News & Analysis as of

Data Protection Risk Management China

Baker Botts L.L.P.

AI Legal Watch - DeepSeek Under Scrutiny

Baker Botts L.L.P. on

Everyone is talking about DeepSeek for its increase performance and efficiency. However, with that comes additional risks, as DeepSeek is subject to Chinese national law, and there are still many unanswered questions...more

A&O Shearman

PRC - New Measures for Personal Information Protection Compliance Audits

A&O Shearman on

The PRC Personal Information Protection Law (PIPL) mandates regular data compliance audits. Following a consultation period beginning in August 3, 2023, the Cyberspace Administration of China (CAC) issued the Measures for...more

Hogan Lovells

Navigating new horizons: China's personal information protection compliance audits

Hogan Lovells on

On February 14, 2025, the Cyberspace Administration of China ("CAC") finalized the "Personal Information Protection Compliance Audit Measures" ("Audit Measures"), which refines the draft version released on August 3, 2023...more

DLA Piper

CHINA: Mandatory Data Protection Compliance Audits from 1 May 2025

DLA Piper on

Chinese data regulators are intensifying their focus on the data protection compliance audit obligations under the Personal Information Protection Law (“PIPL“), with the release of the Administrative Measures for Personal...more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

Sheppard Mullin Richter & Hampton LLP

Data, Deals, and Diplomacy, Part III: DOJ Issues National Security Final Rule with New Data Compliance Obligations for...

On January 8, 2025, the Department of Justice (“DOJ”) published its final rule addressing Executive Order (E.O.) 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more

Ropes & Gray LLP

DeepSeek: Legal Considerations for Enterprise Users

Ropes & Gray LLP on

DeepSeek, a Chinese artificial intelligence (“AI”) startup, recently made waves across the global AI landscape with the release of its latest open-source R1 model. While some versions of DeepSeek’s model can be downloaded and...more

Akin Gump Strauss Hauer & Feld LLP

Former President Biden's Executive Order to Strengthen U.S. Cybersecurity and Consumer Trust

On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts,...more

A&O Shearman

Increasing insider threats and the importance of AI governance

A&O Shearman on

China’s ByteDance, the parent company of TikTok, is seeking USD1.1 million in damages from a former intern accused of sabotaging its artificial intelligence (AI) large language model training infrastructure....more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Robinson+Cole Data Privacy + Security Insider

CISA Lists Top CVEs Exploited by Chinese State-Sponsored Cyber Actors

The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and Exposures (CVEs) that have been used by the People’s Republic of China (PRC) state-sponsored...more

Robinson+Cole Data Privacy + Security Insider

NIST Releases Guidance on Supply Chain Security

The National Institutes of Science and Technology (NIST) Information Technology Laboratory recently released guidance entitled “Software Supply Chain Security Guidance,” in response to directives set forth in President...more

Robinson+Cole Data Privacy + Security Insider

Chinese APT41 Attacking State Networks

Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber threat activity through APT41, which has been linked to China’s...more

Robinson+Cole Data Privacy + Security Insider

China-Based Ransomware Operator Exploiting Log4j Vulnerability

Microsoft has issued frequent updates on the Log4j vulnerability that we have been hearing so much about. The vulnerability is a serious problem that will become more widespread as time goes on....more

McDermott Will & Emery

[Webinar] PIPL - A Review of China’s New Privacy Law and Insights Into Achieving Compliance and Managing Risks - November 18th,...

McDermott Will & Emery on

China recently enacted its Personal Information Privacy Law (PIPL), which came into effect November 1, 2021. PIPL has global reach and broadly regulates entities of all industries that process the personal data of Chinese...more

Orrick, Herrington & Sutcliffe LLP

Guidance from E.U. Supervisory Authorities on Data Processing in a Time of COVID-19

The European Data Protection Board (EDPB) and a number of European data protection supervisory authorities have recently issued guidance on processing personal data, including special categories of personal data (i.e., health...more

Lowndes

Five Cybersecurity Practices to Minimize Risk During Coronavirus

Lowndes on

As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more

Hogan Lovells

Employers Take Notice: Increased Cybersecurity Threats Amid Coronavirus Precautions

Hogan Lovells on

On March 11, the Word Health Organization officially characterized the coronavirus (COVID-19) outbreak as a pandemic. During the outbreak, many employers around the world are seeking to prioritize the well-being and safety of...more

Robinson+Cole Data Privacy + Security Insider

Coronavirus and Remote Workers: Consider Increased Risk of Insider Threat Issues

The conference I was supposed to speak at next week was just cancelled, as many are and will be, due to coronavirus concerns. The topic was “Insider Threats and How to Mitigate Them.”...more

Ballard Spahr LLP

How to Be Ready for Coronavirus-Related Cybersecurity Challenges

Ballard Spahr LLP on

The novel coronavirus outbreak is creating electronic communication and data privacy concerns on a number of fronts. One immediate effect is a significant increase in phishing scams, used by threat actors to launch malware...more

Hogan Lovells

Luxury retailers in Hong Kong and neighboring markets face Coronavirus crisis

Hogan Lovells on

Over the past nine months in Hong Kong, luxury retailers have encountered a challenging market. Hong Kong has traditionally been a popular destination for Mainland Chinese seeking to purchase luxury goods, but recent...more

Hogan Lovells

The grand "finale" of China's Encryption Law

Hogan Lovells on

Two years on since the first draft, the final act of the legislative passage saga of the long-awaited People's Republic of China Encryption Law ended with its promulgation on 26 October 2019. It will take effect on 1 January...more

Hogan Lovells

IoT Cybersecurity and Data Privacy Trends in Asia: Be Ready

Hogan Lovells on

In this hoganlovells.com interview, Hong Kong-based Hogan Lovells partner Mark Parsons talks about the regulatory environment in Asia as it relates to cybersecurity, data privacy, and the Internet of Things (IoT)....more

McDermott Will & Emery

International News: Focus on Private Equity

Our Focus on Private Equity provides a global perspective on some of the challenges being faced by PE firms and how these can be successfully addressed. It also examines some of the many opportunities available, e.g., by...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide