The issue of intellectual property (IP) protection looks set to be a major focus of the upcoming U.S.-China Joint Commission on Commerce and Trade (JCCT) talks scheduled to start April 11.Carlos Gutierrez, the U.S. secretary of commerce, was in Beijing Tuesday to discuss preparations for the talks and raised the issue of IP protection. He met with several senior officials, including Premier Wen Jiabao and Vice Premier Wu Yi, a former trade official who headed China’s JCCT delegation at the last meeting.In his public remarks, Gutierrez emphasized better IP protection will benefit China, noting that ending software piracy would bring in more tax revenue and create jobs.The JCCT was established in 1983 as a forum for the discussion of trade concerns between the United States and China. Recent meetings have brought together top trade officials from both sides for talks on a range of matters, including access to Chinese markets for U.S. companies. IP protection issues largely dominated the agenda at the last JCCT meeting, held in Beijing during July 2005. In response to U.S. government concerns, the Chinese side agreed at that time to take specific measures to reduce IP infringement.In the run up to next month’s meeting, Chinese officials have publicly stressed their commitment to raising protection for IP rights and highlighted their progress in this area. In recent testimony to a U.S. Senate subcommittee, Chris Israel, the U.S. Department of Commerce’s coordinator for international intellectual property enforcement, noted China has made progress in some areas. However, more work needs to be done, he said.One area that appears to be in dispute is whether China has fulfilled its commitment to end government use of pirated software. On Monday, Yan Xiaohong, the deputy commissioner of the National Copyright Administration of China, reiterated the Chinese government’s claim that all government departments were using licensed copies of software at the end of last year.That claim has previously been challenged by the U.S. side. “U.S. industry says its sales data does not support this claim, and there is no other evidence to show that China has moved forward to purchase and use only legal software,” Israel said during his testimony.Whether renewed enforcement efforts and recent statements by Chinese officials ahead of the JCCT talks will yield long-term results remains to be seen.“We have seen, prior to previous JCCT talks, stepped-up anti-piracy enforcement and rhetorical activity from China, and this pre-JCCT meeting is not different,” wrote Mike Ellis, the Motion Picture Association’s senior vice president and regional director of Asia-Pacific, in an e-mail.“The film industry … is hopeful that these renewed Chinese promises will translate into real world reductions in the availability of pirated product,” Ellis wrote. -Sumner Lemon, IDG News ServiceFor related CSO content, read Faked in China.For related news coverage, read Privacy Concerns are Thorn in Sino-U.S. Relations.Keep checking in at our CSO Security Feed page for updated news coverage. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe