PRC Promulgated Measures for Cybersecurity Reviews (CMS)
Learn about the Measures for Cybersecurity Reviews adopted by Chinese authorities, which took effect on 15 February 2022.
Learn about the Measures for Cybersecurity Reviews adopted by Chinese authorities, which took effect on 15 February 2022.
Learn about top developments and predictions in the TMT sector (Technology, Media, and Telecom) in China.
Learn about sanctions taken against Russia by the United States, the European Union, the United Kingdom, Australia, Japan, and Switzerland.
In this multi-jurisdictional guide, explore an overview of key legal issues, rules, and developments regarding merger control across a range of jurisdictions.
China is operating increasingly on a cashless basis, with the Chinese government posed to launch a digital currency called Digital Currency Electronic Payment (DCEP or “digital yuan”). This article provides a holistic overview and answers several key questions pertaining to the DCEP.
In the current climate with Russia invading Ukraine, U.S. and international policymakers enacted numerous sanctions that raise many questions. Knowing the typical course of these sanctions in past scenarios helps to triage new risk assessment and update internal controls. This is a “Top Ten” list of considerations.
A 42-page guide by Dentons regarding the AI journey - opening eyes to opportunity and risk.
This resource, extracted from the ACC Webcast "Global Privacy for Trade Associations," presented on June 12, 2014, includes a checklist of key issues that nonprofit organizations should consider when dealing with cybersecurity.
While the Cybersecurity Regulations require several technical controls (e.g., monitoring network activity and implementing multi-factor authentication and encryption), most of the requirements involve instituting information governance (“IG”) practices and structures to manage cyber risks. In the following, we set out five steps which address the key IG issues and requirements that can help your organization come into compliance with the Cybersecurity Regulations.
Provides an overview of legal aspects of homeland security including corporate viability and business continuity, cybersecurity, the SAFETY Act, the Department of Homeland Security and information sharing and the Freedom of Information Act.