Lunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner
|
|
- Barbara Anderson
- 8 years ago
- Views:
Transcription
1 Lunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner mofo.com
2 Lunch & Learn 2 nd Monday of each month 45 minutes via webinar Unaccredited CPD points Upcoming topics Monday, 9 February 2015: Anti-corruption Compliance: Minimizing the Supply Chain Risk Speakers: Alistair Maughan & Kevin Roberts Monday, 9 March 2015: Drafting Effective Arbitration & Dispute Resolution Agreements Speaker: Gemma Anderson 2
3 Today Questions at the end. Or us afterwards. Phones are muted to reduce background noise. We ll unmute at the end.
4 Background mofo.com
5 Background March, 2011: China s National People s Congress approves 5 Year Plan Sets information security as key priority for ; domestic control of hardware and software May, 2011: State Internet Information Office set up October, 2012: US congressional report on national security risks posed by Huawei January, 2013: China s National Information Security Standards Technical Committee (TC260) includes in annual workplan to support information security review process June 2013: Snowden disclosures 5
6 Background 2014 January, 2014: Xi sets up Cybersecurity Administration of China (CAC) through restructuring of SIIO May 2014: US indictment of PLA officers Market rumour that SOEs told not to use US IT consulting firms Healthcare measures reference national cybersecurity review regime Windows 8 banned from GP market CAC announces coming cybersecurity review rules August 2014: Symantec, Kaspersky banned from China GP market Ministry of Industry and Information Security (MIIT) issues Guiding Opinions 6
7 Why now? Media revelations on activities of security services Snowden disclosures seem to have accelerated Chinese efforts and made Chinese government more vocal Tit for tat Huawei / ZTE challenges in US market PLA indictments Emergence of local heroes Development of domestic IT companies has made China less dependent on foreign IT. And yet. 7
8 Existing Regime mofo.com
9 Existing Regime Heavy media focus on potential new laws But current action taken under existing statutory regime Existing patchwork of laws, regulations and measures issued by various overlapping authorities including: Cybersecurity Administration of China (CAC) Ministry of Public Security (MSP) / Public Security Bureau (PSB) China Information Security Center (CISSC) State Cryptography Administration (SCA) Regulations on the Protection of Computer Information Systems (PCIS Regulations) issued in 1994 provide key framework 9
10 Administrative Measures for the Graded Protection of Information Security Issued under the PCIS Regulations by MPS in 2007 Applies to company s own computer systems Establishes five grades of information systems based on potential damage a failure could cause Different grades have different consequences: Grade 2+ require assessment of risk against national standards and filings with PSB Grade 3+ products need PRC domestic producer and IP rights, declaration of no back doors, and regular inspections by authorized agency Examples of impact: Intrusive inspection requests by PSB Chinese entities requiring suppliers to provide source code 10
11 Measures on the Administration of Product Testing and Sales Permit of Computer Information System Security Special Products Issued under the PCIS Regulations by MPS in 1997 Covers hardware and software ( Security Products ) used for: Physical Security Operational Security Information Security China producer or distributor must apply for per product sales permit Requires submission of product for testing by Chinese lab Need to retest whenever security functions change Sale without permit is unlawful Inclusion of any harmful data which endangers security of information systems may be a criminal offence Easy to miss compliance for non-core functionality and addons 11
12 Notice on Establishing the National Information Security Product Certification and Accreditation System Issued by CISCC and other regulators in 2004 Covers13 types of product, including: firewalls backup intrusion detection Overlaps with MPS Security Products Measures But technically distinct regime Must be certified by CISCC before sale in China Technically applies to all sales But no penalties and historically only enforced in Government tendering 12
13 New Laws mofo.com
14 Guiding Opinions on Strengthening Network Security in the Telecommunications and Internet Sectors Issued by MIIT, September 1, 2014 Calls for strengthening of network security, including through enhanced enforcement of 2010 Measures Calls for promotion of use of secure and controllable hardware and software Encourages establishment of network security certification systems 14
15 Guiding Opinions regarding Application of Secure and Controllable Information Technologies to Strengthen Network Security and Informization of Banking Sector Issued by CBRC, MIIT, NDRC, MOST, September 3, 2014 Priority to secure and controllable information technologies in processing sensitive customer data. Initial focus on network equipment, storage, middle-end and low-end servers, information security, maintenance services and word processing software Sets goals for individual banks in use of secure and controllable technologies: 15% in 15%; 75% in 2019 Calls for establishment of cyber security review standards for banking sector The Guiding Opinions include general language encouraging indigenous innovation, without providing detail as to how it will be encouraged. At the same time they call for open cooperation 15
