Cybersecurity China

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Privacy Monday – May 18, 2015

It’s Monday morning — do you know your privacy/security status? Here are a few bits and bytes to start your week. SEC to Registered Investment Advisers and Broker-Dealers: It’s Your Turn to Pay Attention to...more

Why the Health Care Industry Needs to Focus on Data-Flow Restrictions in China

U.S. health care providers, device manufacturers, lab managers, health information technology and telemedicine/telehealth project investors, and other industry members involved in projects in China, need to be aware of a long...more

China Appears To Delay Implementation Of New IT Security Measures In Banking Sector In Response To US, Canadian, EU, Japanese...

In response to concerns raised by the governments of the United States, Canada, the European Union and Japan - bilaterally and at the World Trade Organization (WTO) - the Chinese government appears to have placed...more

China’s New Cybersecurity Policies: Is the Price of Compliance Worth the Risk of Disclosure?

Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year. ...more

Are China’s New Data and Cybersecurity Regulations a Wolf in Sheep’s Clothing?

As the Year of the Sheep gets underway, it is already apparent that the Chinese government will not be living up to the meek reputation of its zodiac representative—at least not as far as data and cybersecurity are concerned....more

How Recent Data Breaches are Changing the Face of Cybersecurity for the Private Sector

If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber attack; and, while data breaches are not a new concept, the way the private...more

2015 Hot Topics for Multinational Companies

As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues...more

Privacy and Data Protection: 2014 Year in Review

In 2014, regulators around the globe issued guidelines, legislation and penalties in an effort to enhance security and control within the ever-shifting field of privacy and data protection. The Federal Trade Commission...more

Intellectual Property and Technology News (Asia)

Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more

News from the Health Law Gurus™

Chinese Hackers Infiltrate Health System Network Affecting 4.5 Million Individuals – Community Health Systems, Inc. (“CHS”) reported this week that the information of approximately 4.5 million individuals has been affected by...more

FBI Warning to Health Care Sector Holds True

In April of this year, the FBI issued a Private Industry Notification (PIN) to the health care industry warning of the “likely increase [in] cyber intrusions against health care systems.” In the same month, and into June of...more

China Update - June 2014 #2

In This Issue: - Quote of the Week - U.S.-China Relations - China News - Energy & Environment and Trade - Excerpt from U.S.-China Relations: 6th Round of the US-China Strategic and...more

Data Security Compliance and APTs: New Insights from "Putter Panda"

On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

Cyber Espionage And Insurance Coverage

In the United States alone, it is estimated that the cost of “[c]yber-espionage and other malicious cyber crimes...[i s] between $24 billion and $120 billion annually.” In 2008, the U.S. Department of Defense’s classified...more

Trade Secrets Watch 2013 Year-In-Review

It’s been a hot year in the trade secrets field, with some huge verdicts and settlements, a renewed spotlight on cyberattacks, and an unusual flurry of trade secrets legislation. Trade Secrets Watch’s 2013 Year-in-Review...more

Technology & Sourcing News - August 2013

Is gambling law about to liberalise in the Czech Republic? - Foreign entrepreneurs may benefit from the Czech Government's approval of new gambling regulations needed to comply with EU requirements. Data Centre Risk...more

Mofo Tech -- Spring/Summer 2013

In This Issue: - Here Come the Feds -- What President Obama’s second term means for the tech industry - Log In: ...Feds cast an eye on social media - Focus: ...3-D’s IP dimension -...more

The Real Lesson of Chinese Cyberhacking

There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more

Protecting Personal Data in China

This advisory is one of a series prepared by Pillsbury's China Practice on questions frequently asked by our clients doing business in China. In June 2012, we published an advisory on personal data protection in China in...more

Obama Administration Solicits Public Help in Preventing Foreign Trade Secret Theft

On Tuesday, the U.S. Intellectual Property Enforcement Coordinator, Victoria Espinel, published a notice in the Federal Register "requesting any recommendations for legislative changes that would enhance enforcement against,...more

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

Financial Services Report - Spring 2013

Editor’s Note - This is a dignified law firm newsletter, not like the “Brand X” versions. You won’t find pandering, attention-grabbing stories about Justin Bieber, Kim Kardashian, Ashton Kutcher, Prince William, or...more

How to Protect Your Company From Hackers [Video]

March 8 (Bloomberg Law) -- With reports of corporate espionage and hacking on the rise, the US government and private companies need to take steps to prevent the loss of trade secrets and threats to national security says...more

30 Results
|
View per page
Page: of 2

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×