Latest Publications

Share:

China Issues Draft Measures to Restrict the Overseas Transmission of Personal Data

The Cyberspace Administration of China (CAC) issued Draft Measures for public comment on April 11 on Security Assessment for Cross-border Transmission of Personal Information and Critical Data (the Draft Measures). The Draft...more

China Publishes Draft Measures Restricting Outbound Data Transfers

The current draft grants Chinese regulators broad discretion to prohibit data transfers. Key Points: ..The draft requires both the consent of the data subjects and/or the permission of the regulators for any...more

Senior MP Calls for Regulatory Crackdown on Banks’ IT Systems: 3 Things You Can do to Prepare

The recent cyberattack on Tesco Bank’s IT systems has prompted Rt Hon. Andrew Tyrie MP, Chairman of the Treasury Committee, to call on regulators to take action against vulnerable bank IT systems... ...more

China Issues Its First Network Security Law

The Standing Committee of the National People’s Congress of the People’s Republic of China (PRC) has introduced China’s first and comprehensive Network Security Law (also referred to as Cybersecurity Law). The law will have...more

China Issues Its First Network Security Law

The law will have far-reaching implications for parties that utilize the Internet and handle network data and personal information in the PRC. On November 7, 2016, the Standing Committee of the National People’s Congress...more

Prevent and Prepare for a Cybersecurity Breach

Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

Mitigating Cybersecurity Risks

Hacking of organisations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

5 Preventative Steps to Manage Legal Risk Following a Cybersecurity Breach

Preparing for and rehearsing how to respond to a breach is as important as improving security systems and protocols. Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in...more

Anonymous or Not: Court of Justice Issues Ruling on IP Addresses

On October 19, 2016, the Court of Justice of the European Union (CJEU) issued a ruling on the question of whether IP addresses constitute personal data. The ruling has direct implications on the general question of when data...more

Digital Single Market: An Overhaul for Telecoms Regulation

State of the European Union address on September 14 reveals European Commission’s next proposed steps in its Digital Single Market initiative. Jean-Claude Juncker announced the results of the European Commission’s (the...more

European Commission Adopts New EU Copyright Rules

The Commission’s proposals aim to reform EU Copyright laws as part of its package of proposals towards an EU Digital Single Market. On 14 September 2016 the European Commission (the Commission) adopted new proposals for...more

New EU Data Protection Rules Move the M&A Goalposts

After over four years of debate, the General Data Protection Regulation (GDPR) recently came into force, taking effect after a two year transition period, i.e. from 25 May 2018. The GDPR introduces a rigorous and far-reaching...more

BREXIT – What does this mean for UK Data Protection law?

As the whole world now knows, the UK voted to leave the European Union (EU) in its historic referendum on 23rd June by a vote of 51.9 percent in favour of “leave” to 48.1 in favour of “remain”. This blog focusses on how that...more

Europe Counts Down to the General Data Protection Regulation

Businesses have two years to comply with Europe’s new privacy regime. On 24 May 2016, after more than four years of debate, the General Data Protection Regulation (GDPR, or the Regulation) enters into force. The GDPR...more

What You Need to Know About the Cybersecurity Act of 2015

Legislation may change the way government and the private sector collaborate on cybersecurity. After years of vigorous debate and numerous false starts, in the closing hours of its 2015 session, the US Congress...more

Proposal of EU-US Privacy Shield Leaves Businesses in State of Uncertainty

Earlier this week, the European Commission announced that a “political” agreement has been reached on a new framework for data flows from the EU to the US. The announcement highlights a few changes from the old Safe Harbor...more

MEPs Agree to Europe’s First-Ever EU Cybersecurity Law

On December 7th, members of the European Parliament (MEPs) and the Luxembourg Presidency of the EU Council of Ministers provisionally agreed to the text of the long awaited network and information security directive also...more

Technology, Media and Telecommunications Review – UK

The establishment of the Office of Communications (Ofcom) and the entry into force of the Communications Act 2003 (Act) fundamentally altered the UK communications landscape. The Act mirrored the technological neutrality of...more

European Data Protection Authorities Grant Grace Period Until End of January 2016

The so called Article 29 Working Party met on October 15, 2015 to discuss the consequences of the Schrems Judgment of the European Court of Justice (ECJ). On October 16, 2015, the Working Party published a Statement...more

European Court of Justice: Safe Harbor Decision Is Invalid!

On October 6, the European Court of Justice ruled that Decision 2000/520 of the European Commission, which stated that Safe Harbor-certified US companies provide adequate protection for personal data transferred to them from...more

English High Court Declares UK Legislation Expanding Government Powers to Retain and Intercept Data Unlawful

The English High Court has declared that UK legislation which expanded government powers to require communication providers to retain communication traffic data is incompatible with human rights, and is unlawful. The...more

The General Counsel’s Role Before and After a Data Breach Incident

“It is often said that there are two kinds of companies out there — those that have suffered a data breach and those that will have one,” said Latham & Watkins partner Kevin Boyle. “So it makes a lot of sense to be prepared...more

5 Ways to Protect your Business from a Cyber Attack

Global cyber-attack threats stand at the highest ever recorded level, jumping 14 percent from 2012 to 2013 (Cisco 2014 Annual Security Report). Furthermore, a recent Microsoft Security Intelligence Report found that operating...more

Emergency UK Legislation Expands Government Powers to Retain and Intercept Data

On July 17th, the Data Retention and Investigatory Powers Act (“DRIP”) came into effect in the United Kingdom reinstating the Government’s powers to require communication providers to retain traffic data (also known as...more

The "Right to be Forgotten" Landmark Decision: Beyond the Headlines

While the popular press has been full of stories about the European Court of Justice’s (“ECJ”) ruling creating a “right to be forgotten” (ahead of the still pending Data Protection Regulation), we will focus on both the...more

27 Results
/
View per page
Page: of 2

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!