Uploaded by Amilcar Paiz

IP abuses, how should multinationals resspond

advertisement
LRP
Long Range Planning 37 (2004) 459–475
long range planning
www.lrpjournal.com
Intellectual Property Abuses:
How should Multinationals
Respond?
Deli Yang, Mahmut Sonmez and Derek Bosworth
This article illustrates the causes of piracy and pinpoints piracy associated with registrations
and with production and distribution. Based on interviews with British and American
multinational managers working in China, the authors elaborate 10 corporate actions to
counter the spread of the ‘inevitable curse’. In order to implement these 10 strategies, the
authors recommend that firms treat piracy as a challenge, be corporately proactive, be aware
of the repertoire of possible strategies, investigate co-operative action with other companies,
agencies and government and be continuously alert to the dynamic nature of piracy. The
problems reflected here are common to multinationals operating businesses around the
world, and the destructive nature of piracy is likely to encourage more academic study to
yield further insights for practice.
Q 2004 Elsevier Ltd. All rights reserved.
Introduction
With the rapid expansion of international business, piracy—‘the crime of the 21st-century’ is
flourishing and becoming globalised.1 Piracy here refers to ‘the unauthorized use or reproduction of another’s work’, such as a registered trademark. It has much broader meaning than
counterfeiting, which means ‘to imitate exactly something valuable or important’, such as counterfeited money, with intent to defraud or deceive.2 The bogus products vary from apparel,
toys and DVDs in Asia, pharmaceuticals in the Latino world and luxury goods in Europe to
technological bootleg, such as auto and aircraft parts in North America. Piracy is noticeably
pernicious in the under-developed and developing world of intellectual property (IP) systems.
Multinationals therefore tend to pay particular attention to the protection of IP (including
patents and trademarks), when doing business in these countries, because the legal protection
0024-6301/$ - see front matter # 2004 Elsevier Ltd. All rights reserved.
doi:10.1016/j.lrp.2004.07.009
of their original inventions and long established trademarks secure them competitive advantages over their rivals. Piracy undermines multinationals’ cross-border businesses.
It is commonly alleged that the People’s Republic of China (China) is one of the countries in
which much piracy occurs. In 2001, for example, the Chinese government destroyed 11,000
piracy factories, and confiscated US$2.8 million worth of shoddy products, but the figure of
actual piracy is far more appalling, including $160 million worth of DVDs, and $47 million
worth of CDs and cassettes,3 and counterfeiting has undermined China’s position in terms of
attracting businesses from foreign countries. Staunch supporters of IP have dubbed China as
the ‘Centre of Counterfeiting’ and ‘the International Capital of Piracy’ for a number of reasons.4 Firstly, the country is presently a centre for global business: multinationals have established themselves in variety of different sectors, and their concerns about piracy attract media
and organisational attention. The US trade representatives (USTR), for example, repeatedly
files corporate complaints on countries with inadequate IP protection to the US government,
and China appeared on their ‘USTR Priority Watch Lists’ in both 1992 and 1995.5 Secondly,
the booming of international business in the most populous country on earth also attracts high
levels of imitation. Such a lucrative market invites speculators to explore the unsatisfied markets created by low consumer incomes and limited knowledge about the crime. Thirdly, the
gap between developed countries and China in IP development attracts great discussion and
research attention.
This article aims to provide strategic solutions to the problems associated with piracy that
British and American multinationals have encountered in China. With this aim in mind, the
article will first reveal the major piracy problems, and then briefly explain the data source that
has contributed to the research results. The main part of the article then presents an analysis of
the strategic solutions to these problems. Finally, the broad implications from the study will be
applied to the strategic management context for managers and academics.
[The] lucrative market [of the world’s most populous country] invites
speculators to explore unsatisfied markets created by low consumer
incomes.
Piracy: the inevitable curse—problems, causes and effects
Piracy problems
Pirated production and distribution
Three types of production- and distribution-related piracy have been prevalent alongside the
booming of global production in China: counterfeiting, licensing overrun, and forgery. Counterfeiting in the form of imitation of designs, fabric, badges, and colours has been common. For
example, according to the trademark manager of Manchester United (MU) plc., at least six
Chinese cottage factories have been involved in such production with most of the output sold
in China and Southeast Asia. Licensing overrun exists where licensed producers exceed stipulated production levels, allowing firms to sell the ‘overrun’ products unofficially in China at a
lower price, and even export them to other countries in Southeast Asia. Such goods are, in
effect, identical to the real products (except for guarantees and the retail outlet involved): the
principal victim is the licensor. Finally, forgery of well-known marks: uses appear to be at first
sight the original trademarks, but in a new design, colour, material and/or other details.6
460
Intellectual Property Abuses: How should Multinationals Respond?
Piracy associated with registrations
British and American multinationals operating in China have encountered piracy associated
with the registration of trademarks. Local firms intent on piracy are well aware of both the long
established multinational-owned trademarks and the difficulties local agencies have in protecting them due to the size of the country. They can often stay one step ahead of the
multinationals, and have well-known trademarks registered to them before the multinationals
can establish their rights. For example, a leading pharmaceutical firm applied for patent protection. While the patent application was still pending, two local pharmaceutical factories started manufacturing the compound. Such unscrupulous acts can only be eliminated if the true
owner of the trademark can establish, protect and benefit from his rights in both legal and
public-reputation terms. Curiously, the international regulations (mainly the trade related
aspects of intellectual property (TRIPS) agreement and the Paris convention) do not specifically stipulate the rules on the verification of well-known trademarks.7 Consequently, it is not
surprising that this problem is also seen in China, where such a non-integrated standard has
resulted in significant levels of abuse, with local firms adding phrases such as ‘famous trademark’ or ‘well-known trademark’ to their own trademarks, such ‘self awards’ leading to widespread confusion for consumers.
The situation can be exacerbated when the relevant authority treats such marks inconsistently. For example, MU plc. has been doing business with China since 1993 in the form of
licensing. The company, triumphant on the football pitch and also very successful off the field
in business, has registered its corporate trademark in different product categories, but five of
the seven applications have been approved either with only ‘United’ or without the name (see
Table 1 and Figures 1 and 2), although two applications applied for at almost the same time
were approved in the full original form. Applications for trademark registrations in different
product categories are often directed to different departments in the trademark office. As a
result, one department may approve the original mark while another may not. Such inconsistency often results from a lack of knowledge about the application of trademark law—especially
a failure to research the standing of the mark in the global context—as well as poor communication between the departments. Such problems seem to be aggravated by the relatively new
legal framework in China, and the complexities of and inconsistencies between different
departments and government organisations.
Where there is a brand there is a fake
A number of factors have contributed to the prevalence of piracy in most developing countries,
including China. First, the popularity of branded products has created a market demand that is
Table 1. Registrations of the MU Trademarks in China
1
2
3
4
5
6
7
Original Mark
Registration
results
Manchester
United Football
Club
Same as
application
No wording
Class
18
28
25
33
9
Words ‘Manchester Football 24
Club’ omitted
21
only ‘United’
left
Goods
Registration
Number
Date
Sports and travelling bags
Sporting articles except clothing
lothing and footwear
Alcoholic drinks
Photographic film and transparencies
Curtains, towels, banners, flags, and
valances
Sponges (not for surgical use)
791335
1240536
787396
1243372
1261395
1263245
14/01/95
21/01/99
28/10/95
28/01/99
07/04/99
14/04/99
1265610
21/04/99
Source: compiled by Yang based on the interview and MU’s trademark registrations in China.
Long Range Planning, vol 37
2004
461
Figure 1. The original mark. Source: obtained from and permitted by the MU Trademark Office.
only partially satisfied, especially when the set price is out of reach to the majority of potential
buyers. Second, the value of the brand (derived from long-term advertising, brand maintenance and product design costs) increases the price gap between original and pirated products,
providing a financial incentive for pirates to satisfy the latent demand. Thus, pirates are able to
undercut the price, attracting some customers that cannot afford the official merchandise.
Third, the geographical size of China limits the ability of both government and manufacturers
to exercise effective control of piracy, and control of piracy in one area will not prevent infringements breaking out elsewhere. Fourth, the piracy problem can be exacerbated when operational contracts between Sino-foreign partners are not sufficiently specific about the issue of
infringement to stop or even curtail it. In such circumstances, given the limitations of resources and vast geographical size, Chinese government enforcement of trademark law has to rely
largely on the aggrieved party providing evidence. The penalties are still relatively lenient and
administrative in nature, such as warnings, public apologies, fines and compensation, although
Figure 2. One of the marks registered in China. Source: obtained from the MU Trademark Office,
Manchester United plc.
462
Intellectual Property Abuses: How should Multinationals Respond?
the fines have progressively been increased.8 What is lacking are criminal convictions—as
pirates tend not to keep records of their sales, it is difficult for the relevant authority to impose
criminal liability. If the Chinese government remains unwilling to be proactive in ending
piracy, and companies neglect taking sufficiently robust actions, it seems inevitable that
infringement will continue. Finally, the public awareness of the deleterious effects on consumers of such pirated products as fake spirits and shoddy drugs takes time to evolve.
Although in recent years, education on the significance of IP has been widely campaigned in
China and most developing countries, many consumers are still not clear why piracy is a victim
game.
Piracy—a victim game
Piracy is not a victimless game as so many people think, but an unscrupulous practice requiring continuous surveillance and resolution. Host countries, multinationals, and consumers are
all victims of piracy. The host nation will have to bear the cost of allocating resources to handle
the piracy issue, enforce legal powers to curb piracy, and bear the cost of lost tax revenue and
unemployment (although piracy can create illegal employment, albeit with limited tax payments for government and uncertainty for the workers involved). For example, the reduction
of every 10 percentage points in the piracy rate is estimated to have generated 13,170 direct and
indirect jobs for the software industry in China, and US$78 million in Chinese government
revenues in 1998.9 In terms of production and services, global piracy amounts to approximately 5–8 per cent of total world output.10 For consumers, the pirated products provide no
warranty, after-sale services or sense of security, and fake products often mislead or confuse
consumers with their low quality and low prices. Multinationals with IP ownership are the
most direct victims and bear the weight of piracy speculation both to their finances and reputations. The damage is clearly reflected in swift decline of sales, affecting corporate employment, market share, undermining long-term R&D incentives and the intangible loss of the
brand devaluation. Corporate competitiveness is also affected, with firms sometimes having to
bear legal liability for bogus products following consumer complaints, as well as the costs of
educating consumers and countering piracy. For example, MU plc. indicates that it is very difficult to precisely estimate the losses in figures in individual countries, but the ‘guesstimate’ is
that it loses £3 million annually in Asia due to piracy. (This figure does not include the costs of
anti-piracy action by MU, which is confidential information.) Procter and Gamble also spends
$3 million annually dealing with piracy.11 Given that piracy poses such an array of threats to
host country, consumers and multinationals alike, it is apparent that firms cannot treat piracy
as a curse only; corporate actions need to be taken to challenge this blight and seek effective
remedies.
MU plc. ‘guesstimates’ it loses £3 million annually in Asia due to piracy.
