Cardozo Law Review de•novo

Volume

2015

First Page

130

Last Page

150

Publication Date

2015

Document Type

Symposium

Abstract

Taking advantage of the forum provided by this timely Symposium, this Article closely examines the ongoing debate on China’s sustained effort in using online hacking and other intrusive techniques to steal trade secrets and proprietary data from U.S. businesses. Part I outlines the five common narratives that have thus far been advanced to recount this widely criticized effort. Sensing the narratives’ negative overtones, Part II offers five modest suggestions on how a more positive debate can be constructed to help identify ways to reduce online hacking and data breaches as well as to enhance the protection of trade secrets and proprietary data.

Keywords

Administrative Law, Comparative and Foreign Law, Espionage, Foreign Affairs, International Law, Criminal Law and Procedure, Science and Technology Law

Share

COinS