China has been quietly creating a materially different approach to cybersecurity and privacy which serves the central purpose of defending the Chinese notion of cyber sovereignty. Much uncertainty remains about the newly-effective laws and regulations, but it is clear that foreign technology and others companies operating in China should rapidly focus on its significant restrictions on outbound data transfer, the expansive definitions of “important data” and “critical information infrastructure” as well as network-equipment security reviews. Join us as we delve into the Chinese law and gain an understanding of this significantly different and important approach to the challenges of cybersecurity and privacy.

Edward McNicholas, Partner, Sidley Austin
Mingli Shi, Research Associate, Open MIC

Room 302

Shi Mingli
Mingli Shi

Research Associate
Open MIC

Edward McNicholas
Edward McNicholas

Partner
Ropes & Gray