Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Ask a CFIUS Expert: Is Crypto Spying on Us?
Hot Topics in International Trade-Braumiller Law Group-FDI Into Mexico from China
4 Key Takeaways | Solar Industry & Chinese Tariff Update
10 Key Trade Developments: Trade Remedy Cases
Episode 309 -- Alex Cotoia on Compliance with the Uyghur Forced Labor Prevention Act
10 Key Trade Developments: China
Noteworthy Points in the Rules for the Implementation of China's Patent Law 2023
JONES DAY TALKS®: Corporate Compliance in Asia: Managing Rapid Regulatory Change and Ambiguity
Hot Topics in International Trade. Braumiller Law Group Partner & Founder Adrienne Braumiller joins Vp of Marketing Bob Brewer for an Update on Forced Labor
Episode 292 -- 3M's $6.5 Million FCPA Settlement with the SEC
5 Key Takeaways | How to Effectively Leverage the Chinese Patent System
Third Party Observation in Patent Prosecution in China
The Grace Period for Novelty in Chinese Patent Law
One Month to a More Effective Compliance Program with Boards – Day 14 - Boards and Doing Business in China
Episode 276 -- Review of Phillips and Franks Int'l SEC FCPA Settlements
Sanction and the Increasing Complexity of Trade Compliance
Braumiller Law Group Help With China Imports
Coming Conflict with China: Part 5 - Good Compliance Is Good Business
JONES DAY PRESENTS®: Taiwan's Enhanced Trade Secret Restrictions and Stricter Penalties
In this Essential Guide, part of Orrick’s Cybersecurity & Privacy Compass Series, we offer insights into the Cyberspace Administration of China's (CAC) new rules and requirements for cross-border data transfers. The...more
On March 22, 2024, the Cybersecurity Administration of China (CAC), issued the long-awaited new Regulations on Promoting and Regulating Cross-Border Data Flows (the New Regulations) for compliance with China's Personal...more
In Part I of our alert about China’s new safe harbor rules, we discussed key developments between the draft Provisions on Regulating and Facilitating Cross-Border Data Flow (Chinese version only) and the Provisions on...more
Six months after the release of the draft Provisions on Regulating and Facilitating Cross-Border Data Flow, the Cyberspace Administration of China (CAC) officially released the long-awaited finalized Provisions on...more
On March 22, 2024, nearly six months after the release of the “draft Provisions on Regulating and Promoting Cross-border Data Transfer” (the “Draft Rules”), the Cybersecurity Administration of China (the “CAC”) formally...more
Six months after the Cyberspace Administration of China (the CAC) sought public consultation on the draft Provisions on Regulating and Facilitating Cross-Border Data Flow (the Draft Provisions, Chinese version only), the...more
Cross-border transfer of evidence in litigation or arbitration proceedings is no longer innocuous in today’s world, with countries frequently at odds with each other over data security regulations. This was unexpected a...more
In September 2022, the Cyberspace Administration of China (the “CAC”) officially enacted the Measures on Security Assessment for the Cross-border Transfer of Data (the “Measures”). Under the Measures, an entity (the “data...more
On September 28, 2023, the Cyberspace Administration of China (CAC) published the draft Provisions on Regulating and Promoting Cross-Border Data Transfers (Draft Provisions). If adopted into law in their current form, the...more
China's Cybersecurity Law ("CSL"), Personal Information Protection Law ("PIPL") and Data Security Law ("DSL") set a series of rules and requirements for the cross-border transfer of personal information located in China....more
In recent years, alongside the rapid development of the digital economy and the concomitant increase in data generation, collection, processing and monitoring in the People’s Republic of China (PRC or China), the Chinese...more
The Personal Information Protection (PIP) Law of the People’s Republic of China (PRC) provides three legal mechanisms for a personal information processor (data controller) in the mainland PRC to transfer personal information...more
The new guidelines provide insight into how businesses can submit applications to the CAC in order to obtain approval via the CAC security assessment cross-border data transfer requirement. As of September 2022, all...more
The much-anticipated Security Assessment Measures for Outbound Data Transfers (hereinafter referred to as "the Measures") of China has already come into effect on September 1, 2022, and on the eve of the effective date, the...more
On July 7, 2022, the Cyberspace Administration of China (“CAC”) released the Security Assessment Measures of Cross-border Data Transfer ( the “Measures”) which will be effective from September 1, 2022. Previously on October...more
China’s Cybersecurity Law (the “Cybersecurity Law”) took effect on June 1, 2017. The Cybersecurity Law consists of 79 articles in total. According to Article 2 thereof, the Cybersecurity Law would apply to the construction,...more
On Oct. 29, 2021, the Cyberspace Administration of China (CAC) published the “Draft Measures on Security Assessment of Cross-Border Data Transfer” (Draft Measures) for comment through Nov. 28. The Draft Measures follow and...more
The Cyberspace Administration of China (“CAC”) on October 29, 2021 published the draft Measures on Security Assessment of Cross-Border Data Transfer (“Draft Measures”) for comment through November 28, 2021. The Draft Measures...more
As data continues to span across the four corners of the globe, lawmakers worldwide strive to keep up the pace with regulations. The European Union has the General Data Protection Regulation (GDPR), which provides...more
2018 saw two new members of APEC’s Cross Border Privacy Rules (CBPR) system: Australia and Chinese Taipei. They join the US, Mexico, Canada, Japan, South Korea and Singapore...more
The draft legislation provides further guidance on the regulations provided in the recent cybersecurity law, including definitions and details on the security assessments required for cross-border data transfers....more