News & Analysis as of

Regulatory Requirements China Cybersecurity

Mayer Brown

China Proposes Amendments to the Cybersecurity Law

Mayer Brown on

INTRODUCTION - Almost eight years after the Cybersecurity Law (“CSL”) came into force in the PRC in 2017, the Cyberspace Administration of China (“CAC”) issued draft amendments to the CSL (“2025 Draft Amendments”) on 28...more

Sheppard Mullin Richter & Hampton LLP

China Initiates Mandatory Reporting Regime for Personal Information Protection Officers

On July 18, 2025, the Cyberspace Administration of China (the “CAC”) issued the Notice on Launching the Reporting Mechanism for Personal Information Protection Officers (the “Notice ”). This development marks a significant...more

DLA Piper

CHINA: DPOs Must Be Registered Before 29 August 2025

DLA Piper on

While appointing and registering a DPO has been mandatory in China for many years, a portal has now finally been established for organisations to register those DPOs with the China data protection authority. This resolves...more

Dacheng

Decoding the Regulation of “Important Data” in China and the U.S.: Similarities and Differences, Compliance Obligations, and...

Dacheng on

With the rapid development of informatization, how to better safeguard national security in an increasingly complex information environment has become a critical consideration in digital legislation. A key issue within this...more

Jenner & Block

New Rules for Data Flows Take Effect: What You Need to Know

Jenner & Block on

On April 8, 2025, the US Department of Justice’s National Security Division’s final rule regulating sensitive data about US persons came into effect. DOJ also announced a 90-day grace period on enforcement. At a moment of...more

Orrick, Herrington & Sutcliffe LLP

DOJ begins enforcement of its Data Security Program

On July 8, the DOJ’s National Security Division (NSD) will begin enforcing its Data Security Program according to a notice from April titled “Data Security Program Implementation and Enforcement Policy” which outlined the...more

Morgan Lewis

DOJ's Data Security Program Enforcement in Full Swing: Key Considerations for Companies

Morgan Lewis on

The US Department of Justice’s (DOJ’s) final rule implementing Executive Order (EO) 14117, Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern went...more

Paul Hastings LLP

Cybersecurity Compliance in the New Administration

Paul Hastings LLP on

Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more

White & Case LLP

Beating the hackers: US cybersecurity dealmaking hits back against rising attacks - Policymakers have renewed their focus on...

White & Case LLP on

The persistence and evolution of cybercrime across the US is reshaping M&A in the cybersecurity sector. Driven by escalating threats, increasing costs and liability to businesses, and a growing and more defined regulatory...more

Cooley LLP

Understanding and Complying With the DOJ’s Bulk Data Rule  

Cooley LLP on

This post is one in a series where we discuss the US Department of Justice’s (DOJ’s) bulk sensitive data rule (rule), which prohibits individuals or entities from certain foreign countries, including China, from accessing...more

Dacheng

China Monthly Data Protection Update: June 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for June. TC260 Two Cybersecurity Practice Guidelines on Personal Information Protection Compliance Audits: On May 19, 2025, TC260 issued two...more

Dickinson Wright

FCC Expands National Security Measures for Telecom Industry

Dickinson Wright on

Last week, the Federal Communications Commission (FCC) took three separate actions to control foreign influence over US communications products and services. These decisions fit within the FCC’s broader efforts to safeguard...more

Dacheng

China Monthly Data Protection Update: May 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for May. The following events merit special attention...more

Dacheng

China Monthly Data Protection Update: April 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for April....more

Goodwin

DOJ’s Data Export Rule Is In Force April 8: What You Need to Do

Goodwin on

On April 8, 2025, a sweeping rule issued by the US Department of Justice (DOJ) will take effect. The rule imposes restrictions—and in some cases, outright prohibitions—on US companies in connection with certain types of data...more

Dacheng

China Monthly Data Protection Update: March 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for March. The following events merit special attention...more

DLA Piper

China Released New Measures for Labelling AI-Generated and Synthetic Content

DLA Piper on

On 14 March 2025, the Measures for the Labelling of Artificial Intelligence-Generated and Synthetic Content (Measures) was jointly released by four Chinese government agencies, namely the Cyberspace Administration of China,...more

Hogan Lovells

Navigating new horizons: China's personal information protection compliance audits

Hogan Lovells on

On February 14, 2025, the Cyberspace Administration of China ("CAC") finalized the "Personal Information Protection Compliance Audit Measures" ("Audit Measures"), which refines the draft version released on August 3, 2023...more

Gardner Law

AI Regulation and Legal Trends in the U.S and Abroad

Gardner Law on

The Evolving Role of AI/ML in Healthcare - The use of artificial intelligence/machine learning (AI/ML) in healthcare is evolving rapidly and introducing new challenges. Not only are medical devices using AI for diagnostics,...more

Sheppard Mullin Richter & Hampton LLP

Draft Measures for Personal Information Protection Certification for Cross-Border Data Transfers Released for Public Comment

On January 3, 2025, the Cyberspace Administration of China (the “CAC”) released the Draft Measures for Personal Information Protection Certification for Cross-Border Data Transfers (the “Draft Measures”) for public comment....more

Troutman Pepper Locke

Do You Know Where Your Data Is Going? On April 8, New National Security Rules Take Effect

Troutman Pepper Locke on

A groundbreaking new regulatory regime, imposing rules unlike any in existing U.S. law, may surprise many companies due to its sudden adoption and complexity. This article tries to simplify the changing regulatory landscape,...more

Wiley Rein LLP

[Podcast] The Impact of IoT Supply Chain Risks on Government Contracts

Wiley Rein LLP on

In this episode of Wiley’s Government Contracts podcast, partners Tracye Howard and Sara Baxenberg discuss the evolving national security concerns surrounding Internet of Things (IoT) modules produced by Chinese companies...more

Skadden, Arps, Slate, Meagher & Flom LLP

Political Changes Are Unlikely To Fundamentally Alter Key Sanctions

Key Points - - Political transitions in the West notwithstanding, we expect economic sanctions to remain a key response to geopolitical issues. - Current sanctions policy priorities are unlikely to shift markedly in...more

Foley & Lardner LLP

BIS Finalizes Rule Prohibiting Connected Vehicle Imports Linked to China and Russia: Key Compliance Requirements Announced

Foley & Lardner LLP on

The U.S. Department of Commerce’s Bureau of Industry and Security (BIS) has promulgated a Final Rule prohibiting the import and sale of connected vehicles and related components linked to the People’s Republic of China (PRC)...more

Holland & Knight LLP

Holland & Knight Defense Situation Report: December 2024

Holland & Knight LLP on

Welcome to Holland & Knight's monthly defense news update. We are pleased to bring you the latest in defense policy, regulatory updates and other significant developments. ...more

40 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide