News & Analysis as of

Risk Assessment Cybersecurity China

DLA Piper

China Releases AI Safety Governance Framework

DLA Piper on

On September 9, 2024, China’s National Technical Committee 260 on Cybersecurity released the first version of its AI Safety Governance Framework (the Framework), which was formulated to implement the Global AI Governance...more

Benesch

China Officially Promulgates New Cross-Border Data Transfer Requirements

Benesch on

The newly promulgated measures increase the threshold of data triggering security assessments and contract requirements while leaving room for Chinese authorities to heavily restrict cross-border data transfers. In...more

Skadden, Arps, Slate, Meagher & Flom LLP

The Informed Board - Winter 2024

The oversight obligations of boards continue to expand. Recent enforcement actions and new laws in areas such as cybersecurity, artificial intelligence and supply chains create new challenges for boards, as we explain in this...more

Levenfeld Pearlstein, LLC

The AI Legal Pulse: Legal and Tech Updates on Disruptive Technologies

The AI landscape is rapidly evolving. To help you stay abreast of the various developments, we share a recap of the latest legal and tech updates related to AI and other emerging technologies. The “Godfather” of AI resigns...more

WilmerHale

Defense Contractors Will Face Higher Risks as Spending Increases

WilmerHale on

Ongoing geopolitical developments such as Russia’s war in Ukraine and tensions between China and Taiwan have continued to fuel higher US military spending. The demand for military weapons is the strongest it has been in...more

Wiley Rein LLP

What Government Contractors Need to Know About the Fiscal Year 2022 NDAA

Wiley Rein LLP on

On December 15, 2021, Congress passed the National Defense Authorization Act (NDAA or Act) for Fiscal Year (FY) 2022, which President Biden is expected to sign into law soon. As usual, the NDAA contains numerous provisions...more

Sheppard Mullin Richter & Hampton LLP

Overview on China’s New Draft Measures for Data Cross-border Transfer

On October 29, 2021, the Cyberspace Administration of China (“CAC”) published the Security Assessment Measures of Data Cross-border Transfer (Draft for Comments) (the “New Draft Measures”) for public comments. The New...more

Pillsbury Winthrop Shaw Pittman LLP

China Adopts New Data Security Law

The new Data Security Law, together with the Cybersecurity Law (effective since June 1, 2017) and the Personal Information Protection Law (which is expected to be formally published later this year) will serve as the three...more

K&L Gates LLP

Observations on the People's Republic of China Draft Law on Personal Information Protection: A Cross-Border Perspective

K&L Gates LLP on

The full text of the Law of the People’s Republic of China on Personal Information Protection (Draft) (the Draft) was released on 21 October 2020 for public comments by 19 November 2020....more

Jones Day

China Cybersecurity Law Continues to Bring Enforcement Crackdown

Jones Day on

The Situation: In the two years since China enacted the Cybersecurity Law, which granted authorities broad powers to monitor and investigate activities falling under its purview, authorities have increasingly penalized...more

Hogan Lovells

China's first data protection measures lifting its veils

Hogan Lovells on

On 28 May 2019, the Cyberspace Administration of China (CAC) released the draft Measures on the Administration of Data Security (Data Security Measures, see our in-house English translation here) for public consultation. ...more

Skadden, Arps, Slate, Meagher & Flom LLP

UK Government Issues Report on Huawei Vulnerabilities

On March 28, 2019, the Oversight Board of the United Kingdom’s Huawei Cyber Security Evaluation Centre (HCSEC) released a report identifying “serious and systematic defects in Huawei’s software engineering and cyber security...more

Morgan Lewis

China Issues New Rules Strengthening Local Authorities’ Power to Enforce Cybersecurity and Data Privacy Laws

Morgan Lewis on

The Chinese Ministry of Public Security (MPS) on September 15, 2018, released the Provisions for the Supervision and Inspection of Network Security by Public Security Agencies, also known as “Circular 151.” This new...more

Opportune LLP

Power Plants: Cybersecurity Threats and Risks (Part 1)

Opportune LLP on

This is the first installment of a two-part series exploring how critical infrastructure like power plants are proactive in implementing protective measures to safeguard against future cyber attacks, but challenges remain....more

Dechert LLP

China Cybersecurity Law: Seven Key Points to Ensure You are Compliance Ready for its Launch on 1 June 2017

Dechert LLP on

China’s Cybersecurity Law comes into force on 1 June 2017. It is a significant piece of legislation impacting all companies operating a network in China. It covers a wide range of activities relating to the cyberspace,...more

Skadden, Arps, Slate, Meagher & Flom LLP

"Cybersecurity Trends for Boards of Directors"

Cybersecurity has in recent years become an integral component of a board’s role in risk oversight, but directors often find themselves in unfamiliar territory when it comes to formulating policies and oversight processes...more

Hogan Lovells

China moves to implement security review of network products and services: but leaves foreign investor and manufacturer concerns...

Hogan Lovells on

On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

The Volkov Law Group

The Storm Has Arrived: Cybersecurity, Risks And Response

The Volkov Law Group on

Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide