Lunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner

Size: px
Start display at page:

Download "Lunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner"

Transcription

1 Lunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner mofo.com

2 Lunch & Learn 2 nd Monday of each month 45 minutes via webinar Unaccredited CPD points Upcoming topics Monday, 9 February 2015: Anti-corruption Compliance: Minimizing the Supply Chain Risk Speakers: Alistair Maughan & Kevin Roberts Monday, 9 March 2015: Drafting Effective Arbitration & Dispute Resolution Agreements Speaker: Gemma Anderson 2

3 Today Questions at the end. Or us afterwards. Phones are muted to reduce background noise. We ll unmute at the end.

4 Background mofo.com

5 Background March, 2011: China s National People s Congress approves 5 Year Plan Sets information security as key priority for ; domestic control of hardware and software May, 2011: State Internet Information Office set up October, 2012: US congressional report on national security risks posed by Huawei January, 2013: China s National Information Security Standards Technical Committee (TC260) includes in annual workplan to support information security review process June 2013: Snowden disclosures 5

6 Background 2014 January, 2014: Xi sets up Cybersecurity Administration of China (CAC) through restructuring of SIIO May 2014: US indictment of PLA officers Market rumour that SOEs told not to use US IT consulting firms Healthcare measures reference national cybersecurity review regime Windows 8 banned from GP market CAC announces coming cybersecurity review rules August 2014: Symantec, Kaspersky banned from China GP market Ministry of Industry and Information Security (MIIT) issues Guiding Opinions 6

7 Why now? Media revelations on activities of security services Snowden disclosures seem to have accelerated Chinese efforts and made Chinese government more vocal Tit for tat Huawei / ZTE challenges in US market PLA indictments Emergence of local heroes Development of domestic IT companies has made China less dependent on foreign IT. And yet. 7

8 Existing Regime mofo.com

9 Existing Regime Heavy media focus on potential new laws But current action taken under existing statutory regime Existing patchwork of laws, regulations and measures issued by various overlapping authorities including: Cybersecurity Administration of China (CAC) Ministry of Public Security (MSP) / Public Security Bureau (PSB) China Information Security Center (CISSC) State Cryptography Administration (SCA) Regulations on the Protection of Computer Information Systems (PCIS Regulations) issued in 1994 provide key framework 9

10 Administrative Measures for the Graded Protection of Information Security Issued under the PCIS Regulations by MPS in 2007 Applies to company s own computer systems Establishes five grades of information systems based on potential damage a failure could cause Different grades have different consequences: Grade 2+ require assessment of risk against national standards and filings with PSB Grade 3+ products need PRC domestic producer and IP rights, declaration of no back doors, and regular inspections by authorized agency Examples of impact: Intrusive inspection requests by PSB Chinese entities requiring suppliers to provide source code 10

11 Measures on the Administration of Product Testing and Sales Permit of Computer Information System Security Special Products Issued under the PCIS Regulations by MPS in 1997 Covers hardware and software ( Security Products ) used for: Physical Security Operational Security Information Security China producer or distributor must apply for per product sales permit Requires submission of product for testing by Chinese lab Need to retest whenever security functions change Sale without permit is unlawful Inclusion of any harmful data which endangers security of information systems may be a criminal offence Easy to miss compliance for non-core functionality and addons 11

12 Notice on Establishing the National Information Security Product Certification and Accreditation System Issued by CISCC and other regulators in 2004 Covers13 types of product, including: firewalls backup intrusion detection Overlaps with MPS Security Products Measures But technically distinct regime Must be certified by CISCC before sale in China Technically applies to all sales But no penalties and historically only enforced in Government tendering 12

13 New Laws mofo.com

14 Guiding Opinions on Strengthening Network Security in the Telecommunications and Internet Sectors Issued by MIIT, September 1, 2014 Calls for strengthening of network security, including through enhanced enforcement of 2010 Measures Calls for promotion of use of secure and controllable hardware and software Encourages establishment of network security certification systems 14

15 Guiding Opinions regarding Application of Secure and Controllable Information Technologies to Strengthen Network Security and Informization of Banking Sector Issued by CBRC, MIIT, NDRC, MOST, September 3, 2014 Priority to secure and controllable information technologies in processing sensitive customer data. Initial focus on network equipment, storage, middle-end and low-end servers, information security, maintenance services and word processing software Sets goals for individual banks in use of secure and controllable technologies: 15% in 15%; 75% in 2019 Calls for establishment of cyber security review standards for banking sector The Guiding Opinions include general language encouraging indigenous innovation, without providing detail as to how it will be encouraged. At the same time they call for open cooperation 15

16 DRAFT Information Security Techniques Basic Requirements Of Security For Cloud Computing Service Provider Of Government Department Issued by GAQSIQ and SAC, July 2012 Applies to provision of cloud computing services to government procurement market Sets out various requirements for service providers, including: must be locally incorporated must have passed information security certification data processing, transmission and storage must be undertaken in China Stipulates various conditions that must be met by the security technology utilized in provision of cloud services 16

17 Other developments (1) Administrative Measures on Management of Population Health Information, issued May, 2014 by National Health and Family Planning Commission Requires products utilized in healthcare IT systems to comply with the national cybersecurity review regime Security Code of Conduct for Information Security Technology of Information Technology Products Suppliers for Information Technology Products, issued by TC260 for comment, spring 2014 Draft Self-discipline Convention on Safeguarding User's Network Security by Information Technology Product Suppliers, distributed December 2, 2014 by TC260 and CISCC Limits scope of remote control; requires that users be given ability to disable Prohibits inclusion of backdoor covert interfaces Calls for testing of functions such as data collection and remote control functions in appropriate cases 17

18 Other developments (2) Cybersecurity review regime Alluded to in various regulations and government pronouncements May 22, 2014 news broadcast by SIIO officials describing basic parameters: focus on data security and controllability of key IT. November 27, 2014: SIIO head comments that the cybersecurity review system will be announced soon likely not a single document but a system with elements that include legal provisions, policies, national standards and a bureaucratic organization. January 19, 2015: SIIO official comments at an industry meeting that cybersecurity review measures will be submitted for government review in February. 18

19 Strategies mofo.com

20 Things to Consider Business as usual? Review existing business practices and products for compliance Even without new legislation, BAU may not be advisable Remote access functionality Query whether to include/disable? Avoid discriminatory pricing practices Be prepared to disclose Builds trust Will likely be necessary under new Cybersecurity rules Consider PRC specific code base 20

21 Structuring Strategies Go local Establish a local presence and employ staff in China Set up in Free Trade Zone? Show skin in the game Simple absentee licensee model becoming less viable Joint ventures with customers Joint ventures with local partners Work with strategic SOEs? Operational Partners Investment Partners Strategic Partners 21

22 Marketing Strategies Emphasize the long haul Focus on China problems Or at least market yourself as such GE Differentiate yourself from the local heroes Bring higher tier technologies to China Local branding? 22

23 Protect Your IP Protecting disclosed IP: Patents Difficult to obtain software patents in China Consider utility model patents for physical devices Copyright Registration? Filing with China Copyright Protection Center (CPCC) Voluntary not mandatory Provides key procedural advantages Rather bureaucratic and cumbersome procedure Historically not heavily used due to concerns over disclosure, but 23

24 Any questions? 24

25 Lunch & Learn Paul D. McKenzie Managing Partner, Beijing Corporate Practice T: +86 (10) E: Gordon A. Milner Partner, Hong Kong Technology Transactions Practice T: E: Monday, 9 February 2015: Anti-corruption Compliance: Minimizing the Supply Chain Risk Speakers: Alistair Maughan & Kevin Roberts Monday, 9 March 2015: Drafting Effective Arbitration & Dispute Resolution Agreements Speaker: Gemma Anderson 25

Contract Law Highlights of 2014

Contract Law Highlights of 2014 Lunch & Learn 2014 Christmas Special 246660 Contract Law Highlights of 2014 8 December 2014 Alistair Maughan, Sue McLean, Amy Collins 2014 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch

More information

China pushes change in IT infrastructure by strengthening regulation of cyber security

China pushes change in IT infrastructure by strengthening regulation of cyber security April 2015 China pushes change in IT infrastructure by strengthening regulation of cyber security China pushes change in IT infrastructure by strengthening regulation of cyber security The CBRC s recent

More information

Cyber Security and the Impact on Banks in China

Cyber Security and the Impact on Banks in China Cyber Security and the Impact on Banks in China Regulatory Policy Development and Updates March 015 kpmg.com/cn Executive Summary The China Banking Regulatory Commission (CBRC) issued two circulars (Circulars

More information

engagement will not only ensure the best possible law, but will also promote the law s successful implementation.

engagement will not only ensure the best possible law, but will also promote the law s successful implementation. US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

National Security Considerations in China s Financial Sectors an International Perspective.

