Skip to main content
Menu

Main navigation

  • About
    • Annual Reports
    • Leadership
    • Jobs
    • Student Programs
    • Media Information
    • Store
    • Contact
    LOADING...
  • Experts
    • Policy Scholars
    • Adjunct Scholars
    • Fellows
  • Events
    • Upcoming
    • Past
    • Event FAQs
    • Sphere Summit
    LOADING...
  • Publications
    • Studies
    • Commentary
    • Books
    • Reviews and Journals
    • Public Filings
    LOADING...
  • Blog
  • Donate
    • Sponsorship Benefits
    • Ways to Give
    • Planned Giving

Issues

  • Constitution and Law
    • Constitutional Law
    • Criminal Justice
    • Free Speech and Civil Liberties
  • Economics
    • Banking and Finance
    • Monetary Policy
    • Regulation
    • Tax and Budget Policy
  • Politics and Society
    • Education
    • Government and Politics
    • Health Care
    • Poverty and Social Welfare
    • Technology and Privacy
  • International
    • Defense and Foreign Policy
    • Global Freedom
    • Immigration
    • Trade Policy
Live Now

Cato at Liberty


  • Blog Home
  • RSS

Email Signup

Sign up to have blog posts delivered straight to your inbox!

Topics
  • Banking and Finance
  • Constitutional Law
  • Criminal Justice
  • Defense and Foreign Policy
  • Education
  • Free Speech and Civil Liberties
  • Global Freedom
  • Government and Politics
  • Health Care
  • Immigration
  • Monetary Policy
  • Poverty and Social Welfare
  • Regulation
  • Tax and Budget Policy
  • Technology and Privacy
  • Trade Policy
Archives
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • Show More
February 14, 2020 3:37PM

What Will the US‐​China Deal Accomplish on Tech Transfer, IP Protection and Innovation?

By Simon Lester and Huan Zhu

SHARE

The US-China Economic and Trade Agreement, described as a "phase one" deal, entered into force today (30 days after signature, pursuant to Article 8.3, para. 1). The Agreement has created a temporary tariff truce. For the time being, it seems that tariffs will not be raised further, and both sides lowered their retaliatory tariffs to some extent, which is good news.

But with all the talk of tariffs, it is easy to lose sight of the U.S. concerns about Chinese trade practices. How does the Agreement do in terms of addressing the purported basis for the trade war?

The trade war began with a Section 301 investigation and report by the U.S. Trade Representative's Office on China’s "Acts, Policies, and Practices Related to Technology Transfer, Intellectual Property, and Innovation." Pursuant to the Agreement, China has agreed to undertake new obligations in these areas. Will these new obligations successfully address the concerns? In this blog post, we offer some preliminary observations on this question, based on the text of the Agreement. A full analysis will have to await China's actions to implement the Agreement. (Under Article 1.35, "Within 30 working days after the date of entry into force of this Agreement, China will promulgate an Action Plan to strengthen intellectual property protection aimed at promoting its high-quality growth.")

The main findings of the Section 301 report were as follows:

• “China uses joint venture requirements, foreign investment restrictions, and administrative review and licensing processes to require or pressure technology transfer from U.S. companies”;
• “China deprives U.S. companies of the ability to set market-based terms in licensing and other technology-related negotiations”;
• “China directs and unfairly facilitates the systematic investment in, and acquisition of, U.S. companies and assets to generate large-scale technology transfer”;
• “China conducts and supports cyber intrusions into U.S. commercial computer networks to gain unauthorized access to commercially-valuable business information.”

In addition to these four findings, USTR also concluded that certain “other Acts, Policies, and Practices Related to Technology Transfer, Intellectual Property, and Innovation may also burden or restrict US commerce.”

We will now go through each of the findings and evaluate whether, and to what extent, it has been addressed in the Agreement.

