Verified Document

Corporate Espionage Is And Interesting Topic And Essay

Corporate espionage is and interesting topic and it mirrors espionage that is conducted by governments except for the fact that the activities are directed at commercial purposes as opposed to national security or other related items. Corporate espionage, also called industrial or economic espionage, encompasses a wide range of different activities that involve the illegal acquisition of trade secrets or other corporate information that can be used for financial gain by some other party. The most common forms will covertly uncover information about designs, methods, formulas, manufacturing processes, research, or future plans. Such information can be acquired by disloyal employees, students, private firms, online, or through many other such activities. There is also a fine line between legally acquiring information and doing so in an illegal fashion and the rules that govern such questions vary significantly by location. The difference between competitive intelligence and corporate espionage would seem obvious: one is legally getting the information you need to run your business competitively; the other is creeping...

Therefore many professionals may be crossing the line without even recognizing the fact that they are performing an action that could be deemed as illegal.
Notable Cases

While some forms of espionage are subtle, others are incredibly blatant; especially in developing countries. On January 5th, 2013, in a night raid, a gang of criminals broke into a factory near Shanghai owned by Mercury Cable, an American manufacturer of high-voltage equipment (The Economist, 2013). The thieves that orchestrated the robbery took not only raw materials but machinery from production lines as well. The business owners believe that the manufacturing company's local management was responsible for the heist but local police would not pursue the four managers who were implicated. The most dangerous local thieves are "PhD pirates," says Peter Humphrey of ChinaWhys, who consist…

Sources used in this document:
Works Cited

Gupta, A., & Wang, H. (2011, May 20). Safeguarding Your Intellectual Property in China. Retrieved from Bloomberg: http://www.businessweek.com/globalbiz/content/may2011/gb20110520_313022.htm

Smith, B. (2012, November 12). Corporate espionage vs. competitive intelligence. Retrieved from The Globe and Mail: http://www.theglobeandmail.com/report-on-business/careers/business-education/corporate-espionage-versus-competitive-intelligence/article4933482/

The Economist. (2013, February 23). Who needs cyber-spying? Retrieved from The Economist: http://www.economist.com/news/china/21572250-old-fashioned-theft-still-biggest-problem-foreign-companies-china-who-needs

Welch, C. (2013, April 5). Silicon Valley voices opposition to China cyber-espionage provision. Retrieved from The Verge: http://www.theverge.com/2013/4/5/4188396/tech-companies-voice-opposition-china-cyber-espionage-provision
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now