In our previous posts, we discussed what data export activities are subject to scrutiny assessment (CAC Assessment) conducted by the Cyberspace Administration of China (CAC) (see Part 1) and examined ...
The new guidelines provide insight into how businesses can submit applications to the CAC in order to obtain approval via the CAC security assessment cross-border data transfer requirement. As of ...
Please refer to the webinar that we held on this self-assessment. It is mandatory viewing for anyone who is thinking of utilizing this process. Information on this webinar can be found linked on our ...
Visit NAP.edu/10766 to get more information about this book, to buy it in print, or to download it as a free PDF. This report is one of a series designed to provide guidance on the interpretation and ...