Latest Posts › Data Security

Share:

Safe Harbors Part II - China's Safe Harbor Rules Lower the Barrier for Cross-Border Data Transfer

In Part I of our alert about China’s new safe harbor rules, we discussed key developments between the draft Provisions on Regulating and Facilitating Cross-Border Data Flow (Chinese version only) and the Provisions on...more

Safe Harbors Part I – From Regulating to Facilitating: Key Developments in China's Safe Harbor Rules

Six months after the Cyberspace Administration of China (the CAC) sought public consultation on the draft Provisions on Regulating and Facilitating Cross-Border Data Flow (the Draft Provisions, Chinese version only), the...more

An Endeavor to Facilitate Free Movement of Data From China

China is seeking to take a significant step to relax the compliance burden on multinational corporations (MNCs) regarding data export from China by allowing: (i) certain routine data exports for daily business operation or...more

China Standard Contract That Impacts Transferring Personal Information From China

On 1 June 2023, new measures explaining the requirements for using the standard contract (China Standard Contract) mechanism to legally export personal information from China as well as the form of the “standard contract”...more

The CAC Assessment Collection – Part 3: Steps and Timeline of a CAC Assessment

In our previous posts, we discussed what data export activities are subject to scrutiny assessment (CAC Assessment) conducted by the Cyberspace Administration of China (CAC) (see Part 1) and examined what companies must do...more

The CAC Assessment Collection – Part 2: What Must Be Done Before Applying for a CAC Assessment?

In a recent alert, we painted the big picture of the security assessment conducted by the Cyberspace Administration of China (CAC) to data exporting activities from China (CAC Assessment), highlighting what data export...more

The CAC Assessment Collection – Part 1: What You Should Consider Before Exporting Data From China

With the rapid development of the global digital economy, multinational companies (MNCs) have been forced to find legally compliant ways to transfer data across borders. In the past, many MNCs relied on data transfer...more

What You Need to Know About China ‘Binding Corporate Rules' Under the New Certification Specifications

As China enhances its cybersecurity and data protection regime, the processing of personal information, and in particular the information of customers and employees, has come into focus under the Personal Information...more

What is Required Under the PIPL: A PRC-Based Representative or a Personal Information Protection Officer?

Multinational entities with operations in or having business with the People’s Republic of China (PRC) should take note of the PRC’s new Personal Information Protection Law (PIPL), which took effect on 1 November 2021 and is...more

Overview of the New Implementing Rules on Critical Information Infrastructure in China and Key Takeaways

On 30 July 2021, the State Council promulgated the Regulations on the Security Protection of Critical Information Infrastructure (the Regulation), which took effect on 1 September 2021. This Regulation dovetails with the...more

China's New Data Security Law Bolsters Its Data Security Legal Regime

On 10 June 2021, the Standing Committee of the National People’s Congress of China (NPCSC) approved the enactment of Data Security Law (the DSL) of the People’s Republic of China (PRC), which will take effect on 1 September...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide