News & Analysis as of

China Encryption

American Conference Institute (ACI)

[Webinar] Complimentary Webinar on U.S.-China Export & Cyber Controls - June 30th, 1:00 pm - 2:00 pm EDT

With six months into the Biden Administration, American Conference Institute invites you to join one-hour Complimentary Webinar on U.S.-China Export & Cyber Controls, which will take place on June 30th at 1:00pm EDT. The...more

Lowenstein Sandler LLP

Trade Matters - Lowenstein Sandler's Global Trade & Policy Newsletter - May 2021

Lowenstein Sandler LLP on

1. BIS Eliminates Reporting Requirements for Certain Encryption Items Effective March 29, 2021, BIS eliminated or reduced reporting requirements for certain encryption items. For encryption source code and beta test...more

Pillsbury Winthrop Shaw Pittman LLP

China Publishes Import License List and Export Control List for Commercial Encryption

The Encryption Export List is the first list of controlled items after the issuance and implementation of China’s new Export Control Law. Under the previous legal regime, China imposed export licensing requirements on the...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 4, August 2020

Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more

Hogan Lovells

The grand "finale" of China's Encryption Law

Hogan Lovells on

Two years on since the first draft, the final act of the legislative passage saga of the long-awaited People's Republic of China Encryption Law ended with its promulgation on 26 October 2019. It will take effect on 1 January...more

Perkins Coie

China’s New Draft Encryption Law

Perkins Coie on

The Standing Committee of the National People’s Congress released the Encryption Law of the People’s Republic of China (Draft) for public comment on July 5, 2019 (the “2019 Draft”). The Encryption Law is being enacted to do...more

Foley Hoag LLP - Security, Privacy and the...

China's Internet Regulator Drafts COPPA-Like Rules for Children's Data Privacy

In early June, the Cyberspace Administration of China released for public comment new draft regulations applicable to the collection of personal information relating to children under 14 by online service providers. The...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

Federal regulators moved this week to “ease oversight of Wall Street firms by scaling back two major mechanisms that were imposed to scrutinize big financial companies in the wake of the financial crisis.” ...more

Hogan Lovells

TMT China Brief - Winter/Spring 2017

Hogan Lovells on

Welcome to this edition of our bi-annual TMT China Brief! This edition features a total of 15 articles which capture the significant TMT developments in Greater China in the Winter/Spring 2017. These developments cover an...more

Skadden, Arps, Slate, Meagher & Flom LLP

"Cross-Border Investigations Update - June 2016"

This issue of Skadden’s semiannual Cross-Border Investigations Update takes a look at recent cases and enforcement trends, including proposed amendments to China’s commercial bribery law, the use in U.S. courts of compelled...more

Orrick, Herrington & Sutcliffe LLP

China Passes (De) Encryption Cyber Law

On December 27, 2015, the Standing Committee of the National People's Congress, China's national legislative body, passed the Counter-Terrorism Law of China, which entered into force on January 1, 2016. Although the law's...more

Morgan Lewis

Online Payment Systems Technology in China—Trojan Horse or Forbidden Fruit?

Morgan Lewis on

Powerful new computational technology pioneered in e-commerce presents Chinese regulators with potential concerns and solutions to the perennial problem of information, pricing, and settlement capacity. Online payment...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide