China Legislature has early established a set of laws to protect trade secret, mainly the anti-unfair competition law of 1993 and related Supreme Court’s judicial interpretations. Besides, PRC Contract Law, PRC Labor Law, PRC Labor Contract Law and other administrative regulations and departmental rules have sets out supplementary provisions on trade secret protection. Article 10 of anti-unfair competition law defines trade secret as:
practicalinformation of technology and operation unknown to the public;
which can bring economic benefits to the obligee and has practical applicability;
on which the obligeetakes secrecy measures;
Therefore, trade secret includes technology information and operation information that meets above requirements, such as operating process, methods or formula, or other information such as marketing strategies, customer lists, raw materials, contract terms or pricing, etc.
Infringement of Trade Secret
Article 10 of anti-unfair competition law further specifies three means to infringe on the business secrets of others:
obtaining business secrets from the obligee by stealing, promising of gain, resorting to coercion or other illegitimate means;
disclosing, using or allowing others to use the business secrets of the obligee obtained by the means mentioned in the preceding item;
disclosing, using or allowing others to use the business secrets that it has obtained by breaking an engagement or disregarding the requirements of the obligee to preserve the business secrets.
In addition to the above mentioned types of infringement, it also states third party liability for infringement, if a third party obtains, uses or discloses the business secrets of others being fully aware of the infringement upon such business secrets.
According to relevant stipulations of PRC Contract Law, the contractual parties are not allowed to disclose or improperly use the business secrets known or obtained during the formation of the contract. The licensor and licensee may agree in the technology license contract the confidentiality obligations of each other. It is the same logic for the employee confidentiality duty to employer pursuant to the PRC Labor Law and PRC Labor Contract Law.
However, obtaining business trade through self-developing or researching and reverse engineering is not an infringement. In other words, they are effective defenses against accusation of infringement.
Trade Secret Protection in China
Once the obligee knows the infringement, he/she may resort to administrative remedy and judicial remedies, which include civil and criminal proceedings. The relevant Administration of Industry and Commerce (AIC) will conduct investigation once the conduct of infringement is found or reported. After the fact of infringement is confirmed, the enforcement measures may be taken by AIC are requesting infringer to stop infringement or posing fine or penalty on infringer. If the obligee claims for compensation, he/she has to bring a civil litigation.
During the civil litigation, the obligee may be granted two kinds of injunctions, interim injunction and permanents injunction. The obligee has to prove the fact of infringement and the damages or losses occurred thereby. Where the economic damages reach 500, 000 RMB, it will fall into criminal standards.
Trade Secret Protection Measures
In view of great difficulty and high cost, and heavy burden of proof for trade secret protection in China, taking some measures to prevent trade secrets from infringement is the best option to protect trade secrets.
Among them, we suggest:
Make Confidentiality Policy
An effective confidentiality policy may include define confidentiality scope, and people who may get access to it, process of handling confidentiality information, consequences for use without authorized or improper use or disclose. For employee, the consequence could be reasonable cause of termination of employment.
Implement Confidentiality Policy
Here are some suggestions: ask core staff, outside counsel, agent, contractor or other third party to sign confidentiality agreement or write the confidentiality obligation into employee handbook and let employees to acknowledge their confirmation of having reviewed and known it and to sign it; keep the confidentiality information in restricted storage file, device or area and clearly mark “highly classified information”, “confidentiality information” or “not allowed to be disclosed” etc.; require visitors of factory or office area to comply with the confidentiality procedure.
Sign Confidentiality, Invention Assignment and Non-solicitation and Non-competition Agreement
To know more about these and other specific measures, please contact our lawyers by writing an email to info@dandreaparteners.com
Disclaimer This article is intended solely for informational purposes and does not constitute legal advice. Although the information in this article was obtained from reliable official sources, no guarantee is made with regard to its accuracy and completeness.
I.Introduction With the rapid development of technology, customer flow analysis has been widely applied in the retail and service industries as an important tool to optimize operations. Customer flow analysis refers to businesses using devices such as cameras to collect customer entry behavior data and using data modeling to determine customer movement paths, staying areas,
Introduction In the wake of the United States’ recent tariff announcements, markets across the globe are adjusting to a renewed phase of economic uncertainty. Although a 90-day suspension of these measures was announced on April 9th, the underlying threat of their enforcement remains. The proposed tariff framework includes a 10% flat rate, with the potential
The Yangtze River Delta region (hereinafter referred to as the “Delta Region”) continues to stand at the forefront of China’s high-quality economic development and remains a crucial destination for foreign investment. Comprising the municipalities and provinces of Shanghai, Jiangsu, Zhejiang, and Anhui, the Delta Region plays a strategic role in China’s national development. As of
#China
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.