- TOP
- Publications
- Looking Back on the First 4 Years of the “Network Security Law” in China (Part II) -China's Regulations on Cross-border Transfer of Data, Etc.
Looking Back on the First 4 Years of the “Network Security Law” in China (Part II) -China's Regulations on Cross-border Transfer of Data, Etc.
Looking Back on the First 4 Years of the "Network Security Law" in China (Part II) -China's Regulations on Cross-border Transfer of Data, Etc.
by Masafumi Takeda and Pengcheng Zhang (Hanling & Partners)
Authors:
Masafumi Takeda
Latest China Law Newsletter Volume. 2
Publisher:Oh-Ebashi LPC & Partners
Practice: Information Security and Cybersecurity Chinese Practice
Date of publication: September 30, 2021
Other publications by Masafumi Takeda
Other publications about Chinese Practice
- 2024.04.24
- Restructuring and Withdrawal of Chinese Subsidiaries (5)- Withdrawal (i) Share Assingment
- 2023.09.29
- [Report from China] Playing Golf in China
- 2023.04.26
- [Report from China] Chat GPT and China
- 2023.02.27
- China’s Life Science and Healthcare-No.3 Amendment of the Regulations on Cosmetics in China
- 2023.01.20
- [Report from China] Traveling to China Immediately after the Lifting of the “Zero-Covid” Policy
- 2022.11.29
- [Report from China] My Experience When China’s Health Code System Indicated a Yellow Code
- 2022.08.22
- Summary of the Amendment to the Chinese Anti-Monopoly Law (1) – Combination of business operators
- 2022.03.14
- A Legal Review of China’s Life Sciences and 2 Healthcare- No.1 -General Introduction and MAH System
- 2019.03.22
- Building a Compliance System for China-based Affiliates – Mainly on the Aspects of Transactions
- 2017.12.27
- 100 Selected Cases in China, Series 250
- 2017.02.01
- Chinese Business Law System
- 2017.02.01
- Chinese Business Law System: Organized by Internal Division and by Situation [Second Edition]
- 2015.02.01
- Supreme People's Court decision on Abuse of Market Dominant Position under China’s Antitrust Law
- 2009.04.01
- Withdrawal by Transfer of Equity Interest
Other publications about Information Security and Cybersecurity
- 2023.04.03
- Handling of Personal Data in the “Metaverse”
- 2022.07.06
- Information Compromised by a Cyber Attack! What is the Legal Responsibility of the Company?
- 2022.06.24
- Legal Protection of Big Data in Japan
- 2019.01.01
- Learn Digital Forensics from the Basics – From Introduction to Practical Application Thereof
- 2013.01.01
- A Commentary on eDiscovery
- 2012.01.01
- Authenticity of Evidence and Destruction/Falsification Thereof (Forefront of Computer Forensics (3))
- 2011.01.01
- Legal Practice in the Cloud Era