Restricted © Siemens AG 2013. All rights reserved Trade Secret Qu Xiaoyang, Director of Intellectual Property | Dec. 4. 2013.

Slides:



Advertisements
Similar presentations
Domestic Laws governing activity within a country Based on a Constitution Includes Statute and Case Law International Deals with relations between nations.
Advertisements

CHINA - IP Issues Silas Brown Briffa East Midlands International Trade Association Wednesday 12 July 2006.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
© 2011 Dean A. Pelletier Protecting Economic Drivers Because All Roads Lead To The U.S. January 14, 2011 The NAMM Show Anaheim,
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
Types of Intellectual Property in the US Patents (Utility, Design, & Plant) Copyrights (Derivative works, Distribution, public performance, public display)
Right to Privacy: The Unwritten Right
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
OFFICE FOR THE PROTECTION OF COMPETITION OF THE CZECH REPUBLIC1 Judicial Review in Competition Cases in the Czech Republic Robert Neruda Director of the.
BARRIERS AT LABOR MARKET AND PROPOSALS OF PRIVATE SECTOR FOR THEIR ELIMINATION Slaviša Delić Montenegro Business Alliance Solun, May 27, 2005.
Foreign Investment and IP Protection in China Presented by: Julia Zhu Allan Law Group/Alpha Leader Group U.S. Los Angeles May 14, 2008 © Allan Law Group.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 17 Administrativ e Law.
INTERNET and CODE OF CONDUCT
Ministry of Industry, Trade & Labor Head of Section in Charge of Foreign Workers Rights at Work The Role of a Governmental Ombudsman In Charge of Foreign.
Social Media in the Employment Context – The Belgian Perspective Lorenz Data Privacy Practice
Enforcement at the Israel Securities Authority: from Criminal to Administrative Dr. Zvi Gabbay, Adv.
Lower Federal Courts Section 2 The Federal Courts and the Judicial Branch Chapter 8.
 The Community authorities follow the attribution of jurisdiction in Article 81 of the TFEU (formerly Article 65 TA): Rome I, Rome II and Rome III Regulations.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Legal Environment for Doing Business in China
Use Policies Deputy Attorney General Robert Morgester
Joseph Kummer Terri Berry Brad White.  1. Specific instances of employee hacking and the consequences which resulted therefrom.  2. How employees utilize.
Divisions of Canadian Law Substantive and Procedural Law.
Introduction of Communication Protection and Interception Act in Taiwan, R.O.C. Jackie Chien Cybercrime Unit of MJIB Korea KCC, ETRI, KTOA.
Ide kerülhet az előadás címe CCTV operation at work Belgrade, 11 th April 2013.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Classroom Activity – Lesson 1: “Defining Terms”. “Capitalism” is identified by its characteristic institutions Institutions: the formal and informal “rules.
Registration and Certification of Unions in Canada Presentation at the Government-to-Government Session and Seminar for an Exchange of Information on Topics.
IP Protection for Technology Transfer in China Prof. ZHANG Naigen Director, the IP Center Fudan University
THE NATURE OF THE JUDICIAL SYSTEM The judicial system in the United States is an adversarial one in which the courts provide an arena for two parties to.
Dr. Thomas Pattloch, LL.M.Eur. The new Chinese Patent Law An overview Dr. Thomas Pattloch, LL.M.Eur., German Attorney at Law Senior Counsel TaylorWessing.
Civil Law Criminal Law Procedural Law Substantive Law Business Law
LECTURE 6 Theme: Labour law.. PLAN  1. The function and origins of Labour Law.  2. Hours of labour.  3. The main features of the Code.  4. labour.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 22 Criminal Law and Procedure in Business.
Patent Protection During Exhibitions Wu Ningyan State Intellectual Property Office Date: Sept. 9, 2006.
China IP’s Challenge Since joining the World Trade Organization (2001), China has strengthened its legal framework and amended its IPR laws and regulations.
© Haihong Liu, SISU Law School Nov Shan Zhai.
Chapter 41 Corporations: Securities and Investor Protection McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Top 10 Legal Minefields A University Perspective October 8, 2009 Catherine Shea Associate University Counsel University of Colorado.
What is Law?? By Maleeka Brennan. Some laws are are organized as the foundation laws of government Others are organized according to the areas they regulate.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
The lower federal courts, beneath the Supreme Court.
Three Pillars of the Copyright System Any efficient copyright system must include: 1) appropriate legislation 2) management mechanisms 3) enforcement.
COURTS, JUDGES AND THE LAW Key Terms on Judicial Branch.
Legal Framework of Intellectual Property Protection during Exhibition The Intellectual Property Center of Shanghai University of Political Science and.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Law As the Foundation of Business
Ogletree, Deakins, Nash, Smoak & Stewart PC
by John Bagby and F. William McCarty
Chapter 1 Records Management
International Distribution Institute
A Comparative Legal and Economic View of Global Trade Secret Regimes
Munich Intellectual Property Law Center (MIPLC)
Confidentiality October 14, 2005.
ADM 636 Possible Is Everything/tutorialrank.com
PAD 525 Competitive Success/snaptutorial.com
ADM 636 Education for Service/tutorialrank.com
Introduction to Law and the Legal System
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Trade Secrets 2018: International
Bachelor Degree Programs
Presentation on the topic: Right as a science
The Pillars of Law.
Civil vs. Criminal Courts
Presentation transcript:

Restricted © Siemens AG All rights reserved Trade Secret Qu Xiaoyang, Director of Intellectual Property | Dec

Page 2 December 2013Restricted © Siemens AG All rights reserved Trade Secret Trade secret protection A challenge for companies in China

Page 3 December 2013Restricted © Siemens AG All rights reserved Legal Frame Work Civil law Labor law Anti-unfair competition law (1993) Criminal law SAIC Administration regulation

Page 4 December 2013Restricted © Siemens AG All rights reserved Approach of Trade Secret Enforcement Civil procedureCriminal procedure ( Preferred by local company )

Page 5 December 2013Restricted © Siemens AG All rights reserved Chinese Sustainable Growth Requires 20% Annual turnover rate in China Leading local company prefers criminal prosecuting MNC has concerns when transferring cutting-edge technology to China Enterprises has no motivation to develop their own trade secret

Page 6 December 2013Restricted © Siemens AG All rights reserved Two cases District court ruled that the employer had violated the freedom of correspondence of the employees by monitoring their send off. The employee was charged of downloading sensitive files without authorization and send it to 3 rd party, using company PC and company IT network, but through private mail box. Court ruled that the IT monitor / recorded system is under full control of the employer. Therefore the record of unauthorized downloading was not sufficient to charge the former employee.

Page 7 December 2013Restricted © Siemens AG All rights reserved Demand for a modern trade secret protection system Apply to employee, besides business operator Defendant’s burden of proof Court order for evidence preservation Consequential offense replaced by Offense of act

Page 8 December 2013Restricted © Siemens AG All rights reserved Thank you!