Forced technology transfer

In the Section 301 report, USTR found that China uses its foreign investment policy to encourage technology transfer by foreign companies to their Chinese joint venture partners. American (and other foreign) companies are forced to partner with Chinese companies in exchange for entering the Chinese market, and as part of this arrangement, the foreign companies have to share their technology with the Chinese partners.

Ideally, the requirement that foreign investors use joint ventures would be eliminated. In the Agreement, China does not make commitments to open its market (other than the financial services sector) to wholly owned foreign investments. However, recently, outside the context of the Agreement, China announced that it would lift foreign capital restrictions in some manufacturing sectors, including aircraft and automobile manufacturing, within several years. This will help ease forced technology transfer concerns to some extent.

In addition, the Agreement has more detailed and clearer rules on forced technology transfer than are found in existing WTO rules. Article 2.1, para. 1 states that: "Natural or legal persons (“persons”) of a Party shall have effective access to and be able to operate openly and freely in the jurisdiction of the other Party without any force or pressure from the other Party to transfer their technology to persons of the other Party." Article 2.3 then offers more specific obligations:

1. Neither Party shall adopt or maintain administrative and licensing requirements and processes that require or pressure technology transfer from persons of the other Party to its persons.

2. Neither Party shall require or pressure, formally or informally, persons of the other Party to transfer technology to its persons as a condition for, inter alia:

(a) approving any administrative or licensing requirements;
(b) operating in the jurisdiction of the Party of otherwise having access to the Party’s market; or
(c) receiving or continuing to receive any advantages conferred by the Party.

This language identifies a wide range of administration actions through which technology transfer may be encouraged. At first glance, it looks like it could be effective in the fight against foreign technology transfer.

In some instances, international pressure can help push domestic reforms, and that may be the case here, as the US-China trade negotiation might have helped the Chinese government in incorporating these policies into domestic law. China’s new Foreign Investment Law has language that prohibits administrative officials from forcing technology transfer (Article 22). And the Implementing Regulation of the Foreign Investment Law also has specific language that prohibits agencies and officials from forcing technology transfer through licensing, inspection, penalty and other administrative actions (Article 24) and stipulates administrative punishment for officials who are involved in forced technology transfer (Article 43). Whether these laws are effective in stopping forced technology transfer will depend on the implementation.

In addition to forced technology transfer, the Section 301 report points out that the reviewing process may also lead to forced disclosure of information and leakage of such information to parties with a competing interest. To address this, paragraph 2(d) of Article 1.9 of the Agreement prohibits personnel with business interest from gaining access to such information.

In this regard, China’s Foreign Investment Law already prohibits government officials from disclosing confidential information to others (Article 23), and the Implementing Regulation has further detailed provisions. But the language of the Agreement goes beyond the current law and would have a broader scope of application. It applies not only to government officials, but also to all third-party experts and consultants who may be involved in the administrative process.

Licensing restrictions

The Section 301 report concluded that there has been discriminatory treatment of U.S. companies and U.S. intellectual property in China. In particular, it found that Chinese laws impose restrictions on licensing terms, which discriminate against foreign IP and provide an unfair advantage to domestic licensees.

These practices would likely be found in violation of China’s WTO obligations under Article 3 (national treatment) and Article 28 (IP rights conferred) of the Agreement on Trade-Related Aspects of Intellectual Property Rights. In this regard, the United States filed a WTO complaint against China in 2018. Soon after, China abolished the relevant provisions or laws cited in the U.S. claims, and now the case is suspended. (The EU has a similar case on China’s IP practice, but the EU’s claim is broader and the case is still ongoing.) Since the relevant practices have already been revoked, this issue is not addressed in the Agreement.

Since the relevant laws and regulations have already been revoked, this issue is not a main focus of the Agreement. Article 2.1, para. 2 does provide a general principle that should apply to licensing: “Any transfer or licensing of technology between persons of a Party and those of the other Party must be based on market terms that are voluntary and reflect mutual agreement.” To this end, China’s new Foreign Investment Law promises to protect the intellectual property rights of foreign investors and companies (Article 22, para.1). It also has provisions that “encourage” technical cooperation on voluntary principles and commercial rules, and require the terms of such technical cooperation to be determined by fair and equal negotiations between the parties. (Article 22, para. 2). This, hopefully, will prevent future administrative intervention in licensing terms in contracts.