16 DRAFT Information Security Techniques Basic Requirements Of Security For Cloud Computing Service Provider Of Government Department Issued by GAQSIQ and SAC, July 2012 Applies to provision of cloud computing services to government procurement market Sets out various requirements for service providers, including: must be locally incorporated must have passed information security certification data processing, transmission and storage must be undertaken in China Stipulates various conditions that must be met by the security technology utilized in provision of cloud services 16
17 Other developments (1) Administrative Measures on Management of Population Health Information, issued May, 2014 by National Health and Family Planning Commission Requires products utilized in healthcare IT systems to comply with the national cybersecurity review regime Security Code of Conduct for Information Security Technology of Information Technology Products Suppliers for Information Technology Products, issued by TC260 for comment, spring 2014 Draft Self-discipline Convention on Safeguarding User's Network Security by Information Technology Product Suppliers, distributed December 2, 2014 by TC260 and CISCC Limits scope of remote control; requires that users be given ability to disable Prohibits inclusion of backdoor covert interfaces Calls for testing of functions such as data collection and remote control functions in appropriate cases 17
18 Other developments (2) Cybersecurity review regime Alluded to in various regulations and government pronouncements May 22, 2014 news broadcast by SIIO officials describing basic parameters: focus on data security and controllability of key IT. November 27, 2014: SIIO head comments that the cybersecurity review system will be announced soon likely not a single document but a system with elements that include legal provisions, policies, national standards and a bureaucratic organization. January 19, 2015: SIIO official comments at an industry meeting that cybersecurity review measures will be submitted for government review in February. 18
19 Strategies mofo.com
20 Things to Consider Business as usual? Review existing business practices and products for compliance Even without new legislation, BAU may not be advisable Remote access functionality Query whether to include/disable? Avoid discriminatory pricing practices Be prepared to disclose Builds trust Will likely be necessary under new Cybersecurity rules Consider PRC specific code base 20
21 Structuring Strategies Go local Establish a local presence and employ staff in China Set up in Free Trade Zone? Show skin in the game Simple absentee licensee model becoming less viable Joint ventures with customers Joint ventures with local partners Work with strategic SOEs? Operational Partners Investment Partners Strategic Partners 21
22 Marketing Strategies Emphasize the long haul Focus on China problems Or at least market yourself as such GE Differentiate yourself from the local heroes Bring higher tier technologies to China Local branding? 22
23 Protect Your IP Protecting disclosed IP: Patents Difficult to obtain software patents in China Consider utility model patents for physical devices Copyright Registration? Filing with China Copyright Protection Center (CPCC) Voluntary not mandatory Provides key procedural advantages Rather bureaucratic and cumbersome procedure Historically not heavily used due to concerns over disclosure, but 23
24 Any questions? 24
25 Lunch & Learn Paul D. McKenzie Managing Partner, Beijing Corporate Practice T: +86 (10) E: Gordon A. Milner Partner, Hong Kong Technology Transactions Practice T: E: Monday, 9 February 2015: Anti-corruption Compliance: Minimizing the Supply Chain Risk Speakers: Alistair Maughan & Kevin Roberts Monday, 9 March 2015: Drafting Effective Arbitration & Dispute Resolution Agreements Speaker: Gemma Anderson 25
Contract Law Highlights of 2014
Lunch & Learn 2014 Christmas Special 246660 Contract Law Highlights of 2014 8 December 2014 Alistair Maughan, Sue McLean, Amy Collins 2014 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch
More informationChina pushes change in IT infrastructure by strengthening regulation of cyber security
April 2015 China pushes change in IT infrastructure by strengthening regulation of cyber security China pushes change in IT infrastructure by strengthening regulation of cyber security The CBRC s recent
More informationCyber Security and the Impact on Banks in China
Cyber Security and the Impact on Banks in China Regulatory Policy Development and Updates March 015 kpmg.com/cn Executive Summary The China Banking Regulatory Commission (CBRC) issued two circulars (Circulars
More informationengagement will not only ensure the best possible law, but will also promote the law s successful implementation.
