Changeflow GovPing Trade & Sanctions China's New Trade Secret Protection Rules
Priority review Rule Amended Final

China's New Trade Secret Protection Rules

Favicon for www.jdsupra.com JD Supra Trade Law
Published June 1st, 2026
Detected March 24th, 2026
Email

Summary

China's State Administration for Market Regulation (SAMR) has issued new Provisions on the Protection of Trade Secrets, effective June 1, 2026. These replace 1995 rules and significantly expand the scope of protectable information, including technical data like AI datasets and commercial data such as customer information, aligning protection with the digital economy.

What changed

China's State Administration for Market Regulation (SAMR) has issued new Provisions on the Protection of Trade Secrets, which will take effect on June 1, 2026, replacing the 1995 Rules. This revision significantly expands the definition of trade secrets to encompass technical information (e.g., AI model training datasets, algorithms) and commercial information (e.g., customer data, business plans), aligning protection with the digital economy. Notably, interim research results and failed experimental data are now explicitly protectable, and customer information is broadly defined to include transaction habits and purchase intentions.

Companies operating in or with China must review their existing trade secret protection measures to ensure compliance with the expanded scope. This includes updating confidentiality agreements and internal policies to cover new categories of protectable information. The clearer rules on infringing conduct and the broader definition of customer information will make it easier for rights holders to protect their intellectual property and customer relationships, potentially leading to increased enforcement actions.

What to do next

  1. Review and update internal trade secret policies to align with expanded definitions of technical and commercial information.
  2. Ensure confidentiality measures cover interim research results, failed experimental data, and detailed customer information.
  3. Assess existing agreements for trade secret protection clauses to ensure they are comprehensive under the new provisions.

Source document (simplified)

March 24, 2026

China Raises the Stakes on Trade Secret Protection: What Companies and Counsel Need to Know About the New Rules

Yuanmei Lu, Zhenye Wang Sheppard, Mullin, Richter & Hampton LLP + Follow Contact LinkedIn Facebook X Send Embed

[co-author: Yanlong Li]

On February 24, 2026, the State Administration for Market Regulation (“SAMR”) officially issued the Provisions on the Protection of Trade Secrets (the “Provisions”), which will take effect on June 1, 2026. The Provisions repeal the Several Provisions on Prohibiting Infringement of Trade Secrets issued in 1995 (the “1995 Rules”), ending nearly 30 years of application. Expanded from 12 articles to 31, this revision represents the most significant overhaul of China’s trade secret protection regime in thirty years. This article outlines the key changes and their practical implications for businesses operating in or with China.

1. Expanded Scope of Trade Secrets: Aligned with the Digital Economy

The 1995 Rules were enacted before the internet era, at a time when trade secret misappropriation typically meant an employee walking out the door with paper blueprints, a competitor bribing an insider for a chemical formulas, and the theft of a physical customer rolodex. The commercial landscape today looks nothing like that, and the Provisions respond accordingly.

The Provisions define trade secrets as business information — encompassing both technical information and commercial information — that is not publicly known, carries commercial value, and is subject to reasonable confidentiality measures taken by the rights holder.

  • Technical information: The Provisions expressly enumerate the types of technical information that qualify for protection, including structures, formulas, materials, samples, processes, methods, data, algorithms, computer programs, and code. This enumeration is significant in practice. AI model training datasets, algorithm iteration records, and user behavioral analytics can now unambiguously qualify for trade secret protection — a position that was genuinely contested under the prior framework and frequently litigated without a clear legal basis.
  • Commercial information: On the commercial side, protectable information includes ideas, management methods, sales strategies, financial data, business plans, samples, customer information, and other business-related data. Notably, customer information is specifically and broadly defined to include not only names, addresses, and contact details, but also transaction habits, purchase intentions, and the content of prior dealings. This closes a significant gap in the 1995 Rules, under which a competitor could argue – sometimes successfully – that basic client contact information was “publicly available” and therefore unprotectable. Rights holders will find it considerably easier to protect their customer relationships going forward. One of the most practically meaningful expansions in the Provisions is the express extension of protection to interim research results and failed experimental data, provided these meet the commercial value standard. This has particular significance for life sciences, advanced materials, and technology companies, where the research and development cycle is long and the value of negative results is well-understood. The previously common defense that “this was merely a failed experiment with no commercial value” will be far more difficult to sustain under the new framework.

2. Clearer Rules on Infringing Conduct

The Provisions set out specific categories of prohibited conduct with a precision the 1995 Rules never achieved. The drafting is clearly responsive to the most frequently disputed scenarios in practice.

Employee Departures and Unauthorized Data Transfer

The Provisions explicitly provide that misappropriation includes downloading or transferring trade secrets - without authorization, beyond the scope of authorization, or after authorization has expired - to personal email accounts, cloud storage platforms, or other devices or systems outside the rights holder’s control.

This is an important shift. Under the new framework, the act of unauthorized downloading itself constitutes misappropriation. Companies no longer need to wait until confidential information has been used, disclosed to a third party, or caused demonstrable loss before taking action. This significantly enhances the ability of rights holders to intervene at an early stage — for example, upon discovering the data transfer during an exit interview or a forensic IT review.

Poaching with Improper Intent

The Provisions also address the increasingly common practice of a competitor deliberately hiring an employee precisely to obtain the former employer’s confidential information — what practitioners sometimes call “hiring for secrets.”

Specifically, the Provisions prohibit inducing others to misappropriate trade secrets through explicit or implicit offers of money, promotion, or other benefits. They further prohibit providing funding, technology, equipment, or other material support to a person who is known or should reasonably be known to be misappropriating trade secrets.

Liability under the Provisions therefore extends not only to the departing employee, but also to the competitor that recruits them with knowledge - actual or constructive - that the employee intends to bring along confidential information. Such competitors now face direct administrative penalties, giving enforcement authorities a meaningful tool to address a practice that has long operated in a legal grey zone.

Legitimate Activities That Do Not Constitute Infringement

The Provisions also take care to delineate the boundaries of legitimate competitive activity. The following do not constitute infringement: independent development or discovery; reverse engineering of products obtained through legitimate public channels; and an employee's use, in subsequent employment, of the general skills, knowledge, and industry experience accumulated during their prior role.

3. Lower Barriers to Enforcement

Presumption of Infringement

One of the most consequential procedural changes in the Provisions is the establishment of a presumption of infringement. Where a rights holder demonstrates that the information used by the alleged infringer is substantially identical to the claimed trade secret, and that the alleged infringer had access to such trade secret, the market regulation authority may find infringement - unless the alleged infringer can prove the information was lawfully obtained or used.

This burden-shifting mechanism is a material improvement for rights holders. Previously, the obligation to affirmatively prove misappropriation - and to link it to a specific act, person, or channel - placed an often-insurmountable evidentiary burden on companies that had limited visibility into what a departing employee or a competitor had done with their information. Under the new framework, the alleged infringer must now affirmatively establish a legitimate source for the information in question.

Administrative Penalties

For violations of the Provisions, market regulation authorities at or above the county level may order the infringer to cease the unlawful act, confiscate illegal gains, and impose a fine of between RMB 100,000 and 1,000,000. For serious cases, the fine may range from RMB 1,000,000 to 5,000,000.

It should be noted that administrative enforcement under the Provisions operates alongside, and does not replace, civil litigation and criminal prosecution as available enforcement channels. Rights holders will need to make a considered decision as to the most appropriate forum - or combination of forums - depending on the nature of the misappropriation, the remedies sought, and the speed of action required.

4. Conclusion

The enactment of the Provisions marks the beginning of a new stage in the administrative protection of trade secrets in China. The boundaries of protection are clearer, enforcement tools are more robust, and the barriers to asserting rights have been materially reduced.

Companies are encouraged to review their existing confidentiality agreements, employee onboarding and offboarding procedures, IT access controls, and internal data governance policies in light of the new framework before the June 1, 2026 effective date.

Send Print Report

Latest Posts

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.
Attorney Advertising.

©
Sheppard, Mullin, Richter & Hampton LLP

Written by:

Sheppard, Mullin, Richter & Hampton LLP Contact + Follow Yuanmei Lu + Follow Zhenye Wang + Follow more less

PUBLISH YOUR CONTENT ON JD SUPRA

  • ✔ Increased readership
  • ✔ Actionable analytics
  • ✔ Ongoing writing guidance Join more than 70,000 authors publishing their insights on JD Supra

Start Publishing »

Published In:

China + Follow Corporate Counsel + Follow Enforcement Actions + Follow Government Agencies + Follow Intellectual Property Protection + Follow Misappropriation + Follow New Legislation + Follow New Regulations + Follow Regulatory Oversight + Follow Regulatory Reform + Follow Regulatory Requirements + Follow State Administration for Market Regulation (SAMR) + Follow Trade Secrets + Follow Administrative Agency + Follow Intellectual Property + Follow International Trade + Follow more less

Sheppard, Mullin, Richter & Hampton LLP on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra: Sign Up Log in ** By using the service, you signify your acceptance of JD Supra's Privacy Policy.* - hide - hide

Named provisions

Expanded Scope of Trade Secrets Clearer Rules on Infringing Conduct

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
FCC Industry Analysis
Published
June 1st, 2026
Instrument
Rule
Legal weight
Binding
Stage
Final
Change scope
Substantive
Document ID
Provisions on the Protection of Trade Secrets
Supersedes
Several Provisions on Prohibiting Infringement of Trade Secrets (1995)

Who this affects

Applies to
Technology companies Manufacturers Importers and exporters
Industry sector
3254 Pharmaceutical Manufacturing 3341 Computer & Electronics Manufacturing 3345 Medical Device Manufacturing 5112 Software & Technology
Activity scope
Trade Secret Protection Intellectual Property Management
Geographic scope
CN CN

Taxonomy

Primary area
Intellectual Property
Operational domain
Legal
Topics
International Trade Data Privacy

Get Trade & Sanctions alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when JD Supra Trade Law publishes new changes.

Free. Unsubscribe anytime.