News & Analysis as of

Data Privacy Cross-Border Transactions Cross-Border

Dacheng

China Issues First Administrative Penalty for Unlawful Cross Border Transfer of Personal Information

Dacheng on

On September 9, 2025, China announced the landmark administrative penalty against Dior (Shanghai) over unlawful cross-border transfers of personal information, with the primary violation being the failure to satisfy the...more

DLA Piper

Uganda: Data Protection Regulator Clarifies Compliance Requirements for Offshore Entities

DLA Piper on

In a decision issued on 18 July 2025 against Google LLC, the Personal Data Protection Office (PDPO) has affirmed that the data protection compliance obligations under Ugandan law apply to all entities that handle the personal...more

Katten Muchin Rosenman LLP

The Cybersecurity Administration of China Issues Relaxed Rules for Cross-Border Data Transfers

On March 22, 2024, the Cybersecurity Administration of China (CAC), issued the long-awaited new Regulations on Promoting and Regulating Cross-Border Data Flows (the New Regulations) for compliance with China's Personal...more

Sheppard Mullin Richter & Hampton LLP

China Issues Regulations on Facilitating and Regulating Cross-Border Data Flow

On March 22, 2024, nearly six months after the release of the “draft Provisions on Regulating and Promoting Cross-border Data Transfer” (the “Draft Rules”), the Cybersecurity Administration of China (the “CAC”) formally...more

Skadden, Arps, Slate, Meagher & Flom LLP

China Intends To Ease Controls Over Cross-Border Data Transfers

On September 28, 2023, the Cyberspace Administration of China (CAC) published the draft Provisions on Regulating and Promoting Cross-Border Data Transfers (Draft Provisions). If adopted into law in their current form, the...more

Sheppard Mullin Richter & Hampton LLP

Cross-Border Transfer of Personal Information under China’s Cybersecurity Law

China’s Cybersecurity Law (the “Cybersecurity Law”) took effect on June 1, 2017. The Cybersecurity Law consists of 79 articles in total. According to Article 2 thereof, the Cybersecurity Law would apply to the construction,...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide