Why IP probe into China misses the mark
There seems to be a common narrative underpinning the West’s (and particularly the United States’) image of their place in the world. In short, the story is that after World War II, the US (and to a lesser extent, Europe) established a rules-based, open global economic order, which permitted common development and prosperity. After the end of the Cold War, the disappearance of the Eastern Bloc enabled the expansion of this order across the rest of the world. In “our” benevolence, we have welcomed China into this order in the expectation that it would see the light and transform itself into an avatar of “us”. But since no good deed goes unpunished, it has subsequently proceeded to eat our lunch.
It is this narrative that seems to have inspired Donald Trump administration’s decision on Aug 18 to launch an investigation against China concerning its alleged theft of US intellectual property. In conjunction, senior voices, including presidential assistant Peter Navarro and former intelligence and cyber commanders Dennis Blair and Keith Alexander penned supporting op-ed pieces arguing that these measures were overdue, that China’s IP theft costs the US economy up to $600 billion annually, and that China must stop doing it. The arguments they propose, however, are vague, inconsistent and in some cases, misguided.
Primarily, they fail to make clear what the actual problem is that they are trying to solve. A first category of claims concerns Chinese policies that mandate technology transfer and the localization of research and development, as well as user data of companies operating in China. It is not difficult to see why businesses would take issue with them: they increase costs, enable the emergence of future competitors, and present possible data security risks. Yet at the same time, the Chinese government has never forced any foreign company to operate within its borders, and it has a legitimate right as a sovereign state to set the rules there.
For foreign businesses, these measures were part of a Faustian bargain that enabled them to vastly increase profits by producing at lower cost, or to access a massive and rapidly growing market. Foreign governments were complicit as well, as low-cost production from China artificially increased living standards and purchasing power at a time when middle-class salaries had stagnated. It’s a pity this model turned out to be unsustainable, but it is difficult to see how China could be faulted for regulating according to its own perception of its national interest, instead of foreign demands.
A second group of bugbears concerns the infringement of intellectual property rights through piracy, and counterfeiting. To be sure, China’s history of IP law enforcement hasn’t been stellar. But in many cases, this has sapped the development of Chinese companies as much as it has hindered foreign companies. Moreover, it seems that Chinese courts are gradually getting better at IP protection across the board. Any action on this front would do nothing more than telling the Chinese government what it already knows.
Lastly, the authors accuse China of theft of know-how, industrial espionage, and hacking. In particular, Blair and Alexander point at espionage targeting US weapons systems. However, the norm that Washington has sought to institute globally is that spying for national security purposes is legitimate, while it cannot be condoned to unfairly create economic benefits.
If attempting to obtain information on stealth fighters or missile systems isn’t national security-related, it is difficult to fathom what is. If the itches that this measure intends to scratch are the declining relative preponderance of the US or the economic roiling of its middle classes, it is difficult to avoid the impression that scapegoating China is easier than reflecting on mistakes in Washington, from the failure to use increased wealth to generate through trade to soften the impact on those on the receiving end, to the failure to effectively regulate the financial sector, and the waging of extraordinarily expensive military conflicts.
It may also be instructive to look at the argument from the other side. China’s deeply cynical, but not completely inaccurate, reading of the “global rules-based order,” is that it is a vehicle for economic powers to channel their self-interest, with rules set aside when necessary. If the US sees fit, for political reasons, to violate WTO rules on subsidies for the civil aircraft sector or cross-border provision of gambling services, then why shouldn’t China do the same thing? (Smug Europeans might take note that the European Union does exactly the same, for instance with regard to the import of hormone-treated beef and, again, subsidies for civil aviation).
None of this is meant to deny that China’s conduct in economic regulation and international trade has raised numerous legitimate concerns for foreign businesses and governments. Rather, it is necessary to recognize that this measure – an investigation – is going to accomplish little apart from squandering political capital that could have been better employed elsewhere.
Instead, to effectively engage China, it may be more productive to understand that China is in no way obliged (nor inclined) to perpetuate the US’ economic preponderance, and it can be expected to act in its own interest. It may be better, therefore, to address specific issues, preferably instances where China has made commitments that it isn’t living up to. China will not make or change policy because foreigners demand it. It is, however, possible to influence its cost-benefit calculations, or find domestic actors who may be on the same side of the argument.
More specifically with regard to intellectual property, there are many things businesses can do already, while governmental processes are on-going. A sound corporate IP strategy will include non-disclosure agreements for businesses operating with Chinese partners or staff, thorough IP registration and documentation procedures, and aggressive litigation against infringers. Cybersecurity training for staff and other forms of protection against hacking are crucial parts of good corporate governance, not just for IP, but also for sensitive business information. And perhaps most crucially, they must continue to innovate. IP is only one element of business success; product quality, maintenance and support, branding, and continuous improvement are at least equally as critical in maintaining a business lead.
The author is research officer at the Programme for Comparative Media Law and Policy,Centre for Socio-Legal Studies,University of Oxford.
Courtesy: chinausfocus.com