Mondaq All Regions - China: Technology
Foley Hoag LLP
As noted recently in the Wall Street Journal, "New cybersecurity rules will give Chinese authorities sweeping powers to inspect companies' information technology and access proprietary information
Reed Smith (Worldwide)
Following China's Cybersecurity Law, which came into effect on June 1, 2017 and requires the implementation of a multi-level protection scheme for cybersecurity (article 21), China's Ministry of Public Security issued ...
EY Chen & Co
With only a few months left before the enforcement of the Cybersecurity Law (CSL) on 1 June 2017, questions are multiplying on the effective scope of the CSL, on its content and on the various effects ...
EY Chen & Co
As the date of the enforcement of the Cybersecurity Law (CSL), 1 June 2017, is getting closer, we will continue our analysis to support companies in their compliance and understanding of the law.
EY Chen & Co
As the Cybersecurity Law (CSL) became effective as of 1 June 2017, the question of the definition and delimitation of personal information rose once again.
HFG Law & Intellectual Property
On June 1st, 2017 the Cyber Security Law of the People's Republic of China ("CSL"), has finally came into force.
EY Chen & Co
Though ransomware made worldwide headlines twice this year through the Wannacry worm and the Petya/NotPetya attack, most companies are still hesitant on the proper steps to take following a ransomware attack.
Llinks Law Offices
On 30 June 2016, Asset Management Association of China released the FAQs Regarding Registration and Record-Filing of Private Funds (No. 10) under the permission of China Securities Regulatory Commission.
McDermott Will & Emery
China's new data protection framework clearly creates a requirement for local storage and conducting a security assessment before personal information or important data is shared with other jurisdictions ...
CMS Cameron McKenna Nabarro Olswang LLP
It has been more than three months since thePRC Cyber Security Law ("CSL") has taken effect on 1 June 2017.
Fangda Partners
This briefing examines how blockchain technology and its applications may present competition law risks that need to be properly assessed and addressed.
Zhong Lun Law Firm
On July 11, 2017, the Cyberspace Administration of China ("CAC") released the Regulations for the Protection of Critical Information Infrastructure Security (Exposure Draft)...
Jun He Law Office
The National Information Security Standardization Technical Committee ("TC 260") released a second draft of the Information Security Technology-Guidelines for Cross-Border Data Transfer Security Assessment...
Hogan Lovells International LLP
On 4 September 2017, the People's Bank of China ("PBOC") and six other government agencies issued the Statement on Preventing the Risks of Fund Raising through Initial Coin Offerings...
Jones Day
On August 30, the National Information Security Standardization Technical Committee released three draft voluntary guidelines relating to the implementation of Cybersecurity Law:
Clyde & Co
New regulations on data transfer and security clearances
Jones Day
Even before its enactment on June 1, 2017, the Cybersecurity Law of the People's Republic of China ("Cybersecurity Law") sparked outcry from the international community.
Gowling WLG
Despite coming into force on 1 June 2017, China's new Cybersecurity Law (the "Law" or the "Cybersecurity Law") continues to present many unanswered questions.
Pinsent Masons LLP
Virtual currency exchanges in China have been told to close down their operations, according to a news publisher that reports on the industry.
Sheppard Mullin Richter & Hampton
China has put a halt to Initial Coin Offerings (ICOs) in China. In a recent notice, China declared ICOs to be an illegal fund raising tool and indicated it is reviewing previous ICOs for possible fraudulent practices.
Latest Video
Most Popular Recent Articles
Reed Smith (Worldwide)
Following China's Cybersecurity Law, which came into effect on June 1, 2017 and requires the implementation of a multi-level protection scheme for cybersecurity (article 21), China's Ministry of Public Security issued ...
Jun He Law Office
The National Information Security Standardization Technical Committee ("TC 260") released a second draft of the Information Security Technology-Guidelines for Cross-Border Data Transfer Security Assessment...
EY Chen & Co
As the Cybersecurity Law (CSL) became effective as of 1 June 2017, the question of the definition and delimitation of personal information rose once again.
Fangda Partners
This briefing examines how blockchain technology and its applications may present competition law risks that need to be properly assessed and addressed.
HFG Law & Intellectual Property
On June 1st, 2017 the Cyber Security Law of the People's Republic of China ("CSL"), has finally came into force.
Llinks Law Offices
On 30 June 2016, Asset Management Association of China released the FAQs Regarding Registration and Record-Filing of Private Funds (No. 10) under the permission of China Securities Regulatory Commission.
EY Chen & Co
As the date of the enforcement of the Cybersecurity Law (CSL), 1 June 2017, is getting closer, we will continue our analysis to support companies in their compliance and understanding of the law.
McDermott Will & Emery
China's new data protection framework clearly creates a requirement for local storage and conducting a security assessment before personal information or important data is shared with other jurisdictions ...
Jones Day
Even before its enactment on June 1, 2017, the Cybersecurity Law of the People's Republic of China ("Cybersecurity Law") sparked outcry from the international community.
EY Chen & Co
With only a few months left before the enforcement of the Cybersecurity Law (CSL) on 1 June 2017, questions are multiplying on the effective scope of the CSL, on its content and on the various effects ...
Clyde & Co
New regulations on data transfer and security clearances
EY Chen & Co
Though ransomware made worldwide headlines twice this year through the Wannacry worm and the Petya/NotPetya attack, most companies are still hesitant on the proper steps to take following a ransomware attack.
Article Search Using Filters
Related Topics
Popular Authors
Up-coming Events Search
Tools
Font Size:
Translation
Channels
Mondaq on Twitter