News & Analysis as of

China Trade Secrets Data Protection

Dechert LLP

Department of Justice Year-End Update Shows “China Initiative” Prosecutions Are Alive and Well

Dechert LLP on

The Department of Justice on November 19, 2021, updated its online information sheet about its ongoing China Initiative, which “reflects the [DOJ’s] strategic priority of countering Chinese national security threats” by...more

Oberheiden P.C.

Theft of U.S. Companies’ IP Assets and Other National Security Issues Involving Foreign Governments and Foreign-Controlled...

Oberheiden P.C. on

Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more

Sheppard Mullin Richter & Hampton LLP

Privacy Developments in China, Singapore and Hong Kong

International companies should keep in mind recent developments coming out of Asia on the privacy front. Chinese authorities are reported to be confiscating smartphones at the border to install surveillance apps. Companies...more

WilmerHale

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - Global Overview

WilmerHale on

With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent...more

JD Supra Perspectives

10 Popular Reads Covering Latest European Union Developments

JD Supra Perspectives on

Recap of popular updates covering latest developments in the European Union....more

Orrick - Trade Secrets Group

Protecting Trade Secrets In China

Trade secrets were first introduced into China law through the Article 10 of the “Anti-Unfair Competition Law of China” (effective Dec. 1, 1993)....more

Troutman Pepper

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

Troutman Pepper on

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide