With so much attention focused on the GDPR, some may not have noticed that China has been quietly creating a materially different approach to cybersecurity which serves the central purpose of defending the Chinese notion of cyber sovereignty.  Much uncertainty remains about the newly-effective laws and regulations, but it is clear that foreign technology and others companies operating in China should rapidly focus on its significant restrictions on outbound data transfer, the expansive definitions of “important and data” and “critical information infrastructure” as well as forthcoming network-equipment security reviews.  Join us as we delve into the Chinese law and gain an understanding of this significantly different approach to the challenges of cybersecurity.

Edward McNicholas, Partner, Sidley Austin LLP
Hugo Teufel III, Chief Privacy Counsel, Raytheon Company

Room 301

Conference Materials

Readings:

 

Edward McNicholas
Edward McNicholas

Partner
Sidley Austin

Hugo Teufel
Hugo Teufel

Sr. Counsel, Global Privacy
Raytheon Company