最优秀的中国互联网法律律师事务所之一

Opinion and Commentary

Non-monetary currency in the digital platform era: the “User-provided personal content” between privacy and Intellectual property

In web 2.0 and 3.0 users are more and more prosumers of content. In the world of digital market and behavioural algorithms, we cannot ignore ...

View Details>>
Annual Report: 2017 in Retrospect and Prospects for 2018

In the history of China’s cyberspace governance and personal information protection, 2017 is a year worthy to be memorized. Within 2017, th...

View Details>>
Annual Report of Privacy Policy Transparency (2017)

On September 24th, 2017, Cyberspace Administration of China (CAC) and other 3 national ministries and commissions jointly released the assess...

View Details>>
China’s Personal Information Standard: The Long March to a Privacy Law

On 5 September 2017, Chinese authorities circulated the latest version of a draft standard entitled ‘Information Security Techniques - Pers...

View Details>>
Understanding the Politics and Economics Behind the APEC Cross-Border Privacy Protection Rules System

China's governance system of cross-border data flow is gradually taking shape. During this process, we often receive various suggestions from...

View Details>>
Broaden perspective on “data governance”

After months of efforts, “Research Alliance for Data Governance and Cyber Security”was finally online at the beginning of this year. As i...

View Details>>
Data Transfer Rules in Japan

“The free flow of ideas by word and image” under the UNESCO Constitution (Article 1 (2) (a)) is the cornerstone of the Internet age. Fr...

View Details>>
Designing Risk-based Critical Information Infrastructure Protection In China

Critical information infrastructure (CII) bears significant implications to national security and people's daily works and life, is the corne...

View Details>>
New idea for Law on Personal Information Protection in China

With the digitalization of personal information and its processing, both facilities and risks are coming into being when people take advantag...

View Details>>
Forward to the Chinese edition of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

It is my professional honor and personal pleasure to offer this forward to the Chinese edition of the Tallinn Manual 2.0 on the International...

View Details>>
A Three-Perspective Theory of Cyber Sovereignty

The cybercrime and cyber terrorism raging today are the most visible symptoms of a more pervasive problem concerning cyber security. How to e...

View Details>>
The Cross Border Data Flows (Data Exit) Security Assessment: An important part of protecting China’s basic strategic resources

"Data has become a national basic strategic resource." This is the common understanding of the two basic official documents which are guiding...

View Details>>
The new General Data Protection Regulation: Still a sound system for the protection of individuals?

writer:Paul de Hert Free University of Brussels (VUB-LSTS), Belgium b Tilburg University (Tilt), The Netherlands writer:Vagelis Papakonst...

View Details>>