Taking advantage of the forum provided by this timely Symposium, this Article closely examines the ongoing debate on China’s sustained effort in using online hacking and other intrusive techniques to steal trade secrets and proprietary data from U.S. businesses. Part I outlines the five common narratives that have thus far been advanced to recount this widely criticized effort. Sensing the narratives’ negative overtones, Part II offers five modest suggestions on how a more positive debate can be constructed to help identify ways to reduce online hacking and data breaches as well as to enhance the protection of trade secrets and proprietary data.
Cardozo Law Review de·novo
Yu, Peter K., "Trade Secret Hacking, Online Data Breaches, and China’s Cyberthreats" (2015). Cardozo Law Review de•novo. 36.