With so much attention focused on the GDPR, some may not have noticed that China has been quietly creating a materially different approach to cybersecurity which serves the central purpose of defending the Chinese notion of cyber sovereignty. Much uncertainty remains about the newly-effective laws and regulations, but it is clear that foreign technology and others companies operating in China should rapidly focus on its significant restrictions on outbound data transfer, the expansive definitions of “important and data” and “critical information infrastructure” as well as forthcoming network-equipment security reviews. Join us as we delve into the Chinese law and gain an understanding of this significantly different approach to the challenges of cybersecurity.
Edward McNicholas, Partner, Sidley Austin LLP
Hugo Teufel III, Chief Privacy Counsel, Raytheon Company