Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Ask a CFIUS Expert: Is Crypto Spying on Us?
Hot Topics in International Trade-Braumiller Law Group-FDI Into Mexico from China
4 Key Takeaways | Solar Industry & Chinese Tariff Update
10 Key Trade Developments: Trade Remedy Cases
Episode 309 -- Alex Cotoia on Compliance with the Uyghur Forced Labor Prevention Act
10 Key Trade Developments: China
Noteworthy Points in the Rules for the Implementation of China's Patent Law 2023
JONES DAY TALKS®: Corporate Compliance in Asia: Managing Rapid Regulatory Change and Ambiguity
Hot Topics in International Trade. Braumiller Law Group Partner & Founder Adrienne Braumiller joins Vp of Marketing Bob Brewer for an Update on Forced Labor
Episode 292 -- 3M's $6.5 Million FCPA Settlement with the SEC
5 Key Takeaways | How to Effectively Leverage the Chinese Patent System
Third Party Observation in Patent Prosecution in China
The Grace Period for Novelty in Chinese Patent Law
One Month to a More Effective Compliance Program with Boards – Day 14 - Boards and Doing Business in China
Episode 276 -- Review of Phillips and Franks Int'l SEC FCPA Settlements
Sanction and the Increasing Complexity of Trade Compliance
Braumiller Law Group Help With China Imports
Coming Conflict with China: Part 5 - Good Compliance Is Good Business
JONES DAY PRESENTS®: Taiwan's Enhanced Trade Secret Restrictions and Stricter Penalties
On September 24, 2024, the State Council released the Regulations on the Management of Network Data Security (《网络数据安全管理条例》) (“Regulations”). The Regulations focus on prominent issues related to Personal Information (PI),...more
While the definition of sensitive personal information in China has always been different to other jurisdictions, with a focus on risk of harm at its heart, new draft guidance should make it easier for organisations to map...more
On 22 March 2024, the CAC published the final version of the Provisions on Promoting and Regulating Cross-Border Data Flows which took effect immediately and follows the draft published for consultation in September 2023. On...more
The Protecting Americans’ Data from Foreign Adversaries Act (PADFA or the Act) was signed into law by President Joe Biden on April 24 as part of a larger foreign aid appropriations bill. Although other portions of the...more
We are pleased to announce that several of the firm’s practice groups and attorneys were recognized in the 2024 edition of Chambers USA, a directory of leading law firms and attorneys. Chambers and Partners annually...more
The newly promulgated measures increase the threshold of data triggering security assessments and contract requirements while leaving room for Chinese authorities to heavily restrict cross-border data transfers. In...more
From long-standing laws to incoming legislation, global nonprofits must understand the requirements and prepare for scrutiny in their handling of personal data. U.S. privacy regulations are currently a complex framework of...more
Six months have now passed since China's Personal Information Protection Law (PIPL) became effective on November 1, 2021. As noted below, Chinese authorities have recently stepped up enforcement actions relative to PIPL....more
On August 20, the People’s Republic of China became the latest global economic powerhouse to pass an omnibus privacy law. Titled the Personal Information Protection Law (“PIPL”), the law was adopted by the Standing Committee...more
Based on China’s Cybersecurity Law (effective from June 1, 2017), the latest draft of Personal Information Protection Law and draft of Data Security Law, the new draft regulations would apply not only to automobile producers...more
After struggling with developing a national-level data privacy law for over a decade, the National People’s Congress of People’s Republic of China released the draft Personal Information Protection Law (Draft Law) on October...more
China’s State Administration for Market Regulation and the State Standardization Administration issued the recommended national standards named the Information Security Technology - Personal Information Security...more