10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Daily Compliance News: May 6, 2025 the Made in China Edition
Daily Compliance News: May 5, 2025, The Washing Edition
Daily Compliance News: April 30, 2025, The 4 AM Wake-Up Call Edition
10 For 10: Top Compliance Stories For the Week Ending April 26, 2025
Daily Compliance News: April 25, 2025, The Trouble in Travel Edition
What's the Buzz in the Battery World With Roger Miksad, BCI – Battery + Storage Podcast
State AG Pulse | “Don’t Mess With Our Health or Our Kids!”
Daily Compliance News: April 21, 2025, The Tribute to Pope Francis Edition
Daily Compliance News: April 17, 2025, The Musk Fights BEE's Edition
Tit For Tat US China Trade War
Daily Compliance News: April 14, 2025, The Cascade of Corruption Edition
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
10 For 10: Top Compliance Stories For the Week Ending April 12, 2025
Daily Compliance News: April 11, 2025 The Tariff Rollback Edition
Daily Compliance News: April 10, 2025, The Dark Money Corruption Edition
Daily Compliance News: March 26, 2025, The Missile Strike on Boeing Edition
Daily Compliance News: March 24, 2025, The ABC Task Force Edition
Regulatory Ramblings: Episode 65 – The Trump Administration’s Decision to Halt FCPA Enforcement – The Implications for Asia and the World with Tom Fox, Malcolm Nance, and Philip Rohlik
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
The U.S. Department of Commerce's Bureau of Industry and Security (BIS) issued an Advance Notice of Proposed Rulemaking (ANPRM) on January 3, 2025, seeking public input to inform the potential development of a rule to secure...more
On October 16, China’s Ministry of State Security highlighted a case where a foreign company, in collaboration with a Chinese company, conducted illegal surveying and mapping within the territory of China under the guise of...more
Artificial intelligence (AI) is transforming industries at an unprecedented pace, but it also introduces complex compliance challenges. While many regions are ramping up their regulatory frameworks to address these risks,...more
On September 9, 2024, China’s National Technical Committee 260 on Cybersecurity released the first version of its AI Safety Governance Framework (the Framework), which was formulated to implement the Global AI Governance...more
The newly promulgated measures increase the threshold of data triggering security assessments and contract requirements while leaving room for Chinese authorities to heavily restrict cross-border data transfers. In...more
The oversight obligations of boards continue to expand. Recent enforcement actions and new laws in areas such as cybersecurity, artificial intelligence and supply chains create new challenges for boards, as we explain in this...more
The AI landscape is rapidly evolving. To help you stay abreast of the various developments, we share a recap of the latest legal and tech updates related to AI and other emerging technologies. The “Godfather” of AI resigns...more
Ongoing geopolitical developments such as Russia’s war in Ukraine and tensions between China and Taiwan have continued to fuel higher US military spending. The demand for military weapons is the strongest it has been in...more
On December 15, 2021, Congress passed the National Defense Authorization Act (NDAA or Act) for Fiscal Year (FY) 2022, which President Biden is expected to sign into law soon. As usual, the NDAA contains numerous provisions...more
On October 29, 2021, the Cyberspace Administration of China (“CAC”) published the Security Assessment Measures of Data Cross-border Transfer (Draft for Comments) (the “New Draft Measures”) for public comments. The New...more
The new Data Security Law, together with the Cybersecurity Law (effective since June 1, 2017) and the Personal Information Protection Law (which is expected to be formally published later this year) will serve as the three...more
The full text of the Law of the People’s Republic of China on Personal Information Protection (Draft) (the Draft) was released on 21 October 2020 for public comments by 19 November 2020....more
The Situation: In the two years since China enacted the Cybersecurity Law, which granted authorities broad powers to monitor and investigate activities falling under its purview, authorities have increasingly penalized...more
On 28 May 2019, the Cyberspace Administration of China (CAC) released the draft Measures on the Administration of Data Security (Data Security Measures, see our in-house English translation here) for public consultation. ...more
On March 28, 2019, the Oversight Board of the United Kingdom’s Huawei Cyber Security Evaluation Centre (HCSEC) released a report identifying “serious and systematic defects in Huawei’s software engineering and cyber security...more
The Chinese Ministry of Public Security (MPS) on September 15, 2018, released the Provisions for the Supervision and Inspection of Network Security by Public Security Agencies, also known as “Circular 151.” This new...more
This is the first installment of a two-part series exploring how critical infrastructure like power plants are proactive in implementing protective measures to safeguard against future cyber attacks, but challenges remain....more
Cybersecurity has in recent years become an integral component of a board’s role in risk oversight, but directors often find themselves in unfamiliar territory when it comes to formulating policies and oversight processes...more
On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more
Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more