Document Type

Article

Publication Date

2015

Abstract

Taking advantage of the forum provided by this timely Symposium, this Article closely examines the ongoing debate on China’s sustained effort in using online hacking and other intrusive techniques to steal trade secrets and proprietary data from U.S. businesses. Part I outlines the five common narratives that have thus far been advanced to recount this widely criticized effort. Sensing the narratives’ negative overtones, Part II offers five modest suggestions on how a more positive debate can be constructed to help identify ways to reduce online hacking and data breaches as well as to enhance the protection of trade secrets and proprietary data.

Publisher

Cardozo Law Review de·novo

Volume

2015

First Page

130

Comments

Symposium

Included in

Law Commons

Share

COinS