US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More informationNational Security Considerations in China s Financial Sectors an International Perspective.
9 September 2015 National Security Considerations in China s Financial Sectors an International Perspective. National Security Considerations in China s Financial Sectors an International Perspective Background
More informationHow To Respect The Agreement On Trade In Cyberspace
CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationChina Cloud-based Services Structure Options
Zhong Lun Law Firm Beijing Shanghai Shenzhen Guangzhou Wuhan Chengdu Tokyo Hong Kong London New York Robert Lewis 11 June 2013 China Cloud-based Services Structure Options Cloud-based services in China
More informationTestimony before the U.S.-China Economic and Security Review Commission: Regulatory Barriers to Digital Trade in China, and Costs to US Firms
Testimony before the U.S.-China Economic and Security Review Commission: Regulatory Barriers to Digital Trade in China, and Costs to US Firms Key take-aways The Chinese government will press forward with
More informationCHINA S EXPORT CONTROLS AND ENCRYPTION REGULATIONS
CHINA S EXPORT CONTROLS AND ENCRYPTION REGULATIONS Chris Cloutier December 11, 2008 OVERVIEW CHINA S EXPORT CONTROL REGIME International Commitments Statutory Framework Regulatory Framework Key Organizations
More informationLunch & Learn: Legal Issues For Mobile Apps 09 June 2014 Presented By Chris Coulter
Lunch & Learn: Legal Issues For Mobile Apps 09 June 2014 Presented By Chris Coulter 2014 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes via
More informationOnline Sales in China: Opportunities amidst Regulatory Confusion
Online Sales in China: Opportunities amidst Regulatory Confusion Wednesday, 2 November 2011 Lothar Determann, Partner, Palo Alto Bing Ho, Partner, Shanghai Howard Wu, Partner, Shanghai Baker & McKenzie
More informationChina s 12th Five-Year Plan: Healthcare sector
China s 12th Five-Year Plan: Healthcare sector May 2011 KPMG CHINA One of the guiding principles of the 12th Five-Year Plan (5YP) is inclusive growth : helping ensure that the benefits of the country s
More informationPosition Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security
Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic
More informationThe Cloud and Cross-Border Risks - Singapore
The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in
More informationLunch & Learn: Big Data Analytics
239767 Lunch & Learn: Big Data Analytics 13 April 2015 Sue McLean Alex van der Wolk 2015 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes via
More informationTrends and Tactics in Cyber- Terrorism
Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends
More informationShip finance leasing in China
Ship finance leasing in China FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES Jonathan Silver Of Counsel, Norton
More informationApplication of the Electronic Communications and Transactions Act to Online Merchants From Other Jurisdictions
Northwestern Journal of Technology and Intellectual Property Volume 1 Issue 1 Spring Article 7 Spring 2003 Application of the Electronic Communications and Transactions Act to Online Merchants From Other
More informationAustralia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia
More informationSoftware as a Service in China: Legal Requirements and Solutions for U.S. Software Businesses
Software as a Service in China: Legal Requirements and Solutions for U.S. Software Businesses Fred Greguras 1 Xiao Liu 2 Software as a service ( SaaS ) or cloud computing is an important software delivery
More informationMIIT PROMULGATES TWO REGULATIONS FOR REPORTING AND HANDLING CYBERCRIME
TMT Newsletter 22 June 2009 - TransAsia Lawyers Page 1 of 5 PRC Telecoms, Media & Technology Law Newsletter 22 June 2009 MIIT PROMULGATES TWO REGULATIONS FOR REPORTING AND HANDLING CYBERCRIME Background
More informationINFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES
INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES Doc REF: ICTA/VAC/Feb09/01 Applications are invited from suitably qualified candidates for the following positions: A. Director
More informationIT Security Evaluation in China
IT Security Evaluation in China Yi Mao, Ph.D., CISSP atsec information security cooperation Austin, TX USA www.atsec.com yi@atsec.com ICCC 2012 September 18-20, Paris, France atsec information security,
More informationACT. Of.2014. On Cyber Security and Change of Related Acts (Act on Cyber Security)
ACT Of.2014 On Cyber Security and Change of Related Acts (Act on Cyber Security) The Parliament has resolved on the following Act of the Czech Republic: PART ONE Cyber Security Chapter I General provisions
More informationAccounting in China. I. Legal Framework
With the founding of the PRC in 1949, all resources of production in the country came under State ownership, and basically the only form of economic entity was the state-owned enterprise (SOE). The accounting
More informationEstablishment of a Representative Office
Establishment of a Representative Office The Representative Office (RO) is one of the common business vehicles through which a foreign company can establish their first presence in China. The relative
More informationNovember 03, 2009. Via Electronic Mail to www.regulations.gov
November 03, 2009 Via Electronic Mail to www.regulations.gov Ms. Gloria Blue Executive Secretary, Trade Policy Staff Committee Office of the U.S. Trade Representative 600 17th Street, N.W. Washington,
More informationUnder the Cybersecurity Law, network operators are obligated to consider the following security
On July 6, 2015, the Standing Committee of the National People s Congress (NPCSC) of the People s Republic of China published a draft on Cybersecurity Law. A public comment period on the Cybersecurity
More informationChina s Anti-Spam Works
China s Anti-Spam Works Jingguang FU Ministry of Information Industry, China Geneva 7-9 July 2004 China s current situation of spam problem China is a serious victim of spam problem. A survey shows that
More informationProvisional Measures for Construction Project Management
Provisional Measures for Construction Project Management Article 1 Article 2 Purpose and Basis This Provisional Measure is promulgated in accordance with relevant Chinese laws and administrative regulations
More informationACC San Diego Chapter
ACC San Diego Chapter Biomedical and Technology Collaborations with Chinese Companies: Legal and Cultural Challenges October 2012 DLA Piper Overview Our Firm 4,200 lawyers in 77 offices and 33 countries
More informationAnti-counterfeiting Situation in China
Anti-counterfeiting Situation in China Lei Sun Bureau of Inspection SFDA of China 2010-12 Drug counterfeiting endangered people Drug counterfeiting is a global problem. Counterfeit drugs appear in all
More informationUpdate on Company Law. Hong Kong Arts Administrators Association 10 th March 2014 2:00pm 4:00pm
Update on Company Law Hong Kong Arts Administrators Association 10 th March 2014 2:00pm 4:00pm 1 Introduction Rewrite of the Companies Ordinance was endorsed by the Legislative Council in mid- 2006 The
More informationANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001
ANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001 I. Introduction A longstanding objective of U.S. trade policy has been to open opportunities for U.S. suppliers to compete
More informationInformation security due diligence
web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 info@watsonhall.com www.watsonhall.com Identifying information security risk for web applications
More informationEnsuring Data Protection in the Cloud
Ensuring Data Protection in the Cloud The contact center is the world s hub for personally identifiable information. From mobile service providers to pet insurance companies and everything in between we
More informationPRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of
PRIVACY POLICY Mil y Un Consejos Network Version Date: April 15th 2010 GENERAL Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of its users ( user or you ) whether they use
More informationCNNIC Implementing Rules of Domain Name Registration
CNNIC Implementing Rules of Domain Name Registration Chapter 1 General Article 1 These Rules are formulated in accordance with the provisions of the China Internet Domain Name Regulations (hereinafter
More informationIP Considerations in Outsourcing Agreements
IP Considerations in Outsourcing Agreements Speakers: Moderator: Diana Mansour, Associate, Gardner Roberts LLP Mathew Snell, GTS Canada Senior Counsel, IBM Canada Ildiko Mehes, VP and General Counsel,
More informationRegulations on Administration of Internet News Information Services
Regulations on Administration of Internet News Information Services (Promulgated by the Press Office of the State Council and Ministry of Information Industry on 25 September 2005 and effective as of date
More informationE-commerce liberalization in China: State Council and MIIT push forward
E-commerce liberalization in China: State Council and MIIT push forward Contents State Council orders government agencies to take liberalization steps 1 JUNE [ MIIT removes foreign ownership restrictions
More informationInternet investment scams in China
Internet investment scams in China How to protect your business s reputation in China You get a call. Your offices in Beijing and Shanghai have been inundated with complaints from distressed members of
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationCONTRACT MANAGEMENT POLICY
CONTRACT MANAGEMENT POLICY Section Finance Approval Date 25/08/2014 Approved by Directorate Next Review Aug 2016 Responsibility Chief Operating Officer Key Evaluation Question 6 PURPOSE The purpose of
More informationGetting Serious about Privacy and Cyber Security in Asia Pacific
SESSION ID: CDS-F04 Getting Serious about Privacy and Cyber Security in Asia Pacific Scott Thiel Partner DLA Piper @DLA_Piper Peter Jones Partner DLA Piper @DLA_Piper Agenda Current threat environment
More informationLegislative Council Secretariat INFORMATION NOTE. Regulation of advertising and sponsorship for commercial radio broadcasting in selected places
INFORMATION NOTE Regulation of advertising and sponsorship for commercial radio broadcasting in selected places 1. Background 1.1 At its meeting held on 13 May 2010, the Panel on Information Technology
More informationDEFINITIONS. "this web site" means www.vericredonline.com. "user" means any person accessing any part of this web site DISCLAIMER
DEFINITIONS VeriCred Collections means VeriCred Credit Bureau (Pty) Ltd, a private company, with limited liability, duly registered and incorporated as such in accordance with the laws of the Republic
More informationShare with a colleague. 16 July 2012 Hong Kong. Awards. Background. International TMT Team of the Year China Law & Practice Awards, 2011
Page 1 of 2 Breaking news: PRC telecoms market finally open for private domestic and foreign investments? On 27 June 2012, the Ministry of Industry and Information Technology released a ground-breaking
More informationInformation Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
More informationHow To Protect The Internet In The Germany
Computer Information Network and Internet Security, Protection and Management Regulations (Original translation provided by the US Embassy in Beijing) (Approved by the State Council on December 11 1997
More informationGeorgia. Progress Report
Anti-Corruption Network for Eastern Europe and Central Asia Istanbul Anti-Corruption Action Plan Second Round of Monitoring Georgia Progress Report Report is presented by Georgia at the 10 th Monitoring
More informationPersonal Data & Privacy Policy Statement
Personal Data & Privacy Policy Statement Your Privacy Hong Kong Broadband Network Limited ("we" or the "Company") respect the privacy rights of visitors to all our company websites (the Websites ) and
More informationCOMPANY WINDING UP AND LIQUIDATION IN CHINA by Editorial Staff writer
COMPANY WINDING UP AND LIQUIDATION IN CHINA by Editorial Staff writer INTRODUCTION In the People s Republic of China ( PRC ), winding up is broadly divided into insolvency winding up and winding up by
More informationSecurities Exchange Certificate Transaction Law (2013, Pyidaungsu Hluttaw Law No. 20) The 9 th Waning of Waso 1375. M.E (30 th July 2013)
Securities Exchange Certificate Transaction Law (2013, Pyidaungsu Hluttaw Law No. 20) The 9 th Waning of Waso 1375. M.E (30 th July 2013) The Pyidaungsu Hluttaw hereby enacts this Law. Chapter 1 Title
More informationINSTITUTE FOR SAFE MEDICATION PRACTICES CANADA
INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA PRIVACY IMPACT ASSESSMENT (PIA) ON ANALYZE-ERR AND CURRENT DATA HANDLING OPERATIONS VERSION 3.0-2 JULY 11, 2005 PREPARED IN CONJUNCTION WITH: ISMP Canada
More informationORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA ON THE AMENDMENT OF THE ORDER NO. 1V-1013 ON THE APPROVAL OF THE RULES ON THE ENSURANCE OF SECURITY AND INTEGRITY
More informationInternational Safeguards Infrastructure Development
PNNL-SA-74182 International Safeguards Infrastructure Development NGSI Lecture Series, 2011 Sarah Frazar 1 Structure! Overview of the Milestones Process and its three phases! National Development of a
More informationHardware. Maintenance
Government Services available through the portal 1. The scope of the work is limited to the portal and its integration with service provider applications. It doesn't include any work on the service provider
More informationEfficient alternative dispute resolution (ADR) for intellectual property disputes
13.1 Efficient alternative dispute resolution (ADR) for intellectual property disputes More and more rights holders are recognizing the benefits of using private neutral mechanisms that allow parties to
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More information4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, 2015. Agenda
Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing? Cloud CISC Pilot Demo Next Steps Questions?
More informationThe Architecture of Control: Internet Surveillance in China James A. Lewis, Center for Strategic and International Studies July 2006
The Architecture of Control: Internet Surveillance in China James A. Lewis, Center for Strategic and International Studies July 2006 Security concerns shape China s official internet and information technology
More informationTerms for the Treestle LiquiD SaaS Agreement
Terms for the Treestle LiquiD SaaS Agreement This LiquiD Software As A Service Agreement (the Agreement ) is a legal agreement between you or your company and Treestle B.V. ( Treestle ), a company with
More informationApply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu. Pan Yang Deputy Director of Promotion Division, Chengdu, PRC
Apply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu Pan Yang Deputy Director of Promotion Division, Chengdu, PRC Overview of IT and Industry Convergence (1/2) March 2013 According
More informationINSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM
INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM The completed form should be sent to: Box EBC Washington D.C.20231 Block 1- Requestor Status The Certificate requester should check the appropriate
More informationIntellectual Property Rights In China
Intellectual Property Rights In China Intellectual Property Office is an operating name of the Patent Office Contents Intellectual Property Rights In China What Are Intellectual Property Rights? International
More informationTELECOMMUNICATIONS ORDINANCE (Chapter 106) CLASS LICENCE. Section 8(1)(aa) of the Telecommunications Ordinance OFFER OF TELECOMMUNICATIONS SERVICES
TELECOMMUNICATIONS ORDINANCE (Chapter 106) CLASS LICENCE Section 8(1)(aa) of the Telecommunications Ordinance OFFER OF TELECOMMUNICATIONS SERVICES The Telecommunications Authority, in exercise of the powers
More informationCYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATION. Scott Thiel, Partner June 2015
CYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATIN Scott Thiel, Partner June 2015 Agenda 1. Current threat environment 2. Regulatory frameworks of countries in the Asia Pacific region 3. Key challenges
More informationFinancial Services Update June 11, 2013
Financial Services Update June 11, 2013 HIGHLIGHTS Federal Regulatory Developments: CFPB Amends Examination Manual State Regulatory Developments: Texas Proposes Constitutional Amendment Regarding Reverse
More informationIntellectual Property Rights in the USA
Intellectual Property Rights in the USA Intellectual Property Office is an operating name of the Patent Office Contents Intellectual property rights in the USA What are intellectual property rights? International
More informationAN INTRODUCTION TO OUR SERVICES
GET TO KNOW BDO U.S.-CHINA TAX DESK July 2014 Page 2 AN INTRODUCTION TO OUR SERVICES SHARED CULTURE/SHARED LANGUAGE Whether you are looking to expand your business into the U.S. or China, members of BDO
More informationChina opens up its bank card payment clearing market
June 2015 China opens up its bank card payment clearing market The Decision to Implement Market Access Administration for Bank Card Clearing Institutions (the Decision ) of the State Council, which came
More informationSFKS Xi an Electronic Newspaper Issue One Hundred and Twenty-Three June 2013
SFKS Xi an Electronic Newspaper Issue One Hundred and Twenty-Three June 2013 Laws and Regulations Updates I. Supreme People s Court s Explanations for Several Matters Concerning the Applicability of the
More informationSoftware as a Service (SaaS) Contract. I. Subject matter of the Contract. II. Software provision
Software as a Service (SaaS) Contract By completing the registration form (ordering bexio), you shall become subject to the following General Terms and Conditions ("General Terms and Conditions"). I. Subject
More informationAPEC General Elements of Effective Voluntary Corporate Compliance Programs
2014/CSOM/041 Agenda Item: 3 APEC General Elements of Effective Voluntary Corporate Compliance Programs Purpose: Consideration Submitted by: United States Concluding Senior Officials Meeting Beijing, China
More informationForeign Investor s Chance to Invest in RMB EIE/EIFs by Means of RFDI
Llinks Corporate Bulletin April 2012 New Means for Foreign Investors to Invest in RMB Equity Investment Funds: By David Yu, Nicholas Lou and Kevin Huang Ever since the promulgation of the Administrative
More informationWhat Every Business Lawyer Should Know About International Transactions
What Every Business Lawyer Should Know About International Transactions Presenter M. Angella Castille, Faegre Baker Daniels LLP February 19, 2015 BUS270 1.0 General Credit Title 9 Update: A Review of the
More informationBMS e-tendering manual
BMS e-tendering manual Procurement BMS e-tendering manual Procurement This manual aims to provide all suppliers with the basic information to complete the required actions in the Department s Business
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More information1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes.
