of International Competition  Status Quo (before 1996): 1)The law of trade secrets fell within the scope of common law at the state level. 2)Uniform Trade Secrets Act (“UTSA”) vaguely defined “trade secret”.

AFTERMATH  VW settled with GM in 01/97.  German court fined his warriors who left GM: Jose Manuel Gutierrez (100,000DM), Jorge Alvarez (50,000 DM), & Rosario Piazza (40,000 DM). Security experts claim “penalties are nominal.”  By the time the US had indicted Lopez, he was already in Spain, his native county.  US petitioned for Lopez’s extradition, but Spanish court denied request.  To date, Lopez runs and operates an elite consulting company in Spain.  Penalties: VW to pay GM $100 million in damages VW to purchase over $1 billion in in parts from GM over the next seven years (1997 through 2004) Lopez barred from working for VW in any capacity through the 2000

ECONOMIC ESPIONAGE ACT OF 1996 (“EEA”)  In response, Congress passed the Economic Espionage Act of 1996 (EEA), criminalizing the theft of trade secrets.  The EEA significantly expands the ability of American firms to pursue trade secret protection: 1) The EEA broadens the definition of “trade secret” beyond the traditional common law definition. 2) The EEA gives the United States wide extraterritorial authority to enforce this law.

TRADE-RELATED ASPECTS OF INTELLECTUAL PROPERTY RIGHTS (“TRIPS”)  This effort resulted in an agreement under the World Trade Organization (WTO), the Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement, establishing uniform minimum standards of intellectual property protection for all member nations.  Though the agreement requires all member nations to adopt laws ensuring enforcement of the minimum standards, TRIPS acts merely as a floor, and indicates that, beyond meeting the minimum standard, nations are free to establish individual levels of intellectual property protections and mechanisms of Enforcement.

PREVENTION: COUNTER-ESPIONAGE IDEOLOGY  A new wave of counter-surveillance companies are hired by many companies to monitor internal company behavior and conduct (GM, BMW, Toyota): 1)They will visit your offices, most often in the evening or at weekends and carry out a thorough sweep of the premises, including telephone and fax systems and computer terminals. Even an electrical socket can be used to transmit information to your competitors! 2)Following this sweep, teams will remove any alien devices and immediately inform superior management if company is losing material through electronic surveillance. 3)This will be followed up with a full report enabling a possible trace of the leak and identification of the perpetrators.