The Chinese State will in future pursue cybercrime and theft of trade secrets via the Internet in cooperation with other countries. To this end, the Ministry of Public Security launched an operation called Cloud Sword in July 2019, which focuses on international cooperation in the fight against transnational cybercrime. The new programme is showing first… Continue reading Operation Cloud Sword: China Fights Cybercrime
In the fight against counterfeiting and piracy on the Internet, brand owners must try to identify and eliminate counterfeit manufacturers in the real economy. Those who find illegal sales in Internet marketplaces and online shops with the help of crawling software and only have them deleted manually or automatically cure the symptom. The deleted offers… Continue reading Deception Package Crawling Services
China has released its new Artificial Intelligence Development Plan. It focuses on strategic objectives and the development of new artificial intelligence by 2030, and also includes protective measures, a detailed timetable and a three-step roadmap. By 2020, the national applications of artificial intelligence are to be synchronized with the global development of this technology. Particular… Continue reading Artificial Intelligence: China Pushes Forward
On 26 October, the National People’s Congress of the People’s Republic of China passed the new Chinese Encryption Act (密码法), which will come into force on 1 January 2020. It can be seen as a further addition to the cyber security regime that China has been developing for years and which has gained momentum with… Continue reading Access still allowed – The new Chinese Encryption Law
A clear result of the IP Crime Conference in Cape Town: According to prosecuting authorities, brand and product piracy is becoming increasingly digital and transnational. Counterfeiters today are technologically highly advanced and have a global reach – their products are produced in the country A, transported via the country B and sold in the country… Continue reading IP Crime Conference in Cape Town: Can the Public Sector Keep Up?
The value of machines is increasingly shifting from the actual machine to the embedded systems and thus above all to the embedded software. This means that in addition to protecting the machine with traditional IP, i.e. patents, utility models and designs, the software should also be protected as good as possible. So how can embedded… Continue reading Protection of Embedded Software in China
Four years have passed since the first proposal of the strategic plan Made in China 2025 (MiC 2025). Although China is toning down the public media coverage and official statements regarding the MiC 2025, the plan is still running. Its goals focus on high-tech areas, including the pharmaceutical industry. The MiC 2025 plan sets ambitious… Continue reading Know-How Protection in Pharmaceutical Companies