Methodological note
Table 2 provides a brief summary of the methodology underlying this article: details of sample
selection, collection procedure and analysis are given in the Appendix. The corporate strategies
recommended in this article are based on the valid responses from 51 British and American
companies with manufacturing activities in China in 2002–3. Questionnaire responses were
received via email and clarified if necessary by telephone. The authors selected the manufacturing firms because they accounted for 86 per cent of the foreign operations (by value) amongst
the top 10 industrial sectors in China.12 Moreover, piracy is more prevalent in this sector than
in any others in China.13 The interviewees were executives in charge of IP or
technology and development (86 per cent of respondents), or corporate lawyers, chief executives or their assistants. All the managers wished to preserve their anonymity, and although a
Long Range Planning, vol 37
2004
463
Table 2. Summary of interviewee profile
Number of initial contacts
183
Number of valid responses
Company types
Nationality distribution of respondents
Value range of foreign IP
Revelation of respondent identity
Revelation of corporate identity
Positions of the respondents
51
US, UK firms with IP activities in China
21 British; 30 American
£0.1–£3000 million
No
2 Yes; 49 no
21 IP or technology managers
14 Development manager
9 Regional managing directors
7 Lawyers, CEO or CEO assistants
Chemical; pharmaceutical; software; memorabilia,
machinery and equipment; computer
Various from 1984 to 1998
Manufacturing
Year of establishments
Source: based on the interview data.
few consented to their corporate identity being revealed, in the most part this study (which
represents their interests) maintains the anonymity of both individuals and their companies.
The interviews were based on a semi-structured questionnaire with a problem–cause–solution
framework exploring the extent of piracy, the causes and corporate solutions. This article focuses on the solutions adopted by different companies to tackle the prevalence of piracy. Each of
the 10 strategies outlined below is illustrated with examples, and the costs and benefits of
adopting the strategies are discussed.
Strategies to challenge piracy
It can be concluded from this research that effective multinationals are those willing to counter
the arduous corporate challenge of piracy with strategic responses. The authors broadly taxonomise the strategic responses from the firms into three broad categories: proactive approaches, defensive weapons, and networking means under which 10 specific strategies can interact to
form the integral and effective actions for multinationals to counter current and future piracy
(see Figure 3).
Strategy 1: the Budweiser strategy—technical solutions
The most commonly adopted anti-piracy strategy is effective labelling and featured packaging
allowing consumers, distributors, retailers and owners to identify authentic products easily.
Budweiser has been very successful in using this strategy (which has thus been named after the
firm). It has produced a special type of beer can with fluted edges, which makes imitation very
difficult.14 The majority of the interviewed companies have introduced individually numbered
security labels, anti-tamper foil labels, tanglio printing (commonly used for preventing fake
currency) and holograms (a three-dimensional logotype transposed into labels) for their products. The digitalised labels help companies to trace the production date and manufacturer,
identify the fakes from the genuine (no single number appears twice for a product), and prevent counterfeits from entering the official channels. Companies tend to combine a number of
labelling techniques for their products. Some of the authentication techniques are deliberately
made easily visible for consumers to verify, while others are not as they are intended for
inspection by firms and other authoritative organs. For example, MU plc. uses an ample light
test—ultra-violet sensitive signs that counterfeiters cannot afford to replicate—to verify if the
464
Intellectual Property Abuses: How should Multinationals Respond?
Figure 3. Taxonomy to form corporate strategies. Source: created by the authors.
products entering their official stores are authentic. Such devices are not available to consumers, and the authentic labelling cannot be seen with the naked eye.
This strategy has its merits and drawbacks. It is an effective strategy in restricting pirated
goods from entering the official channels and preventing licensees from overrunning production of the authentic products by supplying only limited amounts of authentic labels.
Firms, distributors, retailers, and consumers can now more easily identify the authentication of
a product. This strategy is more preventative than curtailing, which is particularly effective in
piracy-prevalent countries like China, Thailand, and Turkey. But while such strategies will be
effective against less-proficient pirates, they will fail against more sophisticated counterfeiters
with the expertise to replicate authentic marks unless firms can constantly anticipate them by
raising or replacing technical barriers, with the obvious implications for financial and manpower resources. Visible labelling provides information to pirates which can, given time, be
copied to continue to confuse consumers. But less identifiable labels and technical solutions
may also create problems, as consumers cannot tell the fakes from the genuine, leaving pirates
the opportunity to provide the market with confusing replicas. Furthermore, such hidden
solutions may need special reading devices or other aids, resulting in additional costs for the
retailers.
Strategy 2: the partnership strategy—contractual surveillance
Reaching a well-specified contract between Chinese firms and their foreign partners at the outset is the key to reducing the likelihood of IP violations, and can also assist in resolving disputes and avoid partners having to resort to the legal process, which many managers
considered unviable in terms of cost and time. A tight contract should also have specific stipulations on the punishment for any party violating the contract. There should be leeway for
flexibility to modify the contract based on the circumstances to allow ‘the benefit accruing to the
[relevant] party’, as one manager explained. This strategy addresses the differing cultural views
on contracts between Western and Chinese business people. While western managers perceive
contracts as legal binding, Chinese managers deem that partners should rely on trust and
respect to do business, with a contract as a general guideline only. The fact that most Sinoforeign partnerships were established between Chinese firms under state and/or collective ownership and privately owned foreign firms has further aggravated the contractual situation. Thus
conformity to a contractual agreement has become important tool in preventing commercial
misdemeanours, forcing relevant parties to abide by the contractual conditions and particularly
effective in preventing overruns in licensed production. However, given the difference in
understanding contractual functions between the Chinese and Western mentality, negotiating a
Long Range Planning, vol 37
2004
465
quality contract is often a lengthy process. As a manager said: ‘It is better to go through the pain
early [contractual negotiation] than later [piracy overrun and other potential problems].’
Chinese managers deem partnership should rely on trust and respect,
with a contract as a general guideline only.
Strategy 3: the Coca Cola strategy—narrowing price gaps
This strategy is to lower product price in order to narrow price-gap between the authentic and
fake products. Coca Cola China is a good example of successfully adopting this strategy. The
firm has adopted a low pricing strategy for its Cola drinks in China, allowing little room for
pirates to make illegal income. (Microsoft China has also used this strategy to promote its products by lowering prices many times.) Key to pirates’ lucrative business is targeting a particular
niche market by exploiting the authentic owners’ high R&D, advertising and services costs. The
availability of cheap replicas certainly attracts a large number of ‘conscious’ consumers, i.e.
those who are knowingly buying fake products. Attractive products, such as a Prada handbag,
may be technically uncomplicated for pirates to replicate, and confer immensely high prestige
to buyers. Customers may feel their only risk is whether such ‘symbolic’ products, highly visible in society, will appear genuine or be recognized as shoddy imitations.15
The reduction of pricing gaps between the fake and the genuine can certainly gain firms
many consumers, including some conscious consumers. The main attraction for consumers
buying a fake product is the price. Their expectation is low, as they understand the risk that the
fake may not function properly. If the authentic firms promote their products at a competitive
price—even if it is higher than the fake—the excellent quality and brand image, together with
the availability of an attractive after-sale warranty, will attract consumers to buy the genuine
article rather than the fake.
Nonetheless, the effectiveness of this strategy is limited by a number of variables depending
on the company concerned. Firstly, this strategy may have little influence on most conscious
consumers, who believe that cheap is beautiful and authentic firms are exploiting them. Therefore, this strategy should be combined with other corporate tactics, such as education campaigns, in order to have the best effects on a wider range of consumers. Secondly, this strategy
may not work well in high R&D firms. Taking Coca Cola and Microsoft China as examples, the
difference between the Coca Cola drink and Microsoft software is the high input of Microsoft
R&D in software, which needs to be recouped through sales. In comparison, the Cola drinks
are based on the inherited ‘secret ingredients’ (held by only four top executives in the company) and the long established brand, and its R&D costs are likely to be minimal.16 Even if
Microsoft lowered its price to the minimum, pirates can still make profits by free riding the
costly R&D and advertising expenses. Such a strategy could be employed, for example, by MU
plc. The current cost of a Manchester United home jersey is £35,17and while this may be seen
as expensive for ordinary British consumers, it is certainly beyond even the imagination of
most Chinese consumers. Given the low cost of production (materials, labour) and its millions
of fans, MU may be well advised to adopt a localised pricing strategy to curtail piracy and to
attract consumers.
Strategy 4: the Microsoft strategy—monitoring and private eye
Monitoring markets and relevant products is also a widely adopted strategy, and Microsoft
China is a pioneer in upgrading their strategy effectively as circumstances change. This strategy
has a broad meaning. First, it can involve liaison with customs, to prevent fake products from
entering the home country, utilising cooperation between importers, exporters, licensers and
customs officers to maintain checks and controls on pirated products. Second, it can also mean
466
Intellectual Property Abuses: How should Multinationals Respond?
that company employees survey the market to ensure that any fakes are detected and sales prevented. Third, monitoring by regular inspection of relevant manufacturing bases can help to
prevent production from overrunning.
Finally, on-line piracy has in recent years added a new wrinkle to an already aggravated situation. For example, large amounts of fake products are auctioned alongside authentic products
on major auction sites, such as e-Bay, Adobe, Yahoo, etc. Consumers posting files to share with
the public, especially for music, and software products, further exacerbate the piracy situation.
As an example of implementing a monitoring strategy in this area, Microsoft has now adopted
on-line monitoring on a round-the-clock basis. When fakes are detected, the posters are
warned, the buyers of the fakes informed, and offenders notified to withdraw their on-line
piracy activities within 24 hours or risk further actions being taken by the company. As part of
the monitoring process, private investigators are often hired to collect evidence and undertake
undercover investigations on behalf of a company. Unlike the USA (which has 39,000 private
investigators), this is a relatively new profession in China, where it is often undertaken often as
an affiliated responsibility by IP agents, or by small-scale firms or retired police officers.18
However, their presence has accelerated the investigation of pirated products by focusing on
suspected cases.
Microsoft has adopted on-line monitoring on a round-the-clock basis.
In-the-field and virtual monitoring strategies protect the interests of legitimate firms and
consumers who wish to buy authentic products, but it is an expensive strategy, especially when
a wide spread of monitoring is carried out. Large multinationals like Microsoft may have the
financial capacity to deal with the geographical spread of piracy. But most mini-multinationals
(small- and medium-sized companies), while they may monitor their home country intensively
to preventing fake products entering retail channels from production countries, can only
afford to handle such situations in foreign countries on a case-by-case basis. The costs of
monitoring in a vast country such as China are much more substantial than in smaller countries like Thailand. The Internet auction of fake products and posting for on-line sharing are
both borderless crimes, and offenders can make detection more difficult by operating from
fake addresses.
Strategy 5: the commercial settlement strategy
The corporate managers interviewed for this survey confirmed that financial settlements with
pirates can also be a quick cure for counterfeiting. This strategy is based on the Chinese cultural background and the managers’ low level of confidence about legal enforcement. One IP
manager indicated that the pirates’ cultural background means a demand for a public apology
may well lead to them choosing to offer financial compensation and cessation of activities,
rather than risk the loss of public face involved in an apology. Instigating a lawsuit is a lengthy
procedure to go through, and the result can often be unpredictable. A private financial
settlement with an offender can give an aggrieved party a much more efficient and effective
way to resolve cases of piracy, with a possibility of recouping some of the losses incurred. Such
a settlement requires firms to take a proactive role to approach their ‘enemies’ directly, or
through the assistance of a third party. Even though such settlements may fail in the end if
offenders refuse to pay, direct negotiations between the aggrieved party and pirates can provide
a mechanism for firms to construct a case by gaining evidence during the negotiations which
they can use later when seeking support from the authorities.
Strategy 6: the acquiring strategy
The managers interviewed for this research also identified acquisition as an effective and overall non-cost solution when a pirate is detected. Specifically, when a pirated product is detected
Long Range Planning, vol 37
2004
467
in the market, the firm will trace the source of production. During the investigation process,
the firm can evaluate whether the pirates have the necessary quality to become part of the
authentic firm. When all the primary evidence is available, the aggrieved party can approach
the piracy factory. The reaction from the pirated factories is usually mixed. On the one hand,
they are often shocked at what one respondent manager called the ‘discovery and courage of the
original firm’. On the other hand, managers report that firms are generally both overwhelmed
by and also pleased with such offers, not because of the chance of financial benefits, but with
the prestige of being part of a brand firm and the pleasure of doing legitimate business that
flows from such a situation.
The benefits of such an action are substantial. It allows an aggrieved party to prevent the
production of pirated products, acquire the pirate firm to be part of the authentic firm and
use its quality standards to provide authentic, but cheaper, products to the market, perhaps
deterring similar products from other pirates. This action also allows firms to prepare relevant
evidence in the negotiating process. If the piracy firm does not agree on the acquisition, (which
is unlikely, given that the pirate firm has been given no alternative) the authentic firm will have
already acquired enough evidence to report the pirate to the relevant administrative organisations for a raid, which would eliminate the pirate operation immediately. Thus, acquiring is a
win-win strategy—whatever the result, the firm can benefit from the action. However, a number of conditions must exist for such an acquisition to happen. The pirate firms must have
skilled workers, a strong marketing network, and good sourcing markets for supplies. And the
authentic firms must have the intention and financial resources to handle the initial costs of
such a ‘special’ expansion.
Pirates are shocked at the ‘discovery and courage of the original firm’.
Strategy 7: the DuPont strategy—reapplication
This strategy is called the DuPont strategy following its first adopter, E.I. du Pont de Nemours
and Co.19 In 1983, the Trademark Office in China refused DuPont’s application to register its
trademark ‘Freon’ because consumers and manufacturers in China had already widely adopted
the phonemic translation of this foreign word for refrigerants. The trademark was also not
registered because the Trademark Office was not familiar with all the well-known trademarks
in the world. A mark may be well known in one country, but generic in another.20
In the reapplication, the firm adopted a very persuasive tactic with convincing evidence to
demonstrate that DuPont was the originator of ‘Freon’, and had been using the mark since
1931. The mark had been registered in 91 countries, and Freon had even been listed in the
Collin’s Dictionary as a well-known trademark. As a result, the Chinese government not only
approved the trademark after review, but also urgently notified the firms concerned and the
general public in China to stop using Freon as a generic name, and adopt the substitute ‘Fluorine refrigerant’ for relevant products.
As discussed earlier, MU plc. is a successful example of a firm adopting the DuPont Strategy.
The company has applied the strategy to reapply the Class 25 products (see Table 1) with a
demonstration of the validity of the case. Specifically, the company substantiated the inconsistency of the trademark registrations by comparing the original mark and marks registered in
error. The firm has also proved that the words ‘Manchester United Football Club’ and the logo
are inseparable, and as a mark, had over 100 years of history and been registered in over 40
countries as a symbol of the firm’s business. At the time of writing, MU plc. has successfully
had its Class 25 trademark re-registered in China. Other inaccurately registered marks were
also reapplied for. In order to correct these marks, MU trademark attorneys made trips to
China to persuade and convince the Trademark Office.
468
Intellectual Property Abuses: How should Multinationals Respond?
This strategy is effective in dealing with the registrations associated with piracy, including
early registrations from unscrupulous firms and incorrect or inaccurate registrations granted
by relevant organisations. To a great extent, the effectiveness of this strategy lies in the proof
provided by the trademark owner, although the final decision depends on the relevant bodies
in China. Moreover, the overall environment in China has been improved to the advantage of
well-known trademarks since China’s entry into the WTO. The 2001 amendment to the trademark law may help trademark owners whose marks are well known in other countries but not
in China, as applicants are now allowed to apply for corrections of ‘obvious errors’ made by
the Trademark Office.21 Under the amended trademark law, firms can seek redress in court
when the second application fails, thus leaving final decisions to the court instead of an administrative body: this improvement is in line with the TRIPS agreement.
However, the DuPont strategy is a ‘Hobson’s Choice’, as well as being unpredictable, costly
and time-consuming for firms. There is no choice but to re-apply to the trademark office (as
the highest authority on registration) but the outcome cannot be relied on. This strategy is
time-consuming because the procedure to have a mark registered is long-drawn out, and each
application means extra costs for firms. For example, the reapplication for the Class 25 mark
cost MU plc. £6,000 (including fees) to persuade and convince the government, adding up to
almost £30,000 if the five marks were to be re-registered. Furthermore, the costs and risks
could be substantially increased if the company went to court after a second attempt failed.
This would include fees for a lawyer, the risk of failure in court at the first instance and on
appeal, and the possible price to pay for withdrawing the business from China and transferring
to another country if both failed. However, given the reality of the lucrative market, the low
cost production and skilful labour, companies would rather take the risk and bear the costs to
fight their chance for success.
The DuPont strategy is a ‘Hobson’s Choice’, as well as being
unpredictable, costly and time-consuming.
Strategy 8: the MU strategy—communicating with aggrieved firms
This strategy is to establish communications with a network of other ‘brand name’ firms operating in China and take collective measures to exert pressure jointly both on pirates and on
relevant organisations to take administrative actions. MU plc.’s actions have been a model for
such a strategy: the firm has established communications with a network of ‘brand name’ companies, such as Puma and Levis, who meet regularly to discuss their experiences of countering
piracy, including the problems they have encountered and appropriate measures to solve them.
Such alliances allow the companies to learn from one another, in particular in sharing
successful experiences and planning joint actions. Collective actions also strengthen firms’
persuasive powers with governments, save costs with collective sharing and reinforce anti-piracy
measures. External pressures on governments in liaison with non-government organisations,
such as the International Anti-Counterfeiting Coalition, can often be forceful and effective.
In forthcoming meetings with the companies, for example, MU plc. will alert members to
the severe impact of Internet piracy, and discuss what collective actions could be taken to
curb the rapid spread of this new form of piracy. The advantage of this strategy is that cost
sharing certainly alleviates the financial burden for firms, and it works not only for
multinationals, but also for mini-multinationals with limited financial budgets. The only
burden is to coordinate such communications, and to increase corporate persuasiveness on
governments to accelerate the policy-making process.
Long Range Planning, vol 37
2004
469
Strategy 9: the government hand strategy
All the survey firms emphasised the vital importance of cooperating with and seeking support
from government, as well as maintaining close cooperation with government administration
and enforcement agencies. Relevant government authorities can be very co-operative in tackling piracy, such as organising a raid or an injunction, etc. However, government decisions and
action rely on aggrieved companies providing hard evidence. Microsoft China is a very good
example of cooperation with government. It has put IP protection as its top objective in China.
To assist government in fighting IP violations, Microsoft has trained government officials and
established training institutes to increase knowledge awareness of IP in China, and this will
tend to exert long-term external pressure on government to tighten legal enforcement on
piracy.22 Such government actions not only emphasise the gravity of piracy to the public, but
also function as free advertising for the aggrieved party in the brand promotion.
While this strategy can be bureaucratic, managers still think that it is a better route than
immediately instigating legal proceedings. To be productive, the strategy relies on firms jointly
providing detailed evidence to the relevant organisations as part of persuading the government
of the essential importance of action. While the decision to act rests with governments, firms
should proactively seek support from them by taking action to cooperate with governments.
Although the government may be inhibited from investigating individual cases due to the limitations of time, human resources and the vast geographical spread, managers felt that, once
evidence is provided, it was willing to pursue and prove the truthfulness of the matter, and to
take further action.
Strategy 10: consumer campaigns
Increasing consumer awareness and improving consumer relations is a long-term brand building strategy in various ways. The most direct means is to incorporate advertising including
piracy education into peak time TV programmes, including text and images designed to alert
consumers about piracy, and emphasise authentication certificates and ways for consumers to
verify the genuineness of products. Another very direct method is to mount consumer campaigns in shopping centres: firms assign employees to show how to identify the authenticity of
their products, and maybe display fake products for comparison. Companies may also cooperate with other firms to sponsor large-scale campaigns with relevant organisations at city,
provincial, and national levels. Such campaigns attract media attention and raise consumer
awareness, educating the general public about the significance of piracy and the economic
damage it causes.
Such consumer campaigns can be costly and take time to evolve, but can be very effective if
they are organised to take account of consumer interests, cultural understanding and the ability of consumers to understand the information. This effectiveness will certainly be increased if
they are organised jointly with governments, relevant companies, non-government anti-piracy
organisations and deceived consumers. Such campaigns would also educate many consumers
to voluntarily give up buying shoddy fakes, and enhance consumer and corporate relations and
brand image. In this process, firms can also explore the needs of consumers for their products,
demand conditions being an important success factor to inspire firms to constantly introduce
new products to the markets. Again, this is a double victory strategy, as firms educate consumers and explore consumer needs at the same time.
Implications
This article, based on the response of British and US manufacturing multinationals in China,
has highlighted 10 corporate strategies to tackle the prevalent piracy situation, listed in Table 3.
The 10 strategies are to use proactive approaches, defensive weapons and networking means to
actively prevent and curtail piracy and protect corporate reputation. The proactive approaches
include effective labelling and packing, contractual surveillance, appropriate pricing, and
470
Intellectual Property Abuses: How should Multinationals Respond?
monitoring to prevent piracy prevalence (strategies 1–4). The defensive weapons allow firms to
corporately resolve piracy problems with commercial settlement, and acquisition (strategies 5
and 6). In addition, firms can gain support from different external forces, such as government
support, joint actions with other firms and international anti-piracy organisations, and from
increased public awareness among consumers (strategies 7–10).
Corporate managers and academics should bear in mind the wider implications of this article for implementing of the 10 strategies. Although the study is based on British and American
managers’ experiences in the manufacturing sector in China, it has significant implications for
corporate managers across all industries, sectors and countries. Firstly, managers should adopt
a common attitude and response: piracy is an endless and inevitable problem, and an economic
challenge. Taking a united stance will allow firms to avoid indecision or helplessness and force
managers to face the reality about the current situation in the Chinese market. The IP system
in China has only been established for a little over two decades, and is much less secure than
the IP systems of developed countries like the UK and USA—the pioneers in IP advancement.
As a manager argued: ‘There is no point in complaining how inadequate the Chinese IP enforcement is, which will not change overnight. Instead, find your own solutions when there is a problem.’
Secondly, firms need to proactively take corporate actions when piracy is detected, treating it
as a daunting challenge rather than an affliction. The challenge is to combine a repertoire of
the 10 strategies to handle individual cases effectively. In this process, firms not only need to
cooperate with relevant government organisations but also liase with firms with similar problems, and more importantly, work to prevent piracy from happening in the first place. Firms
also need to work closely with consumers to educate and persuade them to stop buying fakes.
They need to be reactive to piracy itself, and take on the task of educating pirates about the
importance of respecting intellectual creations.
