News & Analysis as of

International Data Transfers Compliance China

Seward & Kissel LLP

DOJ Implements New Data Security Program: Data Transfer Restrictions with a National Security Focus

Seward & Kissel LLP on

Effective as of April 8, 2025, the National Security Division of the U.S. Department of Justice (DOJ) has implemented a Data Security Program (the DSP) to address national security risks associated with the transfer of...more

Baker Donelson

DOJ Final Rule Targets Cross-Border Data Transfers: Key Implications for U.S. and Foreign-Owned Companies Operating in the U.S.

Baker Donelson on

In the final days of the Biden administration the U.S. Department of Justice (DOJ) issued a sweeping set of regulations which are in effect as of yesterday, April 8, 2025. The regulations focus on cross-border data transfers...more

Dorsey & Whitney LLP

Justice Issues Final Rule Restricting Transfer of Personal U.S. Data to Countries of Concern, Effective in April 2025

Dorsey & Whitney LLP on

The U.S. Department of Justice (“DOJ”) published its final rule (“Final Rule”) on January 8, 2025, that will prohibit or restrict transfer of certain data of U.S. persons to countries of concern, including to China. The Final...more

Skadden, Arps, Slate, Meagher & Flom LLP

Fortifying US Data: Proposed Rule Would Establish a New Regime To Restrict or Prohibit Certain Data Transactions With Countries of...

On October 29, 2024, the U.S. Department of Justice (DOJ) published a proposed rule (Proposed Rule) that would restrict or prohibit certain transactions with China, Russia and other countries of concern involving U.S....more

WilmerHale

DOJ Issues NPRM Regarding Sensitive Data Transfers

WilmerHale on

With the publication of a recent Notice of Proposed Rulemaking (NPRM), the Department of Justice National Security Division will soon become an important new regulator of transactions involving the transfer of sensitive U.S....more

DLA Piper

CHINA: Mandatory Data Protection Compliance (Self) Audits on Their Way

DLA Piper on

The Personal Information Protection Law (“PIPL“) requires a data controller to conduct compliance audits of its personal data processing activities on a regular basis (“Self-supervision Audits“). Apart from such...more

Eversheds Sutherland (US) LLP

No longer in limbo - China’s CAC finalises new regulations regarding cross-border data flows

The much anticipated response to the Consultation initiated by the Cyberspace Administration of China (CAC) last September has finally arrived (read our earlier briefing here). Last Friday, the CAC ended months of speculation...more

WilmerHale

China Finalizes Rules to Ease Data Export Compliance Burden

WilmerHale on

On March 22, 2024, the Cyberspace Administration of China (“CAC”) promulgated the final version of the Provisions on the Promotion and Regulation of Cross-Border Data Flows (the “Final Provisions”), bringing to conclusion the...more

Guidepost Solutions LLC

The China Syndrome: Competing Regimes Make Due Diligence a Tall Task

...While reliable information from China has always come at a premium, recent restrictions on previously available business intelligence as well as Chinese enforcement actions against foreign investigative diligence firms are...more

Mayer Brown

Unpacking the China Data Laws

Mayer Brown on

China’s stance toward data privacy and cybersecurity has been a matter of interest for the last several years, most prominently with the June 2017 passage of China’s Cybersecurity Law, and the passage of the Data Security Law...more

WilmerHale

China Publishes Draft Rules for Personal Information Protection Compliance Audits

WilmerHale on

The Cyberspace Administration of China (“CAC”) on August 3, 2023 published the draft Administrative Measures for Personal Information Protection Compliance Audits (“draft Measures”) for public comment through September 2,...more

Benesch

As China Cross-Border Data Transfer Security Assessment Requirement Comes Into Effect, New Guidelines Posted for Security...

Benesch on

The new guidelines provide insight into how businesses can submit applications to the CAC in order to obtain approval via the CAC security assessment cross-border data transfer requirement. As of September 2022, all...more

HaystackID

[Webcast Transcript] CFIUS Compliance: Your Approach May Be A Matter of National Security

HaystackID on

Editor’s Note: On July 27, 2022, HaystackID shared an educational webcast on the topic of Committee on Foreign Investment in the United States (CFIUS) compliance. CFIUS is a U.S. government interagency committee with the...more

HaystackID

[Webcast Transcript] You’ve Got to Move It: Data Protection and Privacy with Cross-Border Transfers

HaystackID on

...This session, led by industry-acknowledged experts in areas ranging from data protection and privacy to data transfer and legal discovery, provided a professional forum for the explanation of the best approaches,...more

Latham & Watkins LLP

China’s New Data Security Law: What to Know

Latham & Watkins LLP on

The Data Security Law will enhance an increasingly comprehensive legal framework for information and data security in the PRC. Key Points: Notably, the DSL: ..Applies to a wide range of data and data activities, with...more

Jones Day

Implementing China’s Cybersecurity Law

Jones Day on

China’s Cybersecurity Law was issued on November 7, 2016, by the Standing Committee of the National People’s Congress, and it came into effect on June 1, 2017. The Cybersecurity Law marks the first comprehensive law in China...more

Thomas Fox - Compliance Evangelist

The Trump Administration-Part III: Preparing for a Catastrophe

Writing in her weekly New York Times (NYT) Fair Game column, in a piece entitled “The Trump Effect: Time To Buckle Up”, Gretchen Morgenson noted, “investors are now scratching their heads trying to figure out what his...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide