Ask a CFIUS Expert: Is Crypto Spying on Us?
Hot Topics in International Trade-Braumiller Law Group-FDI Into Mexico from China
4 Key Takeaways | Solar Industry & Chinese Tariff Update
10 Key Trade Developments: Trade Remedy Cases
Episode 309 -- Alex Cotoia on Compliance with the Uyghur Forced Labor Prevention Act
10 Key Trade Developments: China
Noteworthy Points in the Rules for the Implementation of China's Patent Law 2023
JONES DAY TALKS®: Corporate Compliance in Asia: Managing Rapid Regulatory Change and Ambiguity
Hot Topics in International Trade. Braumiller Law Group Partner & Founder Adrienne Braumiller joins Vp of Marketing Bob Brewer for an Update on Forced Labor
Episode 292 -- 3M's $6.5 Million FCPA Settlement with the SEC
5 Key Takeaways | How to Effectively Leverage the Chinese Patent System
Third Party Observation in Patent Prosecution in China
The Grace Period for Novelty in Chinese Patent Law
One Month to a More Effective Compliance Program with Boards – Day 14 - Boards and Doing Business in China
Episode 276 -- Review of Phillips and Franks Int'l SEC FCPA Settlements
Sanction and the Increasing Complexity of Trade Compliance
Braumiller Law Group Help With China Imports
Coming Conflict with China: Part 5 - Good Compliance Is Good Business
JONES DAY PRESENTS®: Taiwan's Enhanced Trade Secret Restrictions and Stricter Penalties
JONES DAY PRESENTS: The Challenges of Defending Trade Secrets in China
On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more
This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more
For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more
No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more