The Asia-Pacific (APAC) region has experienced a significant increase in internet usage among children, fueled by widespread access to smartphones, affordable data plans, and digital platforms. While this digital...more
Concerns about claims of legal professional privilege over third-party investigation reports produced in the course of responding to cyberattacks, and the extent to which such reports can be shielded from disclosure in legal...more
4/23/2025
/ Attorney-Client Privilege ,
Australia ,
Class Action ,
Cyber Attacks ,
Data Breach ,
Disclosure Requirements ,
Discovery ,
Healthcare ,
Insurance Industry ,
Litigation Strategies ,
Popular ,
Privacy Laws
Hong Kong’s Legislative Council passed the Protection of Critical Infrastructures (Computer Systems) Bill (the “CI Bill”) on March 19, 2025. This landmark legislation aims to enhance cybersecurity and minimize disruptions...more
The PRC Personal Information Protection Law (PIPL) mandates regular data compliance audits. Following a consultation period beginning in August 3, 2023, the Cyberspace Administration of China (CAC) issued the Measures for...more
3/7/2025
/ Audits ,
China ,
Compliance ,
Data Privacy ,
Data Protection ,
Data Security ,
Personal Data ,
Personal Information ,
PRC ,
Privacy Laws ,
Regulatory Requirements ,
Risk Management
On October 16, China’s Ministry of State Security highlighted a case where a foreign company, in collaboration with a Chinese company, conducted illegal surveying and mapping within the territory of China under the guise of...more
New legislation focused on uplifting cybersecurity and minimizing disruption of critical and essential services in Hong Kong has been introduced this month. The Hong Kong Government officially released the Protection of...more
China’s ByteDance, the parent company of TikTok, is seeking USD1.1 million in damages from a former intern accused of sabotaging its artificial intelligence (AI) large language model training infrastructure....more
12/19/2024
/ Artificial Intelligence ,
China ,
Class Action ,
Compliance ,
Confidential Information ,
Cybersecurity ,
Damages ,
Data Privacy ,
Data Protection ,
Ethics ,
Insider Information ,
Machine Learning ,
Risk Management ,
Social Media ,
Technology Sector ,
TikTok
Cyber issues are seldom out of the news, from ransomware attacks and espionage to non-malicious outages that cause widespread concern. Organizations need to protect themselves against both current and future risks and...more
12/16/2024
/ Artificial Intelligence ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Incident Response Plans ,
Information Technology ,
Machine Learning ,
Ransomware ,
Risk Assessment ,
Risk Management
On December 16, 2024, the new Cybersecurity Maturity Model Certification (CMMC) 2.0 program from the U.S. Department of Defense (DoD) will go into effect. CMMC 2.0 aims to improve cybersecurity standards within the defense...more
12/16/2024
/ Certification Requirements ,
Compliance ,
Controlled Unclassified Information (CUI) ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Department of Justice (DOJ) ,
Dodd-Frank ,
False Claims Act (FCA) ,
Federal Contractors ,
Flow Down Clause ,
Proposed Rules ,
Regulatory Agenda ,
Remediation ,
Subcontractors
The Hong Kong Securities and Futures Commission (SFC) has issued a circular that sets forth comprehensive guidelines and expectations for licensed corporations (LCs) regarding the responsible use of generative artificial...more
As part of our Cybersecurity Awareness Month program of events, we hosted our inaugural Cybersecurity Forum on October 1 at our London office and online.
Compèred by Ffion Flockhart, global head of cybersecurity, the day’s...more
11/27/2024
/ Acquisitions ,
Corporate Governance ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Controller ,
EU ,
Incident Response Plans ,
Mergers ,
Personal Data ,
Privacy Laws ,
Ransomware ,
Risk Mitigation ,
UK
The Office of the Australian Information Commissioner (OAIC) has published AI guidance articulating how Australian privacy law applies to AI and the OAIC’s overall expectations on AI governance and privacy safeguards for...more
11/19/2024
/ Artificial Intelligence ,
Australia ,
Data Collection ,
Due Diligence ,
Information Commissioner's Office (ICO) ,
Machine Learning ,
New Guidance ,
Personal Information ,
Privacy Laws ,
Risk Management ,
Technology Sector ,
Transparency
Aiming to bolster the security and resilience of critical infrastructures in Australia, the Australian Government introduced the Security of Critical Infrastructure and Other Legislation Amendment (Enhanced Response and...more
The Cyber Security Bill 2024 ("Cyber Bill") tabled in the Australian Federal Parliament yesterday is set to bring significant changes to the cyber security landscape in Australia....more
10/10/2024
/ Australia ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Information Governance ,
Information Technology ,
Pending Legislation ,
Ransomware ,
Regulatory Agenda ,
Regulatory Reform
The Security Bureau has completed its one-month consultation on its proposal in relation to the Protection of Critical Infrastructures (Computer Systems) Bill (the "Bill") and released the consultation report in its...more
After nearly five years of review, the first tranche of amendments to Australia’s Privacy Act has landed (Privacy and Other Legislation Amendment Bill 2024 (Cth) (Bill)). The Bill introduces 23 of the 25 legislative proposals...more
As Artificial Intelligence (AI) continues to evolve and integrates into business processes, the Office of the Privacy Commissioner for Personal Data (PCPD) released its Artificial Intelligence: Model Personal Data Protection...more
6/18/2024
/ Artificial Intelligence ,
Best Practices ,
Corporate Counsel ,
Data Protection ,
Data Security ,
Hong Kong ,
Personal Data ,
Privacy Laws ,
Regulatory Agenda ,
Regulatory Requirements ,
Risk Assessment ,
Risk Management ,
Technology Sector
China has passed provisions which relax the current cross-border data transfer mechanisms. This comes as welcome news to the international business community, especially those with the need to export data from China in the...more