Do I need permission to use images from Google on my website?
Stealth Lawyer: Chieh Huang, Social Games Developer
Bill on Bankruptcy: Why is Kodak's Stock Soaring?
Smolinsky Sees Similarities Between Reader's Digest, Kodak
Digital Health: Where is the Action for Entrepreneurs?
Stealth Lawyer: Scott Jordan, Co-Founder of Scottevest
Top 3 Concerns in Data Security
Vague Definitions in CISPA Raise Concerns of SOPA 2.0
In This Issue:
- Quote of the Week
- U.S.-China Relations
- Excerpt from U.S.-CHINA RELATIONS: Presidential Advisor Susan Rice Meets with Senior Chinese Official -
On February 25, China’s...more
Our September 16, 2014 client alert, “Brave New World? Recent Challenges Facing Foreign IT Companies in China,” discussed efforts by the Chinese government to enforce heightened network security standards, with a particular...more
If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber attack; and, while data breaches are not a new concept, the way the private...more
On September 1, 2014, China’s Ministry of Industry and Information Technology (MIIT) issued the Guiding Opinions on Strengthening Network Security in the Telecommunications and Internet Sectors (the “Opinions”). Issuance of...more
In 2004, the Chinese Communist Party announced a new national goal of building a “Harmonious Society.” Since then, this goal has often been cited by the Chinese government as a reason for Internet censorship. In Mandarin,...more
On Jan. 26, 2014, the Chinese State Administration for Industry and Commerce (“SAIC”) promulgated the Regulatory Measures for Internet Transactions (the “New Measures”). The New Measures, which took effect on March 15, 2014,...more
“Virtual currencies”, and bitcoin in particular, have recently received much attention from law enforcement agencies, the business community, the financial sector and government authorities, all of which are trying to...more
As many of our readers are aware, the “variable interest entity” (“VIE”) structure has proven popular over the past decade as a means to facilitate the offshore financing of PRC companies doing business in regulated sectors...more
The Chinese Ministry of Industry and Information Technology (“MIIT”) issued a draft new Catalogue of Telecommunications Services 2013); the “Draft Catalogue”) for public comment on May 23, 2013.
While the proposed...more
Competition and Innovation: Application of European Competition Law to a Rival’s Demand for Access to a Competitor’s Data -
The Internet has given rise to information-based businesses that create value by accumulating...more
China is the world’s second largest economy, with an annual growth rate of more than eight percent and a rapidly growing middle class. Foreign investment into China routinely exceeds US$100 billion a year. Businesses from all...more
Anyone trying to stop Chinese counterfeiters learns almost immediately that most of the information that would ordinarily identify China-based owners of a URL or website is false. That makes it costly or impossible to...more
On Dec. 28, 2012, the Standing Committee of China’s National People’s Congress enacted a 12-article Decision on Strengthening Online Information Protection (the “Decision”), without public consultation and after just one...more
China’s top legislature, the Standing Committee of the National People’s Congress, closed out 2012 with the approval of rules to enhance the protection of online personal information....more
Back to Top