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD The goal of this document is to provide adequate security and integrity for background check information while under the control or management of an
More informationHong Kong Information Technology Federation
HKITF Response to the Consultation on Mainland / Hong Kong Closer Economic Partnership Arrangement 1. The Hong Kong Information Technology Federation (HKITF) strongly supports the effort of the Hong Kong
More informationGOVERNMENT CONTRACT. Westlaw Journal
Westlaw Journal GOVERNMENT CONTRACT Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 26, ISSUE 13 / OCTOBER 29, 2012 Expert Analysis Switching to Offense in Government Contracting:
More informationLAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE. Chapter two. ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007 Chapter one.
More informationDISCLOSURE STATEMENT PREPARED BY
DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationAd blocker: A new right for users or a threat for the internet? Relevance & State of the Law in Asia
Ad blocker: A new right for users or a threat for the internet? Relevance & State of the Law in Asia John Eastwood Oct. 6, 2015, International Bar Association www.eigerlaw.com People s Republic of China:
More informationBloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all
More informationBecoming a Sustainable Brand in China. By Jordi Martin Business Development Manager at Koehler Group November 2014
Becoming a Sustainable Brand in China By Jordi Martin Business Development Manager at Koehler Group November 2014 Koehler Group About Us Koehler Group (formerly known as Klako Group) is an international
More informationInternational Franchise & Business Opportunities May 28, 2014. VCI Legal Award-winning expertise with practical insights
International Franchise & Business Opportunities May 28, 2014 VCI Legal Award-winning expertise with practical insights Tuan A. PHUNG Esq. Managing Partner VCI Legal Hon. General Consul Finnish Consulate
More informationINFORMATION NOTE. Regulation of gambling-related advertisements in public areas
INFORMATION NOTE Regulation of gambling-related advertisements in public areas 1. Background 1.1 This information note aims to provide the Panel on Home Affairs ("the Panel") with information on the regulation
More informationDVN s Business Model 20
20 DVN s Business Model 33 Cities Mandated to Migrate to Digital 33 DVN has relationships with significant % of the 33 cities to be digitalised. 33 Relationship with DVN Annual Report 2003 21 DVN s Business
More informationThird party Web hosting services security Policy
Office of the Prime Minister Policy document CIMU P 0013:2003 Version: 2.0 Effective date: 09.04.2003 Third party Web hosting services security Policy 1. Policy statement i) General The Government of Malta
More informationinsurance bulletin unlicensed insurance in Canada
September 2013 insurance bulletin unlicensed insurance in Canada This article addresses certain issues relating to foreign insurers conducting unlicensed insurance in Canada, a few years after the federal
More informationChina's new national security law creates more insecurity for foreign businesses
China's new national security law creates more insecurity for foreign businesses Contents Overview 1 JULY Broad definition of national security 1 Expanded national security review regime 1 NSR in relation
More informationAGREEMENT AS AMENDED ON 06 DECEMBER 2002
INFORMATION & COMMUNICATION TECHNOLOGIES SECTOR SUMMIT AGREEMENT AS AMENDED ON 06 DECEMBER 2002 1. INTRODUCTION 1.1 At the Presidential Jobs Summit in 1998 Nedlac constituencies Government, organised Labour,
More informationMicrosoft Cloud Computing Research Centre
Microsoft Cloud Computing Research Centre 1 st Annual Symposium, Cambridge 2014 : Legal frameworks Ian Walden i.n.walden@qmul.ac.uk 1 Introductory remarks From organised crime to law enforcement The Snowden
More informationSSE Newsletter. October 2015. Vol. 29. Highlights:
Vol. 29 SSE Newsletter October 2015 Highlights: SSE Composite rose by 10.80% in October 2015, while trading volume showed significant increase compared with that of the previous month SSE, Deutsche Boerse
More informationPromoting Cross Border Data Flows Priorities for the Business Community
Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
More information