General Business International Trade Privacy

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

International Hacking and Insider Trading Scheme Exposes Cybersecurity Vulnerabilities at Third-Party Vendors

On August 11, 2015, the SEC announced that it was bringing fraud charges against 32 defendants for their alleged participation in a five-year, international hacking and insider trading scheme. According to the SEC, two...more

Enforcement of South Africa’s stringent Data Protection Law on the way

South Africa’s Protection of Personal Information Act 4 of 2013 (POPI) became an Act of Parliament in 2013 and imposes strict requirements on companies for protecting and processing personal information. Yet, full...more

Guide To Doing Business in New Zealand: Employment Laws (Updated)

EMPLOYMENT LAWS - TERMS AND CONDITIONS OF EMPLOYMENT - Terms and conditions of work performed by employees in New Zealand are governed by: • Legislation governing employment terms and working conditions,...more

China Adopts the New National Security Law - a Top Legislative Effort to Control Cybersecurity

On 1 July 2015, the Standing Committee of the National People's Congress, China's top legislature, approved the new National Security Law of the People's Republic of China, the "New Law") which became effective on the same...more

Progress on Data Protection in the European Union

We may see the final text of the proposed EU General Data Protection Regulation by the end of 2015. In mid-June, the Council of the European Union set forth an agreed general approach to the proposed EU General Data...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

The EU’s S-L-O-W March Towards a Uniform Data Protection Regime

The European Union (EU), comprised of 28 member states, currently has a patchwork of privacy and data protection laws, based on the EU’s 1995 Data Protection Directive. This mix of laws has led to inconsistent data...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

EU Council Agrees Draft Data Protection Regulation

On 15 June 2015 the EU Council of Ministers (Council) reached a General Approach to the long-awaited draft Data Protection Regulation (DPR), bringing Europe one step closer to a single, harmonised set of data protection rules...more

One step closer to European privacy regulation? Five unsettled issues

EU Justice and Home Affairs ministers this week reached a general approach on the General Data Protection Regulation at their Council meeting. This means that, more than three years after the Commission’s initial...more

Never Tick Off a Redbird

At a Press Conference today, Satan officially announced that Hell has frozen over. He made this stunning announcement after the New York Times (NYT) reported that the baseball team with the most World Series wins in the...more

Law à la Mode: Co-branding of wearable technologies; Internet of Things and the retail sector; 3D printing and more - Edition 16

The United States editorial team is delighted to bring you the sixteenth edition of Law à la Mode, the quarterly legal magazine produced by DLA Piper's Fashion, Retail and Design Group. In April 2014, we published an...more

Encryption and the Consequences of Public Policy

In a world where the development of technology moves quickly and governments tend to move slowly, it is common for public policy to become out of sync with the realities of the market. In many cases, this proves to be a...more

Outsourcing by Canadian Companies after the USA PATRIOT Act

Wondering about outsourcing your data to the U.S.? What follows is an update to one of our most popular posts: Outsourcing by Canadian Companies: Another Look at the USA PATRIOT Act, originally written in January 2013....more

US Department of Commerce proposes licensing requirements for export and transfer of cybersecurity items

In December 2013, the Wassenaar Arrangement - a group of 41 countries including the United States - agreed to add so-called cybersecurity items to its list of controlled dual-use items. On May 20, 2015, the Department of...more

The Canadian Retail Report

Our Canadian Retail Report provides you with practical content to keep you current on developments that affect retailers in Canada. In this issue, Timothy M. Banks, the Canadian lead for our Privacy and Security practice,...more

Senn on 10 Best Practices in a Cross-Border Investigation – Part II

Today I conclude a two-part series on how to formulate an effective best practices cross-border investigation based upon an interview I did with Mara Senn, a partner at Arnold & Porter LLP, who specializes in white collar...more

Senn on 10 Best Practices in a Cross-Border Investigation – Part I

Today we celebrate a closure for it was on this day in 1935 that probably the best-known baseball player in the history of the game, George Herman ‘Babe’ Ruth, retired. While many of his records were broken with the march of...more

“Forewarned Is Forearmed” – The Rise of Chinese Data-Flow Restrictions

Manufacturers with operations, employees, and/or customers in China must be aware of a long list of China-specific data-flow and content restrictions. Data-flow restrictions in particular affect manufacturers employing or...more

BIS Proposes Broad New Licensing Requirements for Exports Involving Cybersecurity Technology

In December 2013, members of the Wassenaar Arrangement, a group of 41 countries, which includes the United States, agreed to broaden its list of dual-use controls to include certain cybersecurity items. The new items added to...more

FTC Actions Highlight Pitfalls for Failing to Comply with the International Safe Harbor Privacy Frameworks

The Federal Trade Commission recently agreed to settle claims against two companies alleging that the companies were not abiding by the U.S.-EU Safe Harbor international privacy framework. While the U.S.-EU Safe Harbor...more

First IoT Legal and Business Framework Webinar: Summary of Conclusions!

Thank you all for attending our webinar on the “Internet of Things Legal and Business Framework”. For those who could not attend, the main conclusions are summarized below...more

Dawn raids under scrutiny again by European Human Rights Court

ECtHR rules that French dawn raids in Vinci/GTM case breached fundamental rights - The European Court of Human Rights (the “ECtHR”) has ruled in the Vinci case that the circumstances surrounding the electronic removal of...more

New US sanctions program to combat cybercrimes: 3 action steps for tech companies

The new sanctions in President Barack Obama’s Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities,” target individuals and...more

FTC Scrutinizes Two Companies For Falsely Reporting Compliance With E.U. Safe Harbor In Privacy Policies

On April 7, 2015, the Federal Trade Commission (“FTC”) announced that two companies have agreed to settle claims that the companies failed to update their privacy policies to reflect lapsed compliance with the U.S.-E.U. and...more

287 Results
|
View per page
Page: of 12

Follow General Business Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×