Succeeding in China

advertisement
Succeeding in China:
The Risk of Doing Business
in China
Presenters:
Andrew Walker, Director, Deloitte Consulting
Jim Chapman, Partner, Foley & Lardner LLP
Silicon Valley RIMS
January 31, 2013
The Focus of this presentation is on identifying and mitigating the
risks of doing business in China
1. China represents a large and attractive market for Multi-National Companies (MNCs)
2. There have been a series of well-publicized incidents involving U.S. companies operating
in China
3. MNC’s have found ways to be successful in China – to both grow their businesses &
mitigate risks
4. A programmatic approach to risk reduction has proven to be the most successful
approach
Macroeconomic Issues
in China
China offers significant market attractiveness for MNCs
China’s demographic and economic profile make it the world’s fastest growing economy.
China’s Global Positioning1
#1
Global GDP Share3
GDP Growth (9.3%) among emerging
and developed nations
2010
2017 (proj.)
$13.2
$5.9
+12.2%
CAGR
$5.3
#1
United Nations FDI Attraction Index
Rank 2
$9.4
$39.4
$12.5
$49.8
$20.3
#1
Country Population (1.35 Billion)
#1
Total Exports ($1.90 Trillion)
#2
Total GDP ($7.3 Trillion)
#2
Total Imports ($1.66 Trillion)
China
Brazil, India, & Russia
Other Countries
Developed World
China provides MNCs with a strong economic and
demographic foundation for growth and projects to
continue dwarfing other major emerging markets
Sources: (1) WorldBank (2) UNCTAD (3) IMF projections, Deloitte Analysis
China offers significant market potential that can be
hampered by significant risks
However, unique risks may limit MNCs ability to
capture the growth potential . . .
Revenue Expectations
from China in next 3 years
Billions
Companies are expecting increased revenues
from China over the next 3 years
Potential revenue opportunity in China
Risk-adjusted
revenue
30%
10%
4%
25%
16%
Decrease/No Change
Increase by less than 10%
Increase by 10-24%
Increase by 25-49%
Increase by 50-99%
Increase by 100% or more
14%
Global weakness has affected China’s
economic growth, slowing to 7.6% in Q2
2012, however the China market is growing
faster than the global average indicating
continued investment opportunity
As documented in mainstream newspapers,
magazines, journals, and trade publications…
Sources: (1) Deloitte Consulting emerging markets survey conducted in 2011; (2) Weekly Economic Update (7/9/12) (3) 22
companies reporting revenue earned in China, Economist Intelligence Unite and Deloitte Analysis
Changing regulatory landscape is making China more
attractive for MNC
In addition to China’s economic and demographic profile, new leadership and policy changes
are making China a top destination for investment.
Number of Recently Initiated Trade
Restrictive Measures
Top Destinations for MNC Investment
Despite increased global protectionism, China has
imposed fewer restrictive trade measures1 compared
to other major economies. During the same period 21
new trade liberalizing measures were initiated.
Over 60% of executives surveyed by the UN
Conference on Trade and Development cited China as
a top 10 destination for investment between 2012 and
20142.
European Union
India
62
119
Sources: (1) Data from 9/2008 – 7/2011; Mohini, D., Hoekman, B., and Malouche, M., “Taking Stock of Trade Protectionism Since 2008” (2) UNCTAD
Brazil
UAE
55
Canada
Brazil
Spain
53
India
Indonesia
Japan
52
France
United States
United Kingdom
50
Germany
China
70
60
50
40
30
20
10
0
United States
49
China
Russia
Overview
MNCs already operating in China are expecting
substantial near-term revenue growth
55% of surveyed companies are expecting increased revenues from China between 2011 and
2014.
Potential Revenue Opportunity
Revenue Expectations
from China1
30%
140
Decrease/No Change
10%
Increase by less than 10%
4%
25%
100
80
Increase by 25-49%
60
Increase by 100% or more
14%
120
Increase by 10-24%
Increase by 50-99%
16%
in China ($B)2
40
20
2005
2010
2015E
An index of 135 companies weighted by their revenue share from China has
climbed 129% since 2009 compared with the S&P 500’s gain of 57%.3
Sources: (1) Deloitte Consulting emerging markets survey conducted in 2011; (2) 22 companies reporting revenue earned in China, Economist Intelligence Unit and
Deloitte Analysis; (3) The Economist
Legal, Regulatory and
Transaction Issues
Technology Transfer Legal Framework
China’s Regulations on Administration of Technology Import and Export
(Technology Regulations), effective January 1, 2002, govern the import
and export of technologies into and out of China.
The Technology Regulations classify technologies into three broad
categories, including:
1. Prohibited technologies: Cannot be imported into or exported out of
China.
2. Restricted technologies: Import and export must be pre-approved by the
relevant Chinese governmental authority, and copies of the relevant
technology transfer agreement must be submitted to the relevant
governmental authority.
3. Permitted technologies: Can be imported into or exported out of China
without prior Chinese governmental approval.
Forms of Technology Transfers
Technology transactions may take a variety of forms. All of the
following transactions are subject to the Technology
Regulations:
 Patent assignments
 Cooperative research and development
contracts
 Assignments of patent application rights
 Technology consultancy contracts
 Patent licensing
 Technical training contracts
 Assignments of know-how or trade
secrets
 Technology brokerage contracts
 Licensing of know-how or trade secrets
 Software import and export contracts
 Technical services and other unspecified
forms of technology transfer covered by
the Technology Regulations
 Trademark licenses or assignments
involving patented or non-patented
technology
Applicable Contract Law
Unified Contract Law, adopted in 1999 provides
substantial freedom for the parties to enter into
agreements.
Obstacles to Technology Transfer to China
 Lack of control over future developments, modifications and
enhancements of transferred technologies.
 Warranty requirements.
 Collecting royalties and other payments.
 Protection of Intellectual Property.
 Lack of Trust.
Mandatory Provisions of Chinese Law
Chinese law requires that the foreign licensor to:
 “Guarantee” that the licensed technology be complete,
correct, valid, and capable of accomplishing the specified
technological objectives.
 “Guarantee” that it is the legal owner of, or the party with
the right to license, the technology.
 If the Chinese licensee infringes on another party’s right by
using the licensed technology pursuant to the license
agreement, the licensor is required to bear the
responsibility for such infringement.
Prohibitions
The Technology Regulations prohibit the following provisions:
 Requiring the transferee to accept incidental conditions unnecessary for the
imported technology, including the purchase of unnecessary items.
 Requiring the transferee to pay for, or undertake obligations relating to, a
technology for which the patent right has expired or has been announced as
invalid.
 Restricting the transferee’s improvement of the technology provided by the
transferor, or restricting the transferee’s use of the improved technology.
• Restricting the transferee’s acquisition from a third party of any technology
similar to, or competitive with, the technology provided by the transferor.
• Unreasonably restricting the transferee’s channels or sources for the purchase
of raw material, parts, components, products, or equipment.
• Unreasonably restricting the quantity, variety, or price of products produced by
the transferee.
• Unreasonably restricting the transferee’s export channels for products
manufactured by the transferee using the transferred technology.
Key Issues of a Technology Transfer Agreement
Typically, a technology license agreement will cover
the following key issues points:
 Field of use
 Nondisclosure
 Geographic scope/territory
 Noncompetition
 License fees and payment terms  Term/termination
 Ownership of technology
 Indemnities/liabilities
 Ownership of improvements
 Dispute resolution
 Exclusive or nonexclusive/sublicense
 Governing law
 Governing language
(i.e., Chinese or English)
Key To Successful Technology Transfer
 Find the “right” licensee.
 Invest in the relationship and work to build trust.
 Thoroughly document the transaction.
 Work to keep interests aligned.
 Maintain constant communication and support.
Risks and Mitigation
Strategies
Type of Risk
1
IP Protection
High
Mitigating risks to profitability and value creation is
critical
All are related to protecting a company’s brand/reputation
USG-Related
Business
2
3
Negative Impact on USG-Related
Business
Export / OFAC Compliance
4
Compromise of U.S. Ethics Laws
5
Ineffective Legal Entity and Business
Structure
6
Partner Turning Competitor
Potential Impact
2
IP Protection
Ineffective Legal
Entity & Business
Structure
1
U.S. Ethics Laws
Export / OFAC
Compliance
5
4
3
9
Partner Turning
Supply Competitor
Chain
6
Profitability in
China
8
Market
Restrictions
7
Market Restrictions
8
Profitability in China
9
Supply Chain & Operational Risks
Low
7
Medium
High
Likelihood
Protecting IP is typically cited as the most
significant challenge to operating in China
% of Companies Citing Challenges
in China as Significant1
Adequate IP protection
58%
Competition from local
competitors
Understanding customers
buying behavior
Brand awareness in the
market
Providing afforable
products and services
Adequate supply of
skilled labor
Protectionist policies or
government red tape
Establishing partnerships
with local companies
49%
45%
45%
43%
38%
37%
IP Risks in China
 Local companies are known to introduce
rival products within 2-6 months of a new
product introduction by an MNC
 Significant number of IP related lawsuits
between MNCs and Chinese companies
indicate existence of IP infringement
practices (~60,000 in 2011, up from
~43,000 in 2010)2
 Government regulations on IP creation and
usage makes it mandatory for MNCs to
share IP in China in certain instances
31%
Supply chain capabilities
24%
Infrastructure problems
18%
0%
20% 40% 60% 80%
Sources: (1) Deloitte Consulting emerging markets survey conducted in 2011, (2) China Patent Agent LTD., (3) Nera Economic Consulting estimate
An IP protection strategy should be integrated from the
product strategy through the operating model and tactics
Implementation Steps
1
Identify
products being
sold
in China
 Identify the products and services best suited to China market – determine
whether to:
1. Take the whole stack (but restrict access to core technology), or
2. Dedicate less valuable technology that is sufficient to meet current market
demand
Establish a
clear integrated
strategy
 Create a China IP Protection Control Structure that integrates politics, partners,
people, process, vendors, and technology
 Define clear operating model (e.g., human resources, vendor management,
manufacturing, supply chain, information technology)
Manage
operations with
IP protection in
mind
 Redesign R&D processes to increase compartmentalization and protection; this
will result in higher IP management costs
 Program, implement, and commercialize technology development with value
management in mind, building IP protection into processes
Apply the right
tactics to
protect IP
 Define processes and controls throughout all business functions to safeguard IP
 Change product development cadence and release cycles
2
3
4
In addition to IP protection concerns, there is a risk that U.S.
government (USG) agencies could have concerns about offshore
operations in certain countries
Key Risks
 Certain USG agencies may have
concerns surrounding their product
and/or service providers operating in
certain countries
 Key concerns appear to revolve around
the following:
―
Loss of U.S. IP
―
Products or product code being
infiltrated or corrupted by foreign
parties
―
―
Network and IT access into USG
data centers or systems
USG related information becoming
accessible
Mitigation Approach
 Companies should wall-off foreign operations
from public sector business in a way that is
auditable
 Leading practices include creating two sets of
operational, network, and IT firewalls:
1. Between Offshore and US businesses
2. Between US and US Government Services
divisions
 Companies should proactively develop programs
to educate government customers
 Mitigation approach should be structured to
address operations for each business function
across eight key security threads
Negative USG perceptions of the company may impact existing and future contracts /
business may lead to loss of revenue and USG audits
Protecting IP and assuaging U.S. Government concerns
requires a reengineered operating model
Deloitte’s FOCI-Mitigation Toolset
(Foreign, Ownership, Control, or Influence)
Functional Example
Function: Information Technology
ProxyCo Current State
Research & Development
Supply Chain
Selling Product
Product & Delivery
Maintenance
Sales & Marketing
Physical
Supporting Business
Finance
Human Resources
Legal
Facility & Security
IT
Is the Research and Development (R&D)
Function physically separated from the
parent?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
Is the Supply Chain Function physically
separated from the parent?
Is the Product & Delivery Function
physically separated from the parent?
Where are product components / supplies
stored prior to completion?
Is the Maintenance Function physically
separated from the parent?
Is the Sales & Marketing Function
physically separated from the parent?
Is the Finance Function physically
separated from the parent?
Is the Human Resources (HR) Function
physically separated from the parent?
Is the Legal Function physically separated
from the parent?
Is the Facility & Security Function physically
separated from the parent?
Is the Information Technology (IT) Function
physically separated from the parent?
Are controls in place to ensure that there is no
unauthorized access into the IT facilities?
Will non-R&D employee badges be
granted access into R&D facilities?
What additional security is used to
protect the R&D facilities?
Are physical records, project plans, and
contracts stored within ProxyCo
securely?
Will non-Product & Delivery employees be
granted access into the Product & Delivery
facilities?
Are controls in place to ensure that there is no
unauthorized access into the Product &
Delivery facilities?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
Is classified / sensitive information stored in
the IT facilities in a secure manner?
Is visible badge identification required
at all times in R&D facilities?
Are controls in place to ensure that there is no
unauthorized access into the R&D facilities?
Is the shipping and delivery of inputs
securely handled?
Is visible badge identification required at all
times in the Product & Delivery facilities?
Is classified / sensitive information stored in
the Product & Delivery facilities in a secure
manner?
Are controls in place to ensure that there is no
unauthorized access into the Maintenance
facilities?
Is the Sales & Marketing Function staffed
only by ProxyCo's employees?
Are controls in place to
ensure that there is no unauthorized access
into the Finance facilities?
Are controls in place to ensure that there is no
unauthorized access into the HR facilities?
Are controls in place to ensure that there is no
unauthorized access into the Legal facilities?
Are controls in place to ensure that there is no
unauthorized access into the Facility &
Security facilities?
Is the IT Function staffed only by
ProxyCo’s employees?
Are IT subcontractors compliant with the
terms of the NSA?
Are emergency response procedures in
place for the R&D facilities?
Is classified / sensitive information stored
in the R&D facilities in a secure manner?
Are the warehouses and facilities that receive
ProxyCo's inputs appropriately secured?
Are emergency response procedures in place
for the Product & Delivery facilities?
What procedures are taken to ensure that the
shipping and delivery of products is secure?
Is classified / sensitive information stored in
the Maintenance facilities in a secure manner?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Are physical records of financial statements
accessible by the parent company?
Is classified / sensitive information stored in
the HR facilities in a secure manner?
Is classified / sensitive information stored in
the Legal facilities in a secure manner?
Are there video surveillance systems?
Does the IT Function have security policies
and a training plan?
Are IT temporary employees compliant with
the terms of the NSA?
Is the R&D Function staffed only by
ProxyCo's employees?
Does the R&D Function have security
policies and a training plan?
Are controls in place to ensure that there
is no unauthorized access into the Supply
Chain facilities?
Are physical records, project plans, and
contracts stored within ProxyCo securely?
What security procedures / plans are in place
to secure warehouses and facilities that
distribute ProxyCo’s products / technologies?
Is the Maintenance Function staffed only by
ProxyCo's employees?
Does the Sales & Marketing Function have
security policies and a training plan?
Is classified / sensitive information stored in
the Finance facilities in a secure manner?
Is the HR Function staffed only by ProxyCo's
employees?
Is the Legal Function staffed only by
ProxyCo's employees?
Is classified / sensitive information stored at
the Facility & Security facilities in a secure
manner?
Have the IT Function's policies and
procedures pertaining to the NSA been
reviewed with employees?
Is there a separate and independent body that
monitors the access and behaviors of IT staff,
including contact between IT staff
and the parent?
