PRC Promulgated Measures for Cybersecurity Reviews (CMS)
Learn about the Measures for Cybersecurity Reviews adopted by Chinese authorities, which took effect on 15 February 2022.
Learn about the Measures for Cybersecurity Reviews adopted by Chinese authorities, which took effect on 15 February 2022.
Learn about top developments and predictions in the TMT sector (Technology, Media, and Telecom) in China.
Learn about sanctions taken against Russia by the United States, the European Union, the United Kingdom, Australia, Japan, and Switzerland.
In this multi-jurisdictional guide, explore an overview of key legal issues, rules, and developments regarding merger control across a range of jurisdictions.
China is operating increasingly on a cashless basis, with the Chinese government posed to launch a digital currency called Digital Currency Electronic Payment (DCEP or “digital yuan”). This article provides a holistic overview and answers several key questions pertaining to the DCEP.
In the current climate with Russia invading Ukraine, U.S. and international policymakers enacted numerous sanctions that raise many questions. Knowing the typical course of these sanctions in past scenarios helps to triage new risk assessment and update internal controls. This is a “Top Ten” list of considerations.
A 42-page guide by Dentons regarding the AI journey - opening eyes to opportunity and risk.
While the Cybersecurity Regulations require several technical controls (e.g., monitoring network activity and implementing multi-factor authentication and encryption), most of the requirements involve instituting information governance (“IG”) practices and structures to manage cyber risks. In the following, we set out five steps which address the key IG issues and requirements that can help your organization come into compliance with the Cybersecurity Regulations.
Provides an overview of legal aspects of homeland security including corporate viability and business continuity, cybersecurity, the SAFETY Act, the Department of Homeland Security and information sharing and the Freedom of Information Act.
One year after a plan to reform European data protection laws was unveiled, the debate is still intense. While individuals and companies are still feuding over cases of profiling, cloud computing companies are struggling to understand when and how governments can access users’ data. Interestingly, the Commission’s proposal is also contemplating “a right to be forgotten” whereby a person would be able to ask that their data be deleted.
This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.
By using the site, you consent to the placement of these cookies. For more information, read our cookies policy and our privacy policy.