Mondaq Asia Pacific: Technology
Mayer Brown
Although failures of advanced robots might seem the stuff of science fiction, there are various scenarios to consider for those involved in construction, Jonathan Olson-Welsh says...
Global Advertising Lawyers Alliance (GALA)
The Regulation addresses the collection, storage, use, transfer and disclosure of children's PI through the Internet within the territory of China.
McLane Middleton, Professional Association
In 2014, the central government of the People's Republic of China announced a "social credit" system, which will monitor the behavior of the nation's population
Dezan Shira & Associates
China Briefing lists the most common threats facing businesses today and simple steps to secure your IT system.
DeHeng Law Offices
金融科技英译为Fintech,是Financial Technology的缩写,可以简单理解成为Finance(金融)+Technology(科技),金融科技主要是指由大数据、区块链、云计算、人工智能等新
Mayer Brown
On 2 January 2018, the Standardization Administration of China released the final draft of "Information Technology – Personal Information Security Specification".
DLA Piper
Licensed telcos and internet businesses in China face a new wave of investigations by the Ministry of Industry and Information Technology (MIIT)
DLA Piper
An updated and substantially more onerous draft of China's long awaited position on cross border data transfers has just been published. The Measures
AFD China
They have founded groups to spot clues to infringements and cooperate with rights owners and the police, according to the report.
Haseltine Lake Kempner LLP
As blockchain is increasingly being recognised as a disruptive technology that could revolutionise a wide range of industries including finance, logistics, and data services, it continues to be one of the hottest...
The draft Measures impose more extensive security assessment requirements than under the 2017 Draft
Foley Hoag LLP
In early June, the Cyberspace Administration of China released for public comment new draft regulations applicable to the collection of personal information relating to children under 14
Hogan Lovells
The cybersecurity classified protection regime attracted significant attention when it was included in the PRC Cyber Security Law promulgated in 2017
Reed Smith (Worldwide)
After soliciting public comments since last November, the Chinese Ministry of Public Security (MPS) published the finalized Guideline for Internet Personal Information Security Protection (Guideline) on April 10, 2019.
Mayer Brown
Despite being brought into force over two years ago, uncertainty remains regarding the application of China's Cybersecurity Law (CSL).
Clyde & Co
The Insurance Authority has issued its Guideline on Cybersecurity (GL20) for authorised insurers, which will take effect on 1 January 2020.
Mayer Brown
This market trends article identifies comprehensive disclosures related to cybersecurity risks, including discussions about the potential reputational, financial, or operational harm resulting from cybersecurity breaches;
STA Law Firm
The Hong Kong Monetary Authority (the HKMA), on 24 May 2019, issued an alert for eight (8) cyber security incidents which involved a total amount of HK Dollars 70,000.
The Financing and Money Services Act, 2009 (FSMA) provides a framework for the licensing, registration and supervision of persons carrying on financing
S.S. Rana & Co. Advocates
Drones and other remote sensing technologies can help in monitoring crop patterns and thereby enabling efficient delivery of both credit and insurance products.
Latest Video
Most Popular Recent Articles
The issue of free speech in Australia is likely to see a resurgence again in the highly publicised case of Israel Folau.
Singh & Associates
Intellectual properties are creations of the mind including inventions, literary and artistic works and symbols, names and images used in commerce
Singh & Associates
John McCarthy, the father of Artificial Intelligence, describes it as "the science and engineering of making intelligent machines, especially intelligent computer programs".
AZB & Partners
Cryptocurrencies are digital representations of value created by means of cryptography and are intended to secure financial transactions or transfer of assets.
Corrs Chambers Westgarth
The ASX is now being used by tech companies for a future dual listing on other exchanges or as a long-term listing venue.
Sydney Criminal Lawyers
A recent United States case triggered discussion about how a crime allegedly committed in space might be dealt with.
Corrs Chambers Westgarth
The ACCC could pursue enforcement action under competition or consumer protection laws to address data privacy issues.
Vaish Associates Advocates
This need to change has been very well recognized by the courts as well as the legislature in India.
Corrs Chambers Westgarth
The board has an integral role to play in ensuring that the company manages and protects its intangible assets like IP.
Khurana and Khurana
A decade ago, the whole country was sent flying into a state of bewilderment by the news headlines flashing on the TV screens that morning.
Article Search Using Filters
Related Topics
Mondaq Advice Centre (MACs)
Popular Authors
Popular Contributors
Up-coming Events Search
Font Size:
Mondaq on Twitter