Do only authorized personnel have full
access to the R&D Function?
Has the R&D Function's policies and
procedures pertaining to the NSA been
reviewed with employees?
Is classified / sensitive information stored
in the Supply Chain facilities in a secure
manner?
Where is product inventory stored
prior to shipment?
Are the vehicles by which ProxyCo’s products
are transported designed to prevent
destruction or malicious activity / theft?
Does the Maintenance Function have security
policies and a training plan?
Have the Sales & Marketing Function's
policies and procedures pertaining to the NSA
been reviewed with employees?
Is the Finance Function staffed only by
ProxyCo's employees?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Is the Facility & Security Function staffed only
by ProxyCo's employees?
Does the IT Staff report to an executive
at ProxyCo?
Are there people assigned to continuously
monitor intrusions and / or any suspicious
activities, and are these people direct
employees of ProxyCo?
Which Key Management Personnel (KMP)
have influence over or access to the R&D
Function?
Does the R&D Function report to an
executive at ProxyCo?
Is the Supply Chain Function staffed only
by ProxyCo's employees?
Is the Product & Delivery Function staffed
only by ProxyCo's employees?
Does the Product & Delivery Function
report to an executive at ProxyCo?
Have the Maintenance Function's policies and
procedures pertaining to the NSA been
reviewed with employees?
Does the Sales & Marketing Function report
to an executive at ProxyCo?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Does the HR Function have security policies
and a training plan?
Does the Legal Function have security policies
and a training plan?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Do any of ProxyCo's IT personnel also
work for the parent?
Does the parent have access to any
classified / sensitive data that is under the
custody of ProxyCo's IT Staff?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Do any of ProxyCo's R&D
personnel also work for the parent?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Do any of ProxyCo's Product &
Delivery personnel also work for the parent?
Does the Maintenance Function report to an
executive at ProxyCo?
Do Sales & Marketing personnel sell or
market any of the parent's products?
Does the Finance Function have security
policies and a training plan?
Have the HR Function's policies and
procedures pertaining to NSA requirements
been reviewed with employees?
Have the Legal Function's policies and
procedures pertaining to the NSA been
reviewed with employees?
Does the Facility & Security Function have
security policies and a training plan?
Has ProxyCo established a fully separate
and distinct IT process and functional
organization that will manage the IT activities?
Is there a well-documented and regularly
revisited process for incident reporting and
response planning?
Which personnel outside of the R&D
Function’s employees are allowed to be in the
R&D facilities?
Does the company control information
and access from outside researchers?
Does the Supply Chain Function have
security policies and a training plan?
Which Key Management Personnel have
influence over or access
to the Product & Delivery Function?
Are Product & Delivery subcontractors
compliant with the terms of the NSA?
Do any of ProxyCo's Maintenance personnel
also work for the parent?
Do any of ProxyCo's Sales &
Marketing personnel also work for the parent?
Have the Finance Function's policies and
procedures pertaining to the NSA been
reviewed with employees?
Does the HR Function report to an executive
at ProxyCo?
Does the Legal Function report to an
executive at ProxyCo?
Have the Facility & Security Function's
policies and procedures pertaining to the
NSA been reviewed with employees?
Are there a set of security requirements been
provided to IT based on the NSA and other
government documents that IT can use to
take appropriate steps?
Are processes in place to govern how
ProxyCo’s staff engage and interact with
the parent’s staff?
Has ProxyCo established a fully separate
and distinct R&D process and functional
organization that will manage the R&D
Function's activities?
Does ProxyCo outsource
any R&D activities?
Has the Supply Chain Function's policies and
procedures pertaining to the NSA been
reviewed with employees?
What level of clearance is required to have
access to the Product & Delivery Function?
Are Product & Delivery temporary employees
compliant with the terms of the NSA?
Are the Maintenance subcontractors
compliant with the terms of the NSA?
Are Sales & Marketing subcontractors
compliant with the terms of the NSA?
Does the Finance Function report to an
executive at ProxyCo?
What exit policies and procedures are used by
ProxyCo?
Do any of ProxyCo's Legal personnel
also work for the parent?
Does the Facility & Security staff report to an
executive at ProxyCo?
Have electronic security perimeters been
established?
Are IT processes appropriately documented?
What is the process for supporting ProxyCo's
R&D operations in high-risk countries?
Are there controls in place to protect
ProxyCo's intellectual property from
being transferred to the parent?
Does the Supply Chain Function report to
an executive at ProxyCo?
Do any of the personnel that have access to
the Product & Delivery Function not have
the appropriate level of security clearance
required for those facilities?
Do the individuals involved in the distribution
network have the appropriate level of
clearance to transport sensitive
technologies / products?
Are the Maintenance temporary employees
compliant with the terms of the NSA?
Are Sales & Marketing temporary employees
compliant with the terms of the NSA?
Do any of ProxyCo's Finance personnel
also work for the parent?
What is ProxyCo's screening process for
new employees?
Are Legal subcontractors complaint with the
terms of the NSA?
Do any of ProxyCo's Facility & Security
personnel also work for the parent?
Is there a process for securing hardware?
Are ProxyCo's IT systems accessible by
the parent's employees?
Does the company have any joint R&D
activities with outside parties?
Are R&D processes
appropriately documented?
Do only authorized personnel have full
access to the Supply Chain Function?
Which personnel outside of the Product and
Delivery Function's employees are allowed to
be in the Product & Delivery facilities?
Does the Product & Delivery Function have
controls in place to regulate individuals who
handle the products?
Is access to classified / sensitive information
restricted only to the appropriate personnel?
Do Sales & Marketing personnel travel to
foreign countries to conduct business?
Are Finance subcontractors compliant with the
terms of the NSA?
Does ProxyCo hire foreign nationals?
Are Legal temporary employees compliant
with the terms of the NSA?
Are Facility & Security subcontractors
compliant with the terms of the NSA?
Are there any automatic escalation processes
to alert management of intrusions and / or
suspicious activity?
Are the IT systems protected by firewalls?
Has ProxyCo established independent
R&D systems from the parent?
Are ProxyCo’s R&D systems and supporting
systems accessible by outside parties?
Does ProxyCo have controls in place
to regulate and monitor the individuals who
handle the inputs?
Does the Product & Delivery Function have
security policies and a training plan?
Which individuals have access to or are
responsibility for tracking the products
in route?
Has ProxyCo established a fully separate and
distinct maintenance process and
functional organization that will manage the
Maintenance Function's activities?
Has ProxyCo established a fully separate
and distinct Sales & Marketing process and
functional organization that will manage the
Sales & Marketing Function's activities?
Are Finance temporary employees compliant
with the terms of the NSA?
Are security clearances managed by an
approved security officer?
Are Legal employment decisions appropriately
documented and reviewed?
Are Facility & Security temporary employees
compliant with the terms of the NSA?
Has ProxyCo established independent IT
systems from the parent?
Are any IT services outsourced to foreign
countries?
Are ProxyCo's R&D IT systems accessible
by the parent's employees?
Has ProxyCo established a separate secure,
independent data repository for R&D and
related information?
Do any of ProxyCo's Supply Chain
personnel also work for the parent?
Have the Product & Delivery Function's
policies and procedures pertaining to the
NSA been reviewed with employees?
Does ProxyCo outsource / subcontract
any Product & Delivery activities?
Does ProxyCo have the processes and controls
necessary to safeguard classified / sensitive or
protected software code prior to the release of
the hardware for maintenance?
Does ProxyCo sell and track products
on behalf of the parent?
Has ProxyCo established a fully
separate and distinct finance process and
functional organization that will manage the
Finance Function's activities?
Do any of ProxyCo's HR personnel also
work for the parent?
Has ProxyCo established a fully separate
and distinct legal process and functional
organization that will manage the activities of
ProxyCo's Legal Function?
Which individuals have access to the video
surveillance systems?
Are there one-time or recurring data transfers
between ProxyCo and the parent?
Are any data connections between
ProxyCo and the parent appropriately
audited and firewalled?
Have all existing data repositories been
identified and are they within ProxyCo?
Are there appropriate controls in place to
ensure that data cannot be leaked from inside
ProxyCo and that data cannot be accessed
from outside of ProxyCo?
Are Supply Chain subcontractors compliant
with the terms of the NSA?
Has ProxyCo established a fully separate
and distinct Product & Delivery process and
functional organization that will manage the
Product & Delivery Function's activities?
Are ProxyCo's products securely
shipped and delivered?
Is there a defined process for using the
parent's Maintenance Function?
Is ProxyCo's sales planning
independent of the parent?
Is ProxyCo's banking management
process independent of the parent’s?
Do people outside of ProxyCo have
access to ProxyCo's employee records?
What is the process for conducting confidential
investigations for ProxyCo?
Are there security personnel for all facilities?
Have all existing data repositories been
identified and are they within ProxyCo?
Has extensive testing been conducted to
ensure the integrity of the firewall?
Has ProxyCo's R&D data been wiped from the
IT systems that the parent has access to?
Is there a firewall to prevent data storage
outside of ProxyCo's servers?
Are Supply Chain temporary employees
compliant with the terms of the NSA?
What is the process for supporting
ProxyCo's Product & Delivery operations
in high-risk countries?
Are Product & Delivery processes
appropriately documented?
Is data on the devices being repaired wiped
for all devices leaving ProxyCo?
Does ProxyCo outsource
any Sales & Marketing activities?
Is financial and accounting information
transmitted to the parent's Finance Function?
Are HR subcontractors complaint with the
terms of the NSA?
Is there an investigations board, separate from
the parent that will handle all investigations for
ProxyCo?
Are the security personnel properly trained
and vetted to work at cleared facilities?
Has ProxyCo's IT data been wiped from
the IT systems that the parent has access to?
Are there any links on ProxyCo's website
that can take users to secured areas?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Has extensive testing been conducted
to ensure the integrity of the firewall?
Has ProxyCo established a fully separate and
distinct Supply Chain process and functional
organization that will manage the activities of
ProxyCo's Supply Chain Function?
Has ProxyCo established independent
Product & Delivery systems from the parent?
Are ProxyCo’s manufacturing systems
and supporting systems accessible
by outside parties?
Are Maintenance processes appropriately
documented?
Does ProxyCo have IT support for Sales
& Marketing operations, including intranet
and extranet enterprise portal capabilities
and CRM?
Does ProxyCo outsource any Finance
activities?
Are HR temporary employees compliant
with the terms of the NSA?
Does ProxyCo outsource any Legal
activities to vendors who have not agreed
to the terms of the NSA?
Is there a separate and independent body
that monitors the access and behaviors of the
Facility & Security staff, including contact
between the staff and the parent?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Are all data repositories securely hosted for
only ProxyCo?
Has ProxyCo established a fully separate
and distinct set of R&D Service Level
Agreements (SLAs) with its vendors?
What is the process for keeping
ProxyCo's vendor lists confidential?
Does ProxyCo outsource
any Supply Chain activities?
Are ProxyCo's Product & Delivery
IT systems accessible by the
parent's employees?
Are the product assembly guides in the
Product & Delivery Function securely
monitored and stored?
Has ProxyCo established independent
Maintenance systems from the parent?
Are Sales & Marketing processes
appropriately documented?
Are Finance processes appropriately
documented?
Has ProxyCo established a fully separate
and distinct HR process and functional
organization that will manage the HR
Function’s activities?
Are patents exclusively owned by the
mitigated entity?
Are there individuals assigned to continuously
monitor intrusions and / or any suspicious
activities, and are these individuals direct
employees of ProxyCo?
Has ProxyCo established a separate
secure, independent data repository for IT and
related information?
Are company websites governed closely by
security specialists to cleanse them any
sensitive or classified information?
Are Supply Chain processes
appropriately documented?
Have all existing data repositories been
identified and are they within ProxyCo?
Are there appropriate controls in place to
ensure that data cannot be leaked from inside
ProxyCo and that data cannot be accessed
from outside of ProxyCo?
Is there a database for maintaining
agreements / contracts?
Are ProxyCo marketing
and branding decisions independent
of the parent?
Has ProxyCo established independent
Finance systems from the parent?
What is the process for managing security
clearances?
Are Legal processes appropriately
documented?
Has ProxyCo established a fully separate
and distinct process and functional
organization that will manage ProxyCo's
Facility & Security Function's activities?
Is there a firewall to prevent data storage
outside of ProxyCo's servers?
Is any data hosted in offshore locations?
Has ProxyCo established independent Supply
Chain systems from the parent?
Has ProxyCo's Product & Delivery data
been wiped from the IT systems that the
parent has access to?
Is there a firewall to prevent data storage
outside of ProxyCo's servers?
Are all Maintenance systems secured with
a firewall?
Are appropriate processes in place to ensure
that marketing target lists and information
are kept confidential?
Are ProxyCo's Finance IT systems
accessible by the parent's employees?
What is the process for keeping classified /
sensitive employee records secure?
Has ProxyCo established independent
Legal systems from the parent to manage and
support the company's Legal Function?
Are any of the following activities outsourced:
lease administration, space management,
lease transactions, and shipping?
Has ProxyCo established a fully separate
and distinct set of IT SLAs with its vendors?
Is there a separate body or function that
monitors vendors' activities on ProxyCo's
IT systems and infrastructure?
How are physical invoices filed and stored?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Has extensive testing been conducted to
ensure the integrity of the firewall?
Have all existing data repositories been
identified and are they within ProxyCo?
Have all existing data repositories been
identified and are they within ProxyCo?
Are HR processes appropriately documented?
Are ProxyCo's Legal IT systems accessible
by the parent's employees?
Are Facility & Security processes
appropriately documented?
How much access do vendors have to
ProxyCo's IT systems and infrastructure
without the appropriate level of control?
Are vendors that access ProxyCo’s
systems fully compliant with the NSA?
Has ProxyCo established independent
Facility & Security systems from the parent?
Do ProxyCo and the parent
share any vendors?
What information does ProxyCo
share with vendors?
Security Threads
Physical (Real Estate)
(Business and Financial Strategy, Mergers and Acquisitions, Tax Management, Risk
Management, Compliance Management, Program Management and Performance Management)
Have all existing data repositories been
identified and are they within ProxyCo?
Has ProxyCo established a separate
secure, independent data repository for
Product & Delivery and related information?
How much product information is transferred
to the vendors' databases and how secure is
this information transfer?
Has ProxyCo's Maintenance data been wiped
from the IT systems that the parent has
access to?
Are ProxyCo's Customer Relationship
Management (CRM) systems accessible by
the parent's employees?
Has ProxyCo's Finance data been wiped
from the IT systems that the parent has
access to?
Has ProxyCo established independent
HR systems from the parent?
Have all existing data repositories been
identified and are they within ProxyCo?
Has ProxyCo's Supply Chain data been
wiped from the IT systems that the parent
has access to?
Has ProxyCo established a fully separate
and distinct set of Product & Delivery SLAs
with its vendors?
What information does ProxyCo
share with vendors?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Does ProxyCo have an independent
intranet on which to design, develop, publish,
and maintain content?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Are ProxyCo's HR IT systems accessible
by the parent's employees?
Has ProxyCo's Legal data been wiped
from the IT systems that the parent has
access to?
Does ProxyCo have separate voice and
data infrastructure for its facilities?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Does ProxyCo and the parent share
any vendors?
Does ProxyCo have travel and shipping
contracts independent of the parent?
Has ProxyCo established a separate secure,
independent data repository for Maintenance
and related information?
Do Sales personnel maintain classified /
sensitive information in their physical custody
while visiting with prospective clients and / or
visiting trade shows?
Has ProxyCo established a separate
secure, independent data repository for
Finance and related information?
Have all existing data repositories been
identified and are they within ProxyCo?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Are ProxyCo's servers stored in a
secure area outside of the parent’s facilities?
Has ProxyCo established a separate
secure, independent data repository for
Supply Chain and related information?
How much product information is transferred
to vendors' databases and how secure is this
information transfer?
Are there access controls in place to monitor
individuals who are given access to the
products and technologies being delivered?
Has ProxyCo established a fully separate and
distinct set of Maintenance SLAs with its
vendors?
Have all existing data repositories been
identified and are they within ProxyCo?
Is there a firewall to prevent data storage
outside of ProxyCo's servers?
Has ProxyCo's HR data been wiped from
the IT systems that the parent has access to?
Has ProxyCo established a separate
secure, independent data repository for Legal
and related information?
Is the process for moving physical data from
one facility to another secure, documented,
and followed?
Has ProxyCo established a fully separate
and distinct set of Supply Chain SLAs with its
vendors?
What is the process for keeping
ProxyCo's vendor lists confidential?
Are multiple vendors used for Maintenance?
Has ProxyCo's Sales & Marketing data
been wiped from the IT systems that the
parent has access to?
What procedures are in place to protect the
sensitivity and integrity of ProxyCo's
financial data?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Is there a firewall to prevent data storage
outside of ProxyCo's servers?
Is the movement of classified / sensitive data
properly restricted?
People
(Marketing, Sales, Delivery/Provisioning, Billing and Service)
Has ProxyCo established independent
Sales & Marketing systems from the parent?
Process
(Recruitment, Development, Administration and Performance Management)
Physical Data
(Design, Development, Deployment, Operations and Performance Management)
Process
Product
Systems
Physical Data
(Innovation and Design, Supply Chain Management, Production Operations and Logistics)
Systems
People
Security Thread
Product Development, Delivery,
& Support
Electronic Data
Vendor/Suppliers
Does ProxyCo and the parent share
any vendors?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Has ProxyCo established a fully
separate and distinct set of Finance SLAs
with its vendors?
Has ProxyCo established a separate
secure, independent data repository for HR
and related information?
Has extensive testing been conducted to
ensure integrity of the firewall?
Have all existing data repositories been
identified and are they within ProxyCo?
What is the process for keeping ProxyCo's
vendor lists confidential?
Has ProxyCo established a separate
secure, independent data repository for
Sales & Marketing and related information?
Does ProxyCo share any vendors with the
parent?
Is there a firewall to prevent data storage
outside of ProxyCo's servers?
Has ProxyCo established a fully separate
and distinct set of Legal SLAs with its
vendors?
Has ProxyCo's Facility & Security data
been wiped from the IT systems that the
parent has access to?
What information does ProxyCo share
with its vendors?
Are any products or services inappropriately
detailed on the company’s website or in
marketing material?
How much access do vendors have to
financial data from classified / sensitive areas?
Has extensive testing been conducted to
ensure the integrity of the firewall?
Do ProxyCo and the parent share any
vendors?
Has the wiped data from IT systems provided
to the parent been tracked and managed?
Does ProxyCo have sole responsibility for
all supplier selection, subcontracting, and
supplier management activities?
Where are CRM records stored, who
has access to them & who has had access
to them?
Has ProxyCo established a fully separate
and distinct set of HR SLAs with its vendors?
Are vendors that access ProxyCo’s
systems fully compliant with the NSA?
Has ProxyCo established a separate
secure, independent data repository for
Facility & Security and related information?
Has ProxyCo established a fully separate
and distinct set of Sales & Marketing SLAs
with its vendors?
Do ProxyCo and the parent have any
shared contracts with any HR vendors?
Is badging and surveillance data properly
protected?
Are vendors that access ProxyCo’s
systems fully compliant with the NSA?
Has ProxyCo established a fully
separate and distinct set of Facility & Security
SLAs with its vendors?
(Real Estate, Procurement and Other)
Note: Many actions could logically be associated with other or multiple process groupings.
For example, many customer and product actions are likely to have heavy IT and HR components.
Privileged and Confidential for ProxyCo and Deloitte Consulting Only
Electronic Data
As of Month 20XX
Vendors / Suppliers
Foreign Corrupt Practices Act
What are the risks?
Corruption in China –pace of change, growing economic prosperity, historical practices
US FCPA – Prohibits payments of something of value to foreign officials or members of a
political party to obtain or retain business.
Violations and Penalties – Anti-bribery:
 Individual criminal fines up to $250,000 and imprisonment up to 5 years
 Companies may be fined $2 million for each violation
 Violations and Penalties – Violation of accounting provisions
 Individual criminal fines up to $5 million and imprisonment up to 20 years
 Companies may be fined $25 million for each violation
What is an improper gift or payment?
FCPA prohibits corrupt payments through intermediaries
U.S. Foreign Corrupt Practices Act
Understand the Danger Signs
 Large sales to governmental agencies or SOE’s with high unit price and low frequency;
 A request for commission payments to be made to bank accounts in other countries or to
people or companies who did not perform the services; Excessive payments or
commissions for services rendered or insufficient staff to perform the services to be
rendered;
 Vague deliverables in contracts;
 Losing bidders hired as subcontractors;
 Favorable treatment of one supplier over another;
 Lack of relevant experience of a successful bidder;
 Unnecessary third parties performing services;
 Lack of documentation from agents;
 A representative or distributor has family or business ties with government officials;
 A representative or distributor requires that his or her identity not be disclosed;
 A potential government customer recommends or requires that the U.S. company use a
particular representative or distributor;
 A representative or distributor makes requests such as backdating or altering invoices; or
 A representative or distributor requests that an invoice be inflated.
FCPA Compliance Program
Components of Program
 Process and procedures
 Oversight
 Audit
Embezzlement Risk
What to watch out for?
Key Risks
 Fraud is rampant in China –
“Opportunistic” vs. “Systemic
Malfeasance”
 There is a view that there are no
consequences
 It is OK to take advantage of a
foreigner
Mitigation Approach
 Pre-employment screening – verify everything
 Certificate of No Criminal Record –provided by
local police station and can be verified
 Manage the HR Manager in China – Kickbacks and payoffs are common
 Do not allow the GM to hire the finance
manager
Contractual Risk
What to watch out for?
Key Risks
 Chinese view of contracts - tool for
building a relationship
 Negotiation and re-negotiation
 Enforcement
Mitigation Approach
 Formation basics
 Understand the role of contracts – Use strong
contractual protections such as arbitration
outside of China, governing law and language,
waiver of sovereign immunity
 Build personal relationships on a day-by-day
basis
 Learn the culture – role of relationships, how
foreigners are viewed, the role of “face”,
humility, sincerity and other concepts
Understand the role of contracts and cultural differences.
Human Capital Risk
What to watch out for?
Key Risks




The Chinese view of the workplace
Employees are not important
Hierarchy
*Loyalty – To whom do the key
employees owe their loyalty?
 Turnover and its costs
Mitigation Approach
 Integration
 Training
 Loyalty programs
Loyalty issues control and influence protection of IP and one’s brand and reputation
Operating Risk
What to watch out for?
Key Risks
 Supply chain visibility – downstream
and upstream – and chain of
command
 Control over costs and pricing
 Differences in protection of property
and business continuity efforts /
requirements
 Quality control and assurance
 IP
Mitigation Approach





Compartmentalize production
Control the production process
Keep key technologies in the US
Employ rapid versioning
Integrate supply chain requirements through
contracts, quality assurance, and risk
management best practices
Visibility is most important in understanding critical operational risks
Risks should be managed through an integrated,
cross-functional program
Function Responsible For Mitigating Risk
Type of Risk
Executive Office
5
IP Protection
Operations
2
Negative Impact on
USG-Related Business
3
Export / OFAC
Compliance
4
Compromise of U.S.
Ethics Laws
5
Ineffective Legal Entity &
Business Structure
6
Partner Turning
Competitor
7
Market Restrictions
8
Profitability in China
1
3
5
2
6
3
7
8
Sales & Marketing
8
7
2
3
HR
1
6
5
6
Finance
8
1
IT
4
6
1
3
5
8
Legal & Risk
5
Sample Roadmap
1
2
3
4
5
Summary
Key Lessons Learned
 Do not leave common sense at the border
 Understand the role of the Chinese government in day-today business
and develop a governmental relations program
 Develop “guanxi”
 Select the “right partners, suppliers and resellers
 Always have strong legal foundation for business relationships
Andy is a strategy advisor with more than 15 years of
experience leading efforts to help business
executives overcome their most pressing challenges.
His primary focus is on advising companies on ways
to improve financial position by restructuring their
operating models to improve the focus on future
growth prospects.
Director
Strategy Practice
Deloitte Consulting
In addition to this focus area, Andy is a lead in
Deloitte’s cross-border investment practice with a
focus on helping companies meet U.S. national
security expectations, as well as helping them
protect their intellectual property as they expand
globally. He has led Deloitte’s efforts on a number of
high profile CFIUS cases.
Andy has worked with telecom and high tech clients
and has worked in China, Latin America and Europe
on their behalf. He is the author of a number of
articles, including, most recently an article published
in the Wall Street Journal entitled “Improving the
Yield on your corporate investment portfolio.”
Jim is a partner at Foley & Lardner, a leading international law
firm. He is a corporate and securities lawyer focusing on startup and emerging publicly traded and privately held companies
looking to expand domestically and internationally and the
venture capitalists, private equity groups and angels that invest
in them. He has substantial experience in international
transactions including mergers and acquisitions, foreign direct
investment, technology transfers and joint ventures in China.
Partner
Foley & Lardner, LLP
Jim has been involved in approximately 250 mergers,
acquisitions and finance transactions and is the author of
approximately 50 articles and has given over 50 presentations
in the last four years on issues related to raising venture
capital, mergers and acquisitions, start-ups, doing business in
China and other topics.
Jim has been recognized by Law 500 as one of the best lawyers
in the US for mergers and acquisitions, was named one of the
Top 25 Clean Tech Lawyers in California in 2011 by the Daily
Journal and one of Northern California’s Super Lawyers by San
Francisco Magazine and Law and Politics Media.
Download