National Security Considerations in China s Financial Sectors an International Perspective. 9 September 2015 National Security Considerations in China s Financial Sectors an International Perspective. National Security Considerations in China s Financial Sectors an International Perspective Background

More information

How To Respect The Agreement On Trade In Cyberspace

How To Respect The Agreement On Trade In Cyberspace CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

China Cloud-based Services Structure Options

China Cloud-based Services Structure Options Zhong Lun Law Firm Beijing Shanghai Shenzhen Guangzhou Wuhan Chengdu Tokyo Hong Kong London New York Robert Lewis 11 June 2013 China Cloud-based Services Structure Options Cloud-based services in China

More information

Testimony before the U.S.-China Economic and Security Review Commission: Regulatory Barriers to Digital Trade in China, and Costs to US Firms

Testimony before the U.S.-China Economic and Security Review Commission: Regulatory Barriers to Digital Trade in China, and Costs to US Firms Testimony before the U.S.-China Economic and Security Review Commission: Regulatory Barriers to Digital Trade in China, and Costs to US Firms Key take-aways The Chinese government will press forward with

More information

CHINA S EXPORT CONTROLS AND ENCRYPTION REGULATIONS

CHINA S EXPORT CONTROLS AND ENCRYPTION REGULATIONS CHINA S EXPORT CONTROLS AND ENCRYPTION REGULATIONS Chris Cloutier December 11, 2008 OVERVIEW CHINA S EXPORT CONTROL REGIME International Commitments Statutory Framework Regulatory Framework Key Organizations

More information

Lunch & Learn: Legal Issues For Mobile Apps 09 June 2014 Presented By Chris Coulter

Lunch & Learn: Legal Issues For Mobile Apps 09 June 2014 Presented By Chris Coulter Lunch & Learn: Legal Issues For Mobile Apps 09 June 2014 Presented By Chris Coulter 2014 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes via

More information

Online Sales in China: Opportunities amidst Regulatory Confusion

Online Sales in China: Opportunities amidst Regulatory Confusion Online Sales in China: Opportunities amidst Regulatory Confusion Wednesday, 2 November 2011 Lothar Determann, Partner, Palo Alto Bing Ho, Partner, Shanghai Howard Wu, Partner, Shanghai Baker & McKenzie

More information

China s 12th Five-Year Plan: Healthcare sector

China s 12th Five-Year Plan: Healthcare sector China s 12th Five-Year Plan: Healthcare sector May 2011 KPMG CHINA One of the guiding principles of the 12th Five-Year Plan (5YP) is inclusive growth : helping ensure that the benefits of the country s

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

The Cloud and Cross-Border Risks - Singapore

The Cloud and Cross-Border Risks - Singapore The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in

More information

Lunch & Learn: Big Data Analytics

Lunch & Learn: Big Data Analytics 239767 Lunch & Learn: Big Data Analytics 13 April 2015 Sue McLean Alex van der Wolk 2015 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes via

More information

Trends and Tactics in Cyber- Terrorism

Trends and Tactics in Cyber- Terrorism Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends

More information

Ship finance leasing in China

Ship finance leasing in China Ship finance leasing in China FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES Jonathan Silver Of Counsel, Norton

More information

Application of the Electronic Communications and Transactions Act to Online Merchants From Other Jurisdictions

Application of the Electronic Communications and Transactions Act to Online Merchants From Other Jurisdictions Northwestern Journal of Technology and Intellectual Property Volume 1 Issue 1 Spring Article 7 Spring 2003 Application of the Electronic Communications and Transactions Act to Online Merchants From Other

More information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia

More information

Software as a Service in China: Legal Requirements and Solutions for U.S. Software Businesses

Software as a Service in China: Legal Requirements and Solutions for U.S. Software Businesses Software as a Service in China: Legal Requirements and Solutions for U.S. Software Businesses Fred Greguras 1 Xiao Liu 2 Software as a service ( SaaS ) or cloud computing is an important software delivery

More information

MIIT PROMULGATES TWO REGULATIONS FOR REPORTING AND HANDLING CYBERCRIME

MIIT PROMULGATES TWO REGULATIONS FOR REPORTING AND HANDLING CYBERCRIME TMT Newsletter 22 June 2009 - TransAsia Lawyers Page 1 of 5 PRC Telecoms, Media & Technology Law Newsletter 22 June 2009 MIIT PROMULGATES TWO REGULATIONS FOR REPORTING AND HANDLING CYBERCRIME Background

More information

INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES

INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES Doc REF: ICTA/VAC/Feb09/01 Applications are invited from suitably qualified candidates for the following positions: A. Director

More information

IT Security Evaluation in China

IT Security Evaluation in China IT Security Evaluation in China Yi Mao, Ph.D., CISSP atsec information security cooperation Austin, TX USA www.atsec.com yi@atsec.com ICCC 2012 September 18-20, Paris, France atsec information security,

More information

ACT. Of.2014. On Cyber Security and Change of Related Acts (Act on Cyber Security)

ACT. Of.2014. On Cyber Security and Change of Related Acts (Act on Cyber Security) ACT Of.2014 On Cyber Security and Change of Related Acts (Act on Cyber Security) The Parliament has resolved on the following Act of the Czech Republic: PART ONE Cyber Security Chapter I General provisions

More information

Accounting in China. I. Legal Framework

Accounting in China. I. Legal Framework With the founding of the PRC in 1949, all resources of production in the country came under State ownership, and basically the only form of economic entity was the state-owned enterprise (SOE). The accounting

More information

Establishment of a Representative Office

Establishment of a Representative Office Establishment of a Representative Office The Representative Office (RO) is one of the common business vehicles through which a foreign company can establish their first presence in China. The relative

More information

November 03, 2009. Via Electronic Mail to www.regulations.gov

November 03, 2009. Via Electronic Mail to www.regulations.gov November 03, 2009 Via Electronic Mail to www.regulations.gov Ms. Gloria Blue Executive Secretary, Trade Policy Staff Committee Office of the U.S. Trade Representative 600 17th Street, N.W. Washington,

More information

Under the Cybersecurity Law, network operators are obligated to consider the following security

Under the Cybersecurity Law, network operators are obligated to consider the following security On July 6, 2015, the Standing Committee of the National People s Congress (NPCSC) of the People s Republic of China published a draft on Cybersecurity Law. A public comment period on the Cybersecurity

More information

China s Anti-Spam Works

China s Anti-Spam Works China s Anti-Spam Works Jingguang FU Ministry of Information Industry, China Geneva 7-9 July 2004 China s current situation of spam problem China is a serious victim of spam problem. A survey shows that

More information

Provisional Measures for Construction Project Management

Provisional Measures for Construction Project Management Provisional Measures for Construction Project Management Article 1 Article 2 Purpose and Basis This Provisional Measure is promulgated in accordance with relevant Chinese laws and administrative regulations

More information

ACC San Diego Chapter

ACC San Diego Chapter ACC San Diego Chapter Biomedical and Technology Collaborations with Chinese Companies: Legal and Cultural Challenges October 2012 DLA Piper Overview Our Firm 4,200 lawyers in 77 offices and 33 countries

More information

Anti-counterfeiting Situation in China

Anti-counterfeiting Situation in China Anti-counterfeiting Situation in China Lei Sun Bureau of Inspection SFDA of China 2010-12 Drug counterfeiting endangered people Drug counterfeiting is a global problem. Counterfeit drugs appear in all

More information

Update on Company Law. Hong Kong Arts Administrators Association 10 th March 2014 2:00pm 4:00pm

Update on Company Law. Hong Kong Arts Administrators Association 10 th March 2014 2:00pm 4:00pm Update on Company Law Hong Kong Arts Administrators Association 10 th March 2014 2:00pm 4:00pm 1 Introduction Rewrite of the Companies Ordinance was endorsed by the Legislative Council in mid- 2006 The

More information

ANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001

ANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001 ANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001 I. Introduction A longstanding objective of U.S. trade policy has been to open opportunities for U.S. suppliers to compete

More information

Information security due diligence

Information security due diligence web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 info@watsonhall.com www.watsonhall.com Identifying information security risk for web applications

More information

Ensuring Data Protection in the Cloud

Ensuring Data Protection in the Cloud Ensuring Data Protection in the Cloud The contact center is the world s hub for personally identifiable information. From mobile service providers to pet insurance companies and everything in between we

More information

PRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of

PRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of PRIVACY POLICY Mil y Un Consejos Network Version Date: April 15th 2010 GENERAL Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of its users ( user or you ) whether they use

More information

CNNIC Implementing Rules of Domain Name Registration

CNNIC Implementing Rules of Domain Name Registration CNNIC Implementing Rules of Domain Name Registration Chapter 1 General Article 1 These Rules are formulated in accordance with the provisions of the China Internet Domain Name Regulations (hereinafter

More information

IP Considerations in Outsourcing Agreements

IP Considerations in Outsourcing Agreements IP Considerations in Outsourcing Agreements Speakers: Moderator: Diana Mansour, Associate, Gardner Roberts LLP Mathew Snell, GTS Canada Senior Counsel, IBM Canada Ildiko Mehes, VP and General Counsel,

More information

Regulations on Administration of Internet News Information Services

Regulations on Administration of Internet News Information Services Regulations on Administration of Internet News Information Services (Promulgated by the Press Office of the State Council and Ministry of Information Industry on 25 September 2005 and effective as of date

More information

E-commerce liberalization in China: State Council and MIIT push forward

E-commerce liberalization in China: State Council and MIIT push forward E-commerce liberalization in China: State Council and MIIT push forward Contents State Council orders government agencies to take liberalization steps 1 JUNE [ MIIT removes foreign ownership restrictions

More information

Internet investment scams in China

Internet investment scams in China Internet investment scams in China How to protect your business s reputation in China You get a call. Your offices in Beijing and Shanghai have been inundated with complaints from distressed members of

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

CONTRACT MANAGEMENT POLICY

CONTRACT MANAGEMENT POLICY CONTRACT MANAGEMENT POLICY Section Finance Approval Date 25/08/2014 Approved by Directorate Next Review Aug 2016 Responsibility Chief Operating Officer Key Evaluation Question 6 PURPOSE The purpose of

More information

Getting Serious about Privacy and Cyber Security in Asia Pacific

Getting Serious about Privacy and Cyber Security in Asia Pacific SESSION ID: CDS-F04 Getting Serious about Privacy and Cyber Security in Asia Pacific Scott Thiel Partner DLA Piper @DLA_Piper Peter Jones Partner DLA Piper @DLA_Piper Agenda Current threat environment

More information

Legislative Council Secretariat INFORMATION NOTE. Regulation of advertising and sponsorship for commercial radio broadcasting in selected places

Legislative Council Secretariat INFORMATION NOTE. Regulation of advertising and sponsorship for commercial radio broadcasting in selected places INFORMATION NOTE Regulation of advertising and sponsorship for commercial radio broadcasting in selected places 1. Background 1.1 At its meeting held on 13 May 2010, the Panel on Information Technology

More information

DEFINITIONS. "this web site" means www.vericredonline.com. "user" means any person accessing any part of this web site DISCLAIMER

DEFINITIONS. this web site means www.vericredonline.com. user means any person accessing any part of this web site DISCLAIMER DEFINITIONS VeriCred Collections means VeriCred Credit Bureau (Pty) Ltd, a private company, with limited liability, duly registered and incorporated as such in accordance with the laws of the Republic

More information

Share with a colleague. 16 July 2012 Hong Kong. Awards. Background. International TMT Team of the Year China Law & Practice Awards, 2011

Share with a colleague. 16 July 2012 Hong Kong. Awards. Background. International TMT Team of the Year China Law & Practice Awards, 2011 Page 1 of 2 Breaking news: PRC telecoms market finally open for private domestic and foreign investments? On 27 June 2012, the Ministry of Industry and Information Technology released a ground-breaking

More information

Information Security Law: Control of Digital Assets.

Information Security Law: Control of Digital Assets. Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security

More information

How To Protect The Internet In The Germany

How To Protect The Internet In The Germany Computer Information Network and Internet Security, Protection and Management Regulations (Original translation provided by the US Embassy in Beijing) (Approved by the State Council on December 11 1997

More information

Georgia. Progress Report

Georgia. Progress Report Anti-Corruption Network for Eastern Europe and Central Asia Istanbul Anti-Corruption Action Plan Second Round of Monitoring Georgia Progress Report Report is presented by Georgia at the 10 th Monitoring

More information

Personal Data & Privacy Policy Statement

Personal Data & Privacy Policy Statement Personal Data & Privacy Policy Statement Your Privacy Hong Kong Broadband Network Limited ("we" or the "Company") respect the privacy rights of visitors to all our company websites (the Websites ) and

More information

COMPANY WINDING UP AND LIQUIDATION IN CHINA by Editorial Staff writer

COMPANY WINDING UP AND LIQUIDATION IN CHINA by Editorial Staff writer COMPANY WINDING UP AND LIQUIDATION IN CHINA by Editorial Staff writer INTRODUCTION In the People s Republic of China ( PRC ), winding up is broadly divided into insolvency winding up and winding up by

More information

Securities Exchange Certificate Transaction Law (2013, Pyidaungsu Hluttaw Law No. 20) The 9 th Waning of Waso 1375. M.E (30 th July 2013)

Securities Exchange Certificate Transaction Law (2013, Pyidaungsu Hluttaw Law No. 20) The 9 th Waning of Waso 1375. M.E (30 th July 2013) Securities Exchange Certificate Transaction Law (2013, Pyidaungsu Hluttaw Law No. 20) The 9 th Waning of Waso 1375. M.E (30 th July 2013) The Pyidaungsu Hluttaw hereby enacts this Law. Chapter 1 Title

More information

INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA

INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA PRIVACY IMPACT ASSESSMENT (PIA) ON ANALYZE-ERR AND CURRENT DATA HANDLING OPERATIONS VERSION 3.0-2 JULY 11, 2005 PREPARED IN CONJUNCTION WITH: ISMP Canada

More information

ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA

ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA ON THE AMENDMENT OF THE ORDER NO. 1V-1013 ON THE APPROVAL OF THE RULES ON THE ENSURANCE OF SECURITY AND INTEGRITY

More information

International Safeguards Infrastructure Development

International Safeguards Infrastructure Development PNNL-SA-74182 International Safeguards Infrastructure Development NGSI Lecture Series, 2011 Sarah Frazar 1 Structure! Overview of the Milestones Process and its three phases! National Development of a

More information

Hardware. Maintenance

Hardware. Maintenance Government Services available through the portal 1. The scope of the work is limited to the portal and its integration with service provider applications. It doesn't include any work on the service provider

More information

Efficient alternative dispute resolution (ADR) for intellectual property disputes

Efficient alternative dispute resolution (ADR) for intellectual property disputes 13.1 Efficient alternative dispute resolution (ADR) for intellectual property disputes More and more rights holders are recognizing the benefits of using private neutral mechanisms that allow parties to

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, 2015. Agenda

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, 2015. Agenda Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing? Cloud CISC Pilot Demo Next Steps Questions?

More information

The Architecture of Control: Internet Surveillance in China James A. Lewis, Center for Strategic and International Studies July 2006

The Architecture of Control: Internet Surveillance in China James A. Lewis, Center for Strategic and International Studies July 2006 The Architecture of Control: Internet Surveillance in China James A. Lewis, Center for Strategic and International Studies July 2006 Security concerns shape China s official internet and information technology

More information

Terms for the Treestle LiquiD SaaS Agreement

Terms for the Treestle LiquiD SaaS Agreement Terms for the Treestle LiquiD SaaS Agreement This LiquiD Software As A Service Agreement (the Agreement ) is a legal agreement between you or your company and Treestle B.V. ( Treestle ), a company with

More information

Apply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu. Pan Yang Deputy Director of Promotion Division, Chengdu, PRC

Apply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu. Pan Yang Deputy Director of Promotion Division, Chengdu, PRC Apply Industrial Cloud to Accelerate IT and Industry Convergence in Chengdu Pan Yang Deputy Director of Promotion Division, Chengdu, PRC Overview of IT and Industry Convergence (1/2) March 2013 According

More information

INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM

INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM The completed form should be sent to: Box EBC Washington D.C.20231 Block 1- Requestor Status The Certificate requester should check the appropriate

More information

Intellectual Property Rights In China

Intellectual Property Rights In China Intellectual Property Rights In China Intellectual Property Office is an operating name of the Patent Office Contents Intellectual Property Rights In China What Are Intellectual Property Rights? International

More information

TELECOMMUNICATIONS ORDINANCE (Chapter 106) CLASS LICENCE. Section 8(1)(aa) of the Telecommunications Ordinance OFFER OF TELECOMMUNICATIONS SERVICES

TELECOMMUNICATIONS ORDINANCE (Chapter 106) CLASS LICENCE. Section 8(1)(aa) of the Telecommunications Ordinance OFFER OF TELECOMMUNICATIONS SERVICES TELECOMMUNICATIONS ORDINANCE (Chapter 106) CLASS LICENCE Section 8(1)(aa) of the Telecommunications Ordinance OFFER OF TELECOMMUNICATIONS SERVICES The Telecommunications Authority, in exercise of the powers

More information

CYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATION. Scott Thiel, Partner June 2015

CYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATION. Scott Thiel, Partner June 2015 CYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATIN Scott Thiel, Partner June 2015 Agenda 1. Current threat environment 2. Regulatory frameworks of countries in the Asia Pacific region 3. Key challenges

More information

Financial Services Update June 11, 2013

Financial Services Update June 11, 2013 Financial Services Update June 11, 2013 HIGHLIGHTS Federal Regulatory Developments: CFPB Amends Examination Manual State Regulatory Developments: Texas Proposes Constitutional Amendment Regarding Reverse

More information

Intellectual Property Rights in the USA

Intellectual Property Rights in the USA Intellectual Property Rights in the USA Intellectual Property Office is an operating name of the Patent Office Contents Intellectual property rights in the USA What are intellectual property rights? International

More information

AN INTRODUCTION TO OUR SERVICES

AN INTRODUCTION TO OUR SERVICES GET TO KNOW BDO U.S.-CHINA TAX DESK July 2014 Page 2 AN INTRODUCTION TO OUR SERVICES SHARED CULTURE/SHARED LANGUAGE Whether you are looking to expand your business into the U.S. or China, members of BDO

More information

China opens up its bank card payment clearing market

China opens up its bank card payment clearing market June 2015 China opens up its bank card payment clearing market The Decision to Implement Market Access Administration for Bank Card Clearing Institutions (the Decision ) of the State Council, which came

More information

SFKS Xi an Electronic Newspaper Issue One Hundred and Twenty-Three June 2013

SFKS Xi an Electronic Newspaper Issue One Hundred and Twenty-Three June 2013 SFKS Xi an Electronic Newspaper Issue One Hundred and Twenty-Three June 2013 Laws and Regulations Updates I. Supreme People s Court s Explanations for Several Matters Concerning the Applicability of the

More information

Software as a Service (SaaS) Contract. I. Subject matter of the Contract. II. Software provision

Software as a Service (SaaS) Contract. I. Subject matter of the Contract. II. Software provision Software as a Service (SaaS) Contract By completing the registration form (ordering bexio), you shall become subject to the following General Terms and Conditions ("General Terms and Conditions"). I. Subject

More information

APEC General Elements of Effective Voluntary Corporate Compliance Programs

APEC General Elements of Effective Voluntary Corporate Compliance Programs 2014/CSOM/041 Agenda Item: 3 APEC General Elements of Effective Voluntary Corporate Compliance Programs Purpose: Consideration Submitted by: United States Concluding Senior Officials Meeting Beijing, China

More information

Foreign Investor s Chance to Invest in RMB EIE/EIFs by Means of RFDI

Foreign Investor s Chance to Invest in RMB EIE/EIFs by Means of RFDI Llinks Corporate Bulletin April 2012 New Means for Foreign Investors to Invest in RMB Equity Investment Funds: By David Yu, Nicholas Lou and Kevin Huang Ever since the promulgation of the Administrative

More information

What Every Business Lawyer Should Know About International Transactions

What Every Business Lawyer Should Know About International Transactions What Every Business Lawyer Should Know About International Transactions Presenter M. Angella Castille, Faegre Baker Daniels LLP February 19, 2015 BUS270 1.0 General Credit Title 9 Update: A Review of the

More information

BMS e-tendering manual

BMS e-tendering manual BMS e-tendering manual Procurement BMS e-tendering manual Procurement This manual aims to provide all suppliers with the basic information to complete the required actions in the Department s Business

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes.

1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes. SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD The goal of this document is to provide adequate security and integrity for background check information while under the control or management of an

More information

Hong Kong Information Technology Federation

Hong Kong Information Technology Federation HKITF Response to the Consultation on Mainland / Hong Kong Closer Economic Partnership Arrangement 1. The Hong Kong Information Technology Federation (HKITF) strongly supports the effort of the Hong Kong

More information

GOVERNMENT CONTRACT. Westlaw Journal

GOVERNMENT CONTRACT. Westlaw Journal Westlaw Journal GOVERNMENT CONTRACT Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 26, ISSUE 13 / OCTOBER 29, 2012 Expert Analysis Switching to Offense in Government Contracting:

More information

LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE. Chapter two. ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE

LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE. Chapter two. ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007 Chapter one.

More information

DISCLOSURE STATEMENT PREPARED BY

DISCLOSURE STATEMENT PREPARED BY DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Ad blocker: A new right for users or a threat for the internet? Relevance & State of the Law in Asia

Ad blocker: A new right for users or a threat for the internet? Relevance & State of the Law in Asia Ad blocker: A new right for users or a threat for the internet? Relevance & State of the Law in Asia John Eastwood Oct. 6, 2015, International Bar Association www.eigerlaw.com People s Republic of China:

More information

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all

More information

Becoming a Sustainable Brand in China. By Jordi Martin Business Development Manager at Koehler Group November 2014

Becoming a Sustainable Brand in China. By Jordi Martin Business Development Manager at Koehler Group November 2014 Becoming a Sustainable Brand in China By Jordi Martin Business Development Manager at Koehler Group November 2014 Koehler Group About Us Koehler Group (formerly known as Klako Group) is an international

More information

International Franchise & Business Opportunities May 28, 2014. VCI Legal Award-winning expertise with practical insights

International Franchise & Business Opportunities May 28, 2014. VCI Legal Award-winning expertise with practical insights International Franchise & Business Opportunities May 28, 2014 VCI Legal Award-winning expertise with practical insights Tuan A. PHUNG Esq. Managing Partner VCI Legal Hon. General Consul Finnish Consulate

More information

INFORMATION NOTE. Regulation of gambling-related advertisements in public areas

INFORMATION NOTE. Regulation of gambling-related advertisements in public areas INFORMATION NOTE Regulation of gambling-related advertisements in public areas 1. Background 1.1 This information note aims to provide the Panel on Home Affairs ("the Panel") with information on the regulation

More information

DVN s Business Model 20

DVN s Business Model 20 20 DVN s Business Model 33 Cities Mandated to Migrate to Digital 33 DVN has relationships with significant % of the 33 cities to be digitalised. 33 Relationship with DVN Annual Report 2003 21 DVN s Business

More information

Third party Web hosting services security Policy

Third party Web hosting services security Policy Office of the Prime Minister Policy document CIMU P 0013:2003 Version: 2.0 Effective date: 09.04.2003 Third party Web hosting services security Policy 1. Policy statement i) General The Government of Malta

More information

insurance bulletin unlicensed insurance in Canada

insurance bulletin unlicensed insurance in Canada September 2013 insurance bulletin unlicensed insurance in Canada This article addresses certain issues relating to foreign insurers conducting unlicensed insurance in Canada, a few years after the federal

More information

China's new national security law creates more insecurity for foreign businesses

China's new national security law creates more insecurity for foreign businesses China's new national security law creates more insecurity for foreign businesses Contents Overview 1 JULY Broad definition of national security 1 Expanded national security review regime 1 NSR in relation

More information

AGREEMENT AS AMENDED ON 06 DECEMBER 2002

AGREEMENT AS AMENDED ON 06 DECEMBER 2002 INFORMATION & COMMUNICATION TECHNOLOGIES SECTOR SUMMIT AGREEMENT AS AMENDED ON 06 DECEMBER 2002 1. INTRODUCTION 1.1 At the Presidential Jobs Summit in 1998 Nedlac constituencies Government, organised Labour,

More information

Microsoft Cloud Computing Research Centre

Microsoft Cloud Computing Research Centre Microsoft Cloud Computing Research Centre 1 st Annual Symposium, Cambridge 2014 : Legal frameworks Ian Walden i.n.walden@qmul.ac.uk 1 Introductory remarks From organised crime to law enforcement The Snowden

More information

SSE Newsletter. October 2015. Vol. 29. Highlights:

SSE Newsletter. October 2015. Vol. 29. Highlights: Vol. 29 SSE Newsletter October 2015 Highlights: SSE Composite rose by 10.80% in October 2015, while trading volume showed significant increase compared with that of the previous month SSE, Deutsche Boerse

More information

Promoting Cross Border Data Flows Priorities for the Business Community

Promoting Cross Border Data Flows Priorities for the Business Community Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President

More information