Thirdly, corporate managers must also understand that there is a price to pay in handling
piracy. It is a very costly challenge that demands inputs of time, manpower, and corporate
budgets. Firms obviously have different financial strengths to face the challenge, but the key is
to make the best use of the limited budgets allocated for curbing piracy and prevent their
operations from being hurt by illegitimate businesses. As a manager indicated: ‘No matter what
action you take, it is still more beneficial than instigating a lawsuit. Why? A lawsuit is unpredictable, time-consuming, and costly, the effects of it can be limited because pirates rarely go to prison,
and a penalty can be limited with a fine, which can often be settled quickly between pirating companies and us.’ Furthermore, a legal action is usually concerned with one single case, which
does stop one wrongdoing, but does not prevent other wrongdoings from emerging. Therefore,
the most effective methods are to admit the reality, be proactive, and commit corporately to
handle piracy cases by using a combination of the 10 strategies.
Finally, if global business is dynamic, piracy will not be static: when old problems are solved,
new problems will arise. Where there is a popular product, there is a piracy, because pirates are
always aware of how to exploit the unsatisfied market. In recent years, Internet piracy has
become a serious and contingent issue. What action should firms take to resolve this problem
effectively? This article has argued that the Microsoft monitoring strategy can curb virtual
piracy to some extent, but it also has many limitations. Are there any other effective strategies
that firms can adopt? This is an immediate issue for both managers and academics to consider.
If global business is dynamic, piracy will not be static.
Long Range Planning, vol 37
2004
471
472
Intellectual Property Abuses: How should Multinationals Respond?
Tight quality contract and supervision
Lower price to allow little space for pirates to
compete
Field and virtual monitoring of manufacturing
and distribution
2. Contractual surveillance
3. Coca Cola strategy
Source: prepared by the authors based on corporate interviews.
10. Consumer campaign
9. Government hand
8. MU strategy
Reapplication of IP with persuasive evidence
Networking means
7. DuPont strategy
Immediate financial returns, stop piracy, and
further action can be taken with a constructed
case if this fails
Prevent further piracy from certain pirates,
cheaper productions with quality control, and
prepare relevant evidence for further action if
this fails
Prevent pirated goods from entering the official
channel, and licensing overrun
Prevent product overrun, and abide by
contractual agreement
Attract consumers to give up fakes and buy
authentic products
Keep fakes checked and take immediate actions
with evidence
Pros
Resolve wrong registrations from the authority,
and/or early registrations from other companies
Network with other firms to share the grief and Learning curve for all firms, strengthen
experience, take joint measures to curb piracy, pervasive power to government by joint efforts
and cost-sharing
and pressurise authorities to take action
Cooperate with and seek support from the
Wide publicity and media attention on piracy,
government
improve relations through working with the
government, and brand building in the process
Advertising, shopping centre display,
Brand building, educate consumers to give up
sponsorship on anti-piracy with firms and
fakes voluntarily, improve customer relations,
organisations
and network with firms and organisations
Buy piracy firms
6. Acquiring strategy
Defensive weapons
5. Commercial settlement
Strike a financial compensation with pirates
Effective labelling and featured packaging
Proactive strategies
1. Budweiser strategy
4. Microsoft strategy
Measures
Strategies
Table 3. Ten corporate strategies handling piracy
Costly, time-consuming, and immeasurable
about the effects
Bureaucratic, and take time to collect evidence
and prove the case
Needs good organisation and coordination
Unpredictable, costly, and time-consuming
Conditional that pirates must have skilled
workers and other packages, and financial loss
initially
Negotiation can be lengthy, and pirates may be
unwilling to pay the sum
Not a very attractive strategy for high tech
products
Costly, and on-line transactions can be difficult
to trace when there is a fake address
Financial backup, human power for checking,
and research the capacity of replication
Lengthy negotiation with partners
Cons
Acknowledgements
The authors would like to express their deeply felt gratitude to the Editor-in-Chief, Professor
Charles Baden-Fuller, and the two anonymous referees for their constructive comments and
valuable advice. In addition, this piece of work would not have been concluded without the
willingness, patience and insightful assistance from the corporate managers that the authors
have contacted. Their names, due to confidentiality, cannot be revealed, but the authors are
greatly indebted to them for their generosity with their time and efforts.
Appendix. Methodology
Sample selection
The data in this study comes mainly from questionnaire responses and email interviews. The
interview sample selection was based on the first author’s 2000 survey of a broader IP topic
among multinational managers in different manufacturing industries in China. The samples
were chosen from the 1999 lists Top 100 British and American Enterprises, Fortune 500 and Top
500 Multinationals in China (published by the Ministry of Commerce in China). In the end,
183 companies were discovered with IP activities in China in different forms. The first author
contacted these companies with a semi-structured questionnaire via email or by post. As a
result of this survey, 51 companies provided valid responses and were willing to participate in
further interviews which took place in 2002/03.
Confidentiality was an important issue with regard to the interviews. The author has not
identified individuals and corporate names, the investing capital, establishment of the firms, or
number of employees, nor has she offered an individualised summary of the participants: the
respondents’ belief that the revelation of such information could easily make them or their
firms identifiable has been respected throughout this study.
All the respondents working for these firms have been involved in IP activities in China,
including patents, copyrights, and trademarks. The interviewees include managing directors,
deputy managing directors, IP lawyers, development managers, IP managers, and CEO assistants, and all were highly educated with at least a bachelor’s degree (the majority of them having a Master’s degree, and three of them holding Ph.Ds). The respondents’ industries are all
involved in manufacturing in China, including the pharmaceutical, chemical, software,
machinery and equipment, computer and memorabilia industries. All interviews were conducted in English in order to avoid cross-language differences.
Data gathering procedure
All the data collection followed the same procedure. First, a questionnaire was designed following the problem–cause–solution framework established by the first author. The interview questions are either structured or unstructured. Structured questions were all indicated on a 6point Likert scale with 1 meaning strongly disagree, very low, very poor, or very unlikely and 6
indicating strongly agree, very high, excellent, or very likely. (The 6-point scale is used to prevent respondents’ tendency of choosing the middle scale, i.e. choosing 3 on a 5-point Likert
scale.) Second, all the interviewees were contacted by telephone to request a questionnaire
response and email follow-up interviews with the first author. This was not difficult, as these
interviewees have been in contact with the first author over the last few years. Third, the
authors sent the questionnaire to the interviewees, requesting their respective confidentiality
requirements, e.g. if they would like to have their individual and corporate names revealed.
The author received all the first responses within 15 days, and within the following two weeks,
emails were further exchanged with the respondents for clarification and for in-depth discussion and further clarification.
Long Range Planning, vol 37
2004
473
Analysis and validity
The authors followed the following five steps to conduct the analysis and ensure validity.
. Step one was to organise each response using axial coding.
. Step two was to categorise each response into the model framework of problems, causes,
and solutions.
. Step three was to organise all the individual responses into themes within the framework
when all the individual data were categorised.
. Step four was to write up the draft based on the organised data.
. Step five was to send the draft to the respondent for assurance of validity with two purposes;
. The first was to check the accuracy of the facts presented in the analysis and to ask them
to point out any matters that they disgreed with. This resulted in a further in-depth
study, as old information was confirmed and new information found in the process.
. To allow the respondents to check any identifiable factors that could reveal corporate and
individual identities, especially sensitive IP information. Where this was the case, respondents tended to provide suggestions to make the factors unidentifiable.
References
1. International Anti-Counterfeiting Coalition, Customs Seizures Valued at More than $73 Million in First
Half of FY 1999, Available from http://www.iacc.org/customsfy98.html (accessed in July 2003), (1999).
2. The New Oxford Dictionary of English (2001), edited by Pearson, J. Oxford University Press, Oxford.
pp. 418, 1411.
3. R. Meredith, The counterfeit economy, Forbes 171(04), 82 (2003).
4. B. Robins, China has now been identified as the Centre of Counterfeiting Activities particularly in the
Area of CD, CD-ROM, and Computer Software Pirating, Pacific Economic Review, Fall (1994). See also
The Economist, In praise of the real thing, May 17–23, 2003, pp. 12.
5. D. Bosworth and D. Yang, Intellectual property law technology flow and licensing opportunity in the
People’s Republic of China, International Business Review 9 453–477 (2000).
6. This has also been called reverse piracy or reverse counterfeiting.
7. D. Gervais, The TRIPS Agreement: Drafting History and Analysis, Sweet & Maxwell, London (1998).
8. The trademark law of the People’s Republic of China, (2001).
9. PricewaterhouseCoopers, Contribution of the Software Industry to the Chinese Economy PricewaterhouseCoopers, Commissioned by the Business Software Alliance, 1998.
10. J. Van Wijk, Dealing with piracy: intellectual asset management in music and software, European Management Journal 20(6), 689–698 (2002).
11. The Economists, Imitating property is theft, May 15, 2003, pp. 69–71.
12. T. Qu and M. B. Green, Chinese Foreign Direct Investment: A Subnational Perspective on Location, Ashgate,
Aldershot; (1997); P. Lan, Technology Transfer to China through Foreign Direct Investment, Avebury, Sydney
(1996).
13. D. Yang and M. Sonmez, The WTO and trademark development in China, Journal of World Intellectual
Property 6(4), 633–653 (2003).
14. www.budweiser.com.
15. A. Nill and C. J. Shultz II, The scourge of global counterfeiting: ethical consumer decision making and a
demand side solution, Business Horizons 39(6), 37–42 (1996).
16. Anon, The closely guarded recipes, News, North West, January 30, 2001, pp. 11.
17. www.jjb.co.uk.
18. The data are available on the US Bureau of Labour Statistics at www.bks.giv/oco/ocos157.htm, quoted by
Hopkins, Kontnik, and Turnage in Counterfeiting Exposed: Protecting your Brand and Customers, John
Wiley & Sons, Hoboken.
19. C. Zheng, B. Dong, Y. Cheng, M. Cheng, Y. Sun (Eds.), Intellectual Property Case Analysis, Law Publishing
House, Beijing, (1995).
20. Similar examples are the Aspirin and Sherry debates, which, as marks, were lost in some jurisdictions, but
were successful in others.
474
Intellectual Property Abuses: How should Multinationals Respond?
21. On the condition that the correction does not ‘relate to the substance of the trademark registration documents or application documents’, Article 36 of the Trademark Law of the People’s Republic of China (2001).
22. www.microsoft.com/China.
Biographies
Deli Yang is Lecturer in Intellectual Property in International Business at Bradford University School of Management. Her Ph.D. was on Corporate Management of Intellectual Property (IP) from Manchester School of Management, University of Manchester Institute of Science and Technology, UK. Her research interest is in the significance
of culture in IP, the impacts of IP on internationalisation, mergers and acquisitions, international negotiations
and corporate strategies against international piracy. Bradford University School of Management, Emm Lane, Bradford, BD9 4JL UK. URL: http://www.bradford.ac.uk/management/people. Tel.: +44-1274-234364; fax: +44-1274546866. E-mail: d.yang@bradford.ac.uk.
Mahmut Sonmez is Lecturer in Management Science at Loughborough University Business School. His Ph.D. was
on Decision Modelling from Manchester School of Management, University of Manchester Institute of Science and
Technology, UK. His main research interests include strategic solutions on decision-making problems, and violations of IP rights in developing countries, particularly China and Turkey. E-mail: m.sonmez@lboro.ac.uk.
Derek Bosworth was Professor of Economics at the Manchester School of Management, University of Manchester
Institute of Science and Technology, UK. His Ph.D. concerned with the Economics of IP. His research interests
include economics and management of IP and the determinants of firm performance. E-mail: derek.bosworth@btinternet.com.
Long Range Planning, vol 37
2004
475
Download