China’s new Personal Information Protection Law (PIPL) came into effect on November 1 and is now one of the strictest in the world governing what businesses can do with Chinese people’s personal information. So what do China’s new data privacy laws mean for your company in practice? And how can you make sure you’re compliant with the new regulations? In this article, first published in China Briefing, Thomas Zhang, Dezan Shira… …
cyber security
Before a UK company sets up in China, it’s key to weigh up cybersecurity risks: From the effect of the Great Firewall of China to data collection, early research and expert advice are both vital China has established itself as a global superpower, growing its GDP to become the second-largest economy in the world behind the US. Its influence on the global stage is expected to expand even further, with… …
On June 1 2017, China’s new cyber security law came into effect. The new legislation was adopted by the National People’s Congress (NPC) in November 2016 after a year of legislative proceedings. The main objective of this new law is to strengthen central government control over information flows and data security, as well as preventing cyber attacks, computer viruses and other network security violations (such as unauthorised data leakage or… …
Hackers are attempting to sabotage elections in Europe and have brought American democracy into question. A £1.9 billion investment and a new cyber-security centre proves just how seriously the UK is taking cyber-crime, writes Tom Pattinson On Valentine’s Day, Queen Elizabeth II and Prince Phillip attended a formal opening in a cavernous, steel and glass building in Victoria, central London. One of the only public appearances the Queen has made… …
Baiting: The use of bait such as a flash disc or CD that appeals to the curiosity or greed of the user, for instance, a flash disc labelled with a competitor’s logo. Once plugged in, the disc will infect the computer or the network with malware or spyware. Malware: Malicious software design to damage a computer or network or gather information. Phishing: An attempt, usually by email, to get sensitive… …
Invest in security and training “Cyber threats are framed as something existential, technical and expensive, and the usual response to fear, fees, and something incomprehensible is to do nothing,” says Malcolm Taylor, head of cyber security at G3. “Security can be managed with a limited level of investment. Business owners are good at managing risk. Seeing this as just another business risk makes it more comprehensible.”
- Technology
Former Liberal Democrat leader Paddy Ashdown talks about cyber security, the rise of China and the fall of Western hegemony
China’s economic growth has made it a destination for many British businesses. What advice would you give to businesses looking to enter the Chinese market? China is a genuinely open market and one of huge potential for anyone who is prepared to be commercial and a bit adventurous. In economic terms they are reliable. The rule of law of course is less effective than you’d find in a western country… …