Outbound investment

Another focus of the Section 301 report is China’s outbound investment policy and how China is using outbound investment to acquire foreign technology in sectors with strategic importance.

In the Agreement, China agrees to a general obligation not to “support or direct” outbound investment to reach its industrial goals in a way that would distort the market. (Paragraph 3 of Article 2.1). There are aspects to the language used in this provision that are vague and might be difficult to enforce. As a result, it could be a challenge to assess China’s compliance with the Agreement on this point.

A more powerful tool may be America’s domestic law. Separate from the Agreement, the United States has also taken some unilateral actions to tighten technology transfer that takes place through outward investment. For instance, the Foreign Investment Risk Review Modernization Act (FIRRMA) passed in 2018, and related implementing regulations, are designed to enhance the screening of Chinese investment in many sectors. This move will make it more difficult for Chinese companies to invest in the United States and would probably have more impact on curbing the Chinese practice of acquiring technology through foreign investments than the provision in the Agreement.

Cyber theft

The Section 301 report also concludes that the Chinese government has supported cyber intrusion to steal confidential business information. It distinguishes the Chinese government’s cyber activities from those of Western countries because “the intrusions occur within the framework of China’s extensive state-driven economic development model,” which allows China to use government intelligence for economic gains.

There are provisions in the Agreement that deal with private behavior, as Article 1.4 requires China to “enumerate additional acts constituting trade secret misappropriation, especially: (a) electronic intrusions.” China’s Law Against Unfair Competition already has language that restrains individuals or companies from stealing information through cyber intrusion.

However, the Agreement fails to include specific commitments on cyber theft at the government level. It is probably because the two nations are still at odds on the terms of cyber espionage: China considers it to be the same as the spying that every country is doing and that the same rules should be applied to all government-led cyber intelligence activities, while the United States insists on a difference between economic espionage that targets companies and intelligence work for national security purposes. The conversation on this issue is most likely to happen in other bilateral dialogues.

Domestically, the Trump administration recently launched a China Initiative, led by the Department of Justice and the Federal Bureau of Investigation. One of the objectives of the China Initiative is to identify and prosecute trade secret theft and cyber espionage from China. This will help curb cybertheft activities by China.

Other acts, policies, and practices

The Section 301 report also raises concerns over other acts, policies and practices related to technology transfer, intellectual property, and innovation. These concerns include activities and policies on national security, cyber security, inadequate IP protection, anti-monopoly law and practice, standardization law, and talent acquisition policy. Some of these issues are addressed in the Agreement, mainly in the area of IP protection, including counterfeit internet products, bad faith trademarking, and IP enforcement, including civil, criminal and administrative enforcement.

To this end, China makes some promises in the Agreement to strengthen its IP protection. This blog post will only mention a few examples. For instance, China agrees to grant patent term extensions (Article 1.12) for new pharmaceutical products and methods of making or using a new pharmaceutical product. Patents offer patent holders the right to exclude others from making, using or selling the products, but the effective patent term may be shortened by a lengthy administrative process, including the patent examining procedure at the patent office and a market approval process by related agencies (it is the Food and Drug Administration in the United States and the State Administration for Market Regulation in China). To make up for the time lost and ensure patent holders’ profit, the Agreement requires China to extend patent term to make up for “unreasonable delays” that occur during the administrative process.

Previously, China’s Patent Law granted a 20 year-patent term for pharmaceutical products without any possibility of extension. When China started to revise its Patent Law a couple years ago, the proposed Patent Law amendment allowed the patent term to be extended by the State Council for pharmaceutical products (the extension would be five years at maximum, and the total effective patent term would be no more than 14 years after the marketing approval.) The proposed revision only covers pharmaceutical products. But the Agreement requires patent extension to be available for methods of making or using a new pharmaceutical product, as well as new pharmaceuticals. This will require China to further revise its proposed law to fulfill its commitment under the Agreement.

China also agrees to help IP holders safeguard their rights. For instance, China promises to make or amend laws with regard to preliminary injunctions, the burden of proof in some cases, and a mechanism for early resolution of patent disputes. All of these should help boost IP protection in China.

Commentary on the Agreement has highlighted the shifting the burden of proof in trade secret civil cases. Traditionally, the plaintiff would have to provide proof for its claims in civil cases. Under the Agreement, to prove it is a trade secret, a right holder would only need to prove that measures have been taken to protect the confidentially of such information. Then the burden of proof shifts to the accused party to prove such information is generally known and not confidential. In addition, a right holder needs to prove that the accused party has the opportunity for access to such information, which is the same as the information used by the accused party; or the trade secret has been or risks being disclosed or used by the accused party; or other evidence of misappropriation by the accused party. After that, it is up to the accused party to prove there is no trade secret misappropriation, such as the information being obtained through other means (Article 1.5). The provisions are similar to China’s Law Against Unfair Competition (Article 32), which was recently revised in April 2019. The Law Against Unfair Competition also requires the right holder to prove the trade secret has been misappropriated. This is not explicitly required in the Agreement, but one may argue it is implied in the text. How this provision will be implemented and whether it helps trade secret right holders to protect their interests in practice remain to be seen.

China also makes some commitments to deter IP infringement. For instance, China agrees to increase penalties for IP infringement in the Agreement (Article 1.27). China’s current law stipulates that in patent infringement, the compensation amount should be determined according to the patentee’s actual losses, or unlawful gains of the infringer, or a reasonably multiplied amount of the royalties. If all the above are hard to determine, the court will determine the amount within the range of 10,000 Yuan and 1 million Yuan (Article 65 of Patent Law). For the past couple years, China has been in the process of amending its Patent Law. The proposed amendment would raise this range to 100,000 Yuan and 5 million Yuan. This means that when the amount of actual losses, unlawful gains and royalties are hard to determine in a patent infringement case, the infringer will face a much higher fine than before, raising the cost for patent infringement. Such change is in line with China’s commitment under the Agreement. Once finalized and passed, it will make IP infringement more costly and consequential.

Summing up, the Agreement, in combination with some other legislative and administrative actions by either China or the United States, addresses a fair number of the issues raised in the Section 301 report. But the actual implementation remains to be seen. Some issues are still waiting for China’s amendment of its current laws. For the issues left out of the Agreement, some are addressed through unilateral actions either by China or the United States. The remaining issues, such as cyber theft, cyber security, and standardization, are untouched by the Agreement and could be the source of tension in the future.

Related Tags
Trade Policy

Stay Connected to Cato

Sign up for the newsletter to receive periodic updates on Cato research, events, and publications.

View All Newsletters

1000 Massachusetts Ave. NW
Washington, DC 20001-5403
202-842-0200
Contact Us
Privacy

Footer 1

  • About
    • Annual Reports
    • Leadership
    • Jobs
    • Student Programs
    • Media Information
    • Store
    • Contact
  • Podcasts

Footer 2

  • Experts
    • Policy Scholars
    • Adjunct Scholars
    • Fellows
  • Events
    • Upcoming
    • Past
    • Event FAQs
    • Sphere Summit

Footer 3

  • Publications
    • Books
    • Cato Journal
    • Regulation
    • Cato Policy Report
    • Cato Supreme Court Review
    • Cato’s Letter
    • Human Freedom Index
    • Economic Freedom of the World
    • Cato Handbook for Policymakers

Footer 4

  • Blog
  • Donate
    • Sponsorship Benefits
    • Ways to Give
    • Planned Giving
Also from Cato Institute:
Libertarianism.org
|
Humanprogress.org
|
Downsizinggovernment.org