News & Analysis as of

Proposed Regulation Personal Information China

Morgan Lewis - Tech & Sourcing

China’s Proposed Regulations on National Network Identity Authentication Public Services

The Ministry of Public Security and the Cyberspace Administration of China (CAC) on July 26, 2024 released an announcement soliciting public comments on the Draft Measures for the Administration of National Network Identity...more

WilmerHale

China Publishes Draft Regulations on the Administration of Network Data Security

WilmerHale on

The Cyberspace Administration of China (“CAC”) on November 14, 2021 published the draft Regulations on the Administration of Network Data Security (“Draft Regulations”) for comment through December 13, 2021.1 The Draft...more

WilmerHale

China Publishes Draft Measures on Security Assessment of Cross-Border Data Transfer

WilmerHale on

The Cyberspace Administration of China (“CAC”) on October 29, 2021 published the draft Measures on Security Assessment of Cross-Border Data Transfer (“Draft Measures”) for comment through November 28, 2021. The Draft Measures...more

WilmerHale

China Tightens Control Over Overseas Securities Listings in Name of Data Security

WilmerHale on

On July 6, the General Office of the Central Committee of China’s Communist Party and the General Office of the State Council jointly issued the Opinions on Strictly Cracking Down on Illegal Securities-related Activity in...more

Sheppard Mullin Richter & Hampton LLP

Update on the State of Privacy Law in China

China is continuing to move forward with its first comprehensive privacy law. China recently issued a second version of the draft Personal Information Protection Law (Draft PIPL) which will be open for public comments until...more

ArentFox Schiff

Interactive Counsel Newsletter: Privacy Report: FBI Issues Updated Ransomware Guidance

ArentFox Schiff on

FBI Issues Updated Ransomware Guidance - A recent report from New Zealand-based cybersecurity firm Emsisoft has revealed the extent to which ransomware is being used in cyberattacks in the United States. The first 9 months...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide