China has been quietly creating a materially different approach to cybersecurity and privacy which serves the central purpose of defending the Chinese notion of cyber sovereignty. Much uncertainty remains about the newly-effective laws and regulations, but it is clear that foreign technology and others companies operating in China should rapidly focus on its significant restrictions on outbound data transfer, the expansive definitions of “important data” and “critical information infrastructure” as well as network-equipment security reviews. Join us as we delve into the Chinese law and gain an understanding of this significantly different and important approach to the challenges of cybersecurity and privacy.

Edward McNicholas, Partner, Sidley Austin

10:10 am – 11:10 am
Room 302

Readings:

Edward McNicholas

Partner
Sidley Austin