China Cybersecurity

News & Analysis as of

China Adopts the New National Security Law - a Top Legislative Effort to Control Cybersecurity

On 1 July 2015, the Standing Committee of the National People's Congress, China's top legislature, approved the new National Security Law of the People's Republic of China, the "New Law") which became effective on the same...more

Federal Employees’ Personal Information Compromised by Data Breach

In recent headlines, the Office of Personnel Management (“OPM”) has begun notifying millions of federal employees that it may have lost their personal information earlier this month in a data breach. The data breach...more

The War Against Cyber Threats: President Obama Ups the Ante

Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more

Focus on China Compliance - June 2015

In This Issue: - Increased Scrutiny by Chinese Securities Regulators Will Have Global Implications - Effective Employee Suspension Agreements to Facilitate Compliance Investigations - Protecting Against...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Update Regarding Office of Personnel Management Cyber Attack

More details continue to emerge about the cyber attack and data breach disclosed last week of the U.S. federal government’s Office of Personnel Management (OPM), and those details continue to get worse. While original reports...more

Privacy Monday – May 18, 2015

It’s Monday morning — do you know your privacy/security status? Here are a few bits and bytes to start your week. SEC to Registered Investment Advisers and Broker-Dealers: It’s Your Turn to Pay Attention to...more

Why the Health Care Industry Needs to Focus on Data-Flow Restrictions in China

U.S. health care providers, device manufacturers, lab managers, health information technology and telemedicine/telehealth project investors, and other industry members involved in projects in China, need to be aware of a long...more

China Appears To Delay Implementation Of New IT Security Measures In Banking Sector In Response To US, Canadian, EU, Japanese...

In response to concerns raised by the governments of the United States, Canada, the European Union and Japan - bilaterally and at the World Trade Organization (WTO) - the Chinese government appears to have placed...more

China’s New Cybersecurity Policies: Is the Price of Compliance Worth the Risk of Disclosure?

Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year. ...more

Are China’s New Data and Cybersecurity Regulations a Wolf in Sheep’s Clothing?

As the Year of the Sheep gets underway, it is already apparent that the Chinese government will not be living up to the meek reputation of its zodiac representative—at least not as far as data and cybersecurity are concerned....more

How Recent Data Breaches are Changing the Face of Cybersecurity for the Private Sector

If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber attack; and, while data breaches are not a new concept, the way the private...more

2015 Hot Topics for Multinational Companies

As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues...more

Privacy and Data Protection: 2014 Year in Review

In 2014, regulators around the globe issued guidelines, legislation and penalties in an effort to enhance security and control within the ever-shifting field of privacy and data protection. The Federal Trade Commission...more

Intellectual Property and Technology News (Asia)

Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more

News from the Health Law Gurus™

Chinese Hackers Infiltrate Health System Network Affecting 4.5 Million Individuals – Community Health Systems, Inc. (“CHS”) reported this week that the information of approximately 4.5 million individuals has been affected by...more

FBI Warning to Health Care Sector Holds True

In April of this year, the FBI issued a Private Industry Notification (PIN) to the health care industry warning of the “likely increase [in] cyber intrusions against health care systems.” In the same month, and into June of...more

China Update - June 2014 #2

In This Issue: - Quote of the Week - U.S.-China Relations - China News - Energy & Environment and Trade - Excerpt from U.S.-China Relations: 6th Round of the US-China Strategic and...more

Data Security Compliance and APTs: New Insights from "Putter Panda"

On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

Cyber Espionage And Insurance Coverage

In the United States alone, it is estimated that the cost of “[c]yber-espionage and other malicious cyber crimes...[i s] between $24 billion and $120 billion annually.” In 2008, the U.S. Department of Defense’s classified...more

Trade Secrets Watch 2013 Year-In-Review

It’s been a hot year in the trade secrets field, with some huge verdicts and settlements, a renewed spotlight on cyberattacks, and an unusual flurry of trade secrets legislation. Trade Secrets Watch’s 2013 Year-in-Review...more

Technology & Sourcing News - August 2013

Is gambling law about to liberalise in the Czech Republic? - Foreign entrepreneurs may benefit from the Czech Government's approval of new gambling regulations needed to comply with EU requirements. Data Centre Risk...more

Mofo Tech -- Spring/Summer 2013

In This Issue: - Here Come the Feds -- What President Obama’s second term means for the tech industry - Log In: ...Feds cast an eye on social media - Focus: ...3-D’s IP dimension -...more

36 Results
|
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×