China Legislature has early established a set of laws to protect trade secret, mainly the anti-unfair competition law of 1993 and related Supreme Court’s judicial interpretations. Besides, PRC Contract Law, PRC Labor Law, PRC Labor Contract Law and other administrative regulations and departmental rules have sets out supplementary provisions on trade secret protection. Article 10 of anti-unfair competition law defines trade secret as:
practicalinformation of technology and operation unknown to the public;
which can bring economic benefits to the obligee and has practical applicability;
on which the obligeetakes secrecy measures;
Therefore, trade secret includes technology information and operation information that meets above requirements, such as operating process, methods or formula, or other information such as marketing strategies, customer lists, raw materials, contract terms or pricing, etc.
Infringement of Trade Secret
Article 10 of anti-unfair competition law further specifies three means to infringe on the business secrets of others:
obtaining business secrets from the obligee by stealing, promising of gain, resorting to coercion or other illegitimate means;
disclosing, using or allowing others to use the business secrets of the obligee obtained by the means mentioned in the preceding item;
disclosing, using or allowing others to use the business secrets that it has obtained by breaking an engagement or disregarding the requirements of the obligee to preserve the business secrets.
In addition to the above mentioned types of infringement, it also states third party liability for infringement, if a third party obtains, uses or discloses the business secrets of others being fully aware of the infringement upon such business secrets.
According to relevant stipulations of PRC Contract Law, the contractual parties are not allowed to disclose or improperly use the business secrets known or obtained during the formation of the contract. The licensor and licensee may agree in the technology license contract the confidentiality obligations of each other. It is the same logic for the employee confidentiality duty to employer pursuant to the PRC Labor Law and PRC Labor Contract Law.
However, obtaining business trade through self-developing or researching and reverse engineering is not an infringement. In other words, they are effective defenses against accusation of infringement.
Trade Secret Protection in China
Once the obligee knows the infringement, he/she may resort to administrative remedy and judicial remedies, which include civil and criminal proceedings. The relevant Administration of Industry and Commerce (AIC) will conduct investigation once the conduct of infringement is found or reported. After the fact of infringement is confirmed, the enforcement measures may be taken by AIC are requesting infringer to stop infringement or posing fine or penalty on infringer. If the obligee claims for compensation, he/she has to bring a civil litigation.
During the civil litigation, the obligee may be granted two kinds of injunctions, interim injunction and permanents injunction. The obligee has to prove the fact of infringement and the damages or losses occurred thereby. Where the economic damages reach 500, 000 RMB, it will fall into criminal standards.
Trade Secret Protection Measures
In view of great difficulty and high cost, and heavy burden of proof for trade secret protection in China, taking some measures to prevent trade secrets from infringement is the best option to protect trade secrets.
Among them, we suggest:
Make Confidentiality Policy
An effective confidentiality policy may include define confidentiality scope, and people who may get access to it, process of handling confidentiality information, consequences for use without authorized or improper use or disclose. For employee, the consequence could be reasonable cause of termination of employment.
Implement Confidentiality Policy
Here are some suggestions: ask core staff, outside counsel, agent, contractor or other third party to sign confidentiality agreement or write the confidentiality obligation into employee handbook and let employees to acknowledge their confirmation of having reviewed and known it and to sign it; keep the confidentiality information in restricted storage file, device or area and clearly mark “highly classified information”, “confidentiality information” or “not allowed to be disclosed” etc.; require visitors of factory or office area to comply with the confidentiality procedure.
Sign Confidentiality, Invention Assignment and Non-solicitation and Non-competition Agreement
To know more about these and other specific measures, please contact our lawyers by writing an email to info@dandreaparteners.com
Disclaimer This article is intended solely for informational purposes and does not constitute legal advice. Although the information in this article was obtained from reliable official sources, no guarantee is made with regard to its accuracy and completeness.
In the “Ten Typical Cases of Cross-border Data Disputes” released by the Guangzhou Internet Court in September 2024, the case of cross-border transfer of personal information by an international hotel company [(2022) Yue 0192 Min Chu No. 6486] is called as “the first case of cross-border transfer of personal information” in China , which initially
Jiangsu Province is embarking on an ambitious initiative to secure its leadership position in emerging industries through a newly launched pilot-program. The program, unveiled by the Jiangsu Provincial Development and Reform Commission, aims to develop pioneering clusters in 12 future-facing industrial sectors, spanning 21 locations across the province. This strategic move reflects Jiangsu’s determination to
The Shanghai Municipal Bureau of Justice issued on 13 June 2024 and entered into force on 1 August 2024 the Measures for the Promotion of Ad Hoc Arbitration in Shanghai for Foreign-related Matters in Commercial and Maritime Fields (For Trial Implementation) which refers to Ad Hoc Arbitration Measures in this article. For most people, ad
#China
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.