Cybersecurity China

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

Privacy & Cybersecurity Update - September 2015

Adviser to European Court of Justice Says US-EU Safe Harbor Should Be Declared Invalid - An advisory opinion issued by the advocate general to the European Court of Justice states that the U.S.-EU Safe Harbor should be...more

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

US-China Cyber Deal Big on Promises, Short on Action

In the aftermath of recent cyberattacks attributed to China’s government and citizens, many observers prepared for a rather uncomfortable state visit by Chinese President Xi Jinping last week. Then, as President Xi began his...more

SEC Penalizes Investment Adviser over Inadequate Cyber-Risk Program Prior to Data Breach

On September 22, the SEC ordered a Missouri-based investment adviser to pay a $75,000 penalty, settling allegations that the investment adviser failed to implement required written cybersecurity policies and procedures prior...more

China-U.S. Agreement on Cyber-Theft for Commercial Gain

Chinese President Xi Jinping’s visit to Washington D.C. led to a very significant agreement on cybersecurity, as reflected by The White House fact sheet released Friday (excerpted below). The agreement addresses a core U.S....more

Investment Adviser Settles SEC Charges After Data Breach

Last week, the Securities and Exchange Commission (SEC) settled charges against a registered investment adviser for failing to comply with Rule 30(a) of Regulation S-P (17 C.F.R. § 248.30(a)) (“Safeguards Rule”). The...more

China Promulgates Tougher Criminal Provisions Governing Data Privacy

One of the more dramatic privacy law developments in China in 2014 was the August criminal conviction of foreign nationals Peter Humphrey and Yu Yingzeng for their violation of Article 253 of the Criminal Law (??) associated...more

Online Payment Systems Technology in China—Trojan Horse or Forbidden Fruit?

Powerful new computational technology pioneered in e-commerce presents Chinese regulators with potential concerns and solutions to the perennial problem of information, pricing, and settlement capacity. Online payment...more

U.S. Considers Sanctions Against China For Cyber Hacking And Trade Secret Misappropriation

You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more

U.S. Business Groups Urge Obama Administration To Address Chinese Cybersecurity Rules

On August 11, 2015, a group of 19 U.S. business groups, including the U.S. Chamber of Commerce and the US-China Business Council, sent a letter to President Barack Obama urging him to push China to change its cybersecurity...more

China’s Draft Cybersecurity Law – A New Regime for Network Security

China’s current leadership has attached significant attention to network security, which is deemed to be a core aspect of national security. In early 2014, China’s President, Xi Jinping, who is also the head of the Office for...more

United Airlines suffers network breach–same hackers as OPM suspected—dark motives

United Airlines has confirmed that it has suffered a data and network breach which occurred during the same time frame as the OPM breach. Investigators suspect the same Chinese state-sponsored hackers are responsible for both...more

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

China Proposes Draft Privacy Legislation with Significant Potential Implications

On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

China Adopts the New National Security Law - a Top Legislative Effort to Control Cybersecurity

On 1 July 2015, the Standing Committee of the National People's Congress, China's top legislature, approved the new National Security Law of the People's Republic of China, the "New Law") which became effective on the same...more

Federal Employees’ Personal Information Compromised by Data Breach

In recent headlines, the Office of Personnel Management (“OPM”) has begun notifying millions of federal employees that it may have lost their personal information earlier this month in a data breach. The data breach...more

The War Against Cyber Threats: President Obama Ups the Ante

Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more

Focus on China Compliance - June 2015

In This Issue: - Increased Scrutiny by Chinese Securities Regulators Will Have Global Implications - Effective Employee Suspension Agreements to Facilitate Compliance Investigations - Protecting Against...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Update Regarding Office of Personnel Management Cyber Attack

More details continue to emerge about the cyber attack and data breach disclosed last week of the U.S. federal government’s Office of Personnel Management (OPM), and those details continue to get worse. While original reports...more

Privacy Monday – May 18, 2015

It’s Monday morning — do you know your privacy/security status? Here are a few bits and bytes to start your week. SEC to Registered Investment Advisers and Broker-Dealers: It’s Your Turn to Pay Attention to...more

Why the Health Care Industry Needs to Focus on Data-Flow Restrictions in China

U.S. health care providers, device manufacturers, lab managers, health information technology and telemedicine/telehealth project investors, and other industry members involved in projects in China, need to be aware of a long...more

China Appears To Delay Implementation Of New IT Security Measures In Banking Sector In Response To US, Canadian, EU, Japanese...

In response to concerns raised by the governments of the United States, Canada, the European Union and Japan - bilaterally and at the World Trade Organization (WTO) - the Chinese government appears to have placed...more